Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 13 August 2009

Removing the complexity from information protection

Posted on 21:41 by Unknown
How encryption can add value to your business
The use of encryption is no longer optional for many organizations. Certain new regulations demand its use while others provide a safe harbor so that organizations do not have to notify individuals in the event of a security breach—provided data was encrypted. Even those organizations that are not subject to such regulation should consider the use of encryption as best practice for protecting data on portable devices.
 Security breaches are everyday news
Data is increasingly being lost through theft and carelessness. As mobile devices proliferate and become ever smaller, more powerful and functional, it is all too easy for such devices to go missing. This puts large amounts of potentially sensitive information at risk. Encryption, and specifically full-disk encryption, is coming into wider use as a security best practice
Software-based full-disk encryption and newer self-encrypting hard drives provide the highest level of protection by ensuring that no data can be retrieved by third parties from devices that have been lost. Encryption adds value to an organization by enabling the secure sharing of information
Data security technologies should not restrict access to useful information. Rather, the use of encryption allows authenticated users to more easily and securely share information and enables organizations to expand their mobile working practices in a secure manner. Organizations can use encryption to considerably reduce risk across their organization
By ensuring that encryption is always on, is transparent to the user and cannot be bypassed, the chance for human error is reduced considerably. For the best benefits, organizations should look for a product that integrates with all existing technologies in use, including security technologies such as threat management systems, all operating systems and all devices. Encryption can aid organizations in achieving their regulatory compliance objectives
Through the use of full-disk encryption, organizations can ensure that no information, such as file names remain in the clear, so saving the expense and possible embarrassment of having to notify individuals in case of the loss of personally identifiable information. The use of self-encrypting hard drives and trusted hardware devices that can be safely erased adds a further layer of protection and can reduce the cost of securely re purposing old devices for new uses. Productivity gains will be seen through ease of deployment, management and use
Provided the right solution is implemented, through centralized management capabilities, encryption software, cryptographic keys and security policies can be easily deployed and managed, freeing up IT resources for other tasks. Users will also benefit through robust self-service capabilities for provisioning encryption keys and resetting forgotten passwords.
Conclusions
The complexities and cost of using encryption systems have been reduced considerably through the provision of centralized management, making the use of encryption viable for organizations of all sizes. Whether centrally managed on-premise or through a hosted service provider, full-disk encryption systems can shield organizations from data loss and help them achieve their security objectives.

FOR MORE READ FULL ARTICLE
Read More
Posted in | No comments

Thursday, 6 August 2009

Getting Lucky on LinkedIn

Posted on 21:35 by Unknown

As unemployment rates rise over 9% and job search results are down, everyone and their mother’s managers are on LinkedIn trying to social network their way to a new career opportunity.

Except the rest of us think the site is like Facebook’s online schmooze fest and that jobs are going to clutter our home page as do mundane status updates, revealing photos, and odd quiz results. “Not so,” says Lindsey Pollak, LinkedIn Campus Spokesperson and author of Getting from College to Career. Pollak says, “The biggest mistake people make is that they join LinkedIn, and expect it to work for them like magic. It’s a tool and you have to work it to make it work for you.”

It’s true that LinkedIn is the staple for job search success today, but are you taking advantage of all its unique applications? Here are some ways to step up your networking game on LinkedIn, break through the resumes, and make some real connections that can potentially lead to your next gig.
Fill Out Your Profile 100%.

No one is making you fill out some long eHarmony profile, but you should fill out every field in your LinkedIn bio so it appears as though you are taking your job search seriously. People will be more likely to network and share opportunities with you if you have a full, rock star profile. People search for profiles by keywords, so make sure you list all the search terms that fit your desired job descriptions. Look at profiles of people who you have your ideal jobs and see what keywords they have posted on their profile.
Join Groups

There’s one little catch: You can’t send direct messages to people on LinkedIn who are not in your network, but you can contact them if you are in the same group. Again, search for people who have your ideal jobs and see what groups they have joined. College alumni groups are filled with excellent connections and exclusive job opportunities. Join those groups and contact people directly who are working at companies that interest you.
Get Personal

t’s easy to send out the generic invitation customized by LinkedIn, but good luck getting a response. The standard alert “I’d like to add you to my professional network on LinkedIn” sounds as enticing as getting invited to an HR information session about life insurance. When you send out invitations to connect, make sure you write a personal note. Remind your connections how you met or recap your last conversation.
Read Those Updates

Make sure to read your LinkedIn weekly updates, which are opted in when you sign up. Reid Hoffman, LinkedIn founder, says one of his favorite uses of the site is to do “small goods” for people. Networking isn’t about the once in a while chat; instead, it’s about touching base throughout the year. Read your updates to find out what people are up to in your network. Make sure to respond to those updates with a personal note. Something like, “Congrats on your new job!” or “Congrats on leaving your new job!” The way to keep your networking manageable is to do little things to maintain your relationship, rather than reaching out once a year.
Get Searching

You will get better results researching people on LinkedIn over Google any work day. For example, if you want to work at Ralph Lauren, type the company name into LinkedIn’s search fields to find contacts who work there. Connect with employees through your connections or by joining their groups.
Get Set Up with a Job

Friends and contacts can’t help you if they don’t know that you are looking for a job. Put together a letter and explain what you are looking for in a new position and send it out to people in your network who might be able to hook you up. Share your work experience and list your best qualities and send it to former employers, co-workers, and good friends who are great connectors. Make sure you check off individual contacts so that your e-mail blast doesn’t hit the inbox of your current employer.

LinkedIn can be your ticket to a new opportunity if you do more than just sign up and log in. Sure, it’s not as festive as most social networking sites. No one will be sending you cakes, or trivia questions, but use its tools daily and leave the real partying for your new job celebration.
Read More
Posted in | No comments

Monday, 27 July 2009

Microsoft Plans Motion Sensing Natal Technology for Windows System

Posted on 11:51 by Unknown

Nintendo Wii has been getting good traction and becomes the top selling gaming console in high end gaming market. With the popularity of its motion-based games targeted for whole family activities, now seems that other competitors are trying to learn from its success story. Similarly to Microsoft, the giant software company has just introduced a new Motion Sensing Natal Technology that can be incorporated in Windows PC to have the same control capability not only in gaming segments, but also could be extended to other usage model as well.

The main difference between the Natal and Wii technology is that Natal is claimed to be able to utilize any exact device, such as your golf, or tennis racquet for more real interactive gaming experience while Wii will have to stick back to its own replica remote control stick. Besides being used as gaming devices, the usage can also be extended to digital media home in controlling home theater system either to stream movie or run PC programs with only simple hand gestures. Not to be limited by personal use, the Natal technology could be deployed for enterprise environment too

It could be too early to judge if this is going to be another victory for Microsoft but final pricing will be the major determining factor. Anyway, we should expect this to reach consumer market at least one year from now.
Read More
Posted in | No comments

Jade Property Suite 6 Real Estate Software Free Full Commercial Version Download

Posted on 11:19 by Unknown

Jade Property Suite 6 is probably one of the best real estate software available in the market which allows real estate property agents to easily keep track and manage their property listings with ability to automatically print real estate brochures or flyers, save to PDF format for easy sending by email, and create HTML files of complete property listings and publish it to Internet on hosted websites for online marketing of real estate, an essential step to bring in more clients – buyer and seller.

Jade Property Suite 6 saves all agency listings and contacts in a database that is easy to update, search, match, print, export and web publish. With a database, it has added advantage of can be used with a standalone local database or with a shared database in a multi-agent office.

Key Features of Jade Property Suite 6

* Web Publish real estate listings with a directory of categorized listings, a property search engine and property details pages with ability to select which properties to publish on web.
* Print real estate marketing materials or output to PDF with ready-made, editable full-color templates for generating flyers, brochures, catalogs, window cards, reports, letters and envelopes, or business cards and labels.
* Generate emails and send them with own favorite Windows email application.
* Export data to Excel or a text file and PDF.
* Match potential buyers to properties.
* Track the activity and progress of real estate sales.
* Ability to customize the templates, menus and filters.
* Support multiple agents share the same database.

http://www.jadetools.com/jps/download/jade.exe
Read More
Posted in | No comments

Google helps you keep your Gmail account protected

Posted on 03:16 by Unknown


How Google helps me?
You just need to pay a litle atention to details. Just scroll down to bottom of any page from your Gmail account and click the Details link next to the Last account activity line. What you get on this link? Like Google says :

It's information we'd use to troubleshoot unauthorized account activity, and now it's available to you.


