Welcome to My Blog!



Picking an Android phone is tough you probably already have some criteria. However, for those who just want to pick a phone and go, Google’s made a handy tool that helps you decide which phone to get quickly.


The tool asks you a few questions to determine what kind of activities you need your phone for, and more importantly how much you use each one. Gaming, music, watching videos, fitness tracking and more all factor in. Once you’ve selected a few activities, Google will give you a selection of three Android phones. You can then remove phones you don’t like to get a new suggestion, or filter the results by size, price, or how recently it was released.
Clone Application



Whether you’re migrating to a new computer or doing a clean install, life is easier when you take all your settings and tweaks with you. If you don’t want to do a full backup and restore, 

Clone Application backup's settings for the most popular Windows programs so you can restore them later.

Clone Application essentially automates the process we detailed in our Windows migration guide, it knows where each program stores its settings and registry keys, and backs them all up in one fell swoop so you don’t have to do the legwork yourself. It supports different Windows programs, can detect which programs you have installed, and even has a section for manual backups so you can include the programs it doesn’t support.


Clone Application is completely portable also, so you don’t have to install anything. Just extract the program to its own folder on the desktop and right-click it to launch it as an administrator. From there, check the programs you want to back up, and click Start Clone App. It’ll back up all the necessary files and registry keys to its folder, which you can then copy to your new computer ->launch the program and click restore to put all your settings back where they belong.
How do I stop pop-up or pop-under Internet ads?

There are hundreds of different software programs that are designed to help stop, block, or prevent pop-up, pop-under, and other Internet intrusive and annoying advertising on the Internet.
All recent browsers have some type of pop-up and pop-under protection available and enabled.
    
  • Microsoft Internet Explorer
  • Mozilla Firefox
  • Google Chrome
  • Opera

 Microsoft Internet Explorer 6.0 or later:
  • Open Internet Explorer
  • Click Tools (press the Alt key if you don't see the Tools menu option)
  • Click Options (or Internet options)
  • Click the Privacy tab

At the bottom of the Privacy tab, you should have a Pop-up Blocker section. If you want pop-ups to be blocked, check the "Block pop-ups" option (may also be titled "Turn on Pop-Up Blocker"). You can also set additional settings, such as disabling the sound when a pop-up is blocked or disable the information bar displayed when a pop-up is blocked, by clicking the Settings button.

Mozilla Firefox Browser:
  • Open Mozilla Firefox
  • Click the Tools menu option.
  • Click Options
  • Click on the Content option in the Options window

By default, the "Block pop-up windows" option should be checked. Check this option if it is currently unchecked. If there are sites you want to allow pop-ups for, click the Exceptions button, enter the allowed site address, and click the Allow button.

Users may also want to disable any pop-ups from any browser plug-ins, a tactic for bypassing many pop-up blockers. To enable this feature in Firefox, follow the steps below.

Open Mozilla Firefox
  • In the URL field, type about:config and press enter.
  • This should open the Firefox config window.
  • Right-click on a black portion of the window and click New and then Integer.
  • For the preference name, type privacy.popups.disable_from_plugins and click OK.
  • For the value, type 2.

We also suggest you locate the privacy option in the about:config screen and change the value of this setting to false.

Another option for Firefox users is to download and install the Ad Block Plus add-on for Firefox. This extension will block most pop-up ads from opening in Firefox.

Google Chrome Browser:

Google Chrome includes its own pop-up blocker utility and does a good job at blocking most pop-ups by default.
  • Open Google Chrome
  • At the far right, inline with the address bar, click the Menu icon  (titled "Customize and control Google Chrome").
  • Select Settings
  • At the bottom of the Settings page, click Show advanced settings
  • In the Privacy section, click the Content settings button.
  • In the Content settings window, scroll down to the Pop-ups section. If not already selected by default, select the "Do no allow any site to show pop-ups" option. You can also add sites to the exceptions list to allow pop-ups from those sites by clicking the Manage exceptions button.
  • Another option for Google Chrome users is to download and install the Ad Block Plus extension for Chrome. This extension will block most pop-up ads from opening in Chrome

Opera Browser:

The latest version of Opera also includes its own pop-up blocker and has it enabled by default. You can adjust how pop-ups are blocked or allowed by following the steps below
  • Open Opera
  • Click the Opera button in the top left corner
  • Click Settings
  • Click Quick Preferences
  • Within the Quick Preferences menu, you can choose "Block unwanted pop-ups" or "Block all pop-ups."




Windows 10 preview




Follow these steps to download Insider Preview:
  • Sign up for the Windows Insider Program, if you haven't already.
  • Read the system requirements.
  • Click one of the Download links on this page to download a special file—it's called an ISO file—that you can use to install the preview.
  • When the download is complete, transfer the ISO file to installation media such as a USB flash drive or DVD.
  • Double-tap or double-click setup.exe from the installation media, and then follow the steps.
http://windows.microsoft.com/en-us/windows/preview-iso



CCNA
Cisco Certified Network Associate


PORT

The term port can refer to either physical or virtual connection points. There are two kinds of port,

Physical port:

Physical network ports allow connecting cables to computers, routers, modems and other peripheral devices. Several different types of physical ports available on computer network hardware. A physical port, as opposed to a virtual or logical port is an interface on a computer into which you can insert a connector for a device.

Examples of Physical Port: RJ45 port (Ethernet/LAN/NIC Port), Serial Port (RS-232), USB Port.


Virtual port:

                Virtual ports are part of TCP/IP networking. These ports allow software applications to share hardware resources without interfering with each other. Computers and routers automatically manage network traffic traveling via their virtual ports.


Port numbers range from 0 to 65536, but only ports numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of well-known port numbers specifies the port used by the server process as its contact port.

Port NumberDescription
1TCP Port Service Multiplexer (TCPMUX)
5Remote Job Entry (RJE)
7ECHO
18Message Send Protocol (MSP)
20FTP -- Data
21FTP -- Control
22SSH Remote Login Protocol
23Telnet
25Simple Mail Transfer Protocol (SMTP)
29MSG ICP
37Time
42Host Name Server (Nameserv)
43WhoIs
49Login Host Protocol (Login)
53Domain Name System (DNS)
69Trivial File Transfer Protocol (TFTP)
70Gopher Services
79Finger
80HTTP
103X.400 Standard
108SNA Gateway Access Server
109POP2
110POP3
115Simple File Transfer Protocol (SFTP)
118SQL Services
119Newsgroup (NNTP)
137NetBIOS Name Service
139NetBIOS Datagram Service
143Interim Mail Access Protocol (IMAP)
150NetBIOS Session Service
156SQL Server
161SNMP
179Border Gateway Protocol (BGP)
190Gateway Access Control Protocol (GACP)
194Internet Relay Chat (IRC)
197Directory Location Service (DLS)
389Lightweight Directory Access Protocol (LDAP)
396Novell Netware over IP
443HTTPS
444Simple Network Paging Protocol (SNPP)
445Microsoft-DS
458Apple QuickTime
546DHCP Client
547DHCP Server
563SNEWS
569MSN
1080Socks
CCNA
Cisco Certified Network Associate

OSI Layer


1.       Application Layer
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for transfers-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Eg: WWW Browser, FTP, HTTP, Telnet, Nfs, Snmp

2.       Presentation layer
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Eg:  encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.

3.       Session Layer
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Eg: NFS, NetBios names, RPC, SQL.

4.       Transport Layer
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Eg:  SPX, TCP, UDP.

5.       Network Layer
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Eg: AppleTalk DDP, IP, IPX.

6.       Data link layer
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Eg:  PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay. 

7.       Physical layer
This layer conveys the bit stream - electrical impulse, light or radio signal  through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

Eg: Ethernet, FDDI, B8ZS, V.35, V.24, RJ45


Repair Outlook Data Files (.pst and .ost) for Outlook 2010

1.       Open Windows Explorer and select the drive:\Program Files\Microsoft Office\OFFICE14 folder.
2.       Double-click Scanpst.exe.
3.       In the Enter the name of the file you want to scan box, enter the name of the .pst or .ost file that you want to check, or click Browse to select the file.
4.       To specify the scan log options, click Options, and then click the option that you want.
5.       Click Start.

If errors are found, you are prompted to start the repair process to fix the errors.
A backup file is created during the repair process. To change the default name or location of this backup file, in the Enter name of backup file box, enter a new name, or click Browse to select the file that you want to use.

6.       Click Repair.

Start Outlook with the profile that contains the .pst file that you tried to repair.

How to save Outlook messages in PDF format



If you already have PDF printer /Adobe Acrobat software, skip to step 3.
Download and install PDF printer / Adobe Acrobat.
Select the Outlook messages you would like to have converted to PDF.
Click the Message Save Outlook toolbar button. Check the "Print" option.
Click "Save Now"
The messages will be converted to PDF according to your PDF printer settings.


Creating Rules to Manage Your Email

Click File -> Info , and then the Manage Rules & Alerts button.

Click New Rule... on the Email Rules tab. The Rules Wizard dialog will pop up

Rules & Alerts :  Select a template, choose the template that most closely resembles the action you would like to take. Ensure you select a template from the Stay Organized or Stay Up to Date sections

Rules Wizard: Edit the rule description, click on the underlined text in order to specify the details of your rule (e.g. move messages from Office Watch mailing list into the Newsletters folder). Check carefully to make sure that the details are correct and complete. Click Next

Select any additional criteria you would like to set , Select condition(s) by clicking on the underlined words and adding in your criteria.

Specify the details for those criteria in the Edit the rule description box (optional)

Type a name for the rule in the box for  Specify a name for this rule

Tick the box next to Run this rule now... if you want to apply the rule to messages already received

 When you are certain of the details of the rule and want to commit to it, click Finish

Your rule will now appear listed, with a description of the settings, in the Rules and Alerts dialog box

Password on pst-file


To set a password on your pst-file, you must bring up the Properties dialog of the pst-file in Outlook.
 Outlook 2003 and Outlook 2007
          File-> Data File Management…-> double click on your data file-> button: Change Password…
 Outlook 2010 and Outlook 2013
          File-> Account Settings-> Account Settings…-> tab Data Files-> double click on your data file-> button: Change Password…
Leave the “Old password” field empty when no password has been set yet.

CCNA
Cisco Certified Network Associate 


Introduction to Networking and Network Basics :

It is important to understand what a network is and the importance of networks themselves. Every host has a Network Interface Card (NIC) that is used to connect it to a network.
A hub is a network device that repeats information received from a host to all other connects hosts. The hub will relay any information received from Host A to Host B and Host C. This means that all the three hosts can communicate with each other. Communication between hosts can be classified into three types:

Unicast – Communication from one host to another host only.
Broadcast – Communication from one host to all the hosts in the network.
Multicast – Communication from one host to few hosts only.

When a hub is used to network hosts, there are two problems that arise:
A hub repeats information received from one host to all the other hosts. To understand this, consider Host A sending a unicast message to Host B. When the hub receives this message; it will relay the message to both Host B and Host C. Even though the message was a unicast intended only for Host B, Host C also receives it. It is up to Host C to read the message and discard it after seeing that the message was not intended for it.

A hub creates a shared network medium where only a single host can send packets at a time. If another host attempts to send packets at the same time, a collision will occur. Then each device will need to resend their packets and hope not to have a collision again. This shared network medium is called a single collision domain. Imagine the impact of having a single collision domain where 50 or 100 hosts are connected to hubs that are interconnected and they are all trying to send data. That is just a recipe for many collisions and an inefficient network.

The problems associated with hubs can cause severe degradation of a network. To overcome these, switches are used instead of hubs. Like hubs, switches are used to connect hosts in a network but switches break up collision domain by providing a single collision domain for every port. This means that every host (one host connects to one port on the switch) gets its own collision domain thereby eliminating the collisions in the network. With switches, each host can transmit data anytime. Switches simply “switch” the data from one port to another in the switched network. Also, unlike hubs, switches do not flood every packet out all ports. They switch a unicast packet to the port where the destination host resides.



Now that you know how a switch works and improves a network, consider the one problem associated with a switched network. Earlier, you learned that hubs flood out all packets, even the unicast ones. A switch does not flood out unicast packets but it does flood out a broadcast packet. All hosts connected to a switched network are said to be in the same broadcast domain. All hosts connected to it will receive any broadcast sent out in this domain. While broadcasts are useful and essential for network operations, in a large switched network too many broadcasts will slow down the network. To remedy this situation, networks are broken into smaller sizes and these separate networks are interconnected using routers. Routers do not allow broadcasts to be transmitted across different networks it interconnects and hence effectively breaks up a broadcast domain.


Mac Address - 12 digit unique value.
IP Address use to find the particular host in the network, it can be considered as 2 values, bit Network bit and Host bit.

IP Address rule for same network:
-              Network bit need to be same
-             Host bit need to be different.




Translate