Search

Warning!!!! renting Jet Ski in Pattaya (Thailand)

Friday, February 18, 2011

Hey Guys,

Just a bit of advice in regards to renting Jet Skies or anything in Pattaya. I’m just back from my first trip in Thailand, and over its entire disappointed trip for us! However while we spent some days in Pattaya we had a really bad experience.

I and my three friends were approached by a man while walking down the beach asking if we wanted to rent jet Skies at 5:30 PM (02/14/2011), he was friendly enough and we arranged a price of 150THB each for 30mins. We were asked to sign a piece of paper which asked for our Hotel name and room number they were very friendly and polite.

Integration between DCHP and DNS

Saturday, October 2, 2010

Traditionally, DNS and DHCP server have been configured and managed one at a time. Similarly, changing authorization rights for a particular user in a group of devices has meant visiting each one and making configurations changes. DHCP integration with DNS allows the aggregation of these tasks across devices, enabling a company's network services to scale in step with the growth of network users, decives, and policies, while reducing the administrative operations and costs.


This integration provides practical operational efficiencies that lower the cost of ownership. Creating a DHCP network automatically creates an associated DNS Zone, for example , reducing the number of tasks required of network administrators. And integration of DNS  and DHCP in the same database instance provides unmatched consistency between service and management views of IP address-centric network service data. 

Microsoft coming with Internet Explorer 9 (IE9)

Friday, September 24, 2010

Microsoft has raised the stakes again in the heated browser battle. The company's recent public beta release of Internet Explorer 9 (IE9) shows that the software giant has taken seriously the criticisms levied against previous versions of the browser -- especially in the areas of performance and usability.

But there's more to IE9 than faster page loads and fewer hassles when viewing websites. IE9 represents a substantial overhaul of the world's most popular browser. Does that mean it should have a place right now on your desktop? Read on for some answers.soft has raised the stakes again in the heated browser battle. The company's recent public beta release of Internet Explorer 9 (IE9) shows that the software giant has taken seriously the criticisms levied against previous versions of the browser -- especially in the areas of performance and usability.
 

But there's more to IE9 than faster page loads and fewer hassles when viewing websites. IE9 represents a substantial overhaul of the world's most popular browser. Does that mean it should have a place right now on your desktop? Read on for some answers...

Ten Technologies That Will Rock 2010

Tuesday, August 24, 2010

Now that the aughts are behind us, we can start the new decade with a bang. So many new technologies are ready to make a big impact this year. Some of them will be brand new, but many have been gestating and are now ready to hatch. If there is any theme here it is the mobile Web. As I think through the top ten technologies that will rock 2010, more than half of them are mobile. But those technologies are tied to advances in the overall Web as well.


http://techcrunch.com/2010/01/01/ten-technologies-2010/

Routing and Routed Protocols

Tuesday, August 10, 2010

ROUTING PROTOCOLS      

ROUTING PROTOCOLS are the software that allow routers to dynamically advertise and learn routes, determine which routes  are available and which are the most efficient routes to a destination. Routing protocols used by the internet protocol suite include:
  • Routing Information Protocol (RIP and RIP II)
  • Open Shortest Path First (OSPF)
  • Intermediate System to Intermediate System (IS-IS)
  • Interior Gateway Routing Protocol (IGRP)
  • Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Border Gateway Protocol (BGP)

RAID Part 2

Sunday, August 8, 2010

3. RAID-2: Hamming Code ECC
This type uses striping across disks with some disks storing error checking and correcting information. It has no advantage over RAID-3.

RAID Part 1

Tuesday, August 3, 2010

RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, input/output operations can overlap in a balanced way, improving performance. Since multiple disks increases the mean time between failures, storing data redundantly also increases fault tolerance.


Advantages of RAID

There are three reasons you might want a RAID system of drives.
  1. You need tons of storage space and you need it to be fast. (RAID 0)
  2. You want to instantaneously and automatically backup your data. (RAID 1)
  3. You want both. (RAID 5) 
Let’s discuss little bit about types of RAID:

how to configure printer server

Monday, August 2, 2010


What is a Printer?
Printer is a device that prints text, graphics and images on the paper. With regards to quality, graphics, speed there are different types of a printer. The most common types of the printer are Dot matrix, InkJet and Laser printer.