On this page you can find about conccurent sessions opened of your Gmail account. You have even an option to sign out from all other sessions opened of your account. This is not stoping here. Google give us access to some more information. The recent activity table present to you the last five activities with Access Type column showing how your account was accessed, like browser, POP3 or mobile access, an IP address column showing the IP address that have accessed your account and a Date/Time column showing you the time when your account was accessed.
If you think that you need a litle more information on this subject just click the Learn more link from the Details page.
Read More
Posted in | No comments

Does 6figurejobs.com really work?

Posted on 02:48 by Unknown
Read More
Posted in | No comments

Sunday, 26 July 2009

ManiGear eX-L 18 (Claimed As World’s Most Powerful Gaming Notebook)

Posted on 20:55 by Unknown

The expert in building high performance custom computers for gaming, ManiGear Computer has announced its latest eX-L 18 notebook which claims to be the world’s most powerful gaming notebook.

The notebook has been enhanced with dual NVIDIA GeForce GTX 280 graphics with NVIDIA SLI technology for bringing the games and multimedia to life with brilliant 3D graphics and movies in 1080p HD resolution. NVIDIA GeForce GTX 280M GPUs are the fastest GeForce notebook GPUs ever.

“MainGear has equipped the eX-L 18 with the world’s fastest notebook graphics solution,” said by Rene Hass, General Manager of the notebook business unit at NVIDIA. “With NVIDIA GeForce GTX 280M GPUs, MainGear’s customers will experience breathtaking in gaming physics from titles such as Terminator Salvation or Darkest of Days and are ready for GPU computing applications such as Badaboom, vReveal and Arcsoft SimHD.”

Powered by Intel Core 2 mobile processor, the eX-L 18 notebook is also comes with up to three 2.5-inch SATA or SSD drives that configurable in RAID formations, supports eSATA, HDMI, USB 2.0 and FireWire. Besides, it also equipped with 3-megapixel video camera to provide high definition video conferencing.

With the increasing demand for mobile high performance computing solutions, we wanted to offer our customers with the most powerful gaming desktop replacement possible” said by Wallace Santos, CEO and Founder of MAINGEAR. “With the co-processing power of the Intel Core 2 CPU and dual NVIDIA GPUs, you’re able to get the same cutting edge technology available to desktop users in a balanced computing configuration that is ideal for today’s GPU computing environment.”
Read More
Posted in | No comments

Monday, 20 July 2009

Bill Gates Message for the Year of English & IT in Sri Lanka

Posted on 21:18 by Unknown
Read More
Posted in | No comments

Kingston's new DataTraveler® 300

Posted on 21:00 by Unknown

The famous thumb drive maker, Kingston Technology, has just created another new buzz in the industry by unveiling its new Data Traveler 300 which offers the world’s largest memory data storage capacity. The new Kingston Data Traveler 300 is able to deliver 256GB memory storage for high-end users who need huge mobile storage facility for particular reasons.

256 GB of data, allows you to store:

* 10 Blu-ray discs (~25 GB each)
* 54 DVD discs (~4.7 GB each)
* 365 CD discs (~700 MB each)

Fast transfer speeds of up to 20 MB/sec read and 10 MB/sec. write, reduce the transfer times and allow users to access their data directly from the drive, without stuttering movies or slow application response.

DataTraveler 300 is perfect for those looking for significant storage capacity and data protection in a lightweight, durable design. With a retractable USB connector and reinforced lanyard/ key-ring hole – it is built to withstand daily use. Enhanced for Windows Vista ReadyBoost, the DataTraveler 300 is ideal for home or business use.

DataTraveler 300 is backed by legendary Kingston reliability plus a five-year warranty and 24/7 tech support.

Features/Specifications:

* Capacity1 — 256 GB
* Speed 2 — Data transfer rates of up to 20MB/sec. read and 10MB/sec. write
* Safeguarded — includes Password Traveler security software for Windows
* Convenient — does not require Administrator rights to access the Privacy Zone
* Dimensions — 2.78" x 0.88" x 0.65" (70.68 mm x 22.37 mm x 16.45 mm)
* Operating Temperature — 32° to 140° F (0° to 60° C)
* Storage Temperature — -4° to 185° F (-20° to 85° C)
* Simple — just plug into a any 1.1 or 2.0 USB port
* Practical — durable, capless design
* Guaranteed — five-year warranty
* Enhanced — for Windows ReadyBoost™ on Vista-based systems 3
* Compatibility Table
Read More
Posted in | No comments

How to Remove or Delete a Registry Key, Subkey and Values with .reg Registration Entries File

Posted on 20:58 by Unknown
Registry registration entries file, which ends in .reg file extension is an useful script that can automate import and merging of registry keys and value data inside the file to system registry, especially in unattended mode. Most Windows operating system has built-in handler that automatically handle and process a file with .reg extension by using RegEdit.exe, a GUI tool which also support command-line interface to search or edit the Windows registry.

Guide to Remove and Delete Registry Entries, Keys, Subkeys or Values via .reg Registration Entries File

To remove and delete a registry key (entire registry tree branch and its sub-keys) with a .reg file, just add a hyphen (- or also known as minus) in front of the registry path (registry tree branch name) in the .reg file.

For example, a typical .reg file has the following syntax:

RegistryEditorVersion

[RegistryPath]
“DataItemName”=”DataType:DataValue”

Actual .reg file content example:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\My Digital Life]
“MDL”=dword:00000001

To delete the whole registry key (i.e. HKEY_CURRENT_USER\Software\My Digital Life) and its whole subkeys and value data, just add a hyphen in front. For example:

[-HKEY_CURRENT_USER\Software\My Digital Life]

To delete a specific or individual registry value with a .reg file, put a hyphen or minus (-) after the equal sign (=) following the DataItemName in the .reg file, replacing DataType:DataValue. For example, to delete the MDL registry value from above example, put a hyphen after the “MDL”= in the .reg file:

[HKEY_CURRENT_USER\Software\My Digital Life]
“MDL”=-

All editing of .reg file can be done with any text editor such as Notepad.
Read More
Posted in | No comments

Friday, 10 July 2009

free Hyper-V training

Posted on 04:29 by Unknown
MAria posted this.

I would like to share this with all interested ppl in hyper-v.

Microsoft is offering some free Hyper-V training. You will need to enter a specific access code 9350-Y2W6-3676 and sign in with your Live ID. The course “Collection 6319 - Configuring Hyper-V in Windows Server 2008” includes the following modules:

1. An overview of the Hyper-V technology
2. Creating a virtual environment
3. Deploying systems in a virtual environment
4. Configuring high availability in a virtual environment
5. Administering a virtual environment with SCVMM

To sign up go to https://www.microsoftelearning.com/eLearning/enterCode.aspx
Read More
Posted in | No comments

Thursday, 9 July 2009

Grow your business with confidence: Microsoft Dynamics GP

Posted on 03:07 by Unknown

Microsoft Dynamics GP enables you to run your business the way you want to

Microsoft Dynamics GP is a richly featured business management solution that allows you to use familiar, powerful software to operate and grow your business.

Microsoft Dynamics GP removes needless obstacles to the productivity and effectiveness of the people and processes in your business. Connecting all your business processes in one streamlined, flexible management infrastructure, Microsoft Dynamics GP allows your people to do their jobs in the way they like, at outstanding levels of productivity. The solution also provides you with ways to build stronger, more productive relationships with your key stakeholders—customers and trading partners. The extensive reporting and collaborative capabilities in Microsoft Dynamics GP give you the information you need to make informed business decisions. Microsoft Dynamics partners can also help you implement and fine-tune the solution to ensure that you reap the best possible results from it.
Empower people with familiar software

Microsoft Dynamics GP presents the feel and functionality of familiar software your people use every day—Microsoft Office Outlook, Microsoft Office Word, and Microsoft Office Excel. If your employees are comfortable with the Microsoft Office system programs, they will find their way with Microsoft Dynamics GP rapidly—they can perform their jobs with greater productivity and satisfaction, and achieve the business results you need with optimal efficiency.
•

Microsoft Dynamics GP not only presents the same user interface as Microsoft Office applications, but also lets you work with information from the business management solution directly within these Microsoft Office system programs.
•

Microsoft Dynamics GP is designed to work the way people work, with personalized views to get the data they want when they need it.
•

Time needed for training and familiarization is minimized—people can start working efficiently with Microsoft Dynamics GP quickly.

Generate optimal value from all of your systems

Working with and like the software systems you already own, Microsoft Dynamics GP can quickly become a core element of a seamless business management infrastructure. The latest version of Microsoft Dynamics GP works with Microsoft Office SharePoint Server 2007 to facilitate collaboration and communication among your employees and with trading partners and customers. There are many aspects of what makes Microsoft Dynamics GP a great fit with your other technologies—and many ways to benefit from them.
•

Microsoft Dynamics GP gives you an excellent return on your technology investment by integrating with Microsoft Office system applications, Microsoft Dynamics CRM, Microsoft Retail Management Systems (RMS), Microsoft SQL Server, Microsoft SQL Express Edition, Microsoft FRx, Windows Server, and Small Business Server.
•

Customization tools assist your information technology (IT) staff or Authorized Microsoft Dynamics GP partner in adapting the business management solution to your specific requirements.

Drive business productivity

In your business, Microsoft Dynamics GP can help you realize the productivity goals you have for people and processes. Microsoft Dynamics GP 10.0 takes automation to a new level, freeing people to focus on the most critical tasks. The solution also offers many avenues to boost the business value of information and key relationships with partners and customers.
•

Microsoft Dynamics GP lets you automate and standardize many recurring tasks, so they can take place more consistently and reliably, and with a minimal drain on your resources.
•

Employees, trading partners, vendors, and customers can collaborate amongst themselves or engage with your business, transcending departmental, organizational, and geographic boundaries to exchange insight and access business functions at any time, from any location.
•

The vast Microsoft Dynamics partner community offers the expertise and resources to extend Microsoft Dynamics GP with solutions that address challenges in your industry and market.

Enable confident decision-making

Decisions—strategic, tactical, and granular—drive and define both the direction of your business and the activities that take place within it every day. Microsoft Dynamics GP gives decision-makers at every level and in all areas of your business the means to gain practical, relevant insight and determine the best course of action. With Microsoft Dynamics GP, you can devise a rapid and successful response to changing business conditions and emerging market trends.
•

Current, complete information from all areas of your business is available for comprehensive reporting and analysis, so you can make sound decisions based on all pertinent factors.
•

Microsoft Dynamics GP includes a large number of pre-formatted reports, supports reporting with Office Excel and SQL Server analytical capabilities, and lets you efficiently publish and broadcast reports to your audiences anywhere in the most practical and compelling format.
•

You can use familiar, efficient Microsoft Dynamics GP reporting tools to monitor and drive business performance and ensure consistent compliance with regulation or corporate quality standards.
Read More
Posted in | No comments

Windows 7 Pre-Order Offer - It's pretty simple.

Posted on 01:06 by Unknown

Windows 7 is coming on October 22, 2009. Here's an easy way to get it fast and save a bunch: Pre-order a Windows 7 Home Premium Upgrade for $49** or a Windows 7 Professional Upgrade for $99.** That's about half off the estimated retail prices. This offer is available through participating retailers. Pick one below and pre-order today. They'll tell you how to get your copy when Windows 7 is available.

Then sit back and smile. You scored.
Read More
Posted in | No comments

MCTS Self-Paced Training Kit (Exam 70-652): Configuring Windows Server Virtualization

Posted on 01:01 by Unknown

Server virtualization is one of the hottest technologies today, despite a very tough economy. According to a recent IDC study, spending on virtualization is expected to approach $15 billion worldwide this year. The study estimates that over three-quarters of all companies with more than 500 employees are deploying virtual servers.

A strong growth in virtualization means more and better IT jobs for those skilled in the technology. And getting certified is a great way to validate those skills to your current and prospective employers.

for MCTS Study Guide (Exam 70-652): Configuring Windows Server Virtualization
Read More
Posted in | No comments

Wednesday, 8 July 2009

Nadee Ganga

Posted on 05:09 by Unknown
Read More
Posted in | No comments

Friday, 3 July 2009

Jobs Matchmaker Presentation

Posted on 23:02 by Unknown
Read More
Posted in | No comments

Wednesday, 1 July 2009

Google Voice invites on their way

Posted on 01:01 by Unknown

A couple of months ago we announced Google Voice, a service that gives you one phone number to link all your phones and makes voicemail as easy as email. We are happy to share that Google Voice is beginning to open up beyond former GrandCentral users. If you requested an invitation on the Google Voice site or previously on GrandCentral, keep your eye out for an invite email.

Once you receive your invitation, just click on the link and follow the instructions to setup your new Voice account. To help you find a Google number that is personalized to you, we've added a number picker that lets you search by area code and text. See if you can find a number that contains your name, a specific word or a number combination.

Read More
Posted in | No comments

What is Cloud Computing ?

Posted on 00:31 by Unknown
Read More
Posted in | No comments

Explaining Cloud Computing

Posted on 00:30 by Unknown
Read More
Posted in | No comments

Even IT People Don't Know What Cloud Computing Is: Report

Posted on 00:29 by Unknown
Version One reportedly announced that its latest market research survey regarding cloud computing is ready, and its main finding is that more than 40 percent of senior IT professionals have confessed that they do not have a clue about the real meaning and definition of cloud computing.

One of the main reasons is that there are so many differing opinions and definitions floating around like whimsical clouds that even CIOs are having a tough time catching one definition and pinning it down.

“It is clear from the survey results that there are a number of contrasting views as to what cloud computing really is, which is hardly surprising in light of the many different cloud computing definitions in the public arena,” said Julian Buck, general manager of Version One. “For instance, Wikipedia defines it as ‘Internet-based computing’ whileGartner ( News - Alert) refers to it ‘as a service’ using Internet technologies. IT expert, John Willis, writing in his cloud blog says that ‘virtualisation is the secret sauce of a cloud’ and provides different levels of cloud computing. With so many definitions circulating, clarity is urgently needed.”

On a lighter note, the situation reminds me of a familiar musical lilt from the epic film, “The Sound of Music.” Does anyone out there remember, “How do you catch a cloud and pin it down? How do you solve a problem like....? When I’m with .... I’m confused, out of focus and bemused, and I’ll never know exactly where I am....”? (It’s a good thing there is no such thing as “moon computing,” or else the lyrics would start with, “How do you hold a moonbeam in your hand?”

Meanwhile, Version One, a company dealing in document management software, claims that they carried out the research with 60 senior IT professionals, including IT directors and managers, across a range of U.K. public and private sector organizations, and comes very close on the heels of their earlier survey, which showed that more than 66 percent of U.K. senior finance professionals, including finance directors and managers, are confused about cloud computing definitions and uses.

“If organizations are going to embrace cloud computing in the future it’s essential that a single, simplified explanation is adopted by everyone,” said Buck. “Failure to cut through the confusion could result in organizations rejecting this technology and missing out on the benefits it provides.”

The company says the research revealed that 17 percent, of the nearly 60 percent that claim to know what cloud computing is, understand cloud computing to be internet based computing, while 11 percent believe it is a combination of internet based computing, software as a service (SAAS), software on demand, an outsourced or managed service and a hosted software service, and the balance respondents understand cloud computing to be a mixture of the all of the above ingredients.

More interesting facts emerged from the clouded scenario: 5 percent of respondents say they use it a lot; 19 percent use it sparingly; 47 percent say their company does not use it; 29 percent are unaware whether their organization uses it or not; 2 percent are certain that their company is going to invest in cloud computing within the next twelve months; 30 percent are undecided about possible investments; 47 percent just do not know if there will any investment at all; and, 23 percent declared that their companies will be absolutely not invest in cloud computing.

“Although this is only a small survey of IT professionals, the results are nonetheless very alarming, especially as IT professionals are the very people that need to understand cloud computing so that they can explain its benefits to management,” Buck said.

Cloud technology leverages of the computing prowess of tens of thousands of servers and millions of computers all across the globe to deliver solutions and data that need not reside in the end users own desktop computer or mobile computing device. It can handle rapidly increasing simultaneous data inputs and queries without any perceptible alteration in performance, gives the impression that the most of the applications reside in the end users’ systems when these actually reside elsewhere and function over the Internet, and is available as a service. Some agencies offer free unlimited usage and others charge as per consumption. Either way, the cost of buying, learning and maintaining software and data storage is completely neutralized.

Version One says that there are significant benefits to be derived from cloud computing, such as the reduction in overheads and paper, ease of use, cost savings and the ability to provide collaborative tools for teaching and learning.

Another example is that of information technology start-up companies facing easier initiation and break-in periods than before since new cloud related solutions and newer, leaner and more agile planned programming computer languages are significantly and constantly reducing costs.

Another contributing factor is that the rapidly deteriorating economic condition is driving investors away and this is forcing people and companies to search for, innovate and come up triumphantly with a clutch of low cost or freely available solutions to establish and bolster start-ups and survive any which way they can. Venture capital investment has taken a 70-plus percent free-falling death spiral in January 2009 itself and reports claim that the situation is not likely to improve till the beginning of the fourth quarter of 2009.

Remote data storage, Web-based programs and the growing popularity of broadband technologies all contribute to drastic cost reduction by neutralizing the need to buy, hire or contract servers, storage silos, network administrators, and annual maintenance contracts.

A few illustrative futuristic examples demonstrate this concept clearly. One, a salesman delivers a major sales pitch in a client’s meeting room by accessing media rich content from a remote location via the internet and displaying it on the client’s choice of visual display such as laptop screens, stand alone monitors, projector screens, or connected high definition TV’s.

Two, teachers in third world countries could possibly access UNICEF hosted class-room lectures without having to carry heavy text-books and notes, or storing info on the schools’ server and network. In fact why have computing infrastructure of any sort? Stand alone trolley mounted computer systems with low cost projectors that can access Internet connections in each class room should suffice.

A few contemporary examples of cloud computing are: Users of Facebook share mega bytes of personal information such as photos, poems, stories and personal details via remote and connected Facebook (News - Alert) servers spread worldwide; People store data in XLS, DOC, PPT and PDF compatible formats on Google Documents and not on their own systems. In all four cases the end user requires only internet connectivity and comparatively low grade compatible systems that can access, edit if required, and display the information.
Read More
Posted in | No comments

Friday, 26 June 2009

Components of Network Access Protection (NAP)

Posted on 03:52 by Unknown

Components of a NAP-Enabled Infrastructure.

The components of a NAP-enabled network infrastructure consist of the following:
2

NAP clients - Computers that support the NAP platform and include computers running Windows Server 2008, Windows Vista, or Windows XP SP3.

NAP enforcement points - Computers or network access devices that use NAP or can be used with NAP to require the evaluation of a NAP client’s health state and provide restricted network access or communication. NAP enforcement points use a Network Policy Server (NPS) that is acting as a NAP health policy server to evaluate the health state of NAP clients, whether network access or communication is allowed, and the set of remediation actions that a noncompliant NAP client must perform. Examples of NAP enforcement points are the following:

* Health Registration Authority (HRA) -A computer running Windows Server 2008 and Internet Information Services (IIS) that obtains health certificates from a certification authority (CA) for compliant NAP clients
* Network access devices -Ethernet switches or wireless access points (APs) that support IEEE 802.1X authentication
* VPN server -A computer running Windows Server 2008 and Routing and Remote Access that allows remote access VPN connections to an intranet
* DHCP server -A computer running Windows Server 2008 and the Dynamic Host Configuration Protocol (DHCP) Server service that provides automatic Internet Protocol version 4 (IPv4) address configuration to intranet clients

NAP health policy servers -Computers running Windows Server 2008 and the NPS service that store health requirement policies and provide health state validation for NAP. NPS is the replacement for the Internet Authentication Service (IAS), the Remote Authentication Dial-In User Service (RADIUS) server and proxy provided with Windows Server 2003. NPS can also act as an authentication, authorization, and accounting (AAA) server for network access. When acting as a AAA server or NAP health policy server, NPS is typically run on a separate server for centralized configuration of network access and health requirement policies, as Figure 1 shows. The NPS service is also run on Windows Server 2008–based NAP enforcement points, such as an HRA or DHCP server. However, in these configurations, the NPS service is acting as a RADIUS proxy to exchange RADIUS messages with a NAP health policy server.

Health requirement servers -Computers that provide current system health state for NAP health policy servers. For example, a health requirement server for an antivirus program tracks the latest version of the antivirus signature file.

Active Directory Domain Services -The Windows directory service that stores account credentials and properties and Group Policy settings. Although not required for health state validation, Active Directory is 3 required for Internet Protocol Security (IPsec)–protected communications, 802.1X-authenticated connections, and remote access VPN connections.

Restricted network -A separate logical or physical network that contains:

* Remediation servers -Network infrastructure servers and health update servers that NAP clients can access to remediate their noncompliant state. Examples of network infrastructure servers include Domain Name System (DNS) servers and Active Directory domain controllers. Examples of health update servers include antivirus signature distribution servers and software update servers.
* NAP clients with limited access -Computers that are placed on the restricted network when they do not comply with health requirement policies.
* Non-NAP-capable computers -Optionally, computers that do not support NAP can be placed on the restricted network (not shown in Figure 1).

System Health Agents and System Health Validators

Components of the NAP infrastructure known as system health agents (SHAs) on NAP clients and system health validators (SHVs) on NAP health policy servers provide health state tracking and validation for attributes of system health. Windows Vista and Windows XP SP3 include a Windows Security Health Validator SHV that monitors the settings of the Windows Security Center. Windows Server 2008 includes the corresponding Windows Security Health Validator SHV. NAP is designed to be flexible and extensible. It can interoperate with any vendor who provides SHAs and SHVs that use the NAP API.

An SHA creates a statement of health (SoH) that contains the current status information about the attribute of health being monitored by the SHA. For example, an SHA for an antivirus program might contain the state of the program (installed and running) and the version of the current antivirus signature file. Whenever an SHA updates its status, it creates a new SoH. To indicate its overall health state, a NAP client uses a System Statement of Health (SSoH), which includes version information for the NAP client and the set of SoHs for the installed SHAs.

When the NAP client validates its system health, it passes its SSoH to the NAP health policy server for evaluation through a NAP enforcement point. The NAP health policy server uses the SSoH, its installed SHVs, and its health requirement policies to determine whether the NAP client is compliant with system health requirements, and if it is not, the remediation actions that must be taken to achieve compliance. Each SHV produces a statement of health response (SoHR), which can contain remediation instructions. For example, the SoHR for an antivirus program might contain the current version number of the antivirus signature file and the name or IP address of the antivirus signature file server on the intranet.

Based on the SoHRs from the SHVs and the configured health requirement policies, the NAP health policy server creates a System Statement of Health Response (SSoHR), 4 which indicates whether the NAP client is compliant or noncompliant and includes the set of SoHRs from the SHVs. The NAP health policy server passes the SSoHR back to the NAP client through a NAP enforcement point. The NAP client passes the SoHRs to its SHAs. The noncompliant SHAs automatically remediate their health state and create updated SoHs, and the health validation process begins again.
Enforcement Clients and Servers

A NAP Enforcement Client (EC) is a component on a NAP client that requests some level of access to a network, passes the computer’s health status to a NAP enforcement point that is providing the network access, and indicates health evaluation information to other components of the NAP client architecture. The NAP ECs for the NAP platform supplied in Windows Vista, Windows XP SP3, and Windows Server 2008 are the following:

* An IPsec EC for IPsec-protected communications
* An EAPHost EC for 802.1X-authenticated connections
* A VPN EC for remote access VPN connections
* A DHCP EC for DHCP-based IPv4 address configuration
* A TS Gateway EC for connections to a TS Gateway server

A NAP Enforcement Server (ES) is a component on a NAP enforcement point running Windows Server 2008 that allows some level of network access or communication, can pass a NAP client’s health status to NPS for evaluation, and, based on the response from NPS, can provide the enforcement of limited network access. The NAP ESs included with Windows Server 2008 are the following:

* An IPsec ES for IPsec-protected communications
* A DHCP ES for DHCP-based IPv4 address configuration
* A TS Gateway ES for TS Gateway server connections

For 802.1X-authenticated and remote access VPN connections, there is no separate ES component running on the 802.1X switch or wireless AP or VPN server.

Together, ECs and ESs require health state validation and enforce limited network access for noncompliant computers for specific types of network access or communication.
NPS

NPS is a RADIUS server and proxy in Windows Server 2008. As a RADIUS server, NPS provides AAA services for various types of network access. For authentication and authorization, NPS uses Active Directory to verify user or computer credentials and obtain user or computer account properties when a computer attempts an 802.1Xauthenticated connection or a VPN connection.

NPS also acts as a NAP health policy server. Administrators set system health requirements in the form of health requirement policies on the NAP health policy server.
5

NAP health policy servers evaluate health state information provided by NAP clients to determine health compliance, and for noncompliance, the set of remediation actions that must be taken by the NAP client to become compliant.

The role of NPS as an AAA server is independent from its role as a NAP health policy server. These roles can be used separately or combined as needed. For example:

* NPS can be an AAA server on an intranet that has not yet deployed NAP.
* NPS can be a combination of AAA server and health policy server for 802.1Xauthenticated connections on an intranet that has deployed NAP for 802.1Xauthenticated connections.
* NPS can be a health policy server for DHCP configuration on an intranet that has deployed NAP for DHCP configuration.
Read More
Posted in | No comments

Exchange Server 2010 Beta available

Posted on 03:46 by Unknown

Microsoft Exchange Server 2010 brings a new and rich set of technologies, features, and services to the Exchange Server product line. This topic lists many of the new features and functionality that are included in Exchange 2010. The list isn't comprehensive; however, it provides important information to use when you're planning, deploying, and administering your Exchange 2010 organization:

* New Rights-Protected E-Mail Functionality with Active Directory RMS
* New Transport and Routing Functionality
* New Permissions Functionality
* New High Availability Functionality
* New Messaging Policy and Compliance Features
* New Outlook Web Access Features
* New Unified Messaging Features
* Web Management Interface
* New Exchange Core Store Functionality
* New Administration Functionality in the Exchange Management Console
* New Administration Functionality in the Exchange Management Shell

The first Beta version of Exchange Server 2010 is now available for download. Go ahead, download now!!
Read More
Posted in | No comments

Happy Father’s Day to all of you techie dads out there

Posted on 03:42 by Unknown
Read More
Posted in | No comments

Free Windows 7 IT Pro beta class offered

Posted on 03:21 by Unknown
Microsoft Learning has recently completed the beta version of a Windows 7 Instructor-led training course for IT Professionals entitled “Installing and Configuring Windows® 7 Client”

In an attempt to attain feedback on the course prior to the RTM release of Windows 7 we are offering the three-day course to IT Pros who would like to attend and give feedback on the course.

· When: July 7th to 9th (9:00AM to 5:00PM)

· Where: Microsoft Campus, Redmond WA

This beta class is being offered for free only once and class size is limited. If you are interested in attending the course send an email to trblog@microsoft.com. In the email explain your interest in the course as an IT Professional. Students will be chosen based on how well they match the audience profile listed in the syllabus link above. You will receive an email response within 48 hours if you have been selected to attend the course.
Read More
Posted in | No comments

Microsoft’s Virtual Lab Exams: Going Inside the Black Box

Posted on 03:05 by Unknown


Microsoft recently announced the release of virtual labs in 83-640. Virtual labs allow you to perform tasks using the software technology rather than performing them in a simulated environment or answering multiple choices questions about how you would solve the specified problem. With virtual labs, you solve the problem by doing something. I found this totally cool video that shows off the virtual lab technology and item type and thought it would be great to share it with you.
Read More
Posted in | No comments

Implementing Roaming User Profiles in Windows Vista

Posted on 01:07 by Unknown
To implement roaming user profiles for users of Windows Vista computers in an Active Directory environment, follow these steps:

1. 1. Prepare the file server where you want to store roaming user profiles for users by creating a shared folder on the server. (This server is sometimes 2called the profile server; a typical sharename for this shared folder is Profiles.)
2. 2. Assign the permissions shown in Tables 1 and 2 to the underlying folder being shared and to the share itself. Also confirm that the permissions in Table 3 are automatically applied to each roaming user profile folder.

Table 1 NTFS Permissions for Roaming Profile Parent Folder

User account


Minimum permissions required

Creator/Owner


Full Control -Subfolders and Files Only

Administrator


None

Security group of


List Folder/Read Data, Create Folders/Append

users needing to


Data -This Folder Only

put data on share




Everyone


No Permissions

Local System


Full Control -This Folder, Subfolders, and Files

Table 2 Share-Level (SMB) Permissions for Roaming Profile Share

User account


Default permissions


Minimum permissions required

Everyone


Full Control


No Permissions

Security group of users needing to


N/A


Full Control

put data on share







Table 3 NTFS Permissions for Each User’s Roaming Profile Folder

User account


Default permissions


Minimum permissions required

%Username%


Full Control, Owner Of Folder


Full Control, Owner Of Folder

Local System


Full Control


Full Control

Administrators


No Permissions1


No Permissions

Everyone


No Permissions


No Permissions

1This is true unless you set the “Add the Administrator security group to the roaming user profile share” policy, in which case the Administrators group has Full Control (requires Windows 2000 Service Pack 2 or later).

3. 3. Create a default network profile for users and copy it to the NETLOGON share on a domain controller. Let it replicate to other domain controllers in the domain.
This step is optional and is typically necessary only if you want to preconfigure a roaming user profile for your users so that they will all have the same desktop experience when they first log on. If you do not create a default network profile, Windows Vista will use the local %SystemRoot%\Users\Default profile instead.
4. 4. Open Active Directory Users and Computers and configure the profile path on the Profile tab for each user who will roam.

3

Additional, optional steps include configuring roaming profiles as mandatory profiles or as super mandatory profiles if desired.
Creating a Default Network Profile

When a user logs on to a Windows Vista computer for the first time, Windows Vista tries to find a profile named Default User.v2 in the NETLOGON share on the domain controller authenticating the user. If Windows Vista finds such a profile, this profile is copied to the user’s computer to form the user’s local profile on the computer. If Windows Vista does not find such a profile, the Default profile under %SystemDrive%\Users on the user’s computer is copied instead as the user’s local profile.

To create a default network profile, follow these steps:

1. 1. Log on to any computer running Windows Vista, using any domain user account.
2. 2. Configure the desktop settings, Start menu, and other aspects of your computer’s environment as you want users who log on to Windows for the first time to experience them.
3. 3. Log off and then log on using an account that belongs to the Domain Admins group.
4. 4. Click Start, right-click Computer, and then select Properties.
5. 5. Click Advanced System Settings. In the System Properties dialog box, click the Advanced Settings tab and then click Settings under User Profiles. The User Profiles dialog box opens.
6. 6. Select the user profile you previously configured in step 2 and click Copy To.The Copy To dialog box opens.
7. 7. Type \\domain_controller\NETLOGON\Default User.v2 in the Copy To dialog box.
8. 8. Click Change, type Everyone and then click OK twice to copy the local user profile you previously configured to the NETLOGON share as the default network profile Default User v.2.
9. 9. Type \\domain_controller\NETLOGON in the Quick Search box and press ENTER to open the NETLOGON share on your domain controller in a Windows Explorer window. Verify that the profile has been copied.

Note You may already have a Default User profile in NETLOGON that you created previously as a default network profile for users of computers running earlier versions of Windows. This network profile is not compatible with Windows Vista. See the section “Considerations for Mixed Environments” later in this chapter for more information.
Configuring a User Account to Use a Roaming Profile

Once you have created a Profiles share and configured it with suitable permissions on a file server, you can configure new user accounts to use roaming user profiles. To do this, 4 follow these steps (a Windows Server 2003 domain is used in this example):

1. 1. Log on to a domain controller as a member of the Domain Admins group (or any administrator workstation running an earlier version of Windows on which adminpak.msi has been installed).
2. 2. Open Active Directory Users and Computers and select the organizational unit containing the new user accounts you want to enable roaming for.
3. 3. Select each user account in the OU that you want configure. Right-click each account and select Properties.
4. 4. Click the Profile tab, select the check box labeled Profile Path, type \\profile_server\Profiles\%username% in the Profile Path text box, and then click OK.

The selected new user accounts are now ready for using roaming profiles. To complete this procedure, have each user log on to a Windows Vista computer using his or her user credentials. When the user logs on to Windows Vista for the first time, the Default User.v2 profile is copied from NETLOGON to the user’s local profile and then copied as user_name.v2 to the Profiles share on the profile server. For example, a user named Jacky Chen (jchen@contoso.com) who logs on to a Windows Vista computer for the first time will receive the roaming user profile \\profile_server\Profiles\jchen.v2. The .v2 suffix identifies this profile as compatible only with Windows Vista or later.
Implementing Mandatory Profiles

The procedure for implementing mandatory user profiles is similar to the procedure for implementing roaming user profiles described earlier in the article, with the following differences:

* Instead ofassigning the Authenticated Users built-in group Full Control of the Profiles folder on the profile server, assign this group Read permission and the Administrators group Full Control instead.
* Follow the steps in the section “Creating a Default Network Profile,” but instead of copying the domain user profile you configured to \\domain_controller\NETLOGON\Default User.v2, copy the profile to \\profile_server\Profiles\Mandatory.v2.
* Browse to locate the super-hidden \\profile_server\Profiles\Mandatory.v2\ntuser.dat file and change its name to ntuser.man. (Super-hidden files have the hidden and system attributes set.)
* Follow the steps in the section “Configuring a User Account to Use a Roaming Profile,” but instead of typing \\profile_server\Profiles\%username% in the Profile Path text box, type \\profile_server\Profiles\Mandatory.

