Users and network administrators often have different views of their networks. Often, users share printers and some servers form a workgroup, which usually means they are in the same geographic location and are on the same LAN. A community of interest has less of a connotation of being in a local area, and should be thought of as a set of arbitrarily located users who share a set of servers, and possibly also communicate via peer-to-peer technologies.
Network administrators see networks from both physical and logical perspectives. The physical perspective involves geographic locations, physical cabling, and the network elements (e.g., routers, bridges and application layer gateways that interconnect the physical media. Logical networks, called, in the TCP/IP architecture, subnets, map onto one or more physical media. For example, a common practice in a campus of buildings is to make a set of LAN cables in each building appear to be a common subnet, using virtual LAN (VLAN) technology.
Both users and administrators will be aware, to varying extents, of the trust and scope characteristics of a network. Again using TCP/IP architectural terminology, an intranet is a community of interest under private administration usually by an enterprise, and is only accessible by authorized users (e.g. employees).[5] Intranets do not have to be connected to the Internet, but generally have a limited connection. An extranet is an extension of an intranet that allows secure communications to users outside of the intranet (e.g. business partners, customers).[5]
Informally, the Internet is the set of users, enterprises,and content providers that are interconnected by Internet Service Providers (ISP). From an engineering standpoint, the Internet is the set of subnets, and aggregates of subnets, which share the registered IP address space and exchange information about the reachability of those IP addresses using the Border Gateway Protocol. Typically, the human-readable names of servers are translated to IP addresses, transparently to users, via the directory function of the Domain Name System (DNS).
Over the Internet, there can be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer (C2C) communications. Especially when money or sensitive information is exchanged, the communications are apt to be secured by some form of communications security mechanism. Intranets and extranets can be securely superimposed onto the Internet, without any access by general Internet users, using secure Virtual Private Network (VPN) technology.
When used for gaming one computer will have to be the server while the others play through it.
Thursday, April 30, 2009

