Ramswaroop Kumawat
Ramswaroop kumawat AT Post Tapiplya via Ringas Dist SIkar(Rajasthan)
Sunday, January 8, 2012
Difference between Intel i3 ,i5 & i7 core processors
Difference Between Core i3, Core i5, Core i7
Difference between Core i3, Core i5 and Core i7
Intel will stop selling Core 2 Duo and Core 2 Quad in 2010. Core is the new range of Intel processors.
Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)
Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 3-8 MB Cathe
* 32-45 nm Silicon (less heat and energy)
Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor resources)
* 4-8 MB Catche
* 32-45 nm Silicon (less heat and energy)
Sunday, October 3, 2010
Tips for effective Active Directory Design
Tips for effective Active Directory Design
1: Keep it simple
The first bit of advice is to keep things as simple as you can. Active Directory is designed to be flexible, and if offers numerous types of objects and components. But just because you can use something doesn't mean you should. Keeping your Active Directory as simple as possible will help improve overall efficiency, and it will make the troubleshooting process easier whenever problems arise.
2: Use the appropriate site topology
Although there is definitely something to be said for simplicity, you shouldn't shy away from creating more complex structures when it is appropriate. Larger networks will almost always require multiple Active Directory sites. The site topology should mirror your network topology. Portions of the network that are highly connected should fall within a single site. Site links should mirror WAN connections, with each physical facility that is separated by a WAN link encompassing a separate Active Directory site.
3: Use dedicated domain controllers
I have seen a lot of smaller organizations try to save a few bucks by configuring their domain controllers to pull double duty. For example, an organization might have a domain controller that also acts as a file server or as a mail server. Whenever possible, your domain controllers should run on dedicated servers (physical or virtual). Adding additional roles to a domain controller can affect the server's performance, reduce security, and complicate the process of backing up or restoring the server.
4: Have at least two DNS servers
Another way that smaller organizations sometimes try to economize is by having only a single DNS server. The problem with this is that Active Directory is totally dependent upon the DNS services. If you have a single DNS server, and that DNS server fails, Active Directory will cease to function.
5: Avoid putting all your eggs in one basket (virtualization)
One of the main reasons organizations uses multiple domain controllers is to provide a degree of fault tolerance in case one of the domain controllers fails. However, this redundancy is often circumvented by server virtualization. I often see organizations place all their virtualized domain controllers onto a single virtualization host server. So if that host server fails, all the domain controllers will go down with it. There is nothing wrong with virtualizing your domain controllers, but you should scatter the domain controllers across multiple host servers.
6: Don't neglect the FSMO roles (backups)
Although Windows 2000 and every subsequent version of Windows Server have supported the multimaster domain controller model, some domain controllers are more important than others. Domain controllers that are hosting Flexible Single Master Operations (FSMO) roles are critical to Active Directory health. Active Directory is designed so that if a domain controller that is hosting FSMO roles fails, AD can continue to function — for a while. Eventually though, a FSMO domain controller failure can be very disruptive.
I have heard some IT pros say that you don't have to back up every domain controller on the network because of the way Active Directory information is replicated between domain controllers. While there is some degree of truth in that statement, backing up FSMO role holders is critical.
I once had to assist with the recovery effort for an organization in which a domain controller had failed. Unfortunately, this domain controller held all of the FSMO roles and acted as the organization's only global catalog server and as the only DNS server. To make matters worse, there was no backup of the domain controller. We ended up having to rebuild Active Directory from scratch. This is an extreme example, but it shows how important domain controller backups can be.
7: Plan your domain structure and stick to it
Most organizations start out with a carefully orchestrated Active Directory architecture. As time goes on, however, Active Directory can evolve in a rather haphazard manner. To avoid this, I recommend planning in advance for eventual Active Directory growth. You may not be able to predict exactly how Active Directory will grow, but you can at least put some governance in place to dictate the structure that will be used when it does.
8: Have a management plan in place before you start setting up servers
Just as you need to plan your Active Directory structure up front, you also need to have a good management plan in place. Who will administrator Active Directory? Will one person or team take care of the entire thing or will management responsibilities be divided according to domain or organizational unit? These types of management decisions must be made before you actually begin setting up domain controllers.
9: Try to avoid making major logistical changes
Active Directory is designed to be extremely flexible, and it is possible to perform a major restructuring of it without downtime or data loss. Even so, I would recommend that you avoid restructuring your Active Directory if possible. I have seen more than one situation in which the restructuring process resulted in some Active Directory objects being corrupted, especially when moving objects between domain controllers running differing versions of Windows Server.
10: Place at least one global catalog server in each site
Finally, if you are operating an Active Directory consisting of multiple sites, make sure that each one has its own global catalog server. Otherwise, Active Directory clients will have to traverse WAN links to look up information from a global catalog.
Tuesday, December 1, 2009
HOW TO MAKE USB READ ONLY
1. Run Registry Editor (regedit)
.2. Navigate to the following registry
key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control3.
.3 Create a New Key named as StorageDevicePolicies.
4. Highlight StorageDevicePolicies, and then create a New DWORD (32-bit) Value name as WriteProtect.
5. Double click on WriteProtect, and set its value data to 1.Write Protect Removable USB DrivesOnce set, all users on the computer is now blocked and prevented from copying, transferring or writing any files, documents and data to the USB disk drives, without the need to restart or reboot computer. Any attempt to download or copy files to USB drive will return the following error message:The disk is write protected.The media is write-protected.Remove the write protection or use another disk.
Block Write Access to USB Removable Disk
To revert and remove the blocked write access to USB drivers, just delete the StorageDevicePolicies registry key, or delete the WriteProtect registry entry, or change the value data for WriteProtect to 0.
Saturday, August 1, 2009
How to Install Portable Linux Into Usb Drive
At one time or another, you would surely have felt the need for a portable Operating System that you could carry around with you and to help troubleshoot and backup your friends’ crashed PCs or just carry your complete Office with you. There are several Live CD based Linux Distributions(distros) where you just boot from it and enjoy the new OS. But what if you need your Data and settings to be remembered. A good alternative is to use a “LIVE USB” based OS.

Three things should be considered first.
- Size of USB drive
- Type of Distribution
- Usage
Distros like Damn Small Linux and Puppy Linux will perform well in 256MB drives. Some OS’es section off a portion of your computer’s memory[RAM] and use that as a drive, in addition to the flash drive.
We will use an application called UNetbootin to install the Linux into the flash drive. We can let the program download a distro or select the image file(.iso) of an already downloaded distro. Download UNetbootin here: http://unetbootin.sourceforge.net/ and install it.
‘m using the Boxpup version of Puppy Linux as my distro.Get it from the official site here: http://www.puppylinux.org/ . Download for Boxpup version: http://www.puppylinux.org/downloads/puplets/boxpup
The downloaded file will be an .ISO file. The important thing to note here is to make sure that you have downloaded the file correctly. Thats why we’re going to verify the authenticity of the downloaded iso.So get the MD5 hash from the place you downloaded.it will be listed in the download page itself. Select the whole MD5 hash and copy it using ctrl-c.
Now install this MD5 hash checker called HashTab from here: http://beeblebrox.org/hashtab/. After you finish installing HashTab, right click the downloaded iso file, select properties.
MD5 checkers
You’ll see a tab called file hashes. Select the tab and wait for it to calculate the file hashes. Select MD5 and paste the MD5 hash, that you copied earlier, into the box that reads “Hash Comparison”. If your downloaded file in not tampered, you will see a green tick mark in the hash comparison box. If the downloaded iso file is tampered with or has been incorrectly downloaded, you will see a red cross. You should then attempt to re-download the file from another source.
As your iso file has been verified, it’s time to install the OS . Open UNetbootin and select the Diskimage Radio button and select the downloaded iso file. Please make sure the correct drive letter for your USB drive is selected below.
*It is very important to re-check this because a mistake will format one of the partitions in your hard disk.*
UNetBootin
Select Ok and let the program work for some time. After a few minutes you’ll see a dialog box asking to reboot. Click No. Save all your work, eject the USB drive but leave it in the USB port and restart the computer.


Now when your system is restarted, just boot your system with USB(change boot order frm BIOS). You’ll see the UNetbootin menu. Select Puppy.You’ll be asked a one-time set of questions to determine the setup of your computer.Thats it,you can customize your Linux as you want!
Wednesday, May 27, 2009
How to know where the Email Came From
for outlook simple right click on any mail and go in option a pop's window will open there you can see the internet header of a mail and below the method how to trace the mail:-
All Headers are in BLACK / Explanation to Each HEADER is in RED
HEADER :-Return-Path: vikasdhingra@speciality-india.com
EXPLAIN :-This is the Reply to ID: This means this is the sender (vikasdhingra@speciality-
indina.com
HEADER :-Received: from lx4.system3hosting.com (LHLO lx4.system3hosting.com)
(203.185.191.34) by lx4.system3hosting.com with LMTP; Sat, 4 Apr 2009 ,10:56:17
+0530 (IST)
EXPLAIN -:This is the mail received at System3 / mail server is called lx4.system3hosting.com
with the ip 203.185.191.34, it shows that we received the email on LX4 at
10:56AM IST on 4th April 2009.
This date is important to understand message analysis
HEADER :-Received: from localhost (localhost.localdomain [127.0.0.1])by
lx4.system3hosting.com (Postfix) with ESMTP id 89992119000D; Sat, 4 Apr 2009
10:56:17 +0530 (IST)
EXPLAIN :- Before mail is given to LX4, it is scanned by Anti virus / Anti-spam. This shows
that the mail was received by o Anti-spam on Lx4 (Local host) at 10:56:17
HEADER :-X-Virus-Scanned: amavisd-new at X-Spam-Flag: NO
EXPLAIN :- Antivirus Scanned the email and did not find any virus infection in this email. This
does not mean, the sender is not infected, it means any attachment in the email
does not have a virus.
HEADER :-X-Spam-Score: 0
EXPLAIN :-Anti-spam trusts the sender as he is a good friend, and also a customer, and hence
this email was given a spam score of (ZERO) 0.
HEADER :-X-Spam-Level: X-Spam-Status: No, score=x tagged_above=-10 required=6.6
tests=[]l
EXPLAIN :- No tests were done on the email here, hence you see tests=[], for a mail to be called
SPAM, it has to receive 6.6 Points, this mail received 0, hence it was not marked as
spam
HEADER :-Received: from lx4.system3hosting.com ([127.0.0.1]) by localhost
(lx4.system3hosting.com [127.0.0.1]) (amavisd-new, port 10024)with ESMTP id
5CCTkK0Y5zjq; Sat, 4 Apr 2009 10:56:17 +0530 (IST)
EXPLAIN :-this is the transfer from sender server to our anti-spam server
HEADER:-Received: from lx1.system3hosting.com (lx1.system3hosting.com [203.185.191.31])
by lx4.system3hosting.com (Postfix) with ESMTP id 0CCDED904ABfor
<hks@system3group.com>; Sat, 4 Apr 2009 10:56:17 +0530 (IST)
This is a very important line: You see here, that the email was sent using server
lx1.system3hosting.com (203.185.191.31) which is the server that hosts
the sender domain, and was sent to server lx4.system3hosting.com which hosts receiver domain. The email was for hks@system3group.com
HEADER:- Received: (qmail 5180 invoked by uid 511); 4 Apr 2009 10:50:49 +0530
EXPLAIN :-This line shows the sender mail server (in this case, lx1), the mail was processed by
QMAIL with an ID 511 on that server. The server processed this email at 10:50:49
IST that means it took roughly 6 minutes before the mail reached
hks@system3group.com
HEADER:-Received: from 122.173.243.137 by lx1.system3hosting.com (envelope-from
<vikasdhingra@speciality-india.com>, uid 510) with qmail-scanner-1.25-st-qms
Clear: RC:0(122.173.243.137):.Processed in 33.207305 secs); 04
Apr 2009 05:20:49 -0000
EXPLAIN :-This is again a very important line, this shows that vikasdhingra@speciality-
india.com had the IP Address 122.173.243.137 on his broadband / PC
depending on the connection when he submitted the mail to his SMTP Server
lx1.system3hosting.com. The envelope from means, the sender email id.
HEADER :-X-Anti-virus-MYDOMAIN-Mail-From: vikasdhingra@speciality-india.com via
lx1.system3hosting.com
EXPLAIN :-Anti-virus on Lx1 ran and saw this email as clean
HEADER:-X-Antivirus-MYDOMAIN: 1.25-st-qms (Clear:RC:0(122.173.243.137):. Processed in
33.207305 secs Process 5018)
EXPLAIN :- Q processor for Qmail run on LX1 and precessed this email in 33 Seconds. It took
this long, because it must have had a very long BCC List or the load on the server
was very high.
HEADER:-Received: from abts-north-dynamic-137.243.173.122.airtelbroadband.in (HELO
VikasPC2) (122.173.243.137) by lx1.system3hosting.com with SMTP; 4 Apr 2009
05:20:16 -0000
EXPLAIN :- This shows that the mail was received from 122.173.243.137 using VIKASPC2 by
Lx1 Server
HEADER :-Message-ID:
EXPLAIN :- This is one of the most important lines, that help us identify the PC. Some viruses
have the capability of using someone’s PC and using some one else
email id. The VikasPC2 will help us find the PC in the customer network
HEADER :-Reply-To: “Vikas Dhingra” <vikasdhingra@speciality-india.com>
EXPLAIN :- This shows the reply to field
HEADER:-From: “Vikas Dhingra” <vikasdhingra@speciality-india.com>
EXPLAIN :- This shows the From field
HEADER :-To: <”Undisclosed-Recipient:;”@lx4.system3hosting.com>
EXPLAIN :- This basically shows that the email was sent to a lot of people using BCC, clear
indication, that either the customer was doing BCC, or an virus infection was
sending these emails.
HEADER:-Subject: Best Pool Shot Ever by a Naked White Chick
EXPLAIN :- This is the Subject of the email
HEADER:-Date: Sat, 4 Apr 2009 11:08:21 +0530
EXPLAIN :- This is the Date on the PC of the customer, now this is where you see, that the
servers had a time of 10:56, while the customer PC had 11:08, now why this
difference, though both the server and Customer are in IST (+0530). The problem
is that desktops set the time manually, while servers are synchronized to an Atomic
Clock, hence we see this difference.
HEADER:-Organization: Specialty Merchandising Services
EXPLAIN :- When we configure email software, we put in the company name, this comes from
there
HEADER:-MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=”—-
=_NextPart_000_014A_01C9B515.AA782130″
EXPLAIN :- This shows that The Content was MIME / Mixed, ie Attachment Type
HEADER:-X-Priority: 3
EXPLAIN :- This again means, Priority of the Email was Normal
HEADER :-X-MSMail-Priority: Normal
EXPLAIN :- The Priority of the mail (Microsoft also uses some properitary formats, and hence
we see the header X-MSMail-Priority) was set as NORMAL
HEADER :-X-Mailer: Microsoft Windows Mail 6.0.6001.18000
EXPLAIN :- This shows the mail software the customer was using. He was using Microsoft
Windows Mail (Which is the replacement of Outlook Express in Windows Vista) to
send this email.
HEADER :-x-mimeole: Produced By Microsoft MimeOLE V6.0.6001.18049
EXPLAIN :- This line means that the mail was generated using a MIMEOLE command,
typically this is done when you right click a file and send email to, the email is
automatically created, and attached to the mail. This can be done manually,
especially by viruses, as they pick up random files from the PC and send them to
people.
Thursday, February 5, 2009
How To Test The Effectiveness Of Antivirus Software
at our PC.
now i will showing the method test the effectiveness of a anti-virus software.You no need go to visit some dangerous websites for testing the software that has a risk lost your data,it is very simple,just copy and paste a file then save it.
This file are writing in character string,it does not contain any viral code.If the software detects this as a virus file,that means your anti-virus software worked and well protected.
1.Open your notepad,
2.Copy and paste below character string to your open notepad,
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3.Select 'file' and click 'Save as',name this file as 123.com and save it.
4.If your anti-virus is correctly activated, it must then alert you instantaneously.
The grade of the alert are;
Grade 1 - After copy and paste the character string before save it,then giving alert.(excellent)
Grade 2 - After save it then giving alert or delete it.(very good)
Grade 3 - After save it and wait for a while then giving alert or delete it (good)
Grade 4 - Need to manually activate full scan then giving alert or delete it.(poor)
Grade 5 - Can't detect. (need to change your anti-virus software)
Maybe you can share with us what is the grade of your anti-virus software.
Saturday, January 10, 2009
How to protect your computer from hackers, spyware and viruses
Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. I was amazingly surprised that the computer lasted for 2 years with that many viruses! So I gave my dear cousin a serious lesson in how to protect her computer from the dangers of the Internet and I will go through them here for anyone else who might be interested!
This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on!
1. Install Anti-Virus Software -
AVG Anti-Virus - Very good and completely free.
Avast Anti-Virus - Almost on par with AVG.
Kaspersky Anti-Virus - Not free, but one of the best detection rates.
2. Update All Software -
3. Install only Trusted Software -
4. Avoid P2P File Sharing Software -
5. Delete Unknown Emails -
6. Do not click on Ads -
8. Be careful what you attach to your computer -
9. Avoid Shady Web Sites -
10. Turn On or Install a Firewall -
11. Secure Your Wireless Network -
12. Use a Complex Password for Login -
About Me
- Ramswaroo kumawat
- Tapiplya, Rajasthan, India
- Ramswaroop Kumawat AT & post tapiplya via Ringas(Khatu shyam ji) Dist sikar 332404