Search

RAID Part 2

Sunday, August 8, 2010

3. RAID-2: Hamming Code ECC
This type uses striping across disks with some disks storing error checking and correcting information. It has no advantage over RAID-3.

RAID Part 1

Tuesday, August 3, 2010

RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, input/output operations can overlap in a balanced way, improving performance. Since multiple disks increases the mean time between failures, storing data redundantly also increases fault tolerance.


Advantages of RAID

There are three reasons you might want a RAID system of drives.
  1. You need tons of storage space and you need it to be fast. (RAID 0)
  2. You want to instantaneously and automatically backup your data. (RAID 1)
  3. You want both. (RAID 5) 
Let’s discuss little bit about types of RAID:

how to configure printer server

Monday, August 2, 2010


What is a Printer?
Printer is a device that prints text, graphics and images on the paper. With regards to quality, graphics, speed there are different types of a printer. The most common types of the printer are Dot matrix, InkJet and Laser printer.




How to improve your computer performances

If you have any questions leave a comments :)

1. Configuring the paging file.
How to increase paging file or Virtual memory?
In windows XP and Vista : Right My computerà go to Properties ->Advanced->Under Performance click on settings -> Un performance option select advance -> under Virtual Memory click on change -> select the drive and select Set option to increase the Paging file size as per the memory in the system available.

What is?

Sunday, August 1, 2010

DCPROMO:

DCPROMO is an Active Directory Installation wizard. It is used to promote member servers to domain controllers. It can also be used to demote a domain controller back to a member server.

What is BitLocker? and how to encryption and decryption

Saturday, July 31, 2010

BitLocker is an operating system-level extension to Vista and Windows 7 that combines on-disk encryption and special key management techniques. The data and the operating system installation are both protected by two-factor authentication, specifically, a hardware key used in conjunction with a long passphrase.

 Windows 7 ultimate  includes BitLocker To Go, which takes the capability of BitLocker that performs bit-level full volume encryption and extends its use to removable storage devices such as USB keys, meaning if we lose our USB thumb drive, our data is safe

Forgot Administrator password Try this

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)
2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”
3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4. When you get to the
Welcome to Setup screen, press ENTER to Setup Windows now
5. The Licensing Agreement comes next - Press F8 to accept it.

BIOS Power-On Self Test (POST)

Thursday, July 29, 2010

The first thing that the BIOS does when it boots the PC is to perform what is called the Power-On Self-Test, or POST for short. The POST is a built-in diagnostic program that checks your hardware to ensure that everything is present and functioning properly, before the BIOS begins the actual boot. It later continues with additional tests (such as the memory test that you see printed on the screen) as the boot process is proceeding.

The POST runs very quickly, and you will normally not even noticed that it is happening--unless it finds a problem (amazing how many things are like that, isn't it?) You may have encountered a PC that, when turned on, made beeping sounds and then stopped without booting up. That is the POST telling you something is wrong with the machine. The speaker is used because this test happens so early on, that the video isn't even activated yet! These beep patterns can be used to diagnose many hardware problems with your PC. The exact patterns depend on the maker of the BIOS.


Note: Some POST errors are considered "fatal" while others are not. A fatal error means that it will halt the boot process immediately (an example would be if no system memory at all is found). In fact, most POST boot errors are fatal, since the POST is testing vital system components.


Active Directory

Wednesday, July 28, 2010

Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object?people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

What is Global Catalog?

The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.

What types of classes exist in Windows Server 2003 Active Directory?

Structural class:
The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.
 

What is cache memory?

Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.

What is the difference between Unix and Windows?

Unix and Windows use completely different paradigms for run-time loading of code. Before you try to build a module that can be dynamically loaded, be aware of how your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in the program where the functions and data are placed in memory. This is basically a link operation.

What is Backup Storage and the types of backup.

In computers, backup storage is storage that is intended as a copy of the storage that is actively in use so that, if the storage medium such as a HDD (Hard Disk) fails and data is lost on that medium, it can be recovered from the copy. In an enterprise, because the loss of business data can be a big problem differences, it is important that backup storage be provided.

On a personal computer, backup storage is commonly achieved with Zip drivers and DVDs or Store it in a local system itself. In an enterprise, backup storage can sometimes be achieved through replication of data in multidisc storage systems, such as RAID; as part of network-attached storage (NAS); as part of a storage area network SAN. Enterprise backup storage often makes use of both disk and tape as storage media. Special software is used to manage backup as part of a storage system.

Types of Backups:

What we can do if system was infected by Virus

Tuesday, July 27, 2010

"The only way to absolutely, positively clean a machine from a virus is to completely reformat the machine and reinstall the operating system, updates, applications and data from scratch."

It's simple really: consider the possibilities after you're infected with a virus:


1. Your anti-virus program successfully cleans it off.

2. Your anti-virus program thinks it successfully cleans it off, but in fact the virus has hidden itself so well that it remains. You're still infected, and you don't know it.

3. Your anti-virus program doesn't catch it and doesn't even try to clean it off. You're still infected, and you don't know it.

4. Your anti-virus program fails to clean it off and tells you. You're still infected, but at least you know.

Not Satisfied with the above , please try below steps and check:

how to protect my system from Virus..

Viruses are not the only forms of malicious code that may invade your system. Worms, Trojans, adware, spyware, key loggers together with viruses form part of malware running in the wild that may seriously harm your system and your data while also hogging system resources, reducing PC performance and Internet bandwidth. Here are seven ways of protecting yourself against malware.


Today, security threats come in all shapes and sizes and from a variety of sources including software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.

Few ways to protect your system from Viruses.

Tips for a secure password

Monday, July 26, 2010

What do online social networks, online banking and email accounts have in common? They all require passwords.

These passwords act like sentinels, keeping snoops and data pirates away from one's personal data. But bad passwords are as easy to crack as cheap locks. That means one can't be careful enough when picking a password.

“A good password should include a lot of the different options available on most keyboards,” says Lutz Neugebauer of Bitkom, a German technology industry association.

Upgrade to Fedora 13

Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. It is built by people across the globe who work together as a community: the Fedora Project. The Fedora Project is open and anyone is welcome to join. The Fedora Project is out front for you, leading the advancement of free, open software and content.

 Fedora 13 is right around the corner. Code-named "Goddard," the Fedora 13 release sports tons of updates from Fedora 12 and some really exciting new features that will have Linux power users running for their CD burners. You'll find everything from better printer support to experimental 3D support for Nvidia cards and filesystem rollback. Ready to roll up your sleeves? Let's take a look at the best of Fedora 13.

How to troubleshooting blue screen (BSOD) errors ?

First , before troubleshooting blue screen you should enable a complete memory dump on your system after Windows Installation. This is done under the system properties in Startup and Recovery. It's best to do this right after you install Windows, before you start getting any BSODs. Sometimes the blue screen will show the name of the driver that is causing the problem. If nothing else, you can look up the STOP code and see what the problem is.

The most important info to record from the blue screen is the technical info, it will look something like this:

*** STOP: 0x0000007B (0x00000032, 0x00002345, 0xABCDEF00, 0x00000000)


RJ45 Patch Cable Configuration

Sunday, July 25, 2010

RJ45 Patch Cable Configuration
EIA/TIA 568A Colour Scheme


 Colour
 1. White-Green
2. Green
3. White-Orange
4. Blue
5. White-Blue
6. Orange
7. White-Brown
8. Brown