Computer networking is the engineering discipline concerned with communication between computer systems or devices. Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs.[1] Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology and/or computer engineering. Computer networks rely heavily upon the theoretical and practical application of these scientific and engineering disciplines.
A computer network is any set of computers or devices connected to each other with the ability to exchange data.[2] Examples of different networks are:
Local area network (LAN), which is usually a small network constrained to a small geographic area.
Wide area network (WAN) that is usually a larger network that covers a large geographic area.
Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.
All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[3] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[4]).
A computer network is any set of computers or devices connected to each other with the ability to exchange data.[2] Examples of different networks are:
Local area network (LAN), which is usually a small network constrained to a small geographic area.
Wide area network (WAN) that is usually a larger network that covers a large geographic area.
Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.
All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[3] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[4]).
Wednesday, April 29, 2009
Monday, April 27, 2009
ANTI-VIRUS REMOVER
One reason you may want to remove Norton AntiVirus is because the program may have come preinstalled in your computer. It usually comes in the form of a trial version that encourages you to sign up for the full-featured version. If you’re not really impressed with what Norton has to offer, you may want to uninstall it. Also, you may want to install a `better’ anti-virus program. The new program may require you to uninstall Norton AntiVirus first before you could proceed with its installation. Another aspect you would want to consider is there are some viruses created to attack Norton and disable it, so that these viruses can freely attack your system and wreak havoc on it.
Read the rest
One reason you may want to remove Norton AntiVirus is because the program may have come preinstalled in your computer. It usually comes in the form of a trial version that encourages you to sign up for the full-featured version. If you’re not really impressed with what Norton has to offer, you may want to uninstall it. Also, you may want to install a `better’ anti-virus program. The new program may require you to uninstall Norton AntiVirus first before you could proceed with its installation. Another aspect you would want to consider is there are some viruses created to attack Norton and disable it, so that these viruses can freely attack your system and wreak havoc on it.
If you’ve been using Norton AntiVirus for quite a while and regularly updating it, you would have noticed that it has the tendency to slow down your system. It could also be that Norton wrongly cuts off Internet access to protect your system.
In such cases uninstalling Norton AntiVirus and replacing it with a freeware antivirus program like AVG is a wise option. Let’s look at how we can go about uninstalling Norton AntiVirus
Read the rest
One reason you may want to remove Norton AntiVirus is because the program may have come preinstalled in your computer. It usually comes in the form of a trial version that encourages you to sign up for the full-featured version. If you’re not really impressed with what Norton has to offer, you may want to uninstall it. Also, you may want to install a `better’ anti-virus program. The new program may require you to uninstall Norton AntiVirus first before you could proceed with its installation. Another aspect you would want to consider is there are some viruses created to attack Norton and disable it, so that these viruses can freely attack your system and wreak havoc on it.
If you’ve been using Norton AntiVirus for quite a while and regularly updating it, you would have noticed that it has the tendency to slow down your system. It could also be that Norton wrongly cuts off Internet access to protect your system.
In such cases uninstalling Norton AntiVirus and replacing it with a freeware antivirus program like AVG is a wise option. Let’s look at how we can go about uninstalling Norton AntiVirus
COMPUTER HARDWARE
[edit] Relationship to computer hardware
Computer software is so called to distinguish it from computer hardware, which encompasses the physical interconnections and devices required to store and execute (or run) the software. At the lowest level, software consists of a machine language specific to an individual processor. A machine language consists of groups of binary values signifying processor instructions which change the state of the computer from its preceding state. Software is an ordered sequence of instructions for changing the state of the computer hardware in a particular sequence. It is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are compiled or interpreted into machine language object code. Software may also be written in an assembly language, essentially, a mnemonic representation of a machine language using a natural language alphabet. Assembly language must be assembled into object code via an assembler.
The term "software" was first used in this sense by John W. Tukey in 1958.[4] In computer science and software engineering, computer software is all computer programs. The theory that is the basis for most modern software was first proposed by Alan Turing in his 1935 essay Computable numbers with an application to the Entscheidungsproblem
Practical computer systems divide software systems into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.
[edit] System software
System software helps run the computer hardware and computer system. It includes:
device drivers,
operating systems,
servers,
utilities,
windowing systems,
(these things need not be distinct)
The purpose of systems software is to unburden the applications programmer from the details of the particular computer complex being used, including such accessory devices as communications, printers, readers, displays, keyboards, etc. And also to partition the computer's resources such as memory and processor time in a safe and stable manner.
[edit] Programming software
Programming software usually provides tools to assist a programmer in writing computer programs, and software using different programming languages in a more convenient way. The tools include:
compilers,
debuggers,
interpreters,
linkers,
text editors,
An Integrated development environment (IDE) is a single application that attempts to manage all these functions.
Computer software is so called to distinguish it from computer hardware, which encompasses the physical interconnections and devices required to store and execute (or run) the software. At the lowest level, software consists of a machine language specific to an individual processor. A machine language consists of groups of binary values signifying processor instructions which change the state of the computer from its preceding state. Software is an ordered sequence of instructions for changing the state of the computer hardware in a particular sequence. It is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are compiled or interpreted into machine language object code. Software may also be written in an assembly language, essentially, a mnemonic representation of a machine language using a natural language alphabet. Assembly language must be assembled into object code via an assembler.