Any user who now logs on with this mandatory user profile will be able to configure the desktop environment while logged on to the network, but when the user logs off any changes made to the environment will not be saved.
5

Caution Do not add .v2 to the profile path of the user object in Active Directory Users and Computers. Doing so may prevent Windows Vista from locating the roaming or mandatory profile. You should only apply the .v2 suffix to the name of the user folder on the central file server.

Caution It is acceptable to use the existing server and file share where you store your current roaming user profiles. If you do so, however, each user will have two roaming profile folders: one for Windows Vista and one for Windows XP. The added folder also means additional storage requirements for the server. Ensure that the drive hosting the share has adequate free space, and adjust any disk-quota policies accordingly.
Implementing Super Mandatory Profiles

The procedure for implementing super mandatory profiles is similar to the procedure for implementing mandatory user profiles described earlier, with the following differences:

* Instead of copying the domain user profile you configured to \\domain_controller\NETLOGON\Default User.v2, copy the profile to \\profile_server\Profiles\Mandatory.man.v2.
* Instead of typing \\profile_server\Profiles\%username% in the Profile Path text box, type \\profile_server\Profiles\Mandatory.man.

Once you have implemented these profiles, users will be able to configure their desktop environments while logged on to the network, but when they log off any changes they made to their environments will not be saved. In addition, if the profile server is unavailable when the user tries to log on to the network (or if the super mandatory profile does not load for any other reason), Windows Vista will not allow the user to log on to the computer.
Using Roaming User Profiles Together with Folder Redirection

If you configure both Folder Redirection and roaming user profiles, do not store redirected folders within the user’s roaming profiles, but instead store them on the network share where Folder Redirection is targeted. This reduces the size of a user’s roaming profile, speeds up its download time, and improves the user’s logon experience.

In general, best practice is to configure Folder Redirection first, make sure it applies successfully, and then deploy roaming user profiles. Also, users should log off all computers and follow these steps on one computer first (with all their main data).
Considerations for Mixed Environments

The following considerations apply when implementing roaming user profiles in mixed environments that consist of both Windows Vista and Windows XP or Windows 2000 client computers:

* Default network profiles created for computer running an earlier version of Windows are not compatible with default network profiles created for Windows Vista computers because the profile namespace of Windows Vista 6 is incompatible with the profile namespace of Windows XP. Because of this incompatibility, users who log on to a computer running an earlier version of Windows cannot roam their profiles to Windows Vista computers and vice versa. If users must use both Windows Vista computers and earlier versions of Windows, they will need separate roaming profiles for each computer and must manage the profiles separately. If Folder Redirection is implemented, however, part of the user profiles (the redirected folders) can be shared between the two desktop environments.
* If users need to roam across both Windows Vista computers and computers running earlier versions of Windows, you will need twice the usual space to store their roaming profiles. For example, if user Jacky Chen roams across both Windows Vista and computer running an earlier version of Windows, he will have two roaming profiles on the profile server:
o \\profile_server\Profiles\jchen, which is his roaming profile on earlier versions of Windows
o \\profile_server\Profiles\jchen.v2, which is his roaming profile on Windows Vista computers

These two user profiles are incompatible and will not share any data unless you have also implemented Folder Redirection for the user. Specifically, if you implement all available Folder Redirection policies for this user (including those that apply to earlier versions of Windows), only the HKCU settings will be unavailable between platforms.

In Windows Vista, disk quotas configured on roaming profiles no longer prevent users from logging off as disk quotas did on earlier versions of Windows. However, disk quotas will prevent roaming profiles from being uploaded to the profile server when the user logs off. No user data is lost, however, since the data still remains in the user’s local user profile on the computer.
Read More
Posted in | No comments

Free E-Book on Terminal Services

Posted on 00:51 by Unknown

For 25 years, Microsoft Press books have focused on helping you take your skills and knowledge to the next level. Celebrate our 25th Anniversary with a "Free e-book of the Month" offer! Simply sign up for the Microsoft Press Book Connection Newsletter for notification of offers, register, and download the selection of the month.
Read More
Posted in | No comments

Windows 7 Pre-Order 50% Half-Price Discount Promotional Deal

Posted on 00:47 by Unknown
http://www.amazon.com/gp/feature.html?ie=UTF8&ref%5F=ms%5Fsbrspot%5F2&docId=1000392481

Microsoft is launching a time-limited promotional deal that will see the price of certain editions Windows 7 been slashed by 50%, if customer pre-oder the Windows 7.
Read More
Posted in | No comments

Match Fixing

Posted on 00:39 by Unknown
Read More
Posted in | No comments

Movavi Video Converter

Posted on 00:14 by Unknown

Movavi Video Converter is a fast and easy way to convert video & DVD into the format you need. Enjoy video on your iPod, iPhone, PSP.

Why Movavi
* Movavi Video Converter and other products are used by four million people and companies in 92 countries

* 82% of our customers recommend Movavi Video Converter, VideoSuite and other Movavi Products

* Business customers include Microsoft, Procter & Gamble, Coca-Cola, Harvard University, and more

* Reviewed by PC World, CNet, MacWorld, Yahoo!Tech, VideoMaker, and many more .
Read More
Posted in | No comments

IBM Claims Privacy Breakthrough for Cloud, Data

Posted on 00:05 by Unknown
IBM researcher Craig Gentry has proposed a method for manipulating data while leaving it encrypted. That could be big news for cloud computing, for antispam solutions, and for health care providers, according to an IBM (NYSE: IBM) statement -- if it works.

The news comes as regulators are monitoring the handling of personal data. The FTC recently announced the Red Flags rule to force companies to fight fraud more actively. Just yesterday, the now-famous ID thief Frank Abagnale, whose life story inspired the movie "Catch Me If You Can" and who now works for the FBI, said that companies must do better to protect their customers.

It's possible that they can with the breakthrough proposed in a paper by Gentry, a Stanford University Ph.D. candidate. The research was reported last week and published for Association of Computing Machinery members under the title "Fully homomorphic encryption using ideal lattices."

Homomorphic encryption enables encrypted data to be manipulated so that, when decrypted, the result is as if the operation had been performed on the unencrypted data -- an approach that makes it especially suitable for some types of security. Lattice encoding would normally limit the number of operations that could be conducted on the encrypted text, according to PGP Corporation cryptographer Hal Finney, who discussed the approach on a list serv.

But Gentry's approach manages to overcome those shortcomings.

"The resulting scheme is apparently not practical ... but it is still amazing that it is even possible," Finney wrote.

One problem may have to do with the fact that although the data is not decrypted, the software does manipulate a decryption mechanism while working with encrypted data. The ACM abstract notes that Gentry's technique uses "an encryption scheme that can evaluate (slightly augmented versions of) its own decryption circuit; we call a scheme that can evaluate its (augmented) decryption circuit bootstrappable."

Nevertheless, IBM has high hopes for the technology.

"We believe this breakthrough will enable businesses to make more informed decisions, based on more studied analysis, without compromising privacy," Charles Lickel, IBM vice president of software research, said in a statement. "We also think that the lattice approach holds potential for helping to solve additional cryptography challenges in the future."

Additionally, an IBM representative told InternetNews.com that "there are flavors of homomorphic encryption already out there, but they do not offer efficient, affordable ways of analyzing encrypted information from all angles. The fully homomorphic solution we've arrived at offers the possibility of performing nearly unlimited mathematical operations to analyze encrypted information."

PGP's Finney was certainly impressed with Gentry's technique. "I have to go back to Godel's and Turing's work to think of a comparable example," he wrote.

"This is ... one of the most remarkable crypto papers ever. Not only does it solve one of the oldest open problems in cryptography, the construction of a fully homomorphic encryption system, it does so by means of a self-embedding technique reminiscent of Godel's theorem."
Read More
Posted in | No comments

Thursday, 25 June 2009

Microsoft Hohm Beta Helps in Energy Conservation

Posted on 23:14 by Unknown

Energy conservation has always been a critical global issue that nobody can neglect. Excessive development and wastage has resulted in incredibly high world energy consumption. Many parties have put in effort to try to reduce consumption by increasing efficiency. Being one of the world’s technological giants, Microsoft has joined in the effort by introducing its new service, Microsoft Hohm, an online application which allows users to analyze and understand their home energy usage and hence conserve the energy efficiently.

