Picking an Android phone is tough you probably already have some criteria. However, for those who
just want to pick a phone and go, Google’s made a handy tool that helps you
decide which phone to get quickly.
The tool asks you a few questions to determine what kind of
activities you need your phone for, and more importantly how much you
use each one. Gaming, music, watching videos, fitness tracking and more all
factor in. Once you’ve selected a few activities, Google will give you a
selection of three Android phones. You can then remove phones you don’t like to
get a new suggestion, or filter the results by size, price, or how recently it
was released.
Clone Application
Whether you’re migrating to a new computer or doing a clean
install, life is easier when you take all your settings and tweaks with you. If
you don’t want to do a full backup and restore,
Clone Application backup's settings for
the most popular Windows programs so you can restore them later.
Clone Application essentially automates the process we detailed in our
Windows migration guide, it knows where each program stores its settings and
registry keys, and backs them all up in one fell swoop so you don’t have to do
the legwork yourself. It supports different Windows programs, can detect which
programs you have installed, and even has a section for manual backups so you
can include the programs it doesn’t support.
Clone Application is completely portable also, so you don’t have to
install anything. Just extract the program to its own folder on the desktop and
right-click it to launch it as an administrator. From there, check the programs
you want to back up, and click Start Clone App. It’ll back up all the necessary
files and registry keys to its folder, which you can then copy to your new
computer ->launch the program and click restore to put all your settings
back where they belong.
How do I stop pop-up or pop-under Internet ads?
There are hundreds of different software programs
that are designed to help stop, block, or prevent pop-up, pop-under, and other
Internet intrusive and annoying advertising on the Internet.
All recent browsers have some type of pop-up and pop-under
protection available and enabled.
- Microsoft Internet Explorer
- Mozilla Firefox
- Google Chrome
- Opera
- Open Internet Explorer
- Click Tools (press the Alt key if you don't see the Tools menu option)
- Click Options (or Internet options)
- Click the Privacy tab
At the bottom of the Privacy tab, you should have a Pop-up
Blocker section. If you want pop-ups to be blocked, check the "Block
pop-ups" option (may also be titled "Turn on Pop-Up Blocker").
You can also set additional settings, such as disabling the sound when a pop-up
is blocked or disable the information bar displayed when a pop-up is blocked,
by clicking the Settings button.
Mozilla Firefox Browser:
- Open Mozilla Firefox
- Click the Tools menu option.
- Click Options
- Click on the Content option in the Options window
By default, the "Block pop-up windows" option
should be checked. Check this option if it is currently unchecked. If there are
sites you want to allow pop-ups for, click the Exceptions button, enter the
allowed site address, and click the Allow button.
Users may also want to disable any pop-ups from any browser plug-ins, a tactic
for bypassing many pop-up blockers. To enable this feature in Firefox, follow
the steps below.
Open Mozilla Firefox
- In the URL field, type about:config and press enter.
- This should open the Firefox config window.
- Right-click on a black portion of the window and click New and then Integer.
- For the preference name, type privacy.popups.disable_from_plugins and click OK.
- For the value, type 2.
We also suggest you locate the privacy option
in the about:config screen and change the value of this setting to false.
Another option for Firefox users is to download and install
the Ad Block Plus add-on for Firefox. This extension will block most
pop-up ads from opening in Firefox.
Google Chrome Browser:
Google Chrome includes its own pop-up blocker utility and
does a good job at blocking most pop-ups by default.
- Open Google Chrome
- At the far right, inline with the address bar, click the Menu icon (titled "Customize and control Google Chrome").
- Select Settings
- At the bottom of the Settings page, click Show advanced settings
- In the Privacy section, click the Content settings button.
- In the Content settings window, scroll down to the Pop-ups section. If not already selected by default, select the "Do no allow any site to show pop-ups" option. You can also add sites to the exceptions list to allow pop-ups from those sites by clicking the Manage exceptions button.
