- Insert a Windows XP Professional CD in the local system’s CD or DVD drive.
- From the resulting Welcome To Microsoft Windows XP screen, click Perform Additional Tasks.
- Click Setup Remote Desktop Connection from the What Do You Want To Do Screen.
- The InstallShield Wizard will open; click Next on the Welcome To The InstallShield Wizard for Remote Desktop Connection.
- Read and accept the license agreement and click Next.
- Enter the customer name and organization, and specify whether the desktop connection is to be available to all users or only the logged in user and click Next.
- Click Install.
- Click Finish.
This Blog helps you to define your all problems regarding Computer Sc. Info Technology and Management. In this Blog you'll get your topic, solution for your questions as well as you get knowledge about new technologies and Corporate world updates also. Here you'll also get new ideas, techniques, various useful websites links and many more. Please also suggest me, what more i do for this Blog and for its enhancements. WELCOME suggestions & queries at amitesh_km@hotmail.com
Saturday, October 30, 2010
Installing Remote Desktop connection on non-XP systemsInstalling Remote Desktop connection on non-XP systems
Non-Windows XP systems can also access Windows systems running Windows Remote Desktop. The local system used to access the remote computer must have the remote connectivity client software installed. To install the required Terminal Services components:
The Remote Desktop Connection
The Remote Desktop Connection software is pre-installed with Windows XP. To run it, click Start, click All Programs, click Accessories, click Communications, and then click Remote Desktop Connection. This software package can also be found on the Windows XP Professional and Windows XP Home Edition product CDs and can be installed on any supported Windows platform. To install from the CD, insert the disc into the target machine's CD-ROM drive, select Perform Additional Tasks, and then click Install Remote Desktop Connection.
Windows Remote Desktop
Connecting to a remote desktop is fairly straightforward, but a few elements must be in place first:- The host desktop must have Internet access (preferably high-speed).
- The local system (the PC connecting to the remote desktop that will serve as the host) must be running Windows XP Professional (or a Windows 2003-flavor server) or have the appropriate Terminal Services tools installed.
- Firewalls between the local system and the remote host must be configured to pass the appropriate traffic.
- Remote Desktop must be installed and enabled on the target system.
Installing Remote Desktop
Remote Desktop is an optional Windows XP Professional service. To install it on a host system (to enable a computer to accept a remote connection request), Microsoft recommends you:- Click Start.
- Click Control Panel.
- Select Add Or Remove Programs.
- Select Add/Remove Windows Components.
- Select Internet Information Services.
- Click the Details button.
- Select World Wide Web Service.
- Click the Details button.
- Check the Remote Desktop Web Connection checkbox.
- Click OK.
- Click Next.
- Click Finish to complete the wizard.
- Click Start.
- Select Run.
- Enter Net Stop w3svc and click the OK button or press Enter.
- Click Start.
- Select All Programs.
- Select Microsoft Update.
- Select Scan For Updates.
- Install all critical updates on the host system.
- Click Start.
- Select Run.
- Enter Net Start w3svc and click the OK button.
Wednesday, October 27, 2010
Risk Management in IT
It is the method, by which the business managers control the overall operational and financial costs, on all their important business procedures which ultimately yield them profits.
Asset is an entity that demands security/safety. For e.g.
1. Information assets: e.g.
Databases: about customers, personnel, production, sales, marketing, financial. These Information assets are critical for the business its confidentiality, integrity and availability is of utmost importance.
Data files: transaction data giving up to date information about each event.
Operation and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities.
Archived Information : Old Information that may be required to maintain by law.
Continuity plans: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to Ad-hoc decisions in crisis.
2. Software Assets:
Application softwares.
System Softwares.
3. Physical Assets:
Computer Equipments
Communication Equipments
Storage Media
Technical Equipments
Furnitures and fixtures.
4. Services:
Computing services that the organization has outsourced.
Communication services like voice communication, data communication, value added services, wide area network. Environmental Conditioning services like heating, lighting, air conditioning and power.
Risk Assessment:
A step in Risk Management Process
It is the determination of quantitative or qualitative value of risk related to a real situation and a well-known threat.
Quantitative risk assessment requires calculations of two components of risk:
R, the magnitude of the potential loss L, and the probability p that the loss will occur.
Asset is an entity that demands security/safety. For e.g.
1. Information assets: e.g.
Databases: about customers, personnel, production, sales, marketing, financial. These Information assets are critical for the business its confidentiality, integrity and availability is of utmost importance.
Data files: transaction data giving up to date information about each event.
Operation and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities.
Archived Information : Old Information that may be required to maintain by law.
Continuity plans: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to Ad-hoc decisions in crisis.
2. Software Assets:
Application softwares.
System Softwares.
3. Physical Assets:
Computer Equipments
Communication Equipments
Storage Media
Technical Equipments
Furnitures and fixtures.
4. Services:
Computing services that the organization has outsourced.
Communication services like voice communication, data communication, value added services, wide area network. Environmental Conditioning services like heating, lighting, air conditioning and power.
Risk Assessment:
A step in Risk Management Process
It is the determination of quantitative or qualitative value of risk related to a real situation and a well-known threat.
Quantitative risk assessment requires calculations of two components of risk:
R, the magnitude of the potential loss L, and the probability p that the loss will occur.
Sunday, October 24, 2010
Bluetooth History
The name Bluetooth was derived from the Danish king Harald Blatand (Bluetooth), who is credited with uniting the people from Scandinavia during the tenth century. The Bluetooth SIG (Special Interest Group) was formed in February 1998. The original founding members of Bluetooth SIG consisted of Ericsson, IBM, Intel, Nokia, and Toshiba.
By June 2001, the member list of participating companies exceeded 2400. The role of the SIG is to develop the specifications for Bluetooth as per the requirements, promote and market the technology and brand name, handle legal and regulatory issues, and certify the Bluetooth products that meet the conformance and interoperability requirements. Any company, by signing a zero-cost agreement, has complete access to the SIG specifications and can qualify for a royalty-free license to build products based on the Bluetooth technology.
The Bluetooth SIG completed the initial specification work and released the first version of the official Bluetooth standard in July 1999.
Data in GSM Networks
The Global System for Mobile Communication (GSM) is a multiservice cellular network. It provides not only voice service, but a good set of data services as well. This chapter describes the data services offered by a GSM network. It describes the data services before the advent of GPRS and EDGE.
The GSM data services can be categorized in terms of traffic, signaling, and broadcast channel data services. The GSM standard specifies data services on the traffic channel (TCH), which can be utilized by data applications such as fax and Internet service provider (ISP) connection. This is also referred to as circuit switched (CS) data service. The data service on a signaling channel is known as the point-to-point short message service (SMS). Using SMS, a subscriber sends or receives a short string of text (maximum 126 characters) using a signaling channel. There is another type of SMS service called SMS broadcast, which is the only broadcast channel data service. This service transports data on a specially defined broadcast channel to all the subscribers in a cell. The broadcast data applications, such as traffic reports and weather alerts, were anticipated to use this service, but it didn't get much attention in deployment from cellular service providers.
CYBER FORENSICS
Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law.
Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs.
A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded.
When those assets come under attack, or are misused, info security professionals must be able to gather electronic evidence of such misuse and utilize that evidence to bring to justice those who misuse the technology.
Cyber forensics, while firmly established as both an art as well as a science, is at its infancy. With technology evolving, mutating, and changing at such a rapid pace, the rules governing the application of cyber forensics to the fields of auditing, security, and law enforcement are changing as well. Almost daily, new techniques and procedures are designed to provide info security professionals a better means of finding electronic evidence, collecting it, preserving it, and presenting it to client management for potential use in the prosecution of cyber criminals.
Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs.
A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded.
When those assets come under attack, or are misused, info security professionals must be able to gather electronic evidence of such misuse and utilize that evidence to bring to justice those who misuse the technology.
Cyber forensics, while firmly established as both an art as well as a science, is at its infancy. With technology evolving, mutating, and changing at such a rapid pace, the rules governing the application of cyber forensics to the fields of auditing, security, and law enforcement are changing as well. Almost daily, new techniques and procedures are designed to provide info security professionals a better means of finding electronic evidence, collecting it, preserving it, and presenting it to client management for potential use in the prosecution of cyber criminals.
Saturday, October 16, 2010
Internet Registries
Three regional Internet registries are responsible for the assignment of IP addresses and autonomous system numbers globally (other organizations are responsible for the assignment of domain names):
- ARIN— American Registry for Internet Numbers
- APNIC— Asia Pacific Network Information Centre
- RIPE— Réseaux IP Européens
ARIN is a nonprofit organization established for the purpose of administration and registration of IP numbers for the following geographical areas: North America, South America, the Caribbean, and sub-Saharan Africa.
APNIC represents the Asia Pacific region, comprising 62 economies. It is a not-for-profit, membership-based organization whose members include Internet service providers, national Internet registries, and similar organizations.