Microsoft Hohm is built on Azure Cloud Operating System and leverages Bing search as well as the Microsoft Advertising platform. Users can access to this online application via a modern browser easily. Based on the information and feedback from registered users, Microsoft Hohm will feed users with information of personalized energy savings and efficiency recommendations based on users’ dwelling conditions, e.g. house features, usage patterns and appliances. If users do not respond to Hohm with this basic information, the online application will then provide general recommendations to assist users in energy saving.

Microsoft Hohm is a free service with no additional costs to users. As a start, the service will be provided to residents in US only.

Energy conservation does not mean saving money only, but also helping to increase environmental value, national security, personal security, and human comfort. A collective effort will ensure the well-being and preservation of mother nature.
Read More
Posted in | No comments

Enterprise-strength Linux for mission-critical computing. (Reliability has never been so affordable.)

Posted on 02:56 by Unknown



SUSE Linux Enterprise 11 was built for reliability with affordable, enterprise-class clustering for your mission-critical workloads. With the ability to build a resilient and agile infrastructure, you can easily migrate from UNIX. And advanced Green IT capabilities keep your operation lean and efficient. Performance. Reliability. Affordability. What could be more mission-critical than that?

Powers your physical and virtual environments – desktop to data center.
Only SUSE Linux Enterprise 11 powers your complete environment with outstanding performance and manageability. So you can run your physical and virtual machines – from desktop to data center – on a common code base with common tools. Deploy traditional systems, or run software appliances for simplicity and speed. From x86 to mainframe and from netbook to desktop, SUSE Linux Enterprise delivers proven capabilities for your entire infrastructure.

The Linux that makes your IT work as one.
SUSE Linux Enterprise 11 provides maximum interoperability with Windows for lower costs and simplified management. Run Windows virtualized on Linux and vice versa, with full support from Novell and Microsoft. Easily add desktop Linux to your Windows environment for cost savings and security benefits. Leverage open standards to manage SUSE Linux Enterprise from your existing solutions. Even run ASP.NET applications on Linux for better performance and reduced cost.
Read More
Posted in | No comments

Upgrade your MCP credentials for only 25 USD

Posted on 01:49 by Unknown

If the answers to above are “Yes”, this is the BEST OFFER to meet your certification needs.


From now to June 30th, 2009 you are eligible for a Microsoft Certification exam
at a special price of US$25 *.

Save between 45 - 80%** when you utilize this offer to update your skills in new Microsoft technologies e.g. Windows Server 2008, SQL 2008, Visual Studio 2008, Vista and Sharepoint 2007.

This special offer is valid for valued Microsoft Certified Professional who has not attained any new Microsoft Certification credentials after July 1, 2007. Offer is valid for any Microsoft Certified Technology Specialist (MCTS), Microsoft Certified IT Professional (MCITP) and Microsoft Certified Professional Developer (MCPD) examinations scheduled and taken by June 30, 2009.
Read More
Posted in | No comments

The Ultimate Windows Support Framework

Posted on 01:25 by Unknown


Your organization strives to optimize its IT and business processes to achieve maximum performance. IT Standardization minimizes costs, reduces learning curves, reduces errors and increases efficiencies. Now think about the process of supporting Windows users and computers. Does your organization have standard support tools and methodologies? Are your support analysts achieving their maximum performance? Maven was designed specifically to enhance the productivity of Windows support analysts in all areas of support. Your company will save thousands of dollars in support costs.

Maven is a Windows support framework that allows organizations to standardize and audit all of their support tools, thereby greatly reducing support costs. Your enterprise data is typically found in multiple sources. Maven enables your organization to build and deploy a complete Windows support dashboard, with all of the queries, support tools, scripts and enterprise information required to rapidly service your IT infrastructure. Unlike many of today's Windows Management tools, Maven is fast and intuitive, designed specifically for analysts that administer and support Windows. Your service desk can do what they do best; service your organization.
Read More
Posted in | No comments

Microsoft Security Essentials 1.0 (Morro MSE Free Anti-Virus) Leaked Download

Posted on 00:54 by Unknown

Microsoft Security Essentials (MSE) is the official name for new free anti-virus security offering from Microsoft, which previously codenamed as Morro. Microsoft Security Essentials replaces Windows Live OneCare and Windows Defender.

MSE features a a streamlined solution with smaller footprint that focuses on core but comprehensive anti-malware protection including viruses, spyware, rootkits and trojans. As it’s free, don’t expect the security solution to equip with additional non-security features or advanced functions that comes with commercial consumer security suites from other third-party vendors, such as firewall.

Microsoft Security Essentials have been tested internally by Microsoft employees since June 1, 2009. The leaked setup installers appear to be genuine. Beside, virus and malware signature definition update for Microsoft Security Essentials have been working properly too, ensuring up-to-date protection. The freeware Microsoft Security Essentials is available as a stand-alone free download and will support Windows XP, Windows Vista and Windows 7 operating systems.

Download Microsoft Security Essentials

32-bit (x86) Windows Vista and Windows 7: mssefullinstall-x86fre-en-us-vista.exe
64-bit (x64) Windows Vista and Windows 7: mssefullinstall-amd64fre-en-us-vista.exe
Windows XP: mssefullinstall-x86fre-en-us-xp.exe
Read More
Posted in | No comments

Saturday, 20 June 2009

Swine Flue - Influenza A (H1N1) : Precautionary Measures.

Posted on 03:02 by Unknown
Read More
Posted in | No comments

Huawei E583X Wireless Modem

Posted on 02:37 by Unknown

The emergence of those tiny, portable and flash drive shaped HSDPA modems do give frequent travelers and businessmen a lot of convenience to access internet when they are oin the move. The reputable networking and telecommunications equipment manufacturer, Huawei, introduced the small portable modem by showcasing its E583X wireless modem at CommunicAsia 2009.

The new Huawei’s E583X is connected to a computer wirelessly. This tiny modem will detect and acquire 3G wireless signal and thence transmit to the computer as WiFi signal. With this technology, users do not have to worry if they forget to bring the cable or if there is limited desktop space to place their modem. The E583X is powered with a 1,500mAh battery which can provide five hours of signal beaming wirelessly. Users can charge the modem by pluging via USB. Of course users can still connect the tiny gadget to the computer like other regular HSDPA modems.
Read More
Posted in | No comments

Get Free NOD32 License with Valid Username and Password for 90-Days

Posted on 02:20 by Unknown
NOD32 is a popular antivirus software that ranks one of the best and most accurate detection and lowest failure rate. Beside, NOD32 also famous for its virus scanning speed and low system resource usage, with support for DOS,Windows, Novell Netware, Linux, BSD and other platform. NOD32 is a shareware which allows users to download, install, and use NOD32 for evaluation and trial for 30 days. After the trial period expires, users will need to purchase a legitimate and genuine license or serial number for NOD32 in order to continue using it. Now, you can extend the trial and demonstration period for another 90 days or 3 months for free, by a trick to get a valid NOD32 license serial number that allows you to get a user ID and password to enter in NOD32 to make it genuine and able to download NOD32 setup, access any upgrade or update available, without any crack or hack.

1. Go to China NOD32 Users’ Club web page that offers and giveaways free 90-days genuine copyright license and serial number.
2. As it’s web page in Chinese language, you most probably won’t understand what it means. Anyway, fill in the first 3 fields (those with *) respectively as Name, Email and repeat your Email again. Make sure your email is valid and correct as the license PIN or serial number that allows you to get NOD32 username and password will be sent to this email.
3. After finished key in the details, press on the button on the left to submit. Button on the left is for you to press or click in case you don’t receive the email with license information or serial number in 30 minutes.
4. Check your email inbox (or spam folder, just in case) for the email from NOD32. The email should arrive almost immediately, and will contains a PIN or serial number underlined with red text. The rest of the email instructs you how to obtain the user ID and password by using the PIN or serial number. Ignore it if you don’t understand the language.
5. Go to Hong Kong NOD32 Anti-Virus System registration page to register as a user of NOD32.
6. Fill in the first 4 fields (marked with *) which is product serial number, client’s name, your email address, and confirm again your email address. English description is available, so this step should be simple and easy.
7. Click on the left button (Submit).
8. You will then receive another email which contains an user ID or user name with a password, valid for 90 days or 3 months, and will allows you to download latest and upgrade version of NOD32 and update latest virus signatures. The email will be sent pretty soon after a few minutes.
9. As you can see at the bottom of the page, if you registered, but fail to receive email within one hour or lost username password, please check your username and password at http://www.nod32.com.hk/support/password.php.
10. Then download the Eset NOD32 Anti Virus system for free from here with the username and password provided.