- Another option for Google Chrome users is to download and install the Ad Block Plus extension for Chrome. This extension will block most pop-up ads from opening in Chrome
Opera Browser:
The latest version of Opera also includes its own pop-up
blocker and has it enabled by default. You can adjust how pop-ups are blocked
or allowed by following the steps below
- Open Opera
- Click the Opera button in the top left corner
- Click Settings
- Click Quick Preferences
- Within the Quick Preferences menu, you can choose "Block unwanted pop-ups" or "Block all pop-ups."
Windows 10 preview
Follow these steps to download Insider Preview:
- Sign up for the Windows Insider Program, if you haven't already.
- Read the system requirements.
- Click one of the Download links on this page to download a special file—it's called an ISO file—that you can use to install the preview.
- When the download is complete, transfer the ISO file to installation media such as a USB flash drive or DVD.
- Double-tap or double-click setup.exe from the installation media, and then follow the steps.
http://windows.microsoft.com/en-us/windows/preview-iso
CCNA
Cisco Certified Network Associate
PORT
The term port can refer to either physical or
virtual connection points. There are two kinds of port,
Physical port:
Physical network ports allow connecting cables to computers,
routers, modems and other peripheral devices. Several different types of
physical ports available on computer network hardware. A physical port, as
opposed to a virtual or logical port is an interface on a computer into which
you can insert a connector for a device.
Examples of Physical Port: RJ45 port (Ethernet/LAN/NIC
Port), Serial Port (RS-232), USB Port.
Virtual port:
Virtual
ports are part of TCP/IP networking. These ports allow software
applications to share hardware resources without interfering with each other.
Computers and routers automatically manage network traffic traveling via their
virtual ports.
Port numbers range from 0 to 65536, but only ports numbers 0
to 1024 are reserved for privileged services and designated as well-known
ports. This list of well-known port numbers specifies the port used by the
server process as its contact port.
Port Number | Description |
---|---|
1 | TCP Port Service Multiplexer (TCPMUX) |
5 | Remote Job Entry (RJE) |
7 | ECHO |
18 | Message Send Protocol (MSP) |
20 | FTP -- Data |
21 | FTP -- Control |
22 | SSH Remote Login Protocol |
23 | Telnet |
25 | Simple Mail Transfer Protocol (SMTP) |
29 | MSG ICP |
37 | Time |
42 | Host Name Server (Nameserv) |
43 | WhoIs |
49 | Login Host Protocol (Login) |
53 | Domain Name System (DNS) |
69 | Trivial File Transfer Protocol (TFTP) |
70 | Gopher Services |
79 | Finger |
80 | HTTP |
103 | X.400 Standard |
108 | SNA Gateway Access Server |
109 | POP2 |
110 | POP3 |
115 | Simple File Transfer Protocol (SFTP) |
118 | SQL Services |
119 | Newsgroup (NNTP) |
137 | NetBIOS Name Service |
139 | NetBIOS Datagram Service |
143 | Interim Mail Access Protocol (IMAP) |
150 | NetBIOS Session Service |
156 | SQL Server |
161 | SNMP |
179 | Border Gateway Protocol (BGP) |
190 | Gateway Access Control Protocol (GACP) |
194 | Internet Relay Chat (IRC) |
197 | Directory Location Service (DLS) |
389 | Lightweight Directory Access Protocol (LDAP) |
396 | Novell Netware over IP |
443 | HTTPS |
444 | Simple Network Paging Protocol (SNPP) |
445 | Microsoft-DS |
458 | Apple QuickTime |
546 | DHCP Client |
547 | DHCP Server |
563 | SNEWS |
569 | MSN |
1080 | Socks |
CCNA
Cisco Certified Network Associate
OSI Layer
1. Application Layer
This layer supports application and
end-user processes. Communication partners are identified, quality of service
is identified, user authentication and privacy are considered, and any constraints
on data syntax are identified. Everything at this layer is
application-specific. This layer provides application services for transfers-mail,
and other network software services. Telnet and FTP are
applications that exist entirely in the application level. Tiered application
architectures are part of this layer.