How to improve your computer performances

If you have any questions leave a comments :)

1. Configuring the paging file.
How to increase paging file or Virtual memory?
In windows XP and Vista : Right My computerà go to Properties ->Advanced->Under Performance click on settings -> Un performance option select advance -> under Virtual Memory click on change -> select the drive and select Set option to increase the Paging file size as per the memory in the system available.

What is?

Sunday, August 1, 2010

DCPROMO:

DCPROMO is an Active Directory Installation wizard. It is used to promote member servers to domain controllers. It can also be used to demote a domain controller back to a member server.

What is BitLocker? and how to encryption and decryption

Saturday, July 31, 2010

BitLocker is an operating system-level extension to Vista and Windows 7 that combines on-disk encryption and special key management techniques. The data and the operating system installation are both protected by two-factor authentication, specifically, a hardware key used in conjunction with a long passphrase.

 Windows 7 ultimate  includes BitLocker To Go, which takes the capability of BitLocker that performs bit-level full volume encryption and extends its use to removable storage devices such as USB keys, meaning if we lose our USB thumb drive, our data is safe

Forgot Administrator password Try this

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)
2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”
3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4. When you get to the
Welcome to Setup screen, press ENTER to Setup Windows now
5. The Licensing Agreement comes next - Press F8 to accept it.

BIOS Power-On Self Test (POST)

Thursday, July 29, 2010

The first thing that the BIOS does when it boots the PC is to perform what is called the Power-On Self-Test, or POST for short. The POST is a built-in diagnostic program that checks your hardware to ensure that everything is present and functioning properly, before the BIOS begins the actual boot. It later continues with additional tests (such as the memory test that you see printed on the screen) as the boot process is proceeding.

The POST runs very quickly, and you will normally not even noticed that it is happening--unless it finds a problem (amazing how many things are like that, isn't it?) You may have encountered a PC that, when turned on, made beeping sounds and then stopped without booting up. That is the POST telling you something is wrong with the machine. The speaker is used because this test happens so early on, that the video isn't even activated yet! These beep patterns can be used to diagnose many hardware problems with your PC. The exact patterns depend on the maker of the BIOS.


Note: Some POST errors are considered "fatal" while others are not. A fatal error means that it will halt the boot process immediately (an example would be if no system memory at all is found). In fact, most POST boot errors are fatal, since the POST is testing vital system components.


Active Directory

Wednesday, July 28, 2010

Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object?people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

What is Global Catalog?

The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.

What types of classes exist in Windows Server 2003 Active Directory?

Structural class:
The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.
 

What is cache memory?

Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.

What is the difference between Unix and Windows?

Unix and Windows use completely different paradigms for run-time loading of code. Before you try to build a module that can be dynamically loaded, be aware of how your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in the program where the functions and data are placed in memory. This is basically a link operation.

What is Backup Storage and the types of backup.

In computers, backup storage is storage that is intended as a copy of the storage that is actively in use so that, if the storage medium such as a HDD (Hard Disk) fails and data is lost on that medium, it can be recovered from the copy. In an enterprise, because the loss of business data can be a big problem differences, it is important that backup storage be provided.

On a personal computer, backup storage is commonly achieved with Zip drivers and DVDs or Store it in a local system itself. In an enterprise, backup storage can sometimes be achieved through replication of data in multidisc storage systems, such as RAID; as part of network-attached storage (NAS); as part of a storage area network SAN. Enterprise backup storage often makes use of both disk and tape as storage media. Special software is used to manage backup as part of a storage system.

Types of Backups:

What we can do if system was infected by Virus

Tuesday, July 27, 2010

"The only way to absolutely, positively clean a machine from a virus is to completely reformat the machine and reinstall the operating system, updates, applications and data from scratch."

It's simple really: consider the possibilities after you're infected with a virus:


1. Your anti-virus program successfully cleans it off.

2. Your anti-virus program thinks it successfully cleans it off, but in fact the virus has hidden itself so well that it remains. You're still infected, and you don't know it.

3. Your anti-virus program doesn't catch it and doesn't even try to clean it off. You're still infected, and you don't know it.

4. Your anti-virus program fails to clean it off and tells you. You're still infected, but at least you know.

Not Satisfied with the above , please try below steps and check: