Wednesday, December 30, 2009

Bypass with Proxy Access websites

MySpace blocked by your school? More and more schools and libraries are restricting, blocking and cracking down on access to online social networking sites such as MySpace, Facebook, Hi5, Xanga, and chat rooms. The purpose of the restrict or block access to file-sharing, instant messaging, social networking
or email sites such as Yahoo! Mail, Hotmail, Gmail or websites contain undesirable material, websites are vary, but none other than hoping youths will spend time in more productive way and helping to protect children and kids from online sexual predators. However, users can still access MySpace and other blocked sites via web proxy circumventor or bypass firewall, as most blocking are done by content filtering the site’s domain URL (e.g. www.myspace.com) or IP address on outgoing traffic packet.There are a few ways to bypass the MySpace or block sites domain block filter and get the access to the site, depending on how system administrator configured the network routers or system to block and restrict access to MySpace.
Try alternative browser such as Mozilla Firefox and Opera
The easiest way to try if it’s possible bypass blocking of MySpace is to use an alternative web browser such as Mozilla Firefox and Opera. This hack will work if system administrators apply the contents URL filtering and blocking via Internet Explorer settings of Group Policy, which works only on Internet Explorer browsers. Thus, Firefox and Opera are not affected by the restrictions that applied via Group Policy and the access to MySpace or other blocked sites are granted.
Other bypassing MySpace blocking methods involve using a proxy or proxy server or anonymiser or Internet privacy tool or private web-surfing server, which has all the while popular in bypassing censorship and other content filtering and blocking by firewall or routers, while protecting the privacy of online browsing by eliminating the trace. When you’re using a proxy server, the computer establishes the connection to the proxy instead of destination website, and thus filtering or blocking firewall or router will only see the connection from and to proxy. The proxy server, anonymous or transparent, then connect to the destination website such as Myspace or Hotmail, Friendster, Hi5, etc and retrieve the requested page, which will then redirect and send the data back to you. The proxy can be used on various network services such as FTP, HTTPS, SOCKS and etc, but for anti blocking of MySpace, HTTP proxy service is good to fool the packet filtering device or blocking system.
Online Web-based Proxies (Anonymous Proxy Server)
Web-based proxy server allows user to just type in an URL (such as www.myspace.com) on a web page and all connections and traffic to and from the destination URL will be redirected via the proxy, making as it the traffic is originating from the proxy itself, thus circumventing the domain based URL filtering blocking system. The list of such web based proxy servers include:
http://www.atomicproxy.com/nph-proxy.plhttp://www.proxyvan.comhttp://unblockmyspace.com/http://www.unblockmyspace.org/http://unblockmyspace.us/http://www.fsurf.com/http://www.blockfilter.com/https://proxify.com/https://proxify.us/https://proxify.biz/http://www.guardster.com/http://www.ibypass.org/http://www.ipzap.com/http://kproxy.com/index.jsphttps://kproxy.com/index.jsphttp://www.attackcensorship.com/attack-censorship.htmlhttp://mrnewguy.com/http://www.unblockwebsites.com/http://spysurfing.com/https://www.the-cloak.com/anonymous-surfing-home.htmlhttp://www.stupidcensorship.com/http://www.evilsprouts.co.uk/defilter/http://www.bypassbrowser.com/http://www.onlineprotected.info/http://www.proxymouse.com/http://www.hidemyass.com/http://www.mathcookbook.com/http://www.fsurf.com/http://www.3proxy.com/http://www.browseatwork.com/http://www.surfonym.com/http://www.iamnewguy.com/http://www.ninjaproxy.com/http://www.anonymousindex.com/http://www.proxy7.com/http://www.vtunnel.com/http://www.browsehide.com/nph-proxy.cgihttp://www.proxydom.com/http://www.gostealthy.com/http://www.thisproxy.com/http://www.proxymy.com/http://www.webunlocker.com/http://www.ctunnel.com/http://www.schoolmyspace.com/http://www.kickadmin.com/http://www.boxofprox.com/http://www.proxymy.com/http://www.proxyspin.com/http://poxy.us.to/cgi/nph-proxy.cgi
Most of the web based proxy is free, although some has fee-based features that need to pay to gain access to those features. Some proxy has been blocked too, but keep trying for the one that works. By using the web proxy or anonymizer, MySpace users can browse the MySpace website, profiles, login to MySpace, posting comments and blogs and other activities. One thing of note is that there are PHP and CGI-based proxy, and to be able to login properly to MySpace or Gmail or other services, you may need to use CGI proxy.
Note: Sometimes, use the IP address of the proxy (i.e. http://188.77.77.88, can be retrieved by ping the URL from command prompt or ping from third-party websites such as DNSStuff) will work instead of using the domain name.
The list of web proxy and anonymiser is growing all the times, as more and more is been setup to take advantage of ads revenue and growing need of such proxy services to bypass the network restricted access to various sites. Feel free to add more in the comments.
Web Accelerator
A web accelerator is a proxy server that reduces web site access times. Web accelerator is actually very similar to web proxy, except that they have additional functionality of speed up Internet connection and saving user traffic.
http://www.webwarper.net/wwhttp://webaccelerator.google.com/index.html (Download and install required)
Language Translation Tools
It’s also possible to parse MySpace and other block websites thru language translation tool and let these tool served you the translated page of MySpace, hence duping network packet filtering and blocking system. However, the effect won’t be good, although most intelligent translator will know that the page is already in English, and won’t done any translation on it.
http://www.google.com/language_tools?hl=enhttp://babelfish.altavista.com/http://www.worldlingo.com/en/websites/url_translator.html
Mobile or PDA WAP-compatible Mobile Sites Translator/Converter
These sites or services are meant to translate or convert or reformat the normal HTML web pages to WAP-compatible web pages for viewing on mobile phone or PDA web browser. But you can still try to use it to access blocked contents, provided you don’t mind the distorted or garbled pages.
http://www.google.com/gwt/n
Open HTTP Proxy Server
This method to bypass MySpace blocking and access MySpace is not as easy as above method, as it involves changing of network settings in the web browser in order to activate the usage of HTTP proxy server when browse the Internet. First of all, you need to get a working proxy server IP address, which is easily searchable from Google search engine. There is a lot of open anonymous and transparent proxy servers that are available for free usage. Then you need to set up proxy server in your web browser.
For Internet Explorer, go to Tools -> Internet Options, then click on Connections tab. Select the LAN settings button. Under the Proxy server section, click the “Use a proxy server for your LAN”, and then key in the proxy server IP address and port in the respective fields. Click OK when done.
For Mozilla Firefox, go to Tools -> Options, and click on Advanced. Under the Network section, click on Settings… button. Select the Manual proxy configuration, then key in the proxy server IP address and port information at the HTTP Proxy fields. If you want, you can optionally “select the Use this proxy server for all protocols”. Click OK when done.
Get Pass, Bypass, Disable or Remove RM SafetyNet Plus
RM SafetyNet Plus is the Internet filtering service and educational blocking and filtering service that is popular in schools, libraries, LEAs, Councils and Grids as a means of controlling Internet access. When you try to access blocked contents or websites, or when try to download files with unallowed extension, users will be denied access with warning pop-up messages.
To bypass and get passed the RM SafetyNet Internet content blocker, try to RM-Passer.
Create Your Own Proxy Server at Home PC or Web Hosting Server
This is the difficult way to access MySpace, Bebo, Facebook or other block or banned sites, and it’s the most likely way to works to bypass the filtering and blocking of firewall of network if the administrator has getting smart to block access to proxy server sites too, as this private proxy server is set up by yourself and known by you yourself only, unless you blow it away.
Once you get a web server, install a proxy on the website. There are a lot of proxy server program available, such as PHPproxy and CGIproxy that can be installed to set up a proxy server. You will need to install Apache and PHP or CGI on your web server too to run as proxy. You may also want to setup a domain name for your proxy for easy remembrance, or you can always use the IP address to access it. If you’re using home based PC as proxy server, remember that IP address may not be static, so you can use dynamic DNS service to set up a domain name which will point to your correct dynamic IP address when changed, with service such DynDNS and No-IP.
Note: Try not to use and remove all instances of the word “proxy” as it may be “blacklist word” by firewalls.

Tuesday, December 29, 2009

About RAM (Random Access Memory)

RAM Memory TechnologyMemory Types In order to enable computers to work faster, there are several types of memory available today. Within a single computer there is no longer just one type of memory. Because the types of memory relate to speed, it is important to understand the differences when comparing the components of a computer.SIMM (Single In-line Memory Modules)SIMMs are used to store a single row of DRAM, EDO or BEDO chips where the module is soldered onto a PCB. One SIMM can contain several chips. When you add more memory to a computer, most likely you are adding a SIMM.The first SIMMs transferred 8 bits of data at a time and contained 30 pins. When CPU's began to read 32-bit chunks, a wider SIMM was developed and contained 72 pins.72 pin SIMMS are 3/4" longer than 30 pin SIMMs and have a notch in the lower middle of the PCB. 72 pin SIMMs install at a slight angle.DIMM (Dual In-line Memory Modules)DIMMs allow the ability to have two rows of DRAM, EDO or BEDO chips. They are able to contain twice as much memory on the same size circuit board. DIMMs contain 168 pins and transfer data in 64 bit chunks.DIMMs install straight up and down and have two notches on the bottom of the PCB.SODIMM (Small Outline DIMM)SO DIMMs are commonly used in notebooks and are smaller than normal DIMMs. There are two types of SO DIMMs. Either 72 pins and a transfer rate of 32 bits or 144 pins with a transfer rate of 64 bits.
RDRAM - RIMMRambus, Inc, in conjunction with Intel has created new technology, Direct RDRAM, to increase the access speed for memory. RIMMs appeared on motherboards sometime during 1999. The in-line memory modules are called RIMMs. They have 184 pins and provide 1.6 GB per second of peak bandwidth in 16 bit chunks. As chip speed gets faster, so does the access to memory and the amount of heat produced. An aluminum sheath, called a heat spreader, covers the module to protect the chips from overheating.SO RIMMSimilar in appearance to a SODIMM and uses Rambus technology.TechnologyDRAM (Dynamic Random Access Memory)One of the most common types of computer memory (RAM). It can only hold data for a short period of time and must be refreshed periodically. DRAMs are measured by storage capability and access time.Storage is rated in megabytes (8 MB, 16 MB, etc). Access time is rated in nanoseconds (60ns, 70ns, 80ns, etc) and represents the amount of time to save or return information. With a 60ns DRAM, it would require 60 billionths of a second to save or return information. The lower the nanospeed, the faster the memory operates. DRAM chips require two CPU wait states for each execution. Can only execute either a read or write operation at one time. FPM (Fast Page Mode)At one time, this was the most common and was often just referred to as DRAM. It offered faster access to data located within the same row. EDO (Extended Data Out)Newer than DRAM (1995) and requires only one CPU wait state. You can gain a 10 to 15% improvement in performance with EDO memory.BEDO (Burst Extended Data Out)A step up from the EDO chips. It requires zero wait states and provides at least another 13 percent increase in performance.SDRAM (Static RAM)Introduced in late 1996, retains memory and does not require refreshing. It synchronizes itself with the timing of the CPU. It also takes advantage of interleaving and burst mode functions. SDRAM is faster and more expensive than DRAM. It comes in speeds of 66, 100, 133, 200, and 266MHz.DDR SDRAM (Double Data Rate Synchronous DRAM)Allows transactions on both the rising and falling edges of the clock cycle. It has a bus clock speed of 100MHz and will yield an effective data transfer rate of 200MHz.
Check this site for more information about DDR Memory RAM
Direct RambusExtraordinarily fast. By using doubled clocked provides a transfer rate up to 1.6GBs yielding a 800MHz speed over a narrow 16 bit bus.Cache RAMThis is where SRAM is used for storing information required by the CPU. It is in kilobyte sizes of 128KB, 256KB, etc.Other Memory TypesVRAM (Video RAM)VRAM is a video version of FPM and is most often used in video accelerator cards. Because it has two ports, It provides the extra benefit over DRAM of being able to execute simultaneous read/write operations at the same time. One channel is used to refresh the screen and the other manages image changes. VRAM tends to be more expensive.Flash MemoryThis is a solid-state, nonvolatile, rewritable memory that functions like RAM and a hard disk combined. If power is lost, all data remains in memory. Because of its high speed, durability, and low voltage requirements, it is ideal for digital cameras, cell phones, printers, handheld computers, pagers and audio recorders.Shadow RAMWhen your computer starts up (boots), minimal instructions for performing the startup procedures and video controls are stored in ROM (Read Only Memory) in what is commonly called BIOS. ROM executes slowly. Shadow RAM allows for the capability of moving selected parts of the BIOS code from ROM to the faster RAM memory.

