Web or Blog

Wednesday, May 12, 2010

To Know about CCNA certification

The CCNA certification (Cisco Certified Network Associate) is a certification that indicates a foundation in and learner knowledge of networking. CCNA certified professionals can install, configure, and operate LAN, WAN, and dial access services for small networks the use of protocols such as IP, IGRP, serial, frame relay, IP RIP, VLANs, RIP, Ethernet, and access lists. There are no requirement that are required for a CCNA certification. There are two options available for CCNA certification: 640-801 CCNA or 640-821 INTRO combined with 640-811 ICND. The 640-801 single exam option is the most popular route for earning the CCNA certification; however, a two-exam option has been present by Cisco since 2003.

There are several free CCNA study guides available on the market. Most of these sites provide free tutorials and study notes. While some sites provide free practice exams for CCNA, others include a section on tips for studying articles and tips and suggestions on how to get the maximum out of the studying time. Also, people residing in the U.S. or Canada can also get a completely free subscription to many computer magazines that can help them further in preparing for these exams.

Generally, each course includes a pre-assessment, course map, and post-assessment module. The course covers topics such as sub-netting, layered communication models (OSI, TCP/IP & Cisco), IP addressing, and hex and binary. Some free study centers not only include free study guides for CCNA but also provide interactive networking tools such as a sub-netting calculator and real IP address catcher for better understanding of networking concepts.

These free study guides are proven to be a good stepping stone towards preparation for the CCNA exams; it should be the first step of CCNA hopeful towards the certification

How to Send the Large Video File through Email

The most common obstacle to sending large files to another person via email, be it video or other types of data files, is that most email providers restrict the size of individual messages.

Steps

1. Determine the largest file size allowed by your email provider. Don't forget to get the same information for the recipient's provider as well!
2. Determine the amount of storage available to your recipient. If their mailbox is limited to 10mb, for example, 20mb of attachments won't fit and will be "returned to sender". If the storage limit is too small, suggest creating an account from one of the several free providers that offer greater storage space.
3. Obtain a "file splitter" program, the best of which is HJSplit- completely free and very easy to use. HJSplit does not need to be installed to run, and versions are available for both PC and Mac platforms.
4. Using the file splitting program, break the large file into several smaller files. If either of the email providers involved have a limit for file sizes sent or received, the "parts" should be sized a bit smaller than the allowed limit.
5. Send the parts to the recipient as attachments to individual emails. Be sure to note in the message how many parts are to be expected. If the recipient does not have the file splitting program, send it as well (or a link to where it can be obtained).
6. Once the recipient has received all of the parts, they need only use the filesplit program to reassemble the parts into the original file.

Methods to increase wireless Security

Wireless Technolgy is the most emerging technology in present days, but you should aware of risk factors in Wireless Networks. Here are some procedures that you can use to help provide increased security on your wireless network. Each procedure can help to provide an increased layer of security and help to protect against a malicious user who may try to access your network by using wireless technology. You can be implement some of methods or all of them.

Method 1: Enable Wireless Security (WEP)
To enable wireless security (also known as Wired Equivalent Privacy, or WEP) for your MN-500 base station, follow these steps:
1. Open the Base Station Management Tool, and then click Security.
2. On the Security menu, click Wireless Security.
3. Click Enable wireless security.
4. In the Encryption strength drop-down list, click 128-bit or leave the default setting of 64-bit.
5. If you select 128-bit encryption, in the first Key box, type a wireless security (WEP) key.

If you select 64-bit encryption, you can type up to four WEP keys in the Key boxes.
6. If you selected 64-bit encryption, in the Key index drop-down list, click a key index.
The key index number indicates the WEP key that will be activated on the network. (There are four WEP keys.)
7. To save the wireless encryption, click Apply.
8. Update the WEP keys that are stored on each wireless device on your network.

Method 2: Media Access Control (MAC) Filter
When you deny unspecified clients permission to connect to the base station, only the clients who you specifically grant permission to in the MAC Address table can connect to the base station and use your network resources. This is a good option if you want to enforce the highest security level on your network because it helps to prevent unknown wireless clients from being able to join your network.

However, you must make sure to not prevent your own computer from connecting to the base station. If you deny unspecified MAC addresses from connecting, make sure that you type the MAC address of each of your network adapters in the MAC Address table, and then click to select the Allow connection check box.

If you do block your own access to the base station, you must restore the factory default settings by using the Reset button on the physical device, and then reconfigure the base station.

To deny unspecified clients connection permission, follow these steps:
1. Open the Base Station Management Tool, and then click Security.
2. On the Security menu, click MAC Filtering.
3. Click to select the Enable connection control check box.
4. If you do not want unspecified clients to connect to the base station, in the drop-down list, click Deny.

In this scenario, any client whose MAC address is not listed in the MAC Address table and granted permission to connect will not be able to connect to the base station or access the Internet.
5. If you clicked Deny in step 4, in the MAC Address table, specify the MAC address of any clients who you want to be able to connect to the base station, and then click to select the Allow Connection check box.
6. To save your changes, click Apply.

To allow specified clients connection permission, follow these steps:
1. Open the Base Station Management Tool, and then click Security.
2. On the Security menu, click MAC Filtering.
3. In the MAC Address table, specify the MAC address of the client who you want to grant connection permission to, and then click to select the Allow Connection check box.
4. Repeat this step for any additional clients for whom you want to grant connection permission. 5. Make sure that you include the MAC address of your adapter in the MAC address table so that you can access the network.
6. To save your changes, click Apply.

Note Only grant connection permission to specific clients if you have enabled connection control and denied connection permission to all unspecified clients. If you have not denied connection permission to unspecified clients, any client that has the correct wireless security (WEP) information or wired connection can connect to the base station and access network resources.

Method 3: Limit Domain Host Connection Protocol (DHCP) Clients to the Actual Number of Clients
You can limit the number of DHCP addresses that your base station uses to the number of actual computers on your network. If all available DHCP addresses are being used by the computers on your network, no DHCP addresses are available to an unwanted user. To limit the Internet Protocol (IP) addresses that are available to the DHCP server, follow these steps:
1. Open the Base Station Management Tool, and then click Local Area Network.
2. Click to select the Enabled check box (if it is not already selected) to enable the DHCP server on the base station.
3. Type a starting IP address and an ending IP address for the pool. Do not include the base station IP address in the IP address pool.

For example, if you are using the default base station IP address (192.168.2.1), and you have five computers on your network, type an address range of 192.168.2.2 through 192.168.2.6.
4. Select a lease time for the assigned IP addresses.
The default time is two hours.
5. Type a local domain name, if your Internet service provider (ISP) provided one for you.
6. To save the new IP address range, click Apply.

Method 4: Change the Wireless Channel
To set wireless channel for base station, follow these steps:
1. Open the Base Station Management Tool, and then click Wireless.
2. Click to select the Enable wireless access check box if it is not already selected.
3. Click to the channel number that you want in the Wireless channel number drop-down list.
4. To save the new wireless channel setting, click Apply.

Prevent Wireles hijacks

attendants may soon be outfitted with wireless devices that would be used to alert pilots of attempted hijackings or other in-air security threats. The Federal Aviation Administration plans to require that airlines provide a way for the cabin crew to “discreetly notify’’ pilots “in the event of suspicious activity or security breaches in the cabin.’’ The proposed regulation, which is not yet final, grew out of an advisory panel that the Transportation Department created after the September 11, 2001 terrorist attacks. The panel had recommended that cabin crews have “a method for immediate notification to the flight deck during a suspected threat in the cabin’’ that would permit pilots to take appropriate action, such as beginning an immediate landing.

In some airlines have offered flight attendants that kind of alert system “for quite some time’’.
The FAA’s proposal does not mandate wireless devices—which Congress recommended in the law creating the Department of Homeland Security but did not require. Instead, the proposal merely says that passenger flights must have an “approved means’’ by which flight crews could signal such an alert.

Other systems that the agency mentioned as possible alternatives to wireless devices include setting up an alarm procedure using an existing communications system, such as “subtly keying the (intercom) in a specific manner’’.

A Website To Send the Larger Files

Do you want to send larger files to your friends. Here is a Good website allow you to send file upto 2Gb in size. So its really help to people those are have less space in mailbox.

Recently, Yousendit added optional password protection for files that you send. Already, it has proven to be one of thier most valuable and popular features. Today, this website are offering a free upgrade to their Business Plus service so that you can get an added level of security and better manage the files you send with password protection.

Business Plus is the most convenient and efficient service, In addition to password protection Business Plus gives you the ability to:

1.You can Send multiple files at once and files as large as 2 GB
2.Track downloads and Customize your file deliveries with your brand
3.The files you send are available for 14 days and are automatically backed up.
4.The people who receive your files see no 3rd party advertisements.

This offer is free and With the Business Plus account you not only get a dropbox with a URL that makes it easy for everyone to send you files, you also get to create your own design for the upload and download site so everyone recognizes your personal or business site.

TIPS TO BACKUP THROUGH BLUETOOTH

Here is some easy tips to take the backup of your mobile through Bluetooth, Even though all depends on your mobile model.

1.Install your bluetooth hardware and its drivers. Download the latest versions if necessary and Install the software provided by the mobile phone manufacturer. If you dont have a CD, you can download it fairly easily from the internet. Make sure you know the make and model number of your mobile phone to make your job easier. Switch on Bluetooth on your mobile phone and make sure that it can be seen by other devices.

2.If you are using Windows XP, click on your start menu, go to control panel, then bluetooth devices.Click on Add device and after it finishes the search, select your mobile phone.It might ask you for something called a passcode. Here, you can select any one of the options in the list. I usually prefer proceeding without a passcode. If you have selected to use a passcode, enter the same code on your mobile when asked.

3.Once this is finished, you have succesfully paired your computer and phone. Now run the mobile phone software you installed. Depending on the software, you will see options to either backup or sync your phone.