The term "software" was first used in this sense by John W. Tukey in 1958.[4] In computer science and software engineering, computer software is all computer programs. The theory that is the basis for most modern software was first proposed by Alan Turing in his 1935 essay Computable numbers with an application to the Entscheidungsproblem
Practical computer systems divide software systems into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.
[edit] System software
System software helps run the computer hardware and computer system. It includes:
device drivers,
operating systems,
servers,
utilities,
windowing systems,
(these things need not be distinct)
The purpose of systems software is to unburden the applications programmer from the details of the particular computer complex being used, including such accessory devices as communications, printers, readers, displays, keyboards, etc. And also to partition the computer's resources such as memory and processor time in a safe and stable manner.
[edit] Programming software
Programming software usually provides tools to assist a programmer in writing computer programs, and software using different programming languages in a more convenient way. The tools include:
compilers,
debuggers,
interpreters,
linkers,
text editors,
An Integrated development environment (IDE) is a single application that attempts to manage all these functions.
COMPUTER SOFTWARE
Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.[1]
The term includes:
Application software such as word processors which perform productive tasks for users.
Firmware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.
Middleware which controls and co-ordinates distributed systems.
System software such as operating systems, which interface with hardware to provide the necessary services for application software.
Software testing is a domain independent of development and programming. It consists of various methods to test and declare a software product fit before it can be launched for use by either an individual or a group. Many tests on functionality, performance and appearance are conducted by modern testers with various tools such as QTP, Load runner, Black box testing etc to edit a checklist of requirements against the developed code. ISTQB is a certification that is in demand for engineers who want to pursue a career in testing.[2]
Testware which is an umbrella term or container term for all utilities and application software that serve in combination for testing a software package but not necessarily may optionally contribute to operational purposes. As such, testware is not a standing configuration but merely a working environment for application software or subsets thereof.
Software includes websites, programs, video games, etc. that are coded by programming languages like C, C++, etc.
"Software" is sometimes used in a broader context to mean anything which is not hardware but which is used with hardware, such as film, tapes and records.[3]
Contents[hide]
1 Overview
1.1 Relationship to computer hardware
2 Types of software
2.1 System software
2.2 Programming software
2.3 Application software
3 Software topics
3.1 Architecture
3.2 Documentation
3.3 Library
3.4 Standard
3.5 Execution
3.6 Quality and reliability
3.7 License
3.8 Patents
3.9 Ethics and rights
4 Design and implementation
5 Industry and organizations
6 See also
7 References
overview
Computer software is often regarded as anything but hardware, meaning that the "hard" are the parts that are tangible while the "soft" part is the intangible objects inside the computer. Software encompasses an extremely wide array of products and technologies developed using different techniques like programming languages, scripting languages or even microcode or a FPGA state. The types of software include web pages developed by technologies like HTML, PHP, Perl, JSP, ASP.NET, XML, and desktop applications like Microsoft Word, OpenOffice developed by technologies like C, C++, Java, C#, etc. Software usually runs on an underlying software operating systems such as the Microsoft Windows or Linux. Software also includes video games and the logic systems of modern consumer devices such as automobiles, televisions, toasters, etc.
The term includes:
Application software such as word processors which perform productive tasks for users.
Firmware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.
Middleware which controls and co-ordinates distributed systems.
System software such as operating systems, which interface with hardware to provide the necessary services for application software.
Software testing is a domain independent of development and programming. It consists of various methods to test and declare a software product fit before it can be launched for use by either an individual or a group. Many tests on functionality, performance and appearance are conducted by modern testers with various tools such as QTP, Load runner, Black box testing etc to edit a checklist of requirements against the developed code. ISTQB is a certification that is in demand for engineers who want to pursue a career in testing.[2]
Testware which is an umbrella term or container term for all utilities and application software that serve in combination for testing a software package but not necessarily may optionally contribute to operational purposes. As such, testware is not a standing configuration but merely a working environment for application software or subsets thereof.
Software includes websites, programs, video games, etc. that are coded by programming languages like C, C++, etc.
"Software" is sometimes used in a broader context to mean anything which is not hardware but which is used with hardware, such as film, tapes and records.[3]
Contents[hide]
1 Overview
1.1 Relationship to computer hardware
2 Types of software
2.1 System software
2.2 Programming software
2.3 Application software
3 Software topics
3.1 Architecture
3.2 Documentation
3.3 Library
3.4 Standard
3.5 Execution
3.6 Quality and reliability
3.7 License
3.8 Patents
3.9 Ethics and rights
4 Design and implementation
5 Industry and organizations
6 See also
7 References
overview
Computer software is often regarded as anything but hardware, meaning that the "hard" are the parts that are tangible while the "soft" part is the intangible objects inside the computer. Software encompasses an extremely wide array of products and technologies developed using different techniques like programming languages, scripting languages or even microcode or a FPGA state. The types of software include web pages developed by technologies like HTML, PHP, Perl, JSP, ASP.NET, XML, and desktop applications like Microsoft Word, OpenOffice developed by technologies like C, C++, Java, C#, etc. Software usually runs on an underlying software operating systems such as the Microsoft Windows or Linux. Software also includes video games and the logic systems of modern consumer devices such as automobiles, televisions, toasters, etc.
Saturday, April 25, 2009
Find simple ways to extend the life of your computer hardware and accessories. The key to making the most of computer hardware isn't just knowing where to purchase the cheapest replacement parts--it's in knowing how to make the computer components you already have last as long as possible. The most common problems facing the standard business computer user are shortened laptop battery life, hard drive failure or slowdown, and mysterious computer issues and component failure due to ... Read more

TIPS & TRICKS
12 Ways To Secure Your Servers
Servers store your most important business data, deliver your e-mail, and run your Web site, but keeping them from harm's way is a full time job. The 12 tips and tricks in this how-to guide will help keep your data secure.
12 Ways To Secure Your Servers
Servers store your most important business data, deliver your e-mail, and run your Web site, but keeping them from harm's way is a full time job. The 12 tips and tricks in this how-to guide will help keep your data secure.

The question is not whether an unsecured server placed on the Internet will be infected, but rather how many minutes (not hours) it will take. That's why it's important to configure your server off-line and load initial patches through a CD. The goal is to make your server as secure as possible before putting it online.
2. Control access
Administrator login privileges have access and control to your entire system; only a few, ultra-trustworthy individuals should have administrator privileges and only they should know the password.
3. Keep it simple
Though it's possible to combine multiple functions on a Web server (such as database and e-mail server functions), it is not a good idea if that server is exposed to the Internet. A single server running multiple applications is a rich target for hackers and has more potential for software incompatibilities. It's considered best practice to devote one function per server.
Once you've decided to dedicate a server to a single purpose, remove all software and services not directly related to that purpose -- simply disabling unused services through configuration settings may not stop hackers from using them. Among the things that you'll want to consider removing are unused network services, language compliers, and system development tools.
Also very important: make sure there's no instant messaging software on your server as it can be a gateway for intruders. And if your organization has an internal, private Web site on its intranet, it is best not to host that on the same server as the public Web site.
1 2 3 NEXT PAGE
Thursday, April 23, 2009

INTRODUCING THE NEW DELLVOSTRO 1320, 1520 & 1720 LAPTOPS
The next generation of Vostro laptops can make the mobile experience come together for your small business at an amazing value - offering new solutions for increasing productivity, enhancing collaboration, and protecting your data like never before!
Updated with some of the latest technologies, the new Vostro laptops deliver increased performance and a spectacular visual experience. And they're now energy efficient, helping you to save money and protect the environment.
With the latest Vostro laptops you can:
GET MORE — More of the features and services you need and nothing you don’t – all at a great price.
SECURE MORE — Enhanced multi-level security options to protect your business critical data.
DO MORE — Vostro laptops simply make it easy and fast to achieve more no matter where you are.
Dell Vostro Desktops
Dell Vostro Laptops
Reliable desktop solutions designed for small business.
Stay productive and mobile with laptops designed for small business.
Choose Vostro Desktops
Choose Vostro Laptops

Manufacturer: HP
Configration:
CN Number: CN0010932Category: Computer Systems ►Desktop Computers
AMD Turion 64 X2 Dual-Core Mobile Technology TL-52 processor (1.6GHz) Genuine Windows Vista Home Premium Integrated system with computer, monitor, wir...<Read more>

Manufacturer: AOC
Configration:
CN Number: CN0012114
Category: Monitors & Accessories ►LCD Monitors
Get ready to be enchanted by an elegant design and thin profile that saves space and adds class to any room, whether it be at home or in the office. J...<Read more>

Embedded software shapes our world through cell phones, satellites, medical and home appliances, and automotive components—with defects causing life-threatening situations and delays creating huge costs. In this issue, we provide an overview of techniques and methods that impact embedded-software engineering. We also look at digital rights management, cloud computing costs, reliable distributed storage, and a Web-based question-answering system.
Editor’s note: Due to a printing error, the wrong cover captions were presented on Computer’s April issue. The correct captions are provided here: Biologically Inspired Computing, p. 95; Digital Wallet, p. 100; Requirements-Based Visualization Tools, p. 106. Computer regrets this error and offers sincere apologies for any inconvenience it may have caused our readers.
Features April 2009 PerspectivesHow Viable Is Digital Rights Management? Seong Oun Hwang Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.
March 2009 Computing PracticesPuzzling Problems in Computer Engineering Behrooz Parhami University faculty have designed an engaging puzzle-based freshman seminar intended to motivate and retain computer engineering students.
Editor’s note: Due to a printing error, the wrong cover captions were presented on Computer’s April issue. The correct captions are provided here: Biologically Inspired Computing, p. 95; Digital Wallet, p. 100; Requirements-Based Visualization Tools, p. 106. Computer regrets this error and offers sincere apologies for any inconvenience it may have caused our readers.
Features April 2009 PerspectivesHow Viable Is Digital Rights Management? Seong Oun Hwang Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.
March 2009 Computing PracticesPuzzling Problems in Computer Engineering Behrooz Parhami University faculty have designed an engaging puzzle-based freshman seminar intended to motivate and retain computer engineering students.
Subscribe to:
Posts (Atom)