Together with 1 month free trial evaluation default offers, you can effectively try the NOD32 for 4 months or 120 days before deciding whether to purchase the software or not. The best thing about this trick is that it’s possible to indefinitely extend the license and hence the valid username and password for NOD32, without any crack or hack, by applying again for another free 90-days of legal usage after the current user name and password expired, by using the same email address. So you can actually use NOD32 free for life without any keygen, crack, leaked user name or password. However, if you want to apply for multiple PIN or serial number for multiple NOD32 user name and password, you will need to use different email address for each of them, as the free giveaway of NOD32 license is limited to one per e-mail address, and if you reapply for a new license ID with the same email that you used before, then the existing license will be deactivated.
Read More
Posted in | No comments

ARM Cortex-A9 Potentially Power Up Next Generation High End Smartphones

Posted on 01:42 by Unknown

While Intel continues to push its X86 architecture processors for mobile computing, ARM is also keep on upgrading its ARM architecture by integrating multi-core while further shrinking its die size with smaller process technology. According to reliable source, ARM is already planning to migrate to 45nm process technology so that it can integrate multi cores technology, in an attempt to boost up overall performance without affecting the physical foot print and more importantly its power consumption which is crucial for battery life time.

The next generation ARM core product will be mainly targeted for high end smart phone mobile devices where multitasking and graphics performance are important. With the introduction of ARM cortex A9 as the successor of current cortex A8 which has been designed widely including the recently announced Apple’s 3Gs as well as Palm Pre, consumers can expect even better performance boost with its out of order execution while allowing multi-threading technology for scalable performance to handle tasks processing simultaneously.

No exact time line of when this will be available, ARM forecasts that it should reach the market by mid of next year. TI (Texas Instrument) is one of the potential candidates that will leverage on ARM cortex A9 for its OMAP4 which supports full HD 1080p decoding capabilities as well as an impressive 20 Megapixel still image capturing for multimedia centric applications.
Read More
Posted in | No comments

Acer Plans Entry Level Windows Smartphones at $50

Posted on 01:41 by Unknown

If you are an Acer fan and is hoping to get a cheap smartphone from this Taiwanese manufacturer, here is a piece of good news for you! Just recently, the company has unveiled a few series of Windows smartphone targeted for consumers that are tight on budget. These few models, named as C1, L1 and F1 will be available to consumer market by this autumn at a minimum price of $50.

Obviously, Acer is trying its way entering smart phone market by offering an aggressive pricing strategy. Besides functioning as a normal 2,8-inch touchscreen smart phone devices running on Wndows Mobile OS, these devices are also enhanced with GPS functionality utilizing Qualcomm Snapdragon chipset clocking at different core speed. In terms of product features, both C1 and L1 are similar, with 528MHz processor, 2 Megapixels camera except the latter model will be designed with additional slide-out numeric hard keypad that makes it a bit more expensive than C1 series. On top of these, a F1 model, which is targeted for high end market will be featured with Qualcomm’s Snapdragon chipset running at 1GHz as well as supporting HD media playback with impressive 12 megapixels camera module.

No exact hardware details as well as concrete pricing information yet, these Windows based smartphones are expected to be commercialized by this autumn.
Read More
Posted in | No comments

PRTG Network Monitor

Posted on 01:35 by Unknown


Optimize Your Network and Avoid System Downtimes

Businesses increasingly rely on their networks to move data, provide communication, and enable basic operations. Performance loss or system outages can seriously impact the bottom line of your business. Continuous network and server monitoring enables you to find problems and resolve them before they become a serious threat to your business:

* Avoid bandwidth and server performance bottlenecks
* Deliver better quality of service to your users by being proactive
* Reduce costs by buying bandwidth and hardware based on actual load
* Increase profits by avoiding losses caused by undetected system failures
* Find peace of mind: As long as you do not hear from PRTG via email, SMS, pager, etc. you know everything is running fine and you have more time to take care of other important business.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Receiving Error 'ORA-01041: internal error. hostdef extension doesn't exist.' on re-establishing a connection to Oracle.
    You can receive the error message 'Error ORA-01041: internal error. hostdef extension doesn't exist' when attempting to re-esta...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Troubleshooting the Microsoft Exchange Transport Service When It Fails to Start on an Exchange 2007 Hub Transport Server with Event ID 1032 or 1036
    Event ID: 1032 Socket Access Denied. Binding: 0.0.0.0:25. Event ID: 1036 Failed to open one or more bindings. The service will be stopped....
  • C Traps and Pitfalls (Addison Wesley, 1989, English)
    C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual beha...
  • SoftMaker Office 2008 Free Full Version Download With Genuine License Key
    SoftMaker Office 2008 is reliable office productivity software that is designed for beginners and professional users. SoftMaker Office Suite...
  • Amazon Takes the Humans Out of Fulfillment With New API
    keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to out...
  • AP Microsoft backs Icahn's bid to oust Yahoo board
    SAN FRANCISCO - Microsoft Corp. threw its weight behind investor Carl Icahn's effort to dump Yahoo Inc.'s board, saying Monday that...
  • Suba Vesak Mangallayak Weewa !!!!
    Keep your heart free from hate your mind from worry, Live simply expect little, give much Fill your life with love forget self, think of ot...
  • How to Remove Dosearches.com homepage (Virus Removal Guide)
    Dosearches.com  is a browser hijacker, which is promoted via other free downloads, and once installed it will change your browser homepage t...
  • Alcohol 120% v5 Blu-ray Burner Free Download with Registration Unlock Code
    Alcohol 120% is a CD and DVD burning, copying, backup, recording, duplication, emulation and creation software for Windows. In addition to c...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ▼  2009 (67)
    • ▼  August (2)
      • Removing the complexity from information protection
      • Getting Lucky on LinkedIn
    • ►  July (18)
      • Microsoft Plans Motion Sensing Natal Technology fo...
      • Jade Property Suite 6 Real Estate Software Free Fu...
      • Google helps you keep your Gmail account protected
      • Does 6figurejobs.com really work?
      • ManiGear eX-L 18 (Claimed As World’s Most Powerful...
      • Bill Gates Message for the Year of English & IT in...
      • Kingston's new DataTraveler® 300
      • How to Remove or Delete a Registry Key, Subkey and...
      • free Hyper-V training
      • Grow your business with confidence: Microsoft Dyna...
      • Windows 7 Pre-Order Offer - It's pretty simple.
      • MCTS Self-Paced Training Kit (Exam 70-652): Config...
      • Nadee Ganga
      • Jobs Matchmaker Presentation
      • Google Voice invites on their way
      • What is Cloud Computing ?
      • Explaining Cloud Computing
      • Even IT People Don't Know What Cloud Computing Is:...
    • ►  June (23)
      • Components of Network Access Protection (NAP)
      • Exchange Server 2010 Beta available
      • Happy Father’s Day to all of you techie dads out t...
      • Free Windows 7 IT Pro beta class offered
      • Microsoft’s Virtual Lab Exams: Going Inside the Bl...
      • Implementing Roaming User Profiles in Windows Vista
      • Free E-Book on Terminal Services
      • Windows 7 Pre-Order 50% Half-Price Discount Promot...
      • Match Fixing
      • Movavi Video Converter
      • IBM Claims Privacy Breakthrough for Cloud, Data
      • Microsoft Hohm Beta Helps in Energy Conservation
      • Enterprise-strength Linux for mission-critical com...
      • Upgrade your MCP credentials for only 25 USD
      • The Ultimate Windows Support Framework
      • Microsoft Security Essentials 1.0 (Morro MSE Free ...
      • Swine Flue - Influenza A (H1N1) : Precautionary Me...
      • Huawei E583X Wireless Modem
      • Get Free NOD32 License with Valid Username and Pas...
      • ARM Cortex-A9 Potentially Power Up Next Generation...
      • Acer Plans Entry Level Windows Smartphones at $50
      • PRTG Network Monitor
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ►  2008 (319)
    • ►  December (30)
    • ►  November (43)
    • ►  October (45)
    • ►  September (12)
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ►  April (55)
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile