Sunday, January 8, 2012

Difference between Intel i3 ,i5 & i7 core processors

Hi, its for my all friends which wanted to know s difference in inlet's new processors

Difference Between Core i3, Core i5, Core i7

Difference between Core i3, Core i5 and Core i7

Intel will stop selling Core 2 Duo and Core 2 Quad in 2010. Core is the new range of Intel processors.

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)

Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 MB Cathe
* 32-45 nm Silicon (less heat and energy)


Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 4-8 MB Catche
* 32-45 nm Silicon (less heat and energy)

Sunday, October 3, 2010

Tips for effective Active Directory Design


 

Tips for effective Active Directory Design


 


 


 

1: Keep it simple

The first bit of advice is to keep things as simple as you can. Active Directory is designed to be flexible, and if offers numerous types of objects and components. But just because you can use something doesn't mean you should. Keeping your Active Directory as simple as possible will help improve overall efficiency, and it will make the troubleshooting process easier whenever problems arise.


 

2: Use the appropriate site topology

Although there is definitely something to be said for simplicity, you shouldn't shy away from creating more complex structures when it is appropriate. Larger networks will almost always require multiple Active Directory sites. The site topology should mirror your network topology. Portions of the network that are highly connected should fall within a single site. Site links should mirror WAN connections, with each physical facility that is separated by a WAN link encompassing a separate Active Directory site.


 

3: Use dedicated domain controllers

I have seen a lot of smaller organizations try to save a few bucks by configuring their domain controllers to pull double duty. For example, an organization might have a domain controller that also acts as a file server or as a mail server. Whenever possible, your domain controllers should run on dedicated servers (physical or virtual). Adding additional roles to a domain controller can affect the server's performance, reduce security, and complicate the process of backing up or restoring the server.


 

4: Have at least two DNS servers

Another way that smaller organizations sometimes try to economize is by having only a single DNS server. The problem with this is that Active Directory is totally dependent upon the DNS services. If you have a single DNS server, and that DNS server fails, Active Directory will cease to function.


 

5: Avoid putting all your eggs in one basket (virtualization)

One of the main reasons organizations uses multiple domain controllers is to provide a degree of fault tolerance in case one of the domain controllers fails. However, this redundancy is often circumvented by server virtualization. I often see organizations place all their virtualized domain controllers onto a single virtualization host server. So if that host server fails, all the domain controllers will go down with it. There is nothing wrong with virtualizing your domain controllers, but you should scatter the domain controllers across multiple host servers.


 

6: Don't neglect the FSMO roles (backups)

Although Windows 2000 and every subsequent version of Windows Server have supported the multimaster domain controller model, some domain controllers are more important than others. Domain controllers that are hosting Flexible Single Master Operations (FSMO) roles are critical to Active Directory health. Active Directory is designed so that if a domain controller that is hosting FSMO roles fails, AD can continue to function — for a while. Eventually though, a FSMO domain controller failure can be very disruptive.
I have heard some IT pros say that you don't have to back up every domain controller on the network because of the way Active Directory information is replicated between domain controllers. While there is some degree of truth in that statement, backing up FSMO role holders is critical.
I once had to assist with the recovery effort for an organization in which a domain controller had failed. Unfortunately, this domain controller held all of the FSMO roles and acted as the organization's only global catalog server and as the only DNS server. To make matters worse, there was no backup of the domain controller. We ended up having to rebuild Active Directory from scratch. This is an extreme example, but it shows how important domain controller backups can be.


 

7: Plan your domain structure and stick to it

Most organizations start out with a carefully orchestrated Active Directory architecture. As time goes on, however, Active Directory can evolve in a rather haphazard manner. To avoid this, I recommend planning in advance for eventual Active Directory growth. You may not be able to predict exactly how Active Directory will grow, but you can at least put some governance in place to dictate the structure that will be used when it does.


 

8: Have a management plan in place before you start setting up servers

Just as you need to plan your Active Directory structure up front, you also need to have a good management plan in place. Who will administrator Active Directory? Will one person or team take care of the entire thing or will management responsibilities be divided according to domain or organizational unit? These types of management decisions must be made before you actually begin setting up domain controllers.


 

9: Try to avoid making major logistical changes

Active Directory is designed to be extremely flexible, and it is possible to perform a major restructuring of it without downtime or data loss. Even so, I would recommend that you avoid restructuring your Active Directory if possible. I have seen more than one situation in which the restructuring process resulted in some Active Directory objects being corrupted, especially when moving objects between domain controllers running differing versions of Windows Server.


 

10: Place at least one global catalog server in each site

Finally, if you are operating an Active Directory consisting of multiple sites, make sure that each one has its own global catalog server. Otherwise, Active Directory clients will have to traverse WAN links to look up information from a global catalog.

Tuesday, December 1, 2009

HOW TO MAKE USB READ ONLY

we know today there are main issue in IT world to secure their data there a lot business hub they can't disbale the usb but they also wants to secure data in pc here i am telling how to can make usb readbale through this method you can receive the data from usb mass storage device but you can't send data in usb that is fantastic way to secure your data.

1. Run Registry Editor (regedit)
.2. Navigate to the following registry

key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control3.

.3 Create a New Key named as StorageDevicePolicies.
4. Highlight StorageDevicePolicies, and then create a New DWORD (32-bit) Value name as WriteProtect.
5. Double click on WriteProtect, and set its value data to 1.Write Protect Removable USB DrivesOnce set, all users on the computer is now blocked and prevented from copying, transferring or writing any files, documents and data to the USB disk drives, without the need to restart or reboot computer. Any attempt to download or copy files to USB drive will return the following error message:The disk is write protected.The media is write-protected.Remove the write protection or use another disk.

Block Write Access to USB Removable Disk
To revert and remove the blocked write access to USB drivers, just delete the StorageDevicePolicies registry key, or delete the WriteProtect registry entry, or change the value data for WriteProtect to 0.

Saturday, August 1, 2009

How to Install Portable Linux Into Usb Drive

At one time or another, you would surely have felt the need for a portable Operating System that you could carry around with you and to help troubleshoot and backup your friends’ crashed PCs or just carry your complete Office with you. There are several Live CD based Linux Distributions(distros) where you just boot from it and enjoy the new OS. But what if you need your Data and settings to be remembered. A good alternative is to use a “LIVE USB” based OS.

linux-penguin-big_origpreview

Three things should be considered first.

  • Size of USB drive
  • Type of Distribution
  • Usage

Distros like Damn Small Linux and Puppy Linux will perform well in 256MB drives. Some OS’es section off a portion of your computer’s memory[RAM] and use that as a drive, in addition to the flash drive.

We will use an application called UNetbootin to install the Linux into the flash drive. We can let the program download a distro or select the image file(.iso) of an already downloaded distro. Download UNetbootin here: http://unetbootin.sourceforge.net/ and install it.

‘m using the Boxpup version of Puppy Linux as my distro.Get it from the official site here: http://www.puppylinux.org/ . Download for Boxpup version: http://www.puppylinux.org/downloads/puplets/boxpup

The downloaded file will be an .ISO file. The important thing to note here is to make sure that you have downloaded the file correctly. Thats why we’re going to verify the authenticity of the downloaded iso.So get the MD5 hash from the place you downloaded.it will be listed in the download page itself. Select the whole MD5 hash and copy it using ctrl-c.

Now install this MD5 hash checker called HashTab from here: http://beeblebrox.org/hashtab/. After you finish installing HashTab, right click the downloaded iso file, select properties.