Virtual Memory and its influences on performance
While virtual memory makes it possible for computers to more easily handle larger and more complex applications, as with any powerful tool, it comes at a price. The price in this case is one of performance — a virtual memory operating system has a lot more to do than an operating system that is not capable of virtual memory. This means that performance will never be as good with virtual memory than with the same application that is 100% memory-resident.
However, this is no reason to throw up one's hands and give up. The benefits of virtual memory are too great to do that. And, with a bit of effort, good performance is possible. The thing that must be done is to look at the system resources that are impacted by heavy use of the virtual memory subsystem.
Worst Case Performance Scenario
For a moment, take what you have read earlier, and consider what system resources are used by extremely heavy page fault and swapping activity:
· RAM -- It stands to reason that available RAM will be low (otherwise there would be no need to page fault or swap).
Try this site for recommendations on DDR and SDRAM Memory Upgrades
· Disk -- While disk space would not be impacted, I/O bandwidth would be.
· CPU -- The CPU will be expending cycles doing the necessary processing to support memory management and setting up the necessary I/O operations for paging and swapping.
The interrelated nature of these loads makes it easy to see how resource shortages can lead to severe performance problems. All it takes is:
· A system with too little RAM
· Heavy page fault activity
· A system running near its limit in terms of CPU or disk I/O
At this point, the system will be thrashing, with performance rapidly decreasing.
Best Case Performance Scenario
At best, system performance will present a minimal additional load to a well-configured system:
· RAM -- Sufficient RAM for all working sets with enough left over to handle any page faults
· Disk -- Because of the limited page fault activity, disk I/O bandwidth would be minimally impacted
· CPU -- The majority of CPU cycles will be dedicated to actually running applications, instead of memory management
From this, the overall point to keep in mind is that the performance impact of virtual memory is minimal when it is used as little as possible. This means that the primary determinant of good virtual memory subsystem performance is having enough RAM.

Determining your Computer RAM Type
Currently the cost for adding additional memory is very low. Installation of memory is also fairly simple. It does not require any reconfiguration. The difficult part is determining what type of memory you need.
Type Socket Amount
More information on memory determination...Looking Inside Check the Manual Identification
Type
FPM – Fast Page - If you have a 486, you probably have FPM
EDO – Extended Data Out - If you have an early Pentium system, you probably have EDO
SDRAM - If you have a Pentium or Celeron system purchased in 1999, you probably have SDRAM
Sockets
Memory modules plug into a socket on the motherboard. There are three socket types.
SIMM – 30 pin – 3 inches in length
SIMM – 72 pin – 4 inches in length
DIMM – 168 pin – 5 inches in length
Most older 486 machines will use 30 pin modules. Later model 486 and Pentium machines will probably use 72 pin modules. More recent Pentium machines may have 168 pin.
Amount
Memory sizes increase by the power of 2. This results in sizes of 1, 2, 4, 8, 16, 32, 64, 128, 256 MBs.
On some older 486 machines, one memory module can be added at a time.
On most Pentium machines, modules must be added in pairs.
Each pair must be of the same size.
SDRAM modules can be added one at a time.
For example, if you have 8 MBs of memory on a Pentium, you have two 4 MB modules. To increase to 16 MBs, you need to add two more 4 MB modules. To increase to 24 MBs, you need to add two 8 MB modules.
Looking Inside
Now that you know the parameters, how do you determine which type you need? Looking inside the computer will not provide all of the information. It will confirm how many modules you currently have. You can also confirm the type and quantity of open sockets. If you only have four sockets and each socket contains a module, you will have to replace some of the existing memory modules.
Check the Manual
The other place to find the correct information is your owner’s manual. The manufacturer should have listed the type of memory required. You will need to determine the parity and speed.
Identification
Now that you have the necessary information, you find an ad for memory and still you may not be able to determine which modules you need. Why? Because the computer industry thrives on confusion and abbreviations. Here’s how to interpret the coding scheme.
30 pin modules
For 30 pin modules you will see something like
1 x 9-60
4 x 9-70
4 x 8-70
The first number is the size in MB’s. In our example this would be 1MB or 4MB.
The second number represents parity. The value 9 represents parity and 8 represents non-parity. (Of course that makes a lot of sense!) The 9 or 8 also identifies that it is a 30 pin module.
The third value represents the speed.
72 pin modules
For 72 pin modules you will see something like
1 x 32-60
2 x 32-70
4 x 36-60
8 x 36-70
Just like the 30 pin modules, the first value represents the size, EXCEPT it only represents ¼ of the total memory size. Don’t ask why, just accept it. So the value of 4 represents a 16 MB (4 x 4) module. A value of 8 represents a 32 MB (4 x 8) module.
The second value, again just like the 30 pin, represents parity and the number of pins. 36 is used for parity and 32 for non-parity. You aren’t asking why again, are you?
The third value represents the speed, the same as the 30 pin.

Why More RAM is Better ?
Has your old computer lost its get up and go? Or perhaps you've just invested in a brand spankin' new PC and you're thinking life is good… until your son tries his role-playing game over the Net, or you want to open four applications at once. You find that the animation just isn't quick enough, and neither is your multitasking. "But I have a new computer," you say. "It should be lightning fast!" Just because you have the latest, doesn't mean it's the greatest — in terms of performance. Good news! Help is easy and relatively inexpensive: upgrade the memory.
Upgrading your computer's memory (RAM) is one of the quickest, most efficient and most cost-effective ways to boost performance. Many new computers come with only a bare minimum of memory installed. Adding more RAM can add more zip to your system. And installation is not that complicated. Sometimes getting the case off takes more time than installing the actual RAM itself.
How much memory is enough? An average computer user is probably okay with the basic 128MB to 256MB of RAM. But as fast as technology changes, so will your need for additional memory. Just remember: more is better. 256MB is what most average users need. But if you're looking to make your processor really work for you — like for high-end applications, intense gaming and multimedia work — upgrade to even more RAM. You'll notice a significant performance gain all around.
Take a glance at what a memory upgrade can do for you Smoother multitaskingLike to have your charts and e-mail, too? Do you open several programs at the same time and switch between them frequently — and does your current PC moan and groan when you do? Then a memory upgrade is essential for smooth, effortless multitasking. It gives your computer an extra boost so it doesn't have to use the hard drive to manage data.
Faster Web surfingAre you a surf-aholic? If you like to spend countless hours on the Internet, but don't like when your system slows to a crawl, you'll want to add RAM. No matter how fast your Internet connection is, a memory upgrade can help your browser display pages faster. When your computer can store more data in RAM, it has to swap out less memory to the hard drive. Web sites use rotating banners, Flash and Shockwave animation, streaming audio and other plug-ins as dazzling effects to entice visitors. A computer memory upgrade can give your computer the zip it needs for today's browsing.
Enhanced printingDo you print large files like presentations with photos, clip art, graphics and charts? Are you tired of your pokey printer? A printing bottleneck can be fixed easily with a simple memory upgrade. And the boost in performance can have a big impact on productivity, especially in a networked environment where several PCs may be sharing one printer.A printer memory upgrade effects both quality and speed. The quality will improve because additional memory allows you to print better at higher resolutions. And you'll be able to print faster because a printer buffers (or holds data temporarily) part of a print job before actually printing. The more memory you have the more that can be buffered, and the faster you will print. (Note: Not all printers are upgradable. Check your owner's manual for details.)
More efficient video editingIf the video-editing bug has bitten, you'll want to add RAM. Editing is fun — or can be if it's not too slow. Because video files are very large, you'll not only need a big hard drive to store the file, but a quick processor and lots of RAM help speed things up. Video editing software like iMovie and Adobe Premiere typically recommend 64MB of RAM, but once again, more is better. 256MB or more should have you editing without waiting for your computer's hard drive to catch up.
Optimized Windows XP processingMicrosoft's Windows XP is power-packed with enhanced multimedia, gaming and Internet capabilities. It's touted as faster, easier to use and better for remote computing. What's not to like? So take full advantage of all the incredible features by optimizing the performance with a RAM upgrade.
Windows XP ready-labeled computers must meet minimum hardware requirements for the software. But meeting these requirements does not ensure the system is configured for maximum performance with Windows XP. Typically, just meeting minimum requirements for software means minimum performance. Like before: more is better. You'll need at least 128MB, but 256MB is recommended. For the optimal Windows XP experience load up on RAM.
Spectacular gamingA new graphics card is nice, but it isn't enough for today's cutting edge gaming. Revolutionize your 3D gaming experience by adding more memory. Added RAM supports color at higher resolutions and gives you the power for enhanced 3D rendering, with amazing character realism and texture versatility. Enjoy crisper, brighter images and excitingly fast 3D video and animation for a powerful, virtually real gaming experience.
Enhanced multimedia presentationsIntense graphics use and memory-laden programs, such as multimedia, publishing and graphics arts, demand more RAM for the optimal computing experience. Flash and ROM take up a lot of space. You're going to need at least 128MB, with 256MB or more needed for best performance. Once again, more is better. The applications respond much quicker with faster image drawing.
Efficient networkingA memory upgrade is essential for efficient networking. The server as well as individual PCs can be upgraded to lend more benefits for everyone.