RIPE is an open collaborative community of organizations and individuals operating wide area IP networks in Europe and beyond. The objective of the RIPE community is to ensure the administrative and technical coordination necessary to enable operation of a pan-European IP network. RIPE has no formal membership, and its activities are performed on a voluntary basis.
Satellite Communication Systems
The era of satellite systems began in 1957 with the launch of Sputnik by the Soviet Union.
However, the communication capabilities of Sputnik were very limited. The first real communication
satellite was the AT&T Telstar 1, which was launched by NASA in 1962. Telstar 1
was enhanced in 1963 by its successor, Telstar 2. From the Telstar era to today, satellite
communications [16] have enjoyed an enormous growth offering services such as data,
paging, voice, TV broadcasting, Internet access and a number of mobile services.
Satellite orbits belong to three different categories. In ascending order of height, these are
the circular Low Earth Orbit (LEO), Medium Earth Orbit (MEO) and Geosynchronous Earth
Orbit (GEO) categories at distances in the ranges of 100–1000 km, 5000–15 000 km andapproximately 36 000 km, respectively. There also exist satellites that utilize elliptical orbits.
These try to combine the low propagation delay property of LEO systems and the stability of
GEO systems.
The trend nowadays is towards use of LEO orbits, which enable small propagation delays
and construction of simple and light ground mobile units. A number of LEO systems have
appeared, such as Globalstar and Iridium. They offer voice and data services at rates up to 10
kbps through a dense constellation of LEO satellites.
However, the communication capabilities of Sputnik were very limited. The first real communication
satellite was the AT&T Telstar 1, which was launched by NASA in 1962. Telstar 1
was enhanced in 1963 by its successor, Telstar 2. From the Telstar era to today, satellite
communications [16] have enjoyed an enormous growth offering services such as data,
paging, voice, TV broadcasting, Internet access and a number of mobile services.
Satellite orbits belong to three different categories. In ascending order of height, these are
the circular Low Earth Orbit (LEO), Medium Earth Orbit (MEO) and Geosynchronous Earth
Orbit (GEO) categories at distances in the ranges of 100–1000 km, 5000–15 000 km andapproximately 36 000 km, respectively. There also exist satellites that utilize elliptical orbits.
These try to combine the low propagation delay property of LEO systems and the stability of
GEO systems.
The trend nowadays is towards use of LEO orbits, which enable small propagation delays
and construction of simple and light ground mobile units. A number of LEO systems have
appeared, such as Globalstar and Iridium. They offer voice and data services at rates up to 10
kbps through a dense constellation of LEO satellites.
HSCSD and GPRS
Another advantage of GSM is its support for several extension technologies that achieve
higher rates for data applications. Two such technologies are High Speed Circuit Switched
Data (HSCSD) and General Packet Radio Service (GPRS). HSCSD is a very simple upgrade
to GSM. Contrary to GSM, it gives more than one time slot per frame to a user; hence the
increased data rates. HSCD allows a phone to use two, three or four slots per frame to achieve
rates of 57.6, 43.2 and 28.8 kbps, respectively. Support for asymmetric links is also provided,
meaning that the downlink rate can be different than that of the uplink. A problem of HSCSD
is the fact that it decreases battery life, due to the fact that increased slot use makes terminals
spend more time in transmission and reception modes. However, due to the fact that reception
requires significantly less consumption than transmission, HSCSD can be efficient for web
browsing, which entails much more downloading than uploading.
GPRS operation is based on the same principle as that of HSCSD: allocation of more slots
within a frame. However, the difference is that GPRS is packet-switched, whereas GSM and
HSCSD are circuit-switched. This means that a GSM or HSCSD terminal that browses the
Internet at 14.4 kbps occupies a 14.4 kbps GSM/HSCSD circuit for the entire duration of the
connection, despite the fact that most of the time is spent reading (thus downloading) Web
pages rather than sending (thus uploading) information. Therefore, significant system capacity
is lost. GPRS uses bandwidth on demand (in the case of the above example, only when
the user downloads a new page). In GPRS, a single 14.4 kbps link can be shared by more than
one user, provided of course that users do not simultaneously try to use the link at this speed;
rather, each user is assigned a very low rate connection which can for short periods use
additional capacity to deliver web pages. GPRS terminals support a variety of rates, ranging
from 14.4 to 115.2 kbps, both in symmetric and asymmetric configurations.
higher rates for data applications. Two such technologies are High Speed Circuit Switched
Data (HSCSD) and General Packet Radio Service (GPRS). HSCSD is a very simple upgrade
to GSM. Contrary to GSM, it gives more than one time slot per frame to a user; hence the
increased data rates. HSCD allows a phone to use two, three or four slots per frame to achieve
rates of 57.6, 43.2 and 28.8 kbps, respectively. Support for asymmetric links is also provided,
meaning that the downlink rate can be different than that of the uplink. A problem of HSCSD
is the fact that it decreases battery life, due to the fact that increased slot use makes terminals
spend more time in transmission and reception modes. However, due to the fact that reception
requires significantly less consumption than transmission, HSCSD can be efficient for web
browsing, which entails much more downloading than uploading.
GPRS operation is based on the same principle as that of HSCSD: allocation of more slots
within a frame. However, the difference is that GPRS is packet-switched, whereas GSM and
HSCSD are circuit-switched. This means that a GSM or HSCSD terminal that browses the
Internet at 14.4 kbps occupies a 14.4 kbps GSM/HSCSD circuit for the entire duration of the
connection, despite the fact that most of the time is spent reading (thus downloading) Web
pages rather than sending (thus uploading) information. Therefore, significant system capacity
is lost. GPRS uses bandwidth on demand (in the case of the above example, only when
the user downloads a new page). In GPRS, a single 14.4 kbps link can be shared by more than
one user, provided of course that users do not simultaneously try to use the link at this speed;
rather, each user is assigned a very low rate connection which can for short periods use
additional capacity to deliver web pages. GPRS terminals support a variety of rates, ranging
from 14.4 to 115.2 kbps, both in symmetric and asymmetric configurations.
GSM
Throughout Europe, a new part of the spectrum in the area around 900 MHz has been made
available for 2G systems. This allocation was followed later by allocation of frequencies at
the 1800 MHz band. 2G activities in Europe were initiated in 1982 with the formation of a
study group that aimed to specify a common pan-European standard. Its name was ‘Groupe
Speciale Mobile’ (later renamed Global System for Mobile Communications). GSM [3],
which comes from the initials of the group’s name, was the resulting standard. Nowadays,
it is the most popular 2G technology; by 1999 it had 1 million new subscribers every week.
This popularity is not only due to its performance, but also due to the fact that it is the only 2G
standard in Europe. This can be thought of as an advantage, since it simplifies roaming of
subscribers between different operators and countries.
The first commercial deployment of GSM was made in 1992 and used the 900 MHz band.
The system that uses the 1800 MHz band is known as DCS 1800 but it is essentially GSM.
GSM can also operate in the 1900 MHz band used in America for several digital networks and
in the 450 MHz band in order to provide a migration path from the 1G NMT standard that
uses this band to 2G systems.
As far as operation is concerned, GSM defines a number of frequency channels, which are
organized into frames and are in turn divided into time slots. The exact structure of GSM
channels is described later in the book; here we just mention that slots are used to construct
both channels for user traffic and control operations, such as handover control, registration,
call setup, etc. User traffic can be either voice or low rate data, around 14.4 kbps.
available for 2G systems. This allocation was followed later by allocation of frequencies at
the 1800 MHz band. 2G activities in Europe were initiated in 1982 with the formation of a
study group that aimed to specify a common pan-European standard. Its name was ‘Groupe
Speciale Mobile’ (later renamed Global System for Mobile Communications). GSM [3],
which comes from the initials of the group’s name, was the resulting standard. Nowadays,
it is the most popular 2G technology; by 1999 it had 1 million new subscribers every week.
This popularity is not only due to its performance, but also due to the fact that it is the only 2G
standard in Europe. This can be thought of as an advantage, since it simplifies roaming of
subscribers between different operators and countries.
The first commercial deployment of GSM was made in 1992 and used the 900 MHz band.
The system that uses the 1800 MHz band is known as DCS 1800 but it is essentially GSM.
GSM can also operate in the 1900 MHz band used in America for several digital networks and
in the 450 MHz band in order to provide a migration path from the 1G NMT standard that
uses this band to 2G systems.
As far as operation is concerned, GSM defines a number of frequency channels, which are
organized into frames and are in turn divided into time slots. The exact structure of GSM
channels is described later in the book; here we just mention that slots are used to construct
both channels for user traffic and control operations, such as handover control, registration,
call setup, etc. User traffic can be either voice or low rate data, around 14.4 kbps.
What Is PHP?
PHP is officially known as PHP: Hypertext Preprocessor. It is a server-side scripting language often written in an HTML context. Unlike an ordinary HTML page, a PHP script is not sent directly to a client by the server; instead, it is parsed by the PHP engine. HTML elements in the script are left alone, but PHP code is interpreted and executed. PHP code in a script can query databases, create images, read and write files, talk to remote servers—the possibilities are endless. The output from PHP code is combined with the HTML in the script and the result sent to the user.