MD5 checkers

MD5 checkers

You’ll see a tab called file hashes. Select the tab and wait for it to calculate the file hashes. Select MD5 and paste the MD5 hash, that you copied earlier, into the box that reads “Hash Comparison”. If your downloaded file in not tampered, you will see a green tick mark in the hash comparison box. If the downloaded iso file is tampered with or has been incorrectly downloaded, you will see a red cross. You should then attempt to re-download the file from another source.

As your iso file has been verified, it’s time to install the OS . Open UNetbootin and select the Diskimage Radio button and select the downloaded iso file. Please make sure the correct drive letter for your USB drive is selected below.
*It is very important to re-check this because a mistake will format one of the partitions in your hard disk.*

UNetBootin

UNetBootin

Select Ok and let the program work for some time. After a few minutes you’ll see a dialog box asking to reboot. Click No. Save all your work, eject the USB drive but leave it in the USB port and restart the computer.

2008-12-07_140007

final step

Now when your system is restarted, just boot your system with USB(change boot order frm BIOS). You’ll see the UNetbootin menu. Select Puppy.You’ll be asked a one-time set of questions to determine the setup of your computer.Thats it,you can customize your Linux as you want!

Wednesday, May 27, 2009

How to know where the Email Came From

Today is we are facing a lot off issue in email scenario here I am telling you how we can trace a mail where the mail came from and we know is the mail is froad or not we know all this through e-mail header simple we can see header using web based mail and using outlook or other 3rd party e-mail client here i am telling you how to extract the header from outlook and how to trace it

for outlook simple right click on any mail and go in option a pop's window will open there you can see the internet header of a mail and below the method how to trace the mail:-

All Headers are in BLACK / Explanation to Each HEADER is in RED

HEADER :-Return-Path: vikasdhingra@speciality-india.com
EXPLAIN :-This is the Reply to ID: This means this is the sender (vikasdhingra@speciality-
indina.com
HEADER :-Received: from lx4.system3hosting.com (LHLO lx4.system3hosting.com)
(203.185.191.34) by lx4.system3hosting.com with LMTP; Sat, 4 Apr 2009 ,10:56:17
+0530 (IST)
EXPLAIN -:This is the mail received at System3 / mail server is called lx4.system3hosting.com
with the ip 203.185.191.34, it shows that we received the email on LX4 at
10:56AM IST on 4th April 2009.

This date is important to understand message analysis

HEADER :-Received: from localhost (localhost.localdomain [127.0.0.1])by
lx4.system3hosting.com (Postfix) with ESMTP id 89992119000D; Sat, 4 Apr 2009
10:56:17 +0530 (IST)
EXPLAIN :- Before mail is given to LX4, it is scanned by Anti virus / Anti-spam. This shows
that the mail was received by o Anti-spam on Lx4 (Local host) at 10:56:17

HEADER :-X-Virus-Scanned: amavisd-new at X-Spam-Flag: NO
EXPLAIN :- Antivirus Scanned the email and did not find any virus infection in this email. This
does not mean, the sender is not infected, it means any attachment in the email
does not have a virus.
HEADER :-X-Spam-Score: 0
EXPLAIN :-Anti-spam trusts the sender as he is a good friend, and also a customer, and hence
this email was given a spam score of (ZERO) 0.
HEADER :-X-Spam-Level: X-Spam-Status: No, score=x tagged_above=-10 required=6.6
tests=[]l
EXPLAIN :- No tests were done on the email here, hence you see tests=[], for a mail to be called
SPAM, it has to receive 6.6 Points, this mail received 0, hence it was not marked as
spam
HEADER :-Received: from lx4.system3hosting.com ([127.0.0.1]) by localhost
(lx4.system3hosting.com [127.0.0.1]) (amavisd-new, port 10024)with ESMTP id
5CCTkK0Y5zjq; Sat, 4 Apr 2009 10:56:17 +0530 (IST)
EXPLAIN :-this is the transfer from sender server to our anti-spam server

HEADER:-Received: from lx1.system3hosting.com (lx1.system3hosting.com [203.185.191.31])
by lx4.system3hosting.com (Postfix) with ESMTP id 0CCDED904ABfor
<hks@system3group.com>; Sat, 4 Apr 2009 10:56:17 +0530 (IST)

This is a very important line: You see here, that the email was sent using server
lx1.system3hosting.com (203.185.191.31) which is the server that hosts
the sender domain, and was sent to server lx4.system3hosting.com which hosts receiver domain. The email was for
hks@system3group.com

HEADER:- Received: (qmail 5180 invoked by uid 511); 4 Apr 2009 10:50:49 +0530

EXPLAIN :-This line shows the sender mail server (in this case, lx1), the mail was processed by
QMAIL with an ID 511 on that server. The server processed this email at 10:50:49
IST that means it took roughly 6 minutes before the mail reached
hks@system3group.com

HEADER:-Received: from 122.173.243.137 by lx1.system3hosting.com (envelope-from
<vikasdhingra@speciality-india.com>, uid 510) with qmail-scanner-1.25-st-qms
Clear: RC:0(122.173.243.137):.Processed in 33.207305 secs); 04
Apr 2009 05:20:49 -0000
EXPLAIN :-This is again a very important line, this shows that vikasdhingra@speciality-
india.com had the IP Address 122.173.243.137 on his broadband / PC
depending on the connection when he submitted the mail to his SMTP Server
lx1.system3hosting.com. The envelope from means, the sender email id.
HEADER :-X-Anti-virus-MYDOMAIN-Mail-From: vikasdhingra@speciality-india.com via
lx1.system3hosting.com
EXPLAIN :-Anti-virus on Lx1 ran and saw this email as clean

HEADER:-X-Antivirus-MYDOMAIN: 1.25-st-qms (Clear:RC:0(122.173.243.137):. Processed in
33.207305 secs Process 5018)
EXPLAIN :- Q processor for Qmail run on LX1 and precessed this email in 33 Seconds. It took
this long, because it must have had a very long BCC List or the load on the server
was very high.
HEADER:-Received: from abts-north-dynamic-137.243.173.122.airtelbroadband.in (HELO
VikasPC2) (122.173.243.137) by lx1.system3hosting.com with SMTP; 4 Apr 2009
05:20:16 -0000
EXPLAIN :- This shows that the mail was received from 122.173.243.137 using VIKASPC2 by
Lx1 Server
HEADER :-Message-ID:
EXPLAIN :- This is one of the most important lines, that help us identify the PC. Some viruses
have the capability of using someone’s PC and using some one else
email id. The VikasPC2 will help us find the PC in the customer network
HEADER :-Reply-To: “Vikas Dhingra” <vikasdhingra@speciality-india.com>
EXPLAIN :- This shows the reply to field

HEADER:-From: “Vikas Dhingra” <vikasdhingra@speciality-india.com>
EXPLAIN :- This shows the From field
HEADER :-To: <”Undisclosed-Recipient:;”@lx4.system3hosting.com>

EXPLAIN :- This basically shows that the email was sent to a lot of people using BCC, clear
indication, that either the customer was doing BCC, or an virus infection was
sending these emails.

HEADER:-Subject: Best Pool Shot Ever by a Naked White Chick
EXPLAIN :- This is the Subject of the email

HEADER:-Date: Sat, 4 Apr 2009 11:08:21 +0530
EXPLAIN :- This is the Date on the PC of the customer, now this is where you see, that the
servers had a time of 10:56, while the customer PC had 11:08, now why this
difference, though both the server and Customer are in IST (+0530). The problem
is that desktops set the time manually, while servers are synchronized to an Atomic
Clock, hence we see this difference.

HEADER:-Organization: Specialty Merchandising Services
EXPLAIN :- When we configure email software, we put in the company name, this comes from
there
HEADER:-MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=”—-
=_NextPart_000_014A_01C9B515.AA782130″


EXPLAIN :- This shows that The Content was MIME / Mixed, ie Attachment Type

HEADER:-X-Priority: 3

EXPLAIN :- This again means, Priority of the Email was Normal
HEADER :-X-MSMail-Priority: Normal
EXPLAIN :- The Priority of the mail (Microsoft also uses some properitary formats, and hence
we see the header X-MSMail-Priority) was set as NORMAL

HEADER :-X-Mailer: Microsoft Windows Mail 6.0.6001.18000
EXPLAIN :- This shows the mail software the customer was using. He was using Microsoft
Windows Mail (Which is the replacement of Outlook Express in Windows Vista) to
send this email.

HEADER :-x-mimeole: Produced By Microsoft MimeOLE V6.0.6001.18049
EXPLAIN :- This line means that the mail was generated using a MIMEOLE command,
typically this is done when you right click a file and send email to, the email is
automatically created, and attached to the mail. This can be done manually,
especially by viruses, as they pick up random files from the PC and send them to
people.

Thursday, February 5, 2009

How To Test The Effectiveness Of Antivirus Software

This is a critical quiz which anti-virus is effective and which anti-virus should i install
at our PC.
now i will showing the method test the effectiveness of a anti-virus software.You no need go to visit some dangerous websites for testing the software that has a risk lost your data,it is very simple,just copy and paste a file then save it.

This file are writing in character string,it does not contain any viral code.If the software detects this as a virus file,that means your anti-virus software worked and well protected.

1.Open your notepad,

2.Copy and paste below character string to your open notepad,

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

3.Select 'file' and click 'Save as',name this file as 123.com and save it.

4.If your anti-virus is correctly activated, it must then alert you instantaneously.

The grade of the alert are;

Grade 1 - After copy and paste the character string before save it,then giving alert.(excellent)

Grade 2 - After save it then giving alert or delete it.(very good)

Grade 3 - After save it and wait for a while then giving alert or delete it (good)

Grade 4 - Need to manually activate full scan then giving alert or delete it.(poor)

Grade 5 - Can't detect. (need to change your anti-virus software)

Maybe you can share with us what is the grade of your anti-virus software.

Saturday, January 10, 2009

How to protect your computer from hackers, spyware and viruses

I recently made a trip there and since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” act was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. First thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install AVG anti-virus and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus! To make a long story short (and I mean a LONG story), there were a lot viruses on the computer and a lot instances of spyware. I have never even heard of such a ludicrous number of viruses on a computer before!
Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. I was amazingly surprised that the computer lasted for 2 years with that many viruses! So I gave my dear cousin a serious lesson in how to protect her computer from the dangers of the Internet and I will go through them here for anyone else who might be interested!
This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on!
1. Install Anti-Virus Software -
This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages. Here are two of the most popular ones:
AVG Anti-Virus - Very good and completely free.
Avast Anti-Virus - Almost on par with AVG.
Kaspersky Anti-Virus - Not free, but one of the best detection rates.

2. Update All Software -
Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat the new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.

3. Install only Trusted Software -
If you’re not sure what a piece of software does from it’s name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually spyware. Install software from big names sites only, such as Microsoft or Adobe.

4. Avoid P2P File Sharing Software -
If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans.
5. Delete Unknown Emails -
If you receive emails from random people’s names, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.

6. Do not click on Ads -
Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.
7. Run Virus Scans Regularly -
If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.

8. Be careful what you attach to your computer -
This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.

9. Avoid Shady Web Sites -
If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get some virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!

10. Turn On or Install a Firewall -
If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.

11. Secure Your Wireless Network -
Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router, otherwise anyone can connect to your home network and access everything.

12. Use a Complex Password for Login -
This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.

About Me

My photo
Tapiplya, Rajasthan, India
Ramswaroop Kumawat AT & post tapiplya via Ringas(Khatu shyam ji) Dist sikar 332404