Eg: WWW Browser, FTP, HTTP, Telnet,
Nfs, Snmp
2. Presentation layer
This layer provides independence
from differences in data representation (e.g., encryption) by translating
from application to network format, and vice versa. The presentation layer
works to transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network,
providing freedom from compatibility problems. It is sometimes called the
syntax layer.
Eg: encryption, ASCII,
EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
3. Session Layer
This layer establishes, manages
and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between
the applications at each end. It deals with session and connection coordination.
Eg: NFS, NetBios names, RPC, SQL.
4. Transport Layer
This layer provides transparent
transfer of data between end systems, or hosts, and is responsible for
end-to-end error recovery and flow control. It ensures complete data
transfer.
Eg: SPX, TCP, UDP.
5. Network Layer
This layer provides switching and routing technologies,
creating logical paths, known as virtual circuits, for transmitting data
from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control
and packet sequencing.
Eg: AppleTalk DDP, IP, IPX.
6. Data link layer
At this layer, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media
Access Control (MAC) layer and the Logical Link Control (LLC) layer.
The MAC sub layer controls how a computer on the network gains access to the
data and permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.
Eg: PPP, FDDI, ATM, IEEE
802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
7. Physical layer
This layer conveys the bit stream
- electrical impulse, light or radio signal through the network at
the electrical and mechanical level. It provides the hardware means
of sending and receiving data on a carrier, including defining cables, cards
and physical aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.
Eg: Ethernet, FDDI, B8ZS, V.35,
V.24, RJ45
Repair Outlook
Data Files (.pst and .ost) for Outlook 2010
1. Open
Windows Explorer and select the drive:\Program Files\Microsoft Office\OFFICE14
folder.
2. Double-click Scanpst.exe.
3. In
the Enter the name of the file you want to scan box, enter the name of the .pst or
.ost file that you want to check, or click Browse to select the file.
4. To
specify the scan log options, click Options, and then click the option
that you want.
5. Click Start.
If
errors are found, you are prompted to start the repair process to fix the
errors.
A
backup file is created during the repair process. To change the default name or
location of this backup file, in the Enter name of backup file box, enter a new name, or click Browse to select the file that you want to use.
6. Click Repair.
Start
Outlook with the profile that contains the .pst file that you tried to repair.
1. Open
Windows Explorer and select the drive:\Program Files\Microsoft Office\OFFICE14
folder.
2. Double-click Scanpst.exe.
3. In
the Enter the name of the file you want to scan box, enter the name of the .pst or
.ost file that you want to check, or click Browse to select the file.
4. To
specify the scan log options, click Options, and then click the option
that you want.
5. Click Start.
6. Click Repair.
Start
Outlook with the profile that contains the .pst file that you tried to repair.
How to save Outlook messages in PDF format
Creating
Rules to Manage Your Email
Click File -> Info , and then the Manage Rules & Alerts button.
Click New Rule... on
the Email Rules tab. The Rules
Wizard dialog will pop up
Rules & Alerts : Select a template, choose the template that most closely resembles the
action you would like to take. Ensure you select a template from the Stay Organized or Stay Up to Date sections
Rules
Wizard: Edit the rule description, click
on the underlined text in order to specify the details of your rule (e.g. move
messages from Office Watch mailing list into the Newsletters folder). Check
carefully to make sure that the details are correct and complete. Click Next
Select any additional criteria you would like to set , Select condition(s) by
clicking on the underlined words and
adding in your criteria.
Specify the details for those criteria in the Edit the rule description box
(optional)
Type a name for the rule in the box for Specify a name for this rule
Tick the box next to Run this rule now... if
you want to apply the rule to messages already received
When
you are certain of the details of the rule and want to commit to it, click Finish
Your rule will now appear listed, with a description of the
settings, in the Rules and Alerts dialog
box
Click New Rule... on the Email Rules tab. The Rules Wizard dialog will pop up
Rules & Alerts : Select a template, choose the template that most closely resembles the action you would like to take. Ensure you select a template from the Stay Organized or Stay Up to Date sections
Rules Wizard: Edit the rule description, click on the underlined text in order to specify the details of your rule (e.g. move messages from Office Watch mailing list into the Newsletters folder). Check carefully to make sure that the details are correct and complete. Click Next
Select any additional criteria you would like to set , Select condition(s) by clicking on the underlined words and adding in your criteria.