PHP is also installed as a command-line application, making it an excellent tool for scripting on a server. Many system administrators now use PHP for the sort of automation that has been traditionally handled by Perl or shell scripting.
Why Choose PHP?
There are some compelling reasons to work with PHP. For many projects, you will find that the production process is significantly faster than you might expect if you are used to working with other scripting languages. At Corrosive we work with both PHP and Java. We choose PHP when we want to see results quickly without sacrificing stability. As an open-source product, PHP is well supported by a talented production team and a committed user community. Furthermore, PHP can be run on all the major operating systems and with most servers.
Speed of Development
Because PHP allows you to separate HTML code from scripted elements, you will notice a significant decrease in development time on many projects. In many instances, you will be able to separate the coding stage of a project from the design and build stages. Not only can this make life easier for you as a programmer, but it also can remove obstacles that stand in the way of effective and flexible design.
PHP Is Open Source
To many people, open source simply means free, which is, of course, a benefit in itself.
Well-maintained open-source projects offer users additional benefits, though. You benefit from an accessible and committed community that offers a wealth of experience in the subject. Chances are that any problem you encounter in your coding can be answered swiftly and easily with a little research. If that fails, a question sent to a mailing list can yield an intelligent, authoritative response.
You also can be sure that bugs will be addressed as they are found, and that new features will be made available as the need is defined. You will not have to wait for the next commercial release before taking advantage of improvements.
There is no vested interest in a particular server product or operating system. You are free to make choices that suit your needs or those of your clients, secure that your code will run whatever you decide.
Performance
Because of the powerful Zend engine, PHP shows solid performance compared with other server scripting languages, such as ASP, Perl, and Java Servlets, in benchmark tests. To further improve performance, you can acquire a caching tool (Zend Accelerator) from http://www.zend.com/; it stores compiled code in memory, eliminating the overhead of parsing and interpreting source files for every request.
Portability
PHP is designed to run on many operating systems and to cooperate with many servers and databases. You can build for a Unix environment and shift your work to NT without a problem. You can test a project with Personal Web Server and install it on a Unix system running on PHP as an Apache module.
PHP is also installed as a command-line application, making it an excellent tool for scripting on a server. Many system administrators now use PHP for the sort of automation that has been traditionally handled by Perl or shell scripting.
Why Choose PHP?
There are some compelling reasons to work with PHP. For many projects, you will find that the production process is significantly faster than you might expect if you are used to working with other scripting languages. At Corrosive we work with both PHP and Java. We choose PHP when we want to see results quickly without sacrificing stability. As an open-source product, PHP is well supported by a talented production team and a committed user community. Furthermore, PHP can be run on all the major operating systems and with most servers.
Speed of Development
Because PHP allows you to separate HTML code from scripted elements, you will notice a significant decrease in development time on many projects. In many instances, you will be able to separate the coding stage of a project from the design and build stages. Not only can this make life easier for you as a programmer, but it also can remove obstacles that stand in the way of effective and flexible design.
PHP Is Open Source
To many people, open source simply means free, which is, of course, a benefit in itself.
Well-maintained open-source projects offer users additional benefits, though. You benefit from an accessible and committed community that offers a wealth of experience in the subject. Chances are that any problem you encounter in your coding can be answered swiftly and easily with a little research. If that fails, a question sent to a mailing list can yield an intelligent, authoritative response.
You also can be sure that bugs will be addressed as they are found, and that new features will be made available as the need is defined. You will not have to wait for the next commercial release before taking advantage of improvements.
There is no vested interest in a particular server product or operating system. You are free to make choices that suit your needs or those of your clients, secure that your code will run whatever you decide.
Performance
Because of the powerful Zend engine, PHP shows solid performance compared with other server scripting languages, such as ASP, Perl, and Java Servlets, in benchmark tests. To further improve performance, you can acquire a caching tool (Zend Accelerator) from http://www.zend.com/; it stores compiled code in memory, eliminating the overhead of parsing and interpreting source files for every request.
Portability
PHP is designed to run on many operating systems and to cooperate with many servers and databases. You can build for a Unix environment and shift your work to NT without a problem. You can test a project with Personal Web Server and install it on a Unix system running on PHP as an Apache module.
TOP COUNTRIES IN MOBILE Subscribers
TOP COUNTRIES using MOBILE PHONES
- CHINA
- INDIA
- USA
- RUSSIA
- BRAZIL
- INDONESIA
- JAPAN
- GERMANY
Subscribe to:
Posts (Atom)