Traditionally, DNS and DHCP server have been configured and managed one at a time. Similarly, changing authorization rights for a particular user in a group of devices has meant visiting each one and making configurations changes. DHCP integration with DNS allows the aggregation of these tasks across devices, enabling a company's network services to scale in step with the growth of network users, decives, and policies, while reducing the administrative operations and costs.
This integration provides practical operational efficiencies that lower the cost of ownership. Creating a DHCP network automatically creates an associated DNS Zone, for example , reducing the number of tasks required of network administrators. And integration of DNS and DHCP in the same database instance provides unmatched consistency between service and management views of IP address-centric network service data.
Search
Integration between DCHP and DNS
Saturday, October 2, 2010
Posted by
Unknown
at
6:30 PM
0
comments
Microsoft coming with Internet Explorer 9 (IE9)
Friday, September 24, 2010
Microsoft has raised the stakes again in the heated browser battle. The company's recent public beta release of Internet Explorer 9 (IE9) shows that the software giant has taken seriously the criticisms levied against previous versions of the browser -- especially in the areas of performance and usability.
But there's more to IE9 than faster page loads and fewer hassles when viewing websites. IE9 represents a substantial overhaul of the world's most popular browser. Does that mean it should have a place right now on your desktop? Read on for some answers.soft has raised the stakes again in the heated browser battle. The company's recent public beta release of Internet Explorer 9 (IE9) shows that the software giant has taken seriously the criticisms levied against previous versions of the browser -- especially in the areas of performance and usability.
But there's more to IE9 than faster page loads and fewer hassles when viewing websites. IE9 represents a substantial overhaul of the world's most popular browser. Does that mean it should have a place right now on your desktop? Read on for some answers...
Posted by
Unknown
at
7:56 PM
0
comments
Ten Technologies That Will Rock 2010
Tuesday, August 24, 2010
Now that the aughts are behind us, we can start the new decade with a bang. So many new technologies are ready to make a big impact this year. Some of them will be brand new, but many have been gestating and are now ready to hatch. If there is any theme here it is the mobile Web. As I think through the top ten technologies that will rock 2010, more than half of them are mobile. But those technologies are tied to advances in the overall Web as well.
http://techcrunch.com/2010/01/01/ten-technologies-2010/
Posted by
Unknown
at
4:40 PM
0
comments
Routing and Routed Protocols
Tuesday, August 10, 2010
- Routing Information Protocol (RIP and RIP II)
- Open Shortest Path First (OSPF)
- Intermediate System to Intermediate System (IS-IS)
- Interior Gateway Routing Protocol (IGRP)
- Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP)
- Border Gateway Protocol (BGP)
Posted by
Unknown
at
10:18 PM
0
comments
RAID Part 2
Sunday, August 8, 2010
Labels:
RAID
Posted by
Unknown
at
7:44 PM
0
comments
RAID Part 1
Tuesday, August 3, 2010
Advantages of RAID
- You need tons of storage space and you need it to be fast. (RAID 0)
- You want to instantaneously and automatically backup your data. (RAID 1)
- You want both. (RAID 5)
Labels:
RAID
Posted by
Unknown
at
11:00 PM
0
comments
how to configure printer server
Monday, August 2, 2010
Labels:
Printers
Posted by
Unknown
at
10:55 PM
0
comments
How to improve your computer performances
Labels:
Windows
Posted by
Unknown
at
10:37 PM
0
comments
What is?
Sunday, August 1, 2010
Posted by
Unknown
at
1:25 PM
0
comments
What is BitLocker? and how to encryption and decryption
Saturday, July 31, 2010
Labels:
Windows
Posted by
Unknown
at
12:39 AM
0
comments
Forgot Administrator password Try this
4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
Labels:
Windows
Posted by
Unknown
at
12:04 AM
0
comments
BIOS Power-On Self Test (POST)
Thursday, July 29, 2010
The first thing that the BIOS does when it boots the PC is to perform what is called the Power-On Self-Test, or POST for short. The POST is a built-in diagnostic program that checks your hardware to ensure that everything is present and functioning properly, before the BIOS begins the actual boot. It later continues with additional tests (such as the memory test that you see printed on the screen) as the boot process is proceeding.
The POST runs very quickly, and you will normally not even noticed that it is happening--unless it finds a problem (amazing how many things are like that, isn't it?) You may have encountered a PC that, when turned on, made beeping sounds and then stopped without booting up. That is the POST telling you something is wrong with the machine. The speaker is used because this test happens so early on, that the video isn't even activated yet! These beep patterns can be used to diagnose many hardware problems with your PC. The exact patterns depend on the maker of the BIOS.
Note: Some POST errors are considered "fatal" while others are not. A fatal error means that it will halt the boot process immediately (an example would be if no system memory at all is found). In fact, most POST boot errors are fatal, since the POST is testing vital system components.
Labels:
BIOS
Posted by
Unknown
at
1:44 PM
0
comments
Active Directory
Wednesday, July 28, 2010
Labels:
Active Directory
Posted by
Unknown
at
8:52 PM
0
comments
What is Global Catalog?
Labels:
Windows 2003
Posted by
Unknown
at
8:45 PM
0
comments
What types of classes exist in Windows Server 2003 Active Directory?
The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.
Labels:
Windows 2003
Posted by
Unknown
at
8:39 PM
0
comments
What is cache memory?
Labels:
Windows
Posted by
Unknown
at
8:32 PM
0
comments
What is the difference between Unix and Windows?
In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in the program where the functions and data are placed in memory. This is basically a link operation.
Labels:
Windows
Posted by
Unknown
at
8:25 PM
0
comments
What is Backup Storage and the types of backup.
Labels:
Backup and Restore
Posted by
Unknown
at
8:17 PM
0
comments
What we can do if system was infected by Virus
Tuesday, July 27, 2010
"The only way to absolutely, positively clean a machine from a virus is to completely reformat the machine and reinstall the operating system, updates, applications and data from scratch."
It's simple really: consider the possibilities after you're infected with a virus:
1. Your anti-virus program successfully cleans it off.
2. Your anti-virus program thinks it successfully cleans it off, but in fact the virus has hidden itself so well that it remains. You're still infected, and you don't know it.
3. Your anti-virus program doesn't catch it and doesn't even try to clean it off. You're still infected, and you don't know it.
4. Your anti-virus program fails to clean it off and tells you. You're still infected, but at least you know.
Not Satisfied with the above , please try below steps and check:
Labels:
Windows
Posted by
Unknown
at
2:51 PM
0
comments
how to protect my system from Virus..
Viruses are not the only forms of malicious code that may invade your system. Worms, Trojans, adware, spyware, key loggers together with viruses form part of malware running in the wild that may seriously harm your system and your data while also hogging system resources, reducing PC performance and Internet bandwidth. Here are seven ways of protecting yourself against malware.
Today, security threats come in all shapes and sizes and from a variety of sources including software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.
Few ways to protect your system from Viruses.
Labels:
Windows
Posted by
Unknown
at
2:43 PM
0
comments
Tips for a secure password
Monday, July 26, 2010
What do online social networks, online banking and email accounts have in common? They all require passwords.
These passwords act like sentinels, keeping snoops and data pirates away from one's personal data. But bad passwords are as easy to crack as cheap locks. That means one can't be careful enough when picking a password.
“A good password should include a lot of the different options available on most keyboards,” says Lutz Neugebauer of Bitkom, a German technology industry association.
Labels:
Windows
Posted by
Unknown
at
6:06 PM
0
comments
Upgrade to Fedora 13
Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. It is built by people across the globe who work together as a community: the Fedora Project. The Fedora Project is open and anyone is welcome to join. The Fedora Project is out front for you, leading the advancement of free, open software and content.
Fedora 13 is right around the corner. Code-named "Goddard," the Fedora 13 release sports tons of updates from Fedora 12 and some really exciting new features that will have Linux power users running for their CD burners. You'll find everything from better printer support to experimental 3D support for Nvidia cards and filesystem rollback. Ready to roll up your sleeves? Let's take a look at the best of Fedora 13.
Posted by
Unknown
at
5:30 PM
0
comments
How to troubleshooting blue screen (BSOD) errors ?
First , before troubleshooting blue screen you should enable a complete memory dump on your system after Windows Installation. This is done under the system properties in Startup and Recovery. It's best to do this right after you install Windows, before you start getting any BSODs. Sometimes the blue screen will show the name of the driver that is causing the problem. If nothing else, you can look up the STOP code and see what the problem is.
The most important info to record from the blue screen is the technical info, it will look something like this:
*** STOP: 0x0000007B (0x00000032, 0x00002345, 0xABCDEF00, 0x00000000)
Labels:
Windows
Posted by
Unknown
at
3:37 PM
0
comments
RJ45 Patch Cable Configuration
Sunday, July 25, 2010
RJ45 Patch Cable Configuration EIA/TIA 568A Colour Scheme Colour 1. White-Green 2. Green 3. White-Orange 4. Blue 5. White-Blue 6. Orange 7. White-Brown 8. Brown |
Posted by
Unknown
at
6:45 PM
0
comments
Installing Samba on Linux
Posted by
Unknown
at
6:31 PM
0
comments
Ten Reasons to Upgrade to Windows 7
Saturday, July 24, 2010
- Aero Peak : To quickly peer past all open windows to look straight at the Windows 7 desktop, simply point to the right edge of the taskbar. All open windows will instantly turn transparent, making it possible to see what's on the desktop.
- Redesigned Taskbar : With Windows 7, getting an application icon onto the taskbar is as simple as right-clicking on the icon and selecting "Pin to Taskbar." Voila, it magically appears on the Taskbar.
- Aero Snap: With just about every laptop being sold now having a widescreen display, have you ever needed to position two documents side-by-side? Rather than tearing your hair out in frustration, Aero Snap offers a quick and easy way to "snap" windows into the left or right half of your screen simply by dragging Windows to the edges. (You can also snap windows vertically.)
Labels:
Windows
Posted by
Unknown
at
10:15 PM
0
comments
Plan your Windows 7 migration
Labels:
Windows
Posted by
Unknown
at
9:59 PM
0
comments
What You Should Know Before Buying a New Laptop
Shopping for a new laptop computer can be a very daunting task for new shoppers and previous laptop owners alike. Follow this five question jog-list to choose which laptop features, models, brands or price is right for the new laptop of your dreams.
1. What's will you do with your laptop?
Posted by
Unknown
at
9:26 PM
0
comments
Intel WiDi Wireless Display Technology - HOT
Netgear has stepped out early with a receiver product dubbed Push2TV and their block diagram below lays out the solution for you here...
Posted by
Unknown
at
9:09 PM
0
comments
Windows 7 Minimum System Requirements
Labels:
Windows
Posted by
Unknown
at
8:53 PM
0
comments
Could Windows Vistas Pretty Looks Be To Blame For It Running So Slow?
Labels:
Windows
Posted by
Unknown
at
8:34 PM
0
comments
Why Cleaning Up After Windows Can Make Your Slow Computer Faster
Labels:
Windows
Posted by
Unknown
at
8:33 PM
0
comments
Registry Cleaners Can Provide Numerous Advantages
Labels:
Windows
Posted by
Unknown
at
8:32 PM
0
comments
Image Spam
Image spam is junk email that replaces text with images as a means of fooling spam filters.
Image delivery works by embedding code in an HTML message that links to an image file on the Web. Image spam is a larger drain on network resources than text spam because image files are larger than ASCII character strings.
Larger files require more bandwidth and, as a consequence, cause greater degradation of transfer rates.
If the recipient's email program downloads images automatically, the image appears when the message is opened. The image itself may be a picture or drawing of alphanumeric characters that appears as text to the viewer, although it is processed as an image by the user's computer. Many spam filters, especially older or less sophisticated ones, rely upon certain text criteria on which to make judgments.
Such filters typically watch for predetermined words in the subject lines of e-mail messages, suspicious word patterns and word frequency. Image spam is not stopped by such filters because it contains no words that can serve as the basis for blocking messages.
There are a number of approaches to dealing with image spam. In current versions of Outlook, for example, images are not automatically downloaded into messages unless the user has specified that messages from the source can be trusted.
Labels:
Windows
Posted by
Unknown
at
7:56 PM
0
comments
What is eSATA??
Friday, July 23, 2010
Posted by
Unknown
at
10:56 PM
0
comments
Lenovo plans Android tablet PC in growth push
Posted by
Unknown
at
10:42 PM
0
comments
DDR-SDRAM memory specifications
DDR-SDRAM memory specifications:
DATA clock speed (FSB) DDR Ram speed Name:
100 MHz 200 Mbps PC-1600 or DDR-200
133 MHz 266 Mbps PC-2100 or DDR-266
150 MHz 300 Mbps PC-2400 or DDR-300
166 MHz 333 Mbps PC-2700 or DDR-333
200 MHz 400 Mbps PC-3200 or DDR-400
216 MHz 433 Mbps PC-3500 or DDR-433
225 MHz 450 Mbps PC-3600 or DDR-450
233 MHz 466 Mbps PC-3700 or DDR-466
250 MHz 500 Mbps PC-4000 or DDR-500
266 MHz 533 Mbps PC-4200 or DDR-533
275 MHz 550 Mbps PC-4400 or DDR-550
283 MHz 566 Mbps PC-4500 or DDR-566
PC-3200: theoretical Bandwidth is 3200 MB/s
Posted by
Unknown
at
5:24 PM
0
comments
CAT6 Cable??
Even though modern home networks are connected using wireless technology, there are cases when you will still need to use LAN cables. When a wireless signal can’t reach a portion of a house or an office, cables might be your only option.
You’ll encounter several cable type designators with names like CAT5, CAT5e, and CAT6. CAT5 cable is the minimum required for the current Internet standards. CAT5e cable is a higher grade version of CAT5, and CAT6 cable is commonly used for Gigabit Ethernet, an up-and-coming version of Ethernet that operates at 10 times the speed of Fast Ethernet. CAT6 cable costs more than CAT5e but is worth the extra money if you want to future-proof your cable installation.
Posted by
Unknown
at
4:21 PM
0
comments
Intel Huron River CPUs coming Q1 2011 with integrated WiMAX
Early details of Intel’s next-generation mobile processor platform, codenamed Huron River, have emerged well ahead of its expected launch in Q1 2011. Huron River will be based around the 32nm Sandy Bridge process silicon, and be made up of dual- and quad-core processors supporting Intel Turbo Boost.
In addition to the main cores, the Huron River chips will integrate various forms of wireless connectivity too. Bluetooth is one such technology, as well as WiFi and even WiMAX on certain models. There’ll also be support for Intel’s wireless display technology, too.
Intel are expected to position Huron River processors as suitable for both regular laptops and ultrathin models. It will replace the Calpella platform, first launched in 2009, as the seventh-generation Centrino.
Posted by
Unknown
at
10:59 AM
0
comments