Specify the details for those criteria in the Edit the rule description box (optional)
Type a name for the rule in the box for Specify a name for this rule
Tick the box next to Run this rule now... if you want to apply the rule to messages already received
When you are certain of the details of the rule and want to commit to it, click Finish
Your rule will now appear listed, with a description of the settings, in the Rules and Alerts dialog box
Password on
pst-file
To set a password on
your pst-file, you must bring up the Properties dialog of the pst-file in
Outlook.
Outlook
2003 and Outlook 2007
File-> Data File Management…-> double click on your data file->
button: Change Password…
Outlook
2010 and Outlook 2013
File-> Account Settings-> Account Settings…-> tab Data Files->
double click on your data file-> button: Change Password…
Leave the “Old password” field empty when no
password has been set yet.
File-> Data File Management…-> double click on your data file-> button: Change Password…
File-> Account Settings-> Account Settings…-> tab Data Files-> double click on your data file-> button: Change Password…
CCNA
Cisco Certified Network Associate
Introduction to Networking and Network Basics :
It is important to understand what a network is and the
importance of networks themselves. Every
host has a Network Interface Card (NIC) that is used to connect it to a
network.
A hub is a network device that repeats information received
from a host to all other connects hosts. The hub will relay any information
received from Host A to Host B and Host C. This means that all the three hosts
can communicate with each other. Communication between hosts can be classified
into three types:
Unicast – Communication from
one host to another host only.
Broadcast – Communication
from one host to all the hosts in the network.
Multicast – Communication
from one host to few hosts only.
When a hub is used to network hosts, there are two problems
that arise:
A hub repeats information received from one host to all the
other hosts. To understand this, consider Host A sending a unicast message to
Host B. When the hub receives this message; it will relay the message to both
Host B and Host C. Even though the message was a unicast intended only for Host
B, Host C also receives it. It is up to Host C to read the message and discard
it after seeing that the message was not intended for it.
A hub creates a shared network medium where only a single
host can send packets at a time. If another host attempts to send packets at
the same time, a collision will occur. Then each device will need to resend
their packets and hope not to have a collision again. This shared network
medium is called a single collision domain. Imagine the impact of
having a single collision domain where 50 or 100 hosts are connected to hubs
that are interconnected and they are all trying to send data. That is just a
recipe for many collisions and an inefficient network.
The problems associated with hubs can cause severe
degradation of a network. To overcome these, switches are used
instead of hubs. Like hubs, switches are used to connect hosts in a network but
switches break up collision domain by providing a single collision domain for
every port. This means that every host (one host connects to one port on the
switch) gets its own collision domain thereby eliminating the collisions in the
network. With switches, each host can transmit data anytime. Switches simply
“switch” the data from one port to another in the switched network. Also,
unlike hubs, switches do not flood every packet out all ports. They switch a
unicast packet to the port where the destination host resides.
Now that you know how a switch works and improves a network,
consider the one problem associated with a switched network. Earlier, you
learned that hubs flood out all packets, even the unicast ones. A switch does
not flood out unicast packets but it does flood out a broadcast packet. All
hosts connected to a switched network are said to be in the same broadcast
domain. All hosts connected to it will receive any broadcast sent out in this
domain. While broadcasts are useful and essential for network operations, in a
large switched network too many broadcasts will slow down the network. To
remedy this situation, networks are broken into smaller sizes and these
separate networks are interconnected using routers. Routers do not allow
broadcasts to be transmitted across different networks it interconnects and
hence effectively breaks up a broadcast domain.
Mac Address
- 12 digit unique value.
IP Address use
to find the particular host in the network, it can be considered as 2 values,
bit Network bit and Host bit.
IP Address
rule for same network:
- Network
bit need to be same
- Host
bit need to be different.