How Much Memory Do I Need ? The answer really depends on how much and for what your system is used. Upgrading is easy and cost effective. RAM is used every time you open an application, download, play a game or simply turn on your computer. Additionally if you work with or plan to work with digital audio and video more ram is a necessity.
Novice User / AdministrativeIf you use your computer to send and receive email, do a little word processing, and are starting to surf the Web, you can get by with 64MB. However, you would benefit from going to at least 128MB of memory.
Basic UserIf you are spending more time surfing the internet, sending and receiving email, and doing word processing along with other applications, you can get by with 128MB, but would benefit from going to 256MB.
Professional / Feel the need for Speed!If you are running multiple business applications, want to play the newer video games and/or work with graphics, you can get by with 256MB, but your computer speed would benefit greatly by having 512MB.
Advanced ProfessionalIf you work with high-end graphics, CAD software, digital images, or video, you can get by with 256MB, but would benefit greatly by installing 512MB of memory or more. Right now our 512MB memory modules are available at incredibly low prices.
Graphics Design ProfessionalIf you are, or plan to be, a professional graphics designer, use CAD or modeling software, digital images or video, you can get by with 512MB, but would benefit from going to 1GB of memory or more.
Gaming rig??
Ahhhh. Here's the point of all this tech talk. For a gaming rig, how much is enough? Well, before this article, I would have said, anything over 128Mb. We'll see if that's my opinion at the end, although I do recommend instead of skipping to the end, you read what I have to say, because there's some twists to this article that might interest you.
Test System
Below is the system that was used in this article, along with any other important information.
Intel Pentium 3 800MhzHercules Prophet SDR (GeForce 256)Abit BX6 Rv. 2.0 MotherboardMicrosoft Windows 2000 SP2 Operating SystemTest Programs: Quake 3 Arena, 3Dmark 2000
Let me explain some things. I believe the Windows 9x series is now defunct. Windows XP is the future, and the Windows 2000 core is the closest thing I have to to XP, so that's why 2000 was used in this review. Also, Windows 2000 has the best memory handling of all the current Windows OS's. Add in there: total stability, and supreme control over the OS, and you've got all my reasons. The reason Quake 3 is used, is because it's a very taxing program on a system like mine, and it's very easy to benchmark. 3Dmark 2000 was used because 2001 is made for next-gen video cards, and by using 2000 there's more discrepancy between results, making them easier to apply to an article.

How Much RAM Is Enough ?
The answer to this question is a straightforward...it depends. It depends upon what you are using your computer for and what operating system you are using, to take the two most obvious factors. If you are using Adobe Photoshop or doing video editing all the time, and want to be able to run office applications, and surf, and do email, all at once - well, then you may need a fair amount of memory. If you are a typical home user and mostly use your computer for email, surfing, a word processor or spreadsheet, and the occasional game, then you won't need quite as much. In terms of how it affects you, the end user, having the right amount of memory = faster computer.
Here's some general guidelines for the typical home user (note MB = Megabyte, the main unit in terms of which memory is sold; the higher the number, the more memory you have):
Windows 95 - Seems to be happy with 64 MB. Anything over doesn't get you much performance increase, but if you have anything less, I'd seriously consider getting more memory. The benefit can be quite substantial.
Windows 98/Me - Seems to be happy with 128 MB. Works ok with 64 MB, but you will probably see a significant performance increase by going to 128. Anything over 128 generally doesn't get you much.
Windows NT (Workstation) - Seems to be happy with 128 MB for most things.
Windows NT (Server) - Can run with 128 MB, but more is better. Definitely consider getting 256 MB or more if this server is going to have a heavy demand on it.
Windows 2000 - At least 128 MB, and basically as much as you can throw at it. Seriously consider 256 MB or more if it's got a heavy demand on it.
Windows XP - Hard to say, but 256 MB minimum, and almost certainly would work better with more.
Operating System
Fresh Install Memory Usage
Recommended Memory Size
Installed System Memory
Microsoft Windows Vista Home Basic
554MB
512MB
1GB
Microsoft Windows Vista Home Premium
552MB
1GB
1GB
Microsoft Windows Vista Ultimate
541MB
1GB
1GB

Frequently asked Questions on Memory (FAQs)
What are the benefits of upgrading your computers memory?Upgrading your memory is typically the easiest and least expensive way to upgrade your computer for a significant boost in performance. The computer's RAM memory is its workspace, or where all of the instructions it needs to act on are stored temporarily. Think of the RAM as the desk you use to sort through your work. If the size of that desk is small, your efficiency is limited in comparison to a larger desk that allows you to work more effectively and efficiently. Similarly, a computer with more RAM can work more efficiently because it does not need to retrieve information from the hard disk drive as often. A memory upgrade is particularly helpful for users who work with large files, have more than one program open at one time, or use memory-intensive applications such as games or graphics and video editing software.
How do you know it's time for a memory upgrade?There are several signs indicating it may be time to upgrade your memory. If you see your mouse pointer turn into an hourglass for significant periods of time, if you hear your hard drive working, or if your computer seems to work more slowly than you expect, the reason is probably insufficient memory. When physical memory is insufficient, the system uses Hard Disk Space as memory. This is called "Virtual Memory". Since access time of Physical memory is in tens of NanoSeconds and Access time of Hard Disk is in MilliSeconds, the system slows down considerably.
DDR2 Memory Memory
DDR2 is the next-generation DDR memory technology which features faster speeds, higher data bandwidths, lower power consumption, and enhanced thermal performance.
Try this site for recommendations on DDR and DDR2 Memory UpgradesDDR2 Unbuffered DIMM ECC and Non-ECC ( 240pin)For PC and low end workstations Dimension approx. 5.25" x 1.18" (13.34cm x 2.99cm)
Registered ECC DIMMs ( 240 pin) For Server and high end workstations
Unbuffered DDR2 SODIMM ( 200pin)For Laptop and Cube PC
MicroDIMM( 214 pin)Micro-DIMM is a SO-DIMM with a smaller outline and thickness than standard SO-DIMMs. Therefore it is designed for sub-Notebooks applications which are mobile type, slim type and super light weight Notebooks.
Very small outline DIMM Densities: 256MB, 512MB, 1GB Based on Infineon's 512Mbit and 1Gb componentsSpeed: DDR2-400, DDR2-533
What is a DDR2 DIMM ?
A dual inline memory module (DIMM) consists of a number of memory components (usually black) that are attached to a printed circuit board (usually green). The gold pins on the bottom of the DIMM provide a connection between the module and a socket on a larger printed circuit board. The pins on the front and back of a DIMM are not connected to each other.

DDR2 memory modules are offered in two frequency range, 400MHz and 533MHz speeds (data rate) in 2004, and followed by 667MHz by Fall of 2005.

240-pin DIMMs are used to provide DDR2 SDRAM memory for desktop computers. Each 240-pin DIMM provides a 64-bit data path (72-bit for ECC or registered modules), so they are installed singly in 64-bit systems. Most DDR2 chipsets are expected to support dual-channel memory, effectively providing a 128-bit data pathDDR2 DIMM memory modules are not backward-compatible with DDR DIMM , due to incompatible pin configurations, core voltage, and memory chip technology. DDR2 modules are designed with a different "key" in the edge connector to prevent insertion into incompatible memory sockets such as DDR motherboard. A DDR2 SDRAM DIMM will not fit into a standard SDRAM DIMM socket or a DDR DIMM socket. DDR2 modules use a 1.8V power supply, providing a big power saving over the 2.5V DDR modules.

240-pin DIMMs are available in DDR2 PC2-4200 (DDR2-533) SDRAM or DDR2 PC2-3200 (DDR2-400) SDRAM. To use DDR2 memory, your system motherboard must have 240-pin DIMM slots and a DDR2-enabled chipset.

DDR2 Memory Chips DDR2 memory can no longer be made into TSOP chips, and are offered FBGA (Fine-pitch Ball Grid Array) chips.

Memory Classifications
Memory Speed are offered in 400, 533 & 667Mhz
Memory Chip classification are named : DDR2-400 , DDR2-533Mhz and DDR2-667Mhz
Module DIMM Classificiation are named : PC2-3200 or 400Mhz) , PC2-4200 or 533 mhz and PC2-533 or 667Mhz
Module Bandwidth : PC2-3200 = 3.2 Gb/s , PC2-4200= 4.2 Gb/s & PC2-5300= 10.6 Gb/s
DDR2 was designed to overcome many of the problems with DDR:

DDR2 versus DDR Modules DDR2 memory modules have basically the same dimensions as the DDR modules, but have different pin configurations, therefore DDR2 DIMM will not fit in the DDR memory slot.
The table compares the different types of modules for DDR and DDR2:

DDR2
DDR
Unbuffered DIMM
240pin 1.8V
184pin 2.5V
Registered DIMM
240pin 1.8V
184pin 2.5V
SODIMM
200pin 1.8V
200pin 2.5V
Mini Registered DIMM
244pin 1.8V

MicroDIMM
214pin 1.8V
172pin 2.5V
Because of different voltages and pin configurations, DDR2 modules will have a different "key" or notch in their connector to prevent them from being plugged into an incompatible socket. DDR2 memory modules will only fit in systems and motherboards designed to specifically support DDR2 memory. The number of black components on a 240-pin DIMM may vary, but they always have 120 pins on the front and 120 pins on the back.While 240-pin DDR2 DIMMs, 184-pin DDR DIMMs and 168-pin DIMMs are approximately the same size, 240-pin DIMMs and 184-pin DIMMs have only one notch within the row of pins.
DDR3 Memory Modules Launched
Intel Bearlake P35 based desktop motherboards are released for the very first time which support DDR3 memory. While these motherboards will feature the latest and greatest Intel P35 chipsets they also happen to be the first desktop platform that utilizes DDR3 memory modules. For those that don't know DDR3 is the next generation of Double Data Rate (DDR) Synchronous Dynamic Random Access Memory (SDRAM). DDR3 memory modules are an improvement of DDR and DDR2 memory technology and will deliver higher clock frequencies, lower power consumption and as a result lower heat dissipation. When DDR3 is launched the frequencies will be at 1066Mhz and 1333Mhz, with 1600MHz and beyond out in the distance.
For those that recall the transition from DDR1 to DDR2, the move from DDR2 to DDR3 will be much the same. It will take years for DDR3 to become main stream with many predicting that it will take the industry till 2009 to fully moved over to the new memory form factor. Those with DDR2 motherboard have nothing to worry about as DDR2 production will continue with improved parts still on the drawing boards.
About three years ago DDR2 memory first appeared on the desktop PC scene. It would be impossible to say it burst on the scene since it was introduced with the unimpressive Intel NetBurst processors. In that market DDR2 was more like a trickle since it was mainly a curiosity for a processor that was running a distant second place to the leading AMD Athlon chips, which were still powered by DDR memory.
DDR2 finally became the universal standard last May/June when AMD switched to DDR2 on their new AM2 platform and Intel introduced Core 2 Duo, the new CPU performance leader. Core 2 Duo resided on socket 775, which also was fed by DDR2. While it sometimes seems like centuries ago, it is worth remembering that Intel Core 2 Duo regained the CPU performance crown less than a year ago, and the two years prior to that all the fastest systems used AMD Athlon 64/X2/FX processors.
Performance of DDR2 on the new platforms in July of last year. AM2 provided better bandwidth with DDR2, but the better AM2 bandwidth did not translate into better performance. Since Core 2 Duo was faster at the same timings, it appeared the Intel Core 2 Duo architecture was not particularly bandwidth hungry and that it made very good use of the DDR2 bandwidth that was available with the chipset memory controller.
Since last May/June DDR2 has finally turned the market, and it has made some remarkable transformations along the way. The early 5-5-5 timings at the official DDR2-800 speed have since been replaced by several high performance memories capable of 3-3-3 timings at DDR2-800. The best memory at DDR2-1066 can now operate at 4-4-3 timings, and the fastest DDR2 is now around DDR2-1266 and still getting faster.
Perhaps even more remarkable, in the last year DDR2 memory prices have dropped to half of what they once were (sometimes more), and today DDR2 is often cheaper than the DDR memory it replaced. Compared to the very expensive prices at launch and into the holiday buying season we see DDR2 is now the memory price standard in the desktop computer market.

How computer RAM works?

Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit of data. The capacitor holds the bit of information -- a 0 or a 1. The transistor acts as a switch that lets the control circuitry on the memory chip read the capacitor or change its state.RAM stands for Random Access Memory. This means Information can be retrieve and store by the computer at any order. RAM gives your computer a temporary place to process electronic data. This means that, RAM chips continue to store information only as long as computer has electrical power. In other words, when you shut off your computer, all the data stored in RAM are lost.All actual computing starts with the the CPU (Central Processing Unit).The chipset supports the CPU and contains several controllers that control how information travels between the CPU and other components in the PC.The memory controller is part of the chipset and establishes the information flow between memory and the CPU.A bus is a data path that consists of parallel wires and connects the CPU, memory and other devices. The bus architecture determines how much and how fast data can move around the motherboard.The memory bus goes from the memory controller to the computer's memory sockets. Newer systems have a frontside bus (FSB) from the CPU to main memory and a backside bus (BSB) from the memory controller to L2 cache.For the PC to get information...The CPU sends a request to the memory controller to memory and gets a report back of when the information will be available. This cycle can vary in length according to memory speed as well as other factors, such as bus speed.
Residing on the motherboard, the system clock sends a signal to all components, just like a metronome ticking. Each click of the clock represents a clock cycle. A clock running at 100Mhz represents 100 million clock cycles per second. Every action is timed by the clock where different actions require a different number of clock cycles.Many people assume that the speed of the processor is the speed of the computer. Most of the time, the system bus and other components run at different speeds. Because all information processed by the CPU is written or read from memory, the performance of a system is dramatically affected by how fast information can travel between the CPU and memory. Therefore, faster memory technology contributes greatly to the overall system performance.Cache memory is a relatively small amount (normally less than 1 MB) of high speed memory and resides very close to the CPU. It is designed to supply the CPU with the most frequently requested data. It takes a fraction of the time, compared to normal memory, to access cache memory.The concept is that 20% of the time, what is needed is in cache. The cache memory tracks instructions, putting the most frequent used instruction at the top of the list. Once the cache is full, the lowest need is dropped.Today, most cache memory is incorporated in the CPU. It can also be located just outside of the CPU. Cache that is closest to the CPU is labeled Level 1, the next closest Lever 2, etc.Interleaving is a process in which the CPU alternates between two or more memory banks. Every time the CPU addresses a memory bank, the bank needs about one clock cycle to reset. The CPU can save processing time by addressing a second bank while the first bank is resetting.

Different Types of RAM

RAM is the acronym for 'random access memory' and is usually calculated in megabytes. A RAM chip is a module that holds freshly accessed information so that the central processing unit can have access to it. It is faster than reading from the hard drive and allows for easy access of recently stored data, information, and files. This means that all programs must be run through the RAM before they are usable.
There are two basic types of RAM, namely dynamic RAM and static RAM. A dynamic RAM is called so because it has to be constantly refreshed by the memory controller. The reason for refreshing is that the capacitors that hold the information or data have a built-in leak that can only be stopped by refreshing the information thousands of times in a second. This makes dynamic RAM slower and cumbersome compared to static RAM.
Static RAM is a type of random access memory that has a greater capacity for storage because it uses on-off switches instead of capacitors. However, static RAM is more expensive compared to dynamic RAM because it is faster and can hold more information.
Usually, advanced versions of the dynamic RAM are used instead of using static RAM because of its high price. These versions include FPM (fast page mode), ECC (error correcting code), EDO (extended data output), and SDRAM (synchronous dynamic RAM). ECC RAM is a special error-correcting RAM that is usually used in servers.
EDO RAM, or extended data output RAM, is an improvement of the traditional FPM RAM. Data can be read faster and the length of time that the output data is valid is extended, which improves time coordination between the central processing unit and RAM, thus improving the performance.
The speed of a RAM is measured in nanoseconds, and the fewer the nanoseconds (ns), the faster the computer. Today we use 50 ns computers as opposed to the 180 and 150 ns that we used in the last decade.
RAM provides detailed information on RAM, RAM Memory, DVD RAM, DDR RAM and more. RAM is affiliated with Linux Mail Servers.

What are the different types of RAM?

Still confused about the different types of RAM?
It is very easy to become confused with the different types of RAM that will or will not run on the different types of motherboards that support Intel or AMD processors.
Start by remembering that motherboards that support Intel processors never support AMD processors, and you are half way towards clearing up the confusion.
The motherboard must support a given processor if you are to use it. It is then just an simple matter of consulting the motherboard's manual to find out the types of RAM and the processors that it supports.
You can download the manuals from the websites of most of the major motherboard manufacturers. As long as you only install items on a motherboard certified by its manual to run on or with it, you cannot go very far wrong.
Most systems that have motherboards that use SIMM memory modules require you to use matching pairs of modules to fill a bank of slots on your motherboard. If you fail to match them correctly, your system will probably not function properly.
For example, if you want to install 64MB of EDO RAM that comes in the outdated SIMM module form, you may have to install two matching 32MB modules instead of going with just one 64MB module, or one 32MB module plus two 16MB modules. Therefore, always check your system and motherboard manuals before you place an order.
Note that you do not need to install DIMM (SDRAM or DDR RAM) modules,in pairs. Modern motherboards are also often much more forgiving about which DIMM modules that can be fitted - they do not all have to be of the same capacity. - A 64MB module can be installed with 128MB and 256MB modules.Remember, never skimp on quality when it comes to RAM.
Even when buying a new PC always obtain a system specification and check what make of RAM is installed.
Only grade-A memory will do, and it is only manufactured by the major manufacturers of RAM.
RAM is probably the most critical system component. Every bit of data passes through it to get to the processor, so it has to be 100% functional 100% of the time if data corruption is not to take place.
It is a fact that many program crashes can be attributed to cheap, error-prone or defective RAM. Therefore, if the system has generic, low-cost RAM, insist that grade A RAM from one of the major manufacturers is installed.
RAM diagnostic utilities
Memtest-86 3.0
http://www.memtest86.com./
MemTest v1.2 [9k] W9x/2k/XP - free - http://www.mywebattack.com/gnomeapp.php?id=105570 and
http://www.simmtester.com/page/products/doc/download.asp
RAM websites
The "Ultimate Memory Guide." - http://www.kingston.com/tools/umg/default.asp
If you want to know about the technical details of how RAM works, visit this article. -
How Computer Memory Works - http://www.howstuffworks.com/computer-memory.htm.
And if you want to know how Windows, and other operating systems, make use of a virtual memory swap file on a hard disk drive to expand the system's RAM, read the following article. -
How Virtual Memory Works -
http://www.howstuffworks.com/virtual-memory.htm
"Windows 98 & WinME Memory Management" - http://aumha.org/articles.htm - includes information on RAM and the Windows Virtual Memory swap file.
16-bit Rambus RDRAM memory (184 pins)This type of RAM is increasing in popularity. These modules operate at up to 533Mhz speed compared to 133Mhz for SDRAM. Most Pentium 4 systems support RDRAM modules for top performance.
PC800 Rambus RIMM (RDRAM) - 184 pins
» 64Mb Rambus RIMM Samsung 184pins, PC800, 40ns, 16-bit, MR16R1622DF0-CM8Manufacturer: Samsung, Warranty: Lifetime.
» 128Mb Rambus RIMM Samsung 184pins, PC800, 40ns, 16-bit, MR16R1624AF0-CM8Manufacturer: Samsung, Warranty: Lifetime.
» 256Mb Rambus RIMM Samsung 184pins, PC800, 40ns, 16-bit, MR16R1628DF0-CM8Manufacturer: Samsung, Warranty: Lifetime.
» 512Mb Rambus RIMM Samsung 184pins, PC800, 40ns, 16-bit, MR16R162GDF0-CM8Manufacturer: Samsung, Warranty: Lifetime.
» 128Mb ECC Rambus RIMM Samsung 184pins, PC800, 40ns, 18-bit, ECC Error CorrectionMR18R1624AF0-CM8, Manufacturer: SamsungWarranty: Lifetime.
» 256Mb ECC Rambus RIMM Elpida Stock clearance! 184pins, PC800, 40ns, 18-bit, ECC Error CorrectionMC-4R256FKE8D-840, Manufacturer: ElpidaWarranty: 2 years.
» 256Mb ECC Rambus RIMM Samsung 184pins, PC800, 40ns, 18-bit, ECC Error CorrectionMR18R1628DF0-CM8, Manufacturer: SamsungWarranty: Lifetime.
» 512Mb ECC Rambus RIMM Samsung 184pins, PC800, 40ns, 18-bit, ECC Error CorrectionMR18R162GAF0-CM8, Manufacturer: SamsungWarranty: Lifetime.
PC1066 Rambus RIMM (RDRAM) - 184 pins - for overclocking
Special offer on Samsung PC1066 RDRAM 184 pins128Mb, 256Mb, 512Mb
» 128Mb Rambus PC1066 RDRAM (RIMM2100) 184 pins, 16-bit, 1066Mhz, RIMM2100, 32ns, for Intel850E chipsets, P/N: MR16R1624DF0-CT9,Manufacturer: Samsung, Warranty: 10 years.
» 256Mb Rambus PC1066 RDRAM (RIMM2100) 184 pins, 16-bit, 1066Mhz, RIMM2100, 32ns, for Intel850E chipsets, P/N: MR16R1628DF0-CT9.Manufacturer: Samsung, Warranty: 10 years.
» 256Mb Rambus PC1066 RDRAM (RIMM2100) 184 pins, 16-bit, 1066Mhz, RIMM2100, 32nsfor Intel 850E, P/N: KVR1066X16-8/256,Manufacturer: Kingston, Warranty: Lifetime.
» 512Mb Rambus PC1066 RDRAM (RIMM2100) 184 pins, 16-bit, 1066Mhz, RIMM2100, 32ns, for Intel850E chipsets, P/N: MR16R162GDF0-CT9,Manufacturer: Samsung, Warranty: 10 years
PC1200 Rambus RIMM (RDRAM) - 184 pins - for overclocking
» 256Mb Rambus PC1200 RDRAM (RIMM2400) - OCZ New product! 184 pins, 16-bit, 1200Mhz, RIMM2400, 32nsSuitable for i850E and SIS658 chipsets, non-ECCBandwidth 4,8Gb/s Dual Channel,Manufacturer: OCZ Technology, Warranty: Lifetime.
Upgrade Kits (special deals on 2 modules)
» 128Mb RIMM Upgrade Kit, Samsung (2x 64Mb modules), 184pins, PC800, 40ns, non-ECCManufacturer: Samsung, Warranty: Lifetime.
» 256Mb RIMM Upgrade Kit, Samsung (2x 128Mb modules), 184pins, PC800, 40ns, non-ECCManufacturer: Samsung, Warranty: Lifetime.
» 512Mb RIMM Upgrade Kit, Samsung (2x 256Mb modules), 184pins, PC800, 40ns, non-ECCManufacturer: Samsung, Warranty: Lifetime.
» 1Gb RIMM Upgrade Kit, Samsung (2x 512Mb modules), 184pins, PC800, 40ns, non-ECCManufacturer: Samsung, Warranty: Lifetime.
» 256Mb ECC RIMM Upgrade Kit, Samsung (2x 128Mb modules), 184pins, PC800, 40ns, 18 bit, ECCManufacturer: Samsung, Warranty: Lifetime.
» 512Mb ECC RIMM Upgrade Kit, Samsung (2x 256Mb modules), 184pins, PC800, 40ns, 18 bit, ECCManufacturer: Samsung, Warranty: Lifetime.
» 1Gb ECC RIMM Upgrade Kit, Samsung (2x 512Mb modules), 184pins, PC800, 40ns, 18 bit, ECCManufacturer: Samsung, Warranty: Lifetime .
32-bit Rambus RDRAM memory (232 pins)32-bit Rambus modules provides two independent memory channels, which means there is no requirement to install these modules in pairs of two.RIMM3200 modules provide a memory bandwidth of 3,2Gb/s, RIMM4200 provides 4,2Gb/s and RIMM4800 provides an unparalleled transfer rate of 4,8Gb/s.
PC800 Rambus RIMM3200 - 232 pins
» 256Mb Rambus RIMM PC800 32 bit (RIMM3200) 232 pins, 32-bit, PC800, RIMM3200, 40ns MD16R1628AF0-CM8, non-ECC.Manufacturer: Samsung, Warranty: Lifetime
PC1066 Rambus RIMM4200 - 232 pins - for overclocking
» 256Mb Rambus PC1066 32-bit RDRAM (RIMM4200) 232 pins, 32 bit, 1066Mhz, RIMM4200, 32nsfor Intel 850 chipsets, P/N: MD16R1628AF0-CN9Non-ECC, Manufacturer: Samsung, Warranty: 10 years
» 512Mb Rambus PC1066 32-bit RDRAM (RIMM4200) 232 pins, 32 bit, 1066Mhz, RIMM4200, 32nsfor Intel 850 chipsets, P/N: MD16R162GDF0-CT9Non-ECC, Manufacturer: Samsung, Warranty: 10 years
» 512Mb ECC Rambus PC1066 32-bit RDRAM (RIMM4200) 232 pins, 32 bit, 1066Mhz, RIMM4200, 32nsfor Intel 850 chipsets, P/N: MD18R162GAF0-CN9ECC Error Correction, Manufacturer: Samsung, Warranty: 10 years
PC1200 Rambus RIMM4800 - 232 pins - for overclocking
» 256Mb Rambus RIMM PC1200 32 bit (RIMM4800) - OCZ 232 pins, 32-bit, PC1200, RIMM4800, 32ns4.8 Gb/s transfer, non-ECC, Manufacturer: OCZ, Warranty: Lifetime

Monday, December 28, 2009

Types of Routing Protocols & Basic Routing Protocols

Protocols are the language used by computers and routers to communicate with each other. Different systems can employ different network operating systems, which in turn, use different protocols for managing the flow of data between computers and other network devices. Additionally, some protocols can be routed over the Internet, while others are mainly used for local area network (LAN) communications.
What Are Protocols?
Each protocol can be considered a type of "language". Different computer systems can have or use different protocols to communicate with one another.
TCP/IP
All computers and networks that transmit on the Internet must use Transmission Control Protocol/Internet Protocol (TCP/IP); this is a connection-oriented protocol that employs error checking and data flow control.
Apple Talk
Apple talk is a protocol designed to connect Macintosh computers; it can also be routed and combined with Windows/Microsoft based networks.
IPX/SPX
IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange, which was designed by Xerox in the 1980s. Later, IPX/SPX was changed and enhanced by Novell for use in their Netware network operating system.
NetBEUI
NetBIOS extended user interface (NETBUI) was developed by IBM and Microsoft; it is a small, fast, and efficient networking protocol that consumes few system resources.
DHCP
Dynamic Host Control Protocol is in use by nearly every computer connected to the Internet. DHCP automatically assigns IP addresses to computers and virtually eliminates the possibility of duplicates.

Basic Routing Protocols

Routers operate on layer 3 of the Open System Interconnection Reference Model, usually referred to as the OSI Model. Protocols are the language that routers use when speaking to each other. All routers operate on layer 3 of the OSI model and are capable of using multiple protocols such as RIP, IGRP/EIGRP, OSPF and BGP. Each of these protocols have advantages and disadvantages. Each protocol also has an ideal use, whether it is a small or large network.


RIP
Routing Information Protocol was originally designed for XEROX PUP, PARC Universal Protocol. It became a part of networking when it was defined in RFC 1058 in 1988. RIP is a widely used open protocol that is easy to configure and good for use in small networks. If RIP is used on a large network with many paths, and more than 16 hops RIP will leave a lot to be desired. In small networks, RIP is the preferred protocol because of the ease of use.
EIGRP/IGRP
Interior Gateway Routing Protocol was developed by Cisco in the mid 1980s as a proprietary protocol to negate the problems seen with RIP. In the early 1990s Cisco developed EIGRP as a way to overcome the limitations seen in RIP and IGRP. According to Cisco, IGRP will be removed from their IOS, Internetwork Operating System, which Cisco uses to control for their routers. EIGRP is good for networks of all sizes and is very easy to configure.
OSPF
OSPF, Open Shortest Path First, was developed by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). Since it was developed by IETF, it is an open protocol, not a proprietary one. OSPF is more complicated and not as easy to use as RIP since it uses link-state routing. Link-state routing is that every node constructs a map of the connectivity to the network in the form of a graph. This way the router knows which nodes are connected to which other nodes.Link-state advertisements are sent to all devices, which causes an initial flood. After the initial flood from the setup phase OSPF is very efficient in operation. It uses three different databases for neighbors, link states and routes.
BGP
Border Gateway Protocol, BGP, is the standard protocol that the Internet operates on. This protocol is not usually used on small home networks or even larger business networks due to the complexity of setting it up. While it is an open protocol, everything is manual, including neighbors, which is automatic with all of the other protocols discussed here. This is only included for reference as it is very unlikely that the average home user will ever come in contact with this protocol.

Networking and protocols interview questions

In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard.
















An agreed-upon format for transmitting data between two devices. The protocol determines the following:
the type of error checking to be used
data compression method, if any
how the sending device will indicate that it has finished sending a message
how the receiving device will indicate that it has received a message
There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.
From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.


Q: What are the seven layers of the OSI model?
A: The layers are physical, data link, network, transport, session, presentation, and application layers.
Q: In the TCP client-servel model, how does the three-way handshake work in opening connection?
A: The client first sends a packet with sequence "x" to the server. When the server receives this packet, the server will send back another packet with sequence "y", acknowledging the request of the client. When the client receives the acknowledgement from the server, the client will then send an acknowledge back to the server for acknowledging that sequence "y" has been received.
Q: What is the purpose of exchanging beginning sequence numbers during the the connection in the TCP client-server model?
A: To ensure that any data lost during data transfer can be retransmitted.
Q: How does Asynchronous Transfer Mode (ATM) work?
A: ATM works by transmitting all traffic in small, fixed-sized cells. These small, fixed-size cells reduces queuing delay and can be switched quickly. ATM fits into layer 2 of the OSI model and provides functions for framing and error correction. At the port interface, ATM switches convert cells into frames, and vice versa. ATM provides Quality of Service and traffic shaping.
Q: Given a Class B Network with subnet mask of 255.255.248.0 and a packet addressed to 130.40.32.16, what is the subnet address?
A: Take the 2 addresses, write them in binary form, then AND them. The answer is 130.40.32.0


What is a default gateway? - The exit-point from one network and entry-way into another network, often the router of the network.
How do you set a default route on an IOS Cisco router? - ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address]
What is the difference between a domain local group and a global group? - Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant permissions tree or forest wide for any objects within the Active Directory.
What is LDAP used for? - LDAP is a set of protocol used for providing access to information directories.
What tool have you used to create and analyze packet captures? - Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke Networks).
How does HSRP work?
What is the significance of the IP address 255.255.255.255? - The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown.

Networking interview questions
Q1. Name of seven layers in Open System Interconnection model.A. They are Application, Presentation, Session, Transport, Network, Data link, and Physical.
Q2. What is the time complexity of matrix multiplication ?void Mult_Matrix(matrix A, matrix B, matrix C){int i, j, k;for ( i = 1; i < N; i++)for ( j = 1; j < N; j++ ){C[i][j] = 0;for ( k = 0; k < N; k++ )C[i][j] = A[i][j]*B[k][j];}retrun;}A. The time comlexity of matrix mulitiplication is O(N^3)
Q3. What is the null pointer in C++ ?A. The null pointer is a special C++ pointer value that can be used for any pointer that doesn?t pointer anywhere. It can be written as the constant NULL form stlib.h
Q4. What is the goal of the shortest distance algorithm ?A. The goal is to completely fill the distance array so that for each vertex v, the value of distance[v] is the weight of the shortest path from start to v.
Q5. What is the difference between an abstract class and an interface?A.An abstract class may have fields and some implemented methods.An interface has no implementation; only constants and method declarations



What is a Network Protocol
A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer.
Types of Network Protocols
The most common network protocols are:
Ethernet
Local Talk
Token Ring
FDDI
ATM
The follow is some common-used network symbols to draw different kinds of network protocols.

Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired.
Local Talk
Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional software. With the addition of the server version of AppleShare software, a client/server network can be established.
The Local Talk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed. Its speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.
FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.
ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.
ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access to the Internet for their clients. As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks.
Gigabit Ethernet
The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999.
Compare the Network Protocols
Protocol
Cable
Speed
Topology
Ethernet
Twisted Pair, Coaxial, Fiber
10 Mbps
Linear Bus, Star, Tree
Fast Ethernet
Twisted Pair, Fiber
100 Mbps
Star
LocalTalk
Twisted Pair
.23 Mbps
Linear Bus or Star
Token Ring
Twisted Pair
4 Mbps - 16 Mbps
Star-Wired Ring
FDDI
Fiber
100 Mbps
Dual ring
ATM
Twisted Pair, Fiber
155-2488 Mbps
Linear Bus, Star, Tree
Network Diagramming Software
Edraw Network Diagrammer is a new, rapid and powerful network design software for network drawings with rich examples and templates. Easy to draw network topology, Cisco network design diagram, LAN/WAN diagram, network cabling diagrams, active directory, network planform and physical network diagram.
Free Download Network Diagram Tool and View All Examples
Network Protocol Overview
The OSI model, and any other network communication model, provides only a conceptual framework for communication between computers, but the model itself does not provide specific methods of communication. Actual communication is defined by various communication protocols. In the context of data communication, a protocol is a formal set of rules, conventions and data structure that governs how computers and other network devices exchange information over a network. In other words, a protocol is a standard procedure and format that two data communication devices must understand, accept and use to be able to talk to each other.
In modern protocol design, protocols are "layered" according to the OSI 7 layer model or a similar layered model. Layering is a design principle which divides the protocol design into a number of smaller parts, each part accomplishing a particular sub-task and interacting with the other parts of the protocol only in a small number of well-defined ways. Layering allows the parts of a protocol to be designed and tested without a combinatorial explosion of cases, keeping each design relatively simple. Layering also permits familiar protocols to be adapted to unusual circumstances.
The header and/or trailer at each layer reflect the structure of the protocol. Detailed rules and procedures of a protocol or protocol group are often defined by a lengthy document. For example, IETF uses RFCs (Request for Comments) to define protocols and updates to the protocols.
A wide variety of communication protocols exists. These protocols were defined by many different standard organizations throughout the world and by technology vendors over years of technology evolution and development. One of the most popular protocol suites is TCP/IP, which is the heart of Internetworking communications. The IP, the Internet Protocol, is responsible for exchanging information between routers so that the routers can select the proper path for network traffic, while TCP is responsible for ensuring the data packets are transmitted across the network reliably and error free. LAN and WAN protocols are also critical protocols in network communications. The LAN protocols suite is for the physical and data link layers of communications over various LAN media such as Ethernet wires and wireless radio waves. The WAN protocol suite is for the lowest three layers and defines communication over various wide-area media, such as fiber optic and copper cables.
Network communication has slowly evolved. Today's new technologies are based on the accumulation over years of technologies, which may be either still existing or obsolete. Because of this, the protocols which define the network communication are highly inter-related. Many protocols rely on others for operation. For example, many routing protocols use other network protocols to exchange information between routers.
In addition to standards for individual protocols in transmission, there are now also interface standards for different layers to talk to the ones above or below (usually operating system specific). For example: Winsock and Berkeley sockets between layers 4 and 5; NDIS and ODI between layers 2 and 3.
The protocols for data communication cover all areas as defined in the OSI model. However, the OSI model is only loosely defined. A protocol may perform the functions of one or more of the OSI layers, which introduces complexity to understanding protocols relevant to the OSI 7 layer model. In real-world protocols, there is some argument as to where the distinctions between layers are drawn; there is no one black and white answer.
To develop a complete technology that is useful for the industry, very often a group of protocols is required in the same layer or across many different layers. Different protocols often describe different aspects of a single communication; taken together, these form a protocol suite. For example, Voice over IP (VOIP), a group of protocols developed by many vendors and standard organizations, has many protocols across the 4 top layers in the OSI model.
Protocols can be implemented either in hardware or software or a mixture of both. Typically, the lower layers are implemented in hardware, with the higher layers being implemented in software.
Protocols could be grouped into suites (or families, or stacks) by their technical functions, or origin of the protocol introduction, or both. A protocol may belong to one or multiple protocol suites, depending on how you categorize it. For example, the Gigabit Ethernet protocol IEEE 802.3z is a LAN (Local Area Network) protocol and it can also be used in MAN (Metropolitan Area Network) communications.
Most recent protocols are designed by the IETF for Internetworking communications and by the IEEE for local area networking (LAN) and metropolitan area networking (MAN). The ITU-T contributes mostly to wide area networking (WAN) and telecommunications protocols. ISO has its own suite of protocols for internetworking communications, which is mainly deployed in European countries.




Easy to Create
Basic Network Diagram
LAN Diagram
WAN Diagrams
3D Network Diagram
Network Topologies
Cisco Network Design
Logical Network Diagrams
Physical Network Diagrams
Detail Network Diagram
LDAP Diagram
Active Directory
Network Knowledge Base
Create Basic Network Diagram
Network Diagram Examples
Network Diagram Templates
Network Diagram Tutorials
Manage Network Information
Editing Network Equipment Shapes
Diagram An Ethernet Network
Campus Network Design
Hierarchical Network Desig
Network Glossary Definition
Network Protocol
Network Topologies
Network Diagramming Solution
Wide Area Network
Local Area Network
Network Diagram Types
Network Mapping
Network Architecture
Cisco Network Topology Icons
Computer Network Diagram
Draw Network Diagram with Symbols
Network Drawings

Wednesday, December 23, 2009

Windows XP Customize Interface and Usability Tips, Tricks and Tweaks

Remove "Help and Support" link from XP Start Menu
If you would like to remove the help and support link from the Start Menu, here's how:
Right click the Taskbar
Choose Properties
In the Taskbar and Start Menu Properties window, select the Start Menu tab
Click the Customize button
In the Customize Start Menu window, choose the Advanced tab
Uncheck the Help and Support option (see image below)
Click OK, then OK again to exit the Taskbar and Start Menu Properties window
[Top]
Adding an item to the Send To menu
If you would like to add an additional item to your Send To menu, you need to add a shortcut to the SendTo folder. Here's how:
Go to Start>> Run. Type in: sendto [Enter]
Right click a blank space within the SendTo folder.
Click New>> Shortcut.
Follow the Create Short Cut wizards onscreen instructions to create a new shortcut.
Close the SendTo folder window. This newly created shortcut will now appear in your Send To menu.To delete a shortcut from the Send To menu:
Go to Start>> Run: Type in: sendto [Enter]
Find the item that you would like to delete.
Right click the item and select Delete.
[Top]
Clear unwanted items from the "Open With" list
When you right click a file, you may see an option called 'Open With', which lists a number of programs on your computer to open that file with. If you would like to remove some of these options from this list, here's how:
Warning: The following tip involves editing the Windows Registry. Please make sure that you make a backup copy of the registry prior to making any changes.
Go to Start>> Run. Type in: REGEDIT [Enter] or Click OK.
Navigate to the following key:HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ FileExts
Click once on the 'FileExts' entry to empty its contents into the right pane.
Find the extension you wish to edit and click on the "+" sign to expand OpenWithList (see Figure #1)
Right click on the one that you would like to delete, then select Delete. Figure #1 Note: Deleting the item from the above registry key may not remove it from the Open With list. Some items may still reside in the HKEY_CLASSES_ROOT registry key which is common for all user profiles. Navigate to the following registry key: HKEY_CLASSES_ROOT\ .xxx \ OpenWithList (Where .xxx is a file extension) When you find the desired entry, right click and select Delete. [Top]
Adding a special character
If you ever find the need to use a special character such as; ® or ©. Instead of opening up your character map each time you need to insert one of these symbols, there are shortcuts available that can be a great time saver. Here's how:
Go to Start>> All Programs>> Accessories>> System Tools>> Character Map.
Click the © symbol
At the bottom right corner, you will notice the keyboard shortcut used to insert this character. Be sure to write it down for future use.
To insert the character using the keyboard shortcut:
Position the cursor where you would like to insert the special character.
With NUM LOCK key on, hold down the ALT key and use the number pad keys to type the character value. [Top]
Move The Cursor Without A Mouse
If you would like to try out using your mouse with only your keyboard, Windows makes this option available to you. The utility is called MouseKeys. MouseKeys uses your numeric keypad to control the mouse cursor. This can be a handy feature if you are needing better accuracy while designing graphics. MouseKeys allows you to move the cursor pixel by pixel across the screen. Here is how to activate the MouseKeys feature:
Go to Start>> Control Panel>> Accessibility Options
Click the Mouse tab
Place a checkmark in the box titled: Use MouseKeys
Click the settings button to adjust the pointer speed
Click OK Now you can use your numeric keypad to control your mouse cursor. [Top]
Unhide Components in Add/Remove Programs
You can uninstall many Windows components using the Add or Remove Programs. Go to Start>> Control Panel>> Add/Remove ProgramsWhile searching for old programs to delete from your system, you'll probably notice that some components are not there. Well, they really are there, Windows just has them hidden. The most common Windows program that is hidden and marked for removal by many PC users is MSN Messenger. Here's how you can tell Windows not to hide these components.
Go to Start>> Run. Type in: notepad.exe C:\windows\inf\sysoc.inf
In notepad, select Edit from the toolbar.
Click the Replace button.
In the "Find What" text area type HIDE
Leave the "Replace With" text area blank.
Click Replace All.
Exit the Replace window.
In notepad again, select File from the toolbar and click Save. All of the hidden Windows components will now be visible in Add/Remove programs. [Top]
Brand XP
My new HP came loaded with an OEM version of XP on it. I noticed that they had their own icon under Run in the start menu. If you would like to brand your PC with your own clickable icon that will take you wherever you would like to go (eg: website, program), just follow the simple instructions below:Note: This involves a registry tweak, please take all precautions by backing up your registry prior to making any changes to it.
Start up Notepad and insert the following information via copy and paste:Windows Registry Editor Version 5.00[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]@="YOUR TITLE HERE"[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]@="YOUR ICON HERE"[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\InProcServer32]@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,68,00,\64,00,6f,00,63,00,76,00,77,00,2e,00,64,00,6c,00,6c,00,00,00"ThreadingModel"="Apartment"[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance]"CLSID"="{3f454f0e-42ae-4d7c-8ea3-328250d6e272}"[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]"CLSID"="{13709620-C279-11CE-A49E-444553540000}""method"="ShellExecute""Command"="YOUR TITLE HERE""Param1"="YOUR FUNCTION HERE"[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex][HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\ContextMenuHandlers][HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\ContextMenuHandlers\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]@=""[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\MayChangeDefaultMenu]@=""[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\ShellFolder]"Attributes"=dword:00000000
Edit where it says YOUR ICON HERE to a path to an icon (ex. c:\\5staricon.ico), it must be 24x24 pixels and in *.ico format. Use double back slash for path names.
Edit both places where it says YOUR TITLE HERE to what you want it to say in the Start Menu (eg: 5 Star Support).
Edit where it says YOUR FUNCTION here to what you want it to do when you click it, it can be anything... your website, a local HTML document, a program, a Windows function, whatever your imagination can provide (eg: http://www.5starsupport.com).
Save this file as brand.reg, double-click it to enter in your information into the registry then refresh Explorer (log off/on) to see it in the Start Menu! This will work in both Home and Professional editions.
[Top]
Turn Off IE Clicking Noise
Microsoft has added an audible clicking sound when activating a link. If you become annoyed by this clicking sound after awhile, you can turn it off. Here's how:
Start>> Control Panel>> Sounds and Audio Devices.
Select the Sound tab.
Scroll down to the section for Windows Explorer.
Click the event called "Start Navigation," and change the setting to "none" from the dropdown box.
Click OK to apply the change.
[Top]
No To All Option
We all have seen the "Yes To All" option when saving files. Have you ever needed a "No To All" option? This is an undocumented feature, but it does exist. All you need to do is hold down the SHIFT key and click the No button. This will tell Windows Explorer "No To All".
[Top]
New Programs Highlight in Start Menu
By default, a new program that is loaded to your system, Windows XP highlights it in the Start Menu so that it can be easily found. If you find this annoying and would like to stop the new program from automatically being highlighted, here's how:
Right click the Start button
Select Properties
Choose the Start Menu tab and then click the Customize button
In the Customize Start Menu window, click the Advanced tab
Under 'Start Menu Settings' uncheck the "Highlight newly installed programs" entry
[Top]
Turn Off Autoeject
When burning a CD and the data-writing is complete, Windows will automatically eject your CD. If this is an annoying feature to you, it can easily be disabled. Here's how:
Go to Start>> My Computer
Right click the appropriate CD/DVD drive, then select Properties
Select the Recording tab, then uncheck "Automatically Eject The CD After Writing"
Click OK (it may be necessary for you to reboot your system for this to take effect)
[Top]
Enable CD burning service
Windows XP gives you the ability to burn CDs without adding additional software. However, this feature isn't enabled by default. Here's how to start the service:
Go to Start>> Administrative Tools>> Services.
Right-click IMAPI CD-Burning COM Service, then choose Properties.
Change the Startup Type to Automatic.
Select Start>> click OK.
Reboot your system To burn files to a CD-R or CD-RW, individually select the desired files and/or folders and drag them to the CD burner device. Right-click the device, and choose Write These Files To CD. To empty the burn queue, simply right click the device and choose Delete temporary Files. IMAPI: Image Mastering Applications Programming Interface [Top]
Switch Users without the Welcome Screen
If you would like to switch users quickly without going through the welcome screen to do it, here's an alternate method:
Press CTRL + ALT + Delete on your keyboard to access the Task Manager
Click the User tab
Right click the user you would like to switch to and then select Connect from the resulting menu.
[Top]
Disable password when returning from Standby
When resuming from hibernation or Standby mode, you can bypass the password prompt by going to:
Start>> Control Panel>> Power Options>> Advanced tab>> Uncheck the entry "Prompt for password when computer resumes from standby".
[Top]
Arrange two windows side-by-side
If you would like to arrange two windows side-by-side, just click the taskbar button of one of the windows, then right click on the taskbar button of the second windows and select "Tile Vertically" from the resulting menu.
[Top]
Remove shortcut arrow from desktop icons
If you would like to remove the shortcut arrows from your desktop icons, here's how:
Warning: The following tip requires a registry edit. Mistakes made in the Windows registry can cause serious problems with your operating system. Be sure to make a backup copy of your registry prior to making any changes.
Go to Start>> Run. Type in: regedit [Enter] or click OK.
Drill down to the following registry key:
HKEY_CLASSES_ROOT\lnkfile
Delete the IsShortcut registry value.
Note: This may require a system restart.
[Top]
Do Not Highlight Newly Installed Programs
If you would like to turn off the popup that alerts you to newly installed software, here's how:
Right click the Start button>> Properties>> Start Menu tab>> Customize button.
Click the Advanced tab.
Under the "Start menu settings" category, uncheck the entry titled "Highlight newly installed programs".
Click OK, then OK once again.
[Top]
Local Group Policy Editor
(Professional Edition only)Hidden within your hard drive is a very powerful tool that will allow you to modify virtually every feature in Windows XP. It's called Local Group Policy Editor (gpedit). To invoke this tool:Go to Start>> Run. Type in: gpedit.msc [Enter] or click OK.
[Top]
Keep Favorites At The Top Of Start Menu
If you have a certain program that you use frequently and would like to be able to find it quickly and easily. Just pin it to your Start Menu where it can be found in one click. Here's how:
Locate the program that you would like to pin to the start menu.
Right click the program and select "Pin to Start Menu" from the resulting menu.
It will now permanently reside in the top left pane of your Start Menu. To remove this item from the Start Menu, just right click it and select Delete.
[Top]
Change the Registered Owner information
When you install Windows XP, you are requested to enter your name and organization (optional) information. This registration information can be viewed here:Go to Start>> Control Panel>> System>> General tab.If you need to change this information after Windows has been set up, it will be necessary to change it in the Windows registry.Caution: Prior to making changes in the Windows registry, be sure to make a backup copy. Making errors while following this information can create serious problems in your Windows installation. Continue at your own risk.Change the Registered Owner information in Windows XP:
Click Start>> Run. Type in: regedit [Enter]
Drill down to the following registry key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
Single click the "CurrentVersion" entry to empty its contents into the right pane.
In the right pane, locate and double click the entry "RegisteredOrganization".
Under the "Value data" type the new name that you would like to use. Click OK.
Go to File at the top and click Exit.
[Top]
Launch a program minimized or maximized
Windows XP lets you choose how you would like to display a program when launched. The choices you have are:
Minimized
Maximized
Normal
Here is how you can apply this setting:
Go to Start
Right click the program that you would like to launch
Select Properties from the resulting window
Select the Shortcut tab
Open the pull down menu in the "Run:" text box
Select the window launch option, then click OK
Your program will now launch the way that you have pre-selected.
[Top]
Create a customized default user profile
When you logon to Windows XP for the first time, Windows uses a template to store the information you have inputted to customize your Windows XP experience. However, if multiple users would like to have their own customized profile on the same machine, you would need to modify the default user profile to accommodate these new users.Warning: Be careful when editing the default user profile. The change is permanent, so it is a good idea to make a backup copy of it so that it can easily be returned to its original configuration in the event something goes wrong.How to create the customized default user profile:
Logon as Administrator, then create a local user account.Note: Many of the files in the profile are hidden by default, you may need to turn on the option for showing hidden files and folders, here's how:
Go to Start>> My Computer>> Tools>> Folder Options.
Click the View tab
Under Advanced settings, click the Show Hidden files and folders option.
Click OK.
Logoff of the Administrator account, then log back on using the local account information that you've just created.
Note: Step #2 is important because if you change the default user profile while logged on as Administrator, you will cause permission issues.
Go to Start>> My Computer>> Local Drive (usually C:/) >> Documents and Settings>> Default User.
Modify the Template settings as you wish. This will make all new users share the same default settings.
Logoff the system, then log back on as Administrator.
You will now need to replace the current default user profile with the one that you have just created, here's how:
Go to Start>> Control Panel>> System>> Advanced tab
Under User Profiles, click the Settings button.
Under Profiles stored on this computer, click the profile that you've just created. Then, click the "Copy To" button.
In the "Copy To" window and under the "Copy profile to" option, click the Browse button.
In the "Browse doe Folder window, find your default user folder (C:\Documents and Settings\Default User folder)
Click OK.
Back in the "Copy To" window and under the "Permitted to use" option, click the Change button.
In the resulting window, click Everyone and then click OK.
Note: If the "Everyone" option is not listed, choose the Advanced option, then click "Find Now". You should now see the Everyone option. Click OK.Now, when a new user logs on to the computer, Windows XP will use the customized default user profile.Note: This template folder can be copied to any Windows XP based machine.
[Top]
Disable New Programs Installed message
Right click the Start button
Select Properties
Choose Customize
Click the Advanced tab
In the Start menu settings category, uncheck the entry titled: Highlight newly installed programs
Click OK
[Top]
Enable ClearType
Microsoft states, "With Windows XP, ClearType delivers improved font display resolution over traditional anti-aliasing. It improves readability on color LCD monitors with a digital interface, such as those in laptops and high-quality flat desktop displays. Readability on CRT screens can also be somewhat improved."Here is a are the steps to enable ClearType for Windows XP:
Right click on the desktop and select Properties
Click on the Appearance tab.
Click on the Effects button.
Put a check on the Use the following methods to smooth edges of screen fonts.
Change the value from standard to ClearType.
Open up IE and you will see a difference.
[Top]
Disable Caps Lock
To disable the caps lock, follow the instructions below:Open Notepad and insert the following information:====Begin cut-and-paste (omit this line)Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]"ScanCode Map"=hex:00,00,00,00,00,00,00,00,02,00,00,00,00,00,3a,00,00,00,00,00====End cut-and-paste (omit this line)Save the file to your desktop and name it; DisableCapsLock.regTo insert the information contained in this file, right-click and select "merge" or simply double-click the file. You must either restart your system or log off and back on again before the system will recognize the new mapping data. You can delete the file from your desktop is you wish by simply right clicking and select Delete.Note: Do not use if you've already remapped other keys, because you'll lose those remappings!Works in Windows XP and 2000 only.
[Top]
Assign a Keyboard Shortcut
This tip provides instruction on how to create a keyboard shortcut for a program in Windows XP. This feature works only with program shortcuts on the desktop or the Start menu. This feature does not work if the desktop shortcut is a shortcut to another shortcut.
Right-click the desktop or start menu shortcut, and then click Properties.
On the Shortcut tab, click in the Shortcut Key box.
Press the keyboard combination that you want to use to start the program. The shortcut combination must consist of one character (a letter, number, or symbol) plus at least two of the following three keys: CTRL, ALT, and SHIFT.
Click Apply then OK. Note: The default combination is CTRL+ALT; if you press only a character key, Windows XP automatically adds CTRL+ALT. To use other combinations of the three required keys, press those keys before you press the character key. A keyboard shortcut does not work if it conflicts with a keyboard combination that is used in the program that is currently active. [Top]
Customize the Windows XP Start Menu
Windows XP makes it possible to keep your favorite programs within easy to find within the Start Menu. For those programs that you use a lot, you will not have to search through your favorites to find them, just simply Pin them to your Start Menu.A handy tool to have pinned to the Start Menu is the Windows XP Calculator. So, let's use that as our example for today's tip.To pin Calculator to the Start menu:1. Click Start, and then click All Programs. 2. Click Accessories and point to Calculator. 3. Right-click Calculator and click Pin to Start menu.4. Click anywhere on the desktop to quit the Start menu. That's it! This method will work for any program on your computer. To remove the Calculator from your Start Menu:1. Go to Start2. Right-click Calculator and select Unpin from Start menu. 3. Click anywhere on the desktop to quit the Start menu. [Top]
Use your own picture for your User Account
If there are multiple user accounts on your computer. Windows makes it easy for your to use your own picture to be associated with your user account. Here's how:
Go to Start>> Control Panel>> User Accounts
Select your account from the User Accounts window
You should be at the User Accounts windows that asks the question; "What do you want to change about your account? Select the "Change my picture" link.
At the "Pick a new picture for your account" window, Select "Browse for more pictures"
Navigate to the picture that you would like to use, then select "Open" The selected graphic will now appear on the Welcome Screen and Start Menu. [Top]
Alphabetize Your All Programs Menu
Have you ever searched your programs menu and found it difficult to find what you're looking for? That's pretty common. We all enjoy finding new programs and using them on our computers. The problem is that when you load lots of them, it can be very difficult finding them in the All Programs menu. It may help if you alphabetize the All Programs menu, here's how:
Go to Start>> All Programs
Right click any of the listed programs
From the resulting right click menu, select "Sort By Names" All of your programs will now be alphabetically sorted. [Top]
Remap Your Keyboard
If you would like to make a certain key function like a different key, you can use this simple little utility (below) to drag and drop your keyboard function changes. For example; you would like to make the Page Down key function as a Tab key. Not a problem, drag and drop the Tab key from the upper base keyboard layout down to the Page Down key in the remapped layout. Press the Save and Exit icon in the toolbar. You will then be prompted to make the change in your Windows registry and then reboot.
Note: As always, prior to making changes to your registry, be sure to back it up.
NT/XP/2000340KB
[Top]
Customize the Start menu
The start menu is much more customizable than previous versions of Windows. To make the Start menu display only the applications you want, rather than the default determined by Microsoft:
Right-click in an empty section of the Start menu's left column
Select Properties >> Start Menu >> Customize.
Here you'll find a list of your most frequently used programs. (XP keeps track of what you use and what you don't, then updates this list dynamically.)
Note: Don't want your anyone to know that Pinball, Solitaire, and Quake all make your list? Go to the General tab, click Clear List, and set the counter to zero.
[Top]
Alphabetize your Start Menu
Windows by default, adds new programs to the end of the start menu. If you would rather view these in alphabetical order, just simply right click the menu and chose "sort by name".
[Top]
Change Mouse Pointer Scheme
If you would like to see your mouse pointer as something other than an arrow or hourglass, then you will appreciate to know that XP offers a number of alternative pointer schemes, such as Dinosaur, Ocean and Sports. Open the Control Panel, double-click Mouse, and select the Pointers tab. (If you start in Category view, select Appearance and Themes, then click Mouse Pointers under "See Also.") Next to Schemes, click the down arrow and select a scheme to preview its pointers. Click OK to apply the scheme to your desktop.
[Top]
Quick Date & Time Insert
This is a very handy method of inserting the date and time (according to the Windows calendar) into a text document. I believe this only works in Notepad, not in MS Word or WordPad.Steps to insert date and time into a Notepad .txt file:
Click Start>> Run
Type: notepad
Push F5 on your keyboard
This simple shortcut can be very useful, especially when making logs or recording any kind of time-sensitive observations.
[Top]
Pin Items to Start Menu
In the Start Menu, programs will rotate in and out depending on their frequency of use. If you would like to keep a program in the Start Menu:
Right-click the link to your favorite program on the Start Menu and select Pin to Start Menu. Your program will be moved permanently to the top part of the list, just below your browser and e-mail programs.
[Top]
Change Default Sounds
Are you getting tired of hearing the same sounds that came with your Windows installation? You don't have to settle for the default sounds. You can change the sounds that are associated with certain events such as; logging in, logging out, mail notification and much more. Here's how:Go to Start>> Control Panel>> Sound and Audio Device>> Sound tab. Scroll the list of events for one that you would like to change, then browse for a sound that you would like to apply to that event. It's as simple as that!
[Top]
Turn ToggleKeys On
When the ToggleKey feature is activated, you will be given a beep sound to let you know that either the Numlock, Capslock or ScrollLock keys have been pressed. Turn this feature on by pressing and holding the NumLock button on your keyboard for 5 seconds. You will hear a beep to let you know that it is on. Turn it off the same way.
[Top]
Expand Control Panel in the Start Menu
Windows XP makes it possible to view your Control Panel in a separate window (default) or your can view in in a sub-menu or choose not to have it listed in the Control Panel at all. Here's how:Right-click the Start menu button, then choose Properties. From the Taskbar & Start Menu Properties window, click the Customize button, then click the Advanced tab. You should see three options for Control Panel:
Display as Link: (default)
Display as Menu: When you click it, or hold the mouse over it, the Control Panel items will open as a sub-menu.
Do not display this item: This will remove it from the Start Menu completely.
Or, if you want to view the Control Panel in a separate window, just right-click Control Panel and select Open. The Control Panel will now open in a new window and the behavior of your Start Menu will be unchanged.
[Top]
Change The Text In The XP Start Button
I have made these instructions available due to the many requests I have received. Note: Use the information below at your own risk, please see the "Terms of use" section (link below). This modification is not recommended for the beginner.
Changing the text in the XP start button is done by modifying the Explorer.exe file. In order to modify this file you will need a special editor equipped to handle binary files. A commonly referred editor is Resource Hacker. Resource Hacker is a freeware utility that has the ability to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files. It works with Win95, Win98, WinME, WinNT, Win2000 and WinXP Operating Systems. Click the button below to download Resource Hacker.
First, make a backup copy of Explorer.exe located at C:\Windows\explorer. You can place it in a special folder or save it to a disk. An alternate plan is to rename the file to "explorerB.exe" (the B is for backup), then just simply edit Explorer.exe.
Next, open Resource Hacker. The category you will be using is String Table. You will need to expand it by clicking on the plus sign, then navigate down and expand string 37 followed by 1033, (For Classic Layout use number 38). On the right hand pane look for item 578, it will show the word "start". Now, let's modify the file.
Double click on "Start" so that it is highlighted. This should highlight ONLY the word Start and NOT the quotation marks. It is important to leave the quotation marks in tact. The new text will go in-between the quotation marks. As an example:
Current name= "Start"
Deleted name= ""
Modification= "5Star" Note: Using 5 digits or less in the Start button is best, however, many people have had success using more than that. I don't recommend using more that ten digits for your modified Start button text.
After changing the "Start" text, you will need to click on the Compile Script button. Go to the File menu and choose the "Save as" command. Give the file a name such as "explorerN.exe" (the N is for new). Save this file to C:\Windows.
Next, you will need to make a Windows registry change so that your newly modified explorer.exe file will be recognized when you logon to your system. Here's how: Go to the Start>> Run. Type in: regedit [Enter]Drill to the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. Click once on the "Winlogon" entry to empty its contents into the right pane. In the right pane, double click the "Shell" entry to open the Edit String dialog box. In the "Value data" line, type in your Start Menu button's modified name (in this example we used "5Star"). Click OK.
Close the Registry Editor and restart Windows. If you have followed the instructions (above) carefully, your Start button should have its new name. Warning: Shell modifications may be identified as spyware by Ad-aware. Deleting this file in Ad-aware could cause Windows not to start. Also, running the update to SP2 with the modified Shell has been reported to render your computer unusable. If you run in to any trouble using this modification, revert back to your original version of your explorer.exe file. [Top]
Windows XP ClickLock Feature
If you are doing a lot of drag and drop of files and folders, you may want to consider using the ClickLock feature available in Windows XP. With this feature activated, you can left click and hold the click for a determined amount of time until the item that was clicked is locked. Then just release the left click and move your mouse to the location where you would like to drop the item, left click again and it will be dropped in to this new location. Here is how to activate the ClickLock feature:Go to Start>> Control Panel>> Mouse Icon. You will then see the illustration shown below. In the Mouse Properties window, click the "Buttons" tab. Then, place a check mark in the little check box titled "Turn on ClickLock". Once this is checked it will activate the "Settings" button. By clicking the settings button, you will be able to control the speed in which it takes Windows to lock on to the selected item. It defaults in the center position and in most cases, this is fine.
[Top]
Access your favorite programs fast
Windows makes it possible to access your favorite programs with a keyboard command. This is very helpful when you have a window open and you need to access a certain program quickly and you don't want to go to your desktop to access it. Here's how to set this up:
Right click any program, either in All Programs or on your Desktop.
Select Properties from the resulting menu.
Click the Shortcut tab.
In your programs Properties window, you will find the word "None" list in the Shortcut key text box.
Click once inside this text box and choose a letter on your keyboard that you would like to associate with your program (see Figure #1). In my case I chose the letter "F". Windows will automatically insert Ctrl + Alt + F into the text box making this your new keyboard shortcut command.
Click Apply and exit the Properties window. Now whenever I use Ctrl + Alt + F on my keyboard, the chosen program will automatically launch.
Figure #1 [Top]
Save Custom Colors & Patterns
If you enjoy creating custom colors and patterns for your Windows installation, you know that creating this takes a great deal of time. If you would like to save these settings to keep as a backup copy or transferring these settings to a second computer here's how:
Open up the Registry Editor, Start>> Run, type in: regedit [Enter]
Drill to the following two registry keys:
HKEY_CURRENT_USER\Control Panel\Custom Colors
HKEY_CURRENT_USER\Control Panel\Patterns
Right click Custom Colors and select Export from the resulting menu. Choose a location to save it to and click Save. Do the same for the "Patterns" entry.Once you copy the file to the second computer, just double click the file to import.
[Top]
Rename IE's Title Bar
If you would like to see a new name for Internet Explorer in its title bar, here's how:
Go to: Start >> Run
Type in: REGEDIT
Navigate to: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Single click on "Main" to view its contents in the right pane. Scroll down and check to see if an entry "Window Title" exists. If it does not exist, then go up to Edit >> New>> String Value.
Right click on your new String Value entry and select "Modify" in the resulting menu.
In the "Value data" text box, type in whatever you would like the title bar to read, select OK when done. I have mine named "5 Star Support Explorer".
If you have done this correctly, the next time you open up Internet Explorer, you should see your new name at the title bar.
Note: Be sure to back up your registry prior to making any changes.
[Top]
Installing Fonts
Windows comes with a great deal of different fonts selections, but there are those of you that need more. Windows makes it easy to add new fonts to your system. Once you have downloaded your font of choice:
Go to Start>> Control Panel.
Double-click the Fonts icon. If the Fonts icon is not visible, you may need to click Appearance and Themes first. Then go to "See Also" in the upper left of your screen.
Once you get to your Fonts window, you can either drag and drop your new font from its downloaded location into the Font window or, you can click on the File menu in the upper left of the Fonts window and select "Install New Font...". From here, you can browse to the new font location, click the font file and click OK. The font will automatically be copied into your Fonts folder.
Your new font will now be available for all Windows applications to use.
[Top]
Launch the On-Screen Keyboard
Microsoft's on-screen keyboard utility is a virtual keyboard that allows people with mobility impairments to use the on-screen keyboard via a mouse or joystick.To access the on-screen keyboard:Go to Start>> Run. Type in: OSK [Enter] or click OK.The on-screen keyboard will now be displayed at the bottom of your screen. You can move it anywhere you would like just as you can with any other window.Once you have the on-screen keyboard displayed, you can click the "Keyboard" button and select the type of keyboard to be displayed (see figure #1).Then, click the "Settings" button to select the mode you would like it to operate in (see figure #2).
Figure #1
Figure #2
[Top]
Quickly Close All Windows
If you have several windows open and you would like to close them quickly, you can hold down the CTRL button while clicking each taskbar button. With all of the buttons selected, right click the last button clicked and select "Close Group" (see illustration below).
[Top]
Change Your Pointer Scheme
The default scheme for the Windows busy pointer is the hourglass. If you would like to change the default scheme to any of the available alternatives, such as:
Dinosaur
Ocean
Sports
...plus many moreHere's how:
Go to Start>> Control Panel>> Mouse>> Pointers tab
Next to Schemes, click the drop-down arrow and select a scheme to preview its pointers.
Click OK to apply the scheme of choice to your desktop.
[Top]
Create a Shortcut to Lock Your System
In the event you should need to leave your computer system in a hurry and do not want others to be able to access your information. You can create a shortcut to sit on your desktop so that all you would have to do is double click this shortcut and your computer will automatically lock your display. This will not log-off your system. In order to unlock your computer, simply click your "User Name", enter your password and your back in business. Here's how to set this up:
Right click an empty area of your Desktop.
Select New>> Shortcut.
The Shortcut wizard will activate. Type the following exactly as is in to the "Type the location of the item:" text box:rundll32.exe user32.dll,LockWorkStation
Note: It may be best to copy and paste the command (above) for accuracy sake.
Click Next
Enter a name for your new shortcut (eg: Lock System).
Click Finish
Alternately, you can always just press the Windows key + "L" on your keyboard which will do the very same thing. Some people just like having the shortcut to click.
Now that you have the Shortcut residing on your Desktop. You can change the actual icon to something other than the default icon. Here's how:
Right click the new shortcut on your Desktop.
Select Properties.
Select the Shortcut tab
Click the Change Icon button.
In the textbox titled: "Look for icons in this file", type in: shell32.dll
Click OK
Click any of the available icons from the list.
Click OK
[Top]
Classic Start Menu
If you prefer to have your system Icons on the Desktop rather than having many of them in your Start Menu, then here's how to get the Classic Start Menu on your XP system.
Right-click the Start Menu and choose Properties. The "Taskbar and Start Menu Properties" window should appear.
In the bottom half of the window, select "Classic Start Menu" and then click OK or Apply, and you should see the old familiar Start Menu.
[Top]
Full Screen feature
The Windows Full Screen Feature is very helpful when you are in search of a file within a very large folder. For instance, when you open your My Documents folder, press the F11 key on your keyboard to activate the Full Screen Feature. This will make the whole folder viewable within the screen instead of having to scroll down in search of your file. To revert back to your regular screen, just press the F11 key again.
[Top]

Explaining DNS Concepts - DNS Servers-DNS Queries-DNS Records

3 types of DNS queries— recursive, iterative, and non-recursive 3 types of DNS servers— DNS Resolver, DNS Root Server and Authoritative Name...