Posts

Showing posts from March 29, 2009

Peer to Peer Networking

Peer to Peer Networking • Designed for ten or less workstations • Only moderate network security – Users manage their own account information. • No centralized storage of information • No centralized administration control – Lack of management for users and critical files – Inability to centrally back up important files • Slower response times when sharing resources • Examples: – Windows for Workgroups – Windows 9x, 2K, XP – LANtastic – AppleTalk • Advantages: cheap to create and operate than a client-server network, users control their own resources, no dedicated server is required, no additional software is required, beyond a suitable operation system. • Disadvantages: no central management, each user must manage shared resources on their machine. If a workstation is unavailable, those resources are not available. If there are more than ten users or if the network will gr...

Live Score Card Test Match Pakistan Vs Sri Lanka

Sri Lanka 292 & 217 Pakistan 342 & 117 (44.3 ov) Sri Lanka won by 50 runs Pakistan RR 2.62 Last 10 ovs 25/3 RR 2.50 Refresh scorecard Refresh scorecard Current time: 12:49 local, 07:19 GMT

IT Office Basics

Basics of Data Arrangement and Access The Data Hierarchy Recall …8 bits => 1 byte => 1 character, num, symbol Field - a logical grouping of characters into a word, a small group of words, or a complete number Record - a logical grouping of related fields File - a logical grouping of related records Database - a logical grouping of related files Data Management Terminology Entity - a person, place, thing, or event about which information is maintained Such as employee, customer, product Records describe entities Attribute - each characteristic or quality describing a particular entity Such as employee name, customer id, product color Fields describe attributes Primary Key - field that uniquely identifies the record so that the record can be retrieved, updated and stored Secondary Key - field does not identify the records uniquely, but can be used to form logical groups of records the students last name doest uniquely identifies that student

The Religion of the Taliban

Deobandi Islam: The Religion of the Taliban Information provided and used with permission from the Defense Language Institute at: wrc.lingnet.org “We have a common task – Afghanistan, the USA and the civilized world – to launch a joint struggle against fundamentalism. If fundamentalism comes to Afghanistan, war will continue for many years…Afghanistan will be turned into a center for terrorism.”i Mohammed Najibullah, August 1996 Afghanistan President (The following month Najibullah was assassinated by the Taliban. His mutilated body was hung from a light pole for public display in downtown Kabul) “Afghanistan is the only country in the world with a real Islamic system. All Muslims should show loyalty to the Afghan Taliban leader, Mullah Mohammad Omar”ii Osama Bin Laden, April 2001 The International Deobandi Conference, April 2001 From April 8-11th of this year an estimated half-million people converged on a small town outside of Peshawar, Pakistan to celebrate the founding of a religio...

Linux Backyp and recovery

Before we can talk about backups, we need to introduce the tools used to archive files on UNIX systems. Linux Based Networks Topic Heading Class Meeting # Slide : 4 Usingtar. The tar command is most often used to archive files. Its command syntax is where optionsis the list of commands and options for tar, and filesis the list of files to add or extract from the archive. For example, the command # tar options files # tar cvf backup.tar /etc Linux Based Networks Topic Heading Class Meeting # Slide : 5 # tar cvf backup.tar /etc packs all of the files in /etc into the tar archive backup.tar. The first argument to tar, “cvf” c tells tar to create a new archive file. v forces tar to use verbose mode, printing each file name as it is archived. f option tells tar that the next argument, backup.tar, is the name of the archive to create. The rest of the arguments to tar are the file and directory names to add to the archive. Linux Based Networks Topic Heading Class Meeting # Slide : 6 # tar xvf...

Introduction to Oracle 10g R1 (10.1.0.3) on SUSE LINUX Professional 9.3

Introduction to Oracle 10g R1 (10.1.0.3) on SUSE LINUX Professional 9.3 Introduction This paper is designed to help you get started with Oracle 10g on SUSE LINUX 9.3. This will help you to work on latest SUSE OS and latest Oracle Database 10g from Oracle. Oracle 10g is supported and certified only on SUSE LINUX Enterprise Server (SLES), but occasionally for development and testing purposes you will prefer to have it up and running on your desktop for quick access. Instruction provided here will also work on SUSE LINUX 9.2. Hardware Requirements The system must meet the following minimum hardware requirements: Requirement Minimum Value RAM 512 MB Swap space Approx. twice the size of RAM Disk space in /tmp 400 MB Disk space for software files 2.5 GB (2621440 KB) Disk space for database files 1.2 GB Required Software You need SUSE LINUX 9.3 and Oracle 10g. Also, Novell/SUSE orarun package will help you to make Oracle pre-Install task simple. Novell/SUSE 1. Novell SUSE LINUX 9.3 (ftp ins...

How to Write a Blog?

How to Write a Blog? 1. You must take a writing course from community college. You know a poor writer can make interesting topic boring. 2. when you want to write on any topic or article first you research on it from the source of magazine, books and internet after that you write a article on your own words. 3. I always try to more and more research on topic. And add original content & story with additional information. 4. First time when you write any article you must write in draft mode and read carefully after writing and post it. I recently start Google bloging. This the way you can help the peoples in any professional field. I am related to computer network hardware & internet field. I have many ideas in my mind. I have many computer related problems in my practical field. Bloging is the best way to polish your practical field. You can write your practical experiences on bloging. This way increase blog or website traffic.

ISP’s Servers Architecture FTP Server

ISP’s Servers Architecture FTP Server: Partition Table Information Filesystem Size Used Avail Use% Mounted on /dev/hda2 6.0G 199M 5.9G 4% / tmpfs 497M 0 497M 0% /dev/shm /dev/hda1 102M 36M 66M 36% /boot /dev/hda8 4.2G 33M 4.2G 1% /data /dev/hda6 4.0G 33M 4.0G 1% /tmp /dev/hda5 6.1G 605M 5.5G 10% /usr /dev/hda3 15G 292M 15G 2% /var 202.125.142.119:/home 34G 3.9G 28G 13% /home Package Used for FTP Server: vsftpd-2.0.2-3 Checking package for installation: rpm –qa grep vsftpd Installing package Using Yast2: Yast2->Install and Remove S/W->Ctrl+S->vsftpd->press space and then Ctrl+I for install Configuration File: /etc/vsftpd.conf # Example config file /etc/vsftpd.conf # # The default compiled in settings are very paranoid. This sample file # loosens things up a bit, to make the ftp daemon more usable. # # If you dont change anything here you will have a minimum setup for an # Anonymous FTP server. # General Settings # # Uncomment this to enable any form of FTP write command. # ...