Sunday, December 28, 2008

3 Types Of Cheap Ink Cartridges

Your printer ink cartridges play as big a part in the final quality of your print as the paper that you use. If you use cheap paper, your print quality will suffer and in many cases the same is true of using cheap ink cartridges. This isn't always the case, however. Discount ink can be bought in a few different ways and each of them has advantages and disadvantages.

Refill Ink

The first option for cheap ink is to refill your empty cartridges. This is generally the cheapest of all the alternatives, but it is also tends to wind up with the lowest quality prints.

It'll depend on what brand and model of printer you have, but many of the newer printers are difficult to refill. It can also be quite messy because you're dealing with bottled ink, trying to inject it back into the empty cartridge.

Recycled Cartridges

There are plenty of companies that recycle cartridges for you. They basically take the empty cartridges, clean them up, refill the ink and test them.

This is more expensive than refilling your own because you're paying for the labor involved, but it tends to give you better results.

These companies have refilling and cleaning equipment that can do a much better job of remanufacturing your empty cartridge. They also generally offer a guarantee on their work, so if the cartridge doesn't work properly you can either get a replacement or get your money back.

Generic Brand Cartridges

Generic cartridges are not as common as the other two options, mainly because many printer companies have patents on their ink cartridges so no other companies can duplicate them.

There are some cartridges that you can find brand new generic replacement ink for. These generic cartridge are not recycled, they are new but they aren't made by the printer companies themselves.

These cartridges tend to be the highest priced of the three options, but they are still cheaper than the original cartridges, and work just as well.

Which option will be best for you is going to depend a lot on how much printing you do, and what you're printing. If you're printing photos that you want to be able to keep for a lifetime, you'll have different needs than if you're just printing copies of web pages for future reference.

3 Things You Should Do To Avoid Becoming Technically Challenged

Technology is moving ahead at a break neck pace. Technology is revolutionizing the way we work, live and play. These days you can barely choose a TV without some technical knowledge. So, how can you keep it all straight and stay in the 21st century? Just remember these 3 steps.

Call technology by its name. Every person, place or thing has a name. Technology is no different. TVs are referred to as LCD or Plasma. Broadband has two implementations known as DSL or cable modem. VOIP means voice over IP. Just pick up a sales paper and read the ads to learn the jargon. Some retailers have online tutorials to bring you up to speed.

Learn what devices and gadgets are used for. What does a wireless router do? What are some related devices and accessories? A wireless router manages Internet access, network administration and security, and wireless connectivity for multiple computers. Normally, a user needs a wireless adapter if he has a wireless router. The wireless adapter allows a desktop to communicate with the wireless router. Understanding what devices do and their relation to other devices is important.

Know what device you need when you adopt technology. Suppose you are ready to build a wireless home network. You have signed up for High Speed Internet from the ISP of your choice. And you want to connect both your desktop and laptop to the Internet. What might you need to accomplish this? You guessed it. You are going to need at minimum a wireless router and wireless adapter. Now you just have to select the brand.

Now you are ready to get out there and learn more about technology. You have the tools you need to get you started. Next time you hear about latest device or gadget, remember these 3 steps. Welcome to the 21st century.

3 Things You Need To Know About Voip

You have seen the ads about VOIP and you want in on it if it is what it promises to be. But, before you do so, you realize you need to know a little bit more about it. VOIP is fast becoming the talk of the world, literally! People are seeing the benefits of it in their bank accounts as well as in their service experiences. VOIP, or Voice Over Internet Protocol, is a way of communicating via the internet instead of using standard land phone lines.

What You Have To Know

* Not sure how it works? Just as your internet connection can stay on, so can a phone system that is hooked up to it. The phone runs through the web, allowing for you to talk to anyone, anywhere without the need of expensive phone service. A great way to learn more about VOIP is to take a free demo of how it works. You’ll find these throughout the web.

* How does it save money? Another common question people have is how VOIP can save you money. If you are one that spends a lot of money each month on long distance phone calls, call waiting and forwarding services… and all other gadgets available for your standard phone, VOIP can save you money. It can do this because when you call through the internet, distance simply does not matter. Does it cost you anything to email your friend in China? No! And, neither does it cost to use VOIP long distance.

* What do you have to do to get it? First, you’ll need to insure that you have the service available in your area. Next, you’ll need to do some research to find out what the businesses can offer you in terms of service and cost. Then, you’ll need to install software and simple equipment and that’s that. You’ll likely pay a monthly payment as you do now, but it is likely to be much lower.

VOIP is fast growing because it is easy to use, affordable and quite possibly is the way of making phone calls in the years to come.

3 Reasons Why Zune Could Beat The Ipod

There is a lot of hype around the release of the Zune player. Microsoft claims that their portable media device is a real iPod killer. But the reality may not be that easy. There are 3 reasons though that makes us believe that the Zune can succeed. Two of them are already announced but the third one is more on our wish list for now.

Wi-fi connectivity
With the introduction of the zune in November, Microsoft brings the portable media players on new grounds. The Wi-fi feature will enable users to socialize within their music universe. The social web as took all the attention on the internet in the last year or so. With the Zune, a part of that trend becomes “portable”. Exchanging a song or a video may look boring but doing it with the Zune and at the speed of a Wi-fi network will be very attractive for young people. On a negative note, the drm feature (Digital Rights Management) could eventually generate frustration among Zune users.

Integrated Marketplace
The subscription base Zune Marketplace could be a real skyrocket feature. Being able to access an online database of new music without having to download it first to your computer will make the Zune a real and first “portable media device”. The other important aspect of the Zune Marketplace is the ability to download as many songs as you want for a flat fee. If we can access the Zune Marketplace thru a public wi-fi network it will be a real technology and music orgasm!

VoIp Phone
This feature as not been announced by Microsoft (yet!) but it would be like a cherry on a sundae to have it. Imagine if your Wi-fi portable device could connect thru internet to access a VoIp network. This feature should not be very difficult to develop because most of the required hardware is already there (besides the microphone). A VoIp phone would be a lot easier to release compared to a real mobile phone which requires a lot more integration work and approvals.

3 Rad Ways To Pimp Your Cell Phone

Nine times out of ten you're thinking of dunking your cellphone into the fire or mixing it in the blender because everyone else seems to be sporting a snazzy, sexy cell phone, while you are stuck with one that's snarky, ugly, obsolete and so unhip that it's started to look like a pig's behind. Chances are that you are planning to call it an antique and shove it down the throat of some wacko buyer on eBay.

Let's move on to the next step – your new cellphone. Now you need to pick up something and jazz it up so much, that you can show it off and make your buddies go green with envy. So, here are the latest ways using which, you can pimp up your cellphone:

1. Turn your cellphone into an ecosystem: In other words, convert your cellphone into an environmental-friendly product and check out the "oohs" and the "aahs" you get when you gently explain, to the opposite sex, how your cellphone actually protects the ozone layer. Don't buy cellphones that use non-biodegradable plastics; don't go near cellphones that coat their phones with flame retardant chemicals such as bromine-based flame retardants; conserve electricity by charging your phone as much as is required – better still, there's a new kind of phone that's made using bamboo and is powered by solar cells. Go for that. Our planet is getting hotter by the day; at least make your cellphone look cool!

2. Go for total convergence: First, get your cellphone hooked into a mobile radio service – there are many mobile services available and many, many more are on the way. Next, get a mobile TV service going – it's about 10 bucks a month, but that's nothing if you want to really pimp your buddy up. Now, get mobile VOIP (Voice over Internet Protocol) going – make calls to anyone in the world using your local connection! Bang, that's gonna get you some cool eyeballs! Now – here's the sucker punch – build all these features into a full screen phone! Mobile companies are coming out with full screen phones where everything is touch operated and the screen lights up when touched! Imagine a full screen phone with radio, TV and Mobile VOIP! Cool!

3. Make it burglar-proof: There are applications available in the market that make your cellphone scream out like Bruce Springsteen did while bellowing out "Born In The USA". Okay, the Bruce Springsteen bit was a joke, but, seriously, mobile applications are available that make your cellphone scream if it is stolen. Not just that, these applications lock in your private data, which can be recovered when you find the phone. Imagine what a technosavvy image you will project! Move over Neo, you two-bit son of an antique!

These are the top three ways you can pimp up your cellphone. Not only will your cellphone increase your social rank, it will also offer you protection from theft and provide you with entertainment when you need it the most – while at work or while studying. Plus, it will massage the ozone layer for you. Now what more can you wish for – Go for it, dude!

3 Mobile Launch Skypephone

3 Mobile have teamed up with Skype to offer free calls across the Internet using their new Skypephone. The Skype network has, within a very short space of time, become hugely popular for making free Internet calls through handsets that are attached to your PC and has built up a large customer base that recently prompted a buyout by eBay. If popular, this brave step by 3 could prompt an end of pay as you talk tariffs and push other mobile phone networks into action to try and offer similar competitive deals.

The new Skypephone from 3 has all the functionality you would expect from a modern day mobile phone including 3G, a 2-megapixel camera, mp3 player, mobile TV and internet plus the handset looks stylish and comes in either black or white with pink or blue trims. The Skypephone includes 16MB internal memory and comes with a 256MB micro SD memory card which is also expandable up to 1GB. The large Skype button in the center of the handset allows for quick and easy access to the Skype menu where you can simply make a free call or write a text message to people within your friends list.

The biggest challenge for the 3 Skypephone is encouraging people who are not already signed up with Skype, or whose friends are not members of Skype, to buy the phone. If this hurdle can be cleared then it could create a domino effect which would push all other mobile phone networks to provide a similar service and may make Skype a major player in the world of telecommunications. Once you are signed up to Skype you will not only be able to call people using the 3 Skypephone but also talk to friends connected to Skype through their PC.

3 Mobile offer the Skypephone on either pay as you go or monthly contract deals. The payg deal currently costs £49.99 for the Skypephone handset and requires you to top up your phone with at least £10 credit for standard voice calls and texts. The contract deals start from £12 per month with a minimum tie-in of 18 months.

The Skype deal from 3 is also available with other compatible mobile phones such as the Nokia N95 or the Sony Ericsson W910i which makes the offer a lot more flexible and doesn’t tie customers to a single handset. For none 3 Mobile customers Skype is also compatible with mobile phones that run the Windows Mobile operating system, plus it is possible to connect to Skype using Fring (a third party mobile VoIP application that enables free mobile internet calls and live chat to other fringsters and PC-based services including Skype, Google Talk, ICQ, MSN Messenger and Twitter) through a mobile phone with the Symbian operating system.

This fantastic offer could help encourage a reduction in prices of mobile phone calls and it is likely that other mobile phone networks will be keeping a close eye on how the collaboration develops. Flexibility is the key and by allowing customers to choose whether they make calls through Skype or through normal network services, the Skypephone should be a huge success.

3 High-Tech Features Of The Apple Iphone

What's the big deal behind the Apple iPhone? It's expensive. It's revolutionary. But are its features worth the money?

With all the popularity, you can assume everyone’s at least heard about it. What does the Apple iPhone feature and what can it do?

#1: Multi-Touch Technology

The most outstanding feature is the iPhone’s radical multi-touch screen. The MT screen allows any mechanical button to appear on this high tech toy. It simply allows you to use your fingers to operate it. This is contrary to any other phone today, which either have mechanical keyboards or a stylus.

By tapping the screen with your finger, you can navigate menus, dial phone numbers, write e-mail messages and likewise use the whole functionality of the popular gadget. The three-point-five-inch screen displays a keyboard for inputting text via multi-touch. Most consumers are seemingly skeptical about typing with the virtual keyboard, but Apple has predicted the common problems and has made sure the iPhone was constructed with features like automatic spell check and word prediction, not to mention an enhanced customizable dictionary. More so, the iPhone addresses the problems of typos commonly known to multi-touch usage by adding self-correction capabilities.

When scrolling, the usual wheel is not found at the side of the gadget. The multi-touch screen functionality allows its owner to scroll by dragging a finger in the desired direction. The speed of scrolling is designed to be proportional to the speed at which you drag your finger.

The multi-touch feature furthermore enables several more functions like multi-touch sensing for magnifying or reducing photos and even web pages. Using this feature, you can regulate object size simply by placing two fingers at the side of the object and then moving them, by dragging, either further apart or closer to one another. This feature does not distort images because images are initially scaled according to its original dimensions in the first place.

Hands down, the iPhone is more intelligent than any other phone today.

#2: Revolutionary Sensors

The gadget’s sensors have the ability to detect changes to the iPhone’s environment. The sensors are minuscule yet absurdly powerful. The three major sensors include an accelerometer, sensor for ambient light, and a proximity sensor.

The accelerometer sensor conveys the ability to detect any changes in the iPhones positioning. …The iPhone’s screen display will actually rotate to portrait or landscape, while still packing its contents into the 3.5-inch screen. Because it changes the view according to ratio, images are not distorted among web pages, videos, or photos.

The proximity sensors.

These high-tech features detect the location of the iPhone with regard to the skin. When you make a call and hold the iPhone up against your ear, the display will automatically set to standby. This is important in that it serves two basic functions.

One, by shutting off the display when not necessarily needed, this saves your battery’s life. More so, this avoids accidental touches to the screen, which would otherwise be sensitive. As soon as the cell is moved away from your face, the proximity sensors react in this way.

Ambient light sensor.

Through the AL sensor, changes in the phone’s environment are detected and instantaneously adjust the display’s brightness. Your iPhone’s display will always be well adjusted in regard to lighting.

#3: Mac OS X Operating System

The hype behind the Apple iPhone increased when Mac fans found out the Mac OS X would be included. The Mac OS X is the operating system inside the latest Apple computers. On the other hand, the electronic doesn’t have the complete functionality of the operating system. The entire OS X is too large to fit within the 4GB or 8GB internal memory. The iPhone contains a 500 MB version of the operating system.

3 Cool Cell Phone Tricks For You

Cell phones have become ubiquitous. It is now unusual to find anyone who does not have one of the little beasties. The obvious next step was to seek a means to ensure your cell phone is unique and different from all of the others out there. A variety of features exist in varying combinations and there are the usual tricks like customizing the picture on the screen or the ringtone. These are almost all more style than substance.

We’ve all experienced the ringtone that outstays its welcome and then just won’t go away or a ringtone that is just particularly inopportune for some reason. There are also stories of just the wrong cell phone wallpaper showing the bosses relative or some other potentially embarrassing sight. Some people actually use those phones for something other than status symbols. Here are a couple of tricks for those.

One potentially useful trick is the doggie whistle. For cell phones that allow multiple ring tones, using the inaudible dog whistle for one provides a handy method to discourage annoying dogs that might chase you as you jog, harass you as you walk or some other hassle.

Another useful trick is that of habitually locking the phone’s keys when you replace it into a pocket, purse or other container. The random presses of buttons that otherwise occur are a drain on battery power unless the phone has been told to ignore them with the lock command, and can potentially save money if the phone might accidentally hit the correct combination to make a call. Another useful feature to save battery power is airplane mode, for those times when you do not desire to answer the phone but do expect to need the phone's other features, such as a planner function or even clock.

Finally, cell phones are terribly convenient. Carrying around a phone book isn’t. Yet conventional directory assistance costs can add up. The alternative is 800-FREE411, or 800-373-3411. This is an ad supported directory assistance that can be used to find numbers you haven’t stored on your phone without running up those directory assistance charges.

3.03 Psp Downgrade

3.03 PSP Downgrade.

So you're looking a 3.03 PSP Downgrade? well this article may help you out.

First and foremost, you need an unpatched copy of Grand Theft Auto Liberty City Stories.

There is no other way that you can downgrade any PSP over 2.81 without it. Now for some reason people don't seem to appreciate this fact and will spend hours upon hours searching the Internet for other ways to downgrade with out the GTA. Let me save you time, there is no other way to downgrade any PSP above 2.81 with out the unpatched GTA.

In late 2005 a vulnerability was found in the way the PSP version of GTA: Liberty City Stories processes saved games. In December 2005 software was developed to execute unsigned code on PSPs with firmwares 2.00 through 2.60. In April 2006 firmware 2.70 was released and patched the exploit, however, as of January 25, 2007 it was discovered that Sony did not completely patch the exploit, and unsigned code may be run on 3.03 firmware, a 3.03 downgrader was released 3 days after the exploit was found. Also, new copies of GTA: Liberty City Stories patched the exploit as well, preventing it from being executed on other firmware versions. Since then homebrew has advanced to the point that a copy of GTA: Liberty City Stories is no longer needed to run unsigned code except on firmware versions 2.81 to 3.03. Sony has now blocked the GTA exploit for good with the release of the 3.10 firmware update and later subsequent firmware udates.

So how do I know if I have the right GTA for a 3.03 PSP downgrade? Well, it's quite simple really. Get your copy of GTA Liberty City Stories and put it in your UMD drive, now scroll to the game folder and you will see a "UMD update" option. Now, if this says "Update 2.00" then you have an unpatched version, if it says "Update 2.60" then you have the patched version which is no good for a 3.03 PSP downgrade.

Now all you have to do from here is find the 3.03 downgrader, there are a couple of versions around the Internet which you can download and these are relatively easy to follow . Just be sure you download the software from a reputable place as there are some scumbags around who have put fake downgraders up on the Internet so unsuspecting people can download them and brick their PSPs.

Also, make sure you to follow the steps exactly as they are described, this is very important. If you do one thing out of place, or if you put a file and the wrong place you could effectively brick your PSP, so it is vitally important that you follow instructions when you do at 3.03 PSP downgrade.

I hope this article helps you to successfully do a 3.03 PSP downgrade.

2 Approaches To Data Recovery After Formatting

The first thing you need to do after a system crash has forced you to reformat your hard drive is to test your PC to make sure whatever caused the crash is still not around to destabilize your system. Once you know your PC is stable, you can begin the process of data recovery after formatting.

Do-It-Yourself Data Recovery After Formatting

The easiest way to get proof of your system’s stability is to upload some non-critical files, so that if they become corrupted you will not have lost anything. Try opening and closing the files, and as long as you do not get a message saying they have been corrupted, you can be fairly certain that your system is functioning normally and storing ant retrieving your data properly. You can move now move on to the data recovery after formatting process.

During the data recovery after formatting process you’ll upload all your recovered data, and for some systems this can take a considerable amount of time. You’ll need to monitor the data recovery after formatting process in case your system flashes messages with question or pinpointing errors on specific files. You’ll need to make a record of every file mentioned in a message, and when the data recovery after formatting upload is complete, do individual checks on each of them. Often an error in one file can compromise the performance of an entire program.

When your data has been completely uploaded, you can go through the key files in each of your programs one at a time, and open them to see if all their data is intact. In some cases, you may have to delete and reinstall some of your software. For more indo see http://www.pcdatarecoveryhelp.com/Data_Recovery_After_Formatting/ on Data Recovery After Formatting.

Software For Data Recovery After Formatting

Another approach to data recovery after formatting is to purchase Windows data recovery software. The data recovery after formatting software can give you step-by step guidance in retrieving data lost sue to formatting, deletion, or partition damage as long as your hard drive has not been physically damaged.

Formatting your hard drive will change your data partitions, and data recovery after formatting software can retrieve data from the previous partitions or even from corrupted sectors. It is designed to support data recovery after formatting for both older file allocation table (FAT) and new technology file systems (NTFS). That covers all Windows operating systems as far back as Windows 98.

Data recovery after formatting can be both challenging and time-consuming. But being able to restore all you key files, either through your own efforts of with the help of user-friendly software, can save you a tremendous amount when compared to the fees of a data recovery specialist.

2 Approaches To Data Recovery After Formatting

The first thing you need to do after a system crash has forced you to reformat your hard drive is to test your PC to make sure whatever caused the crash is still not around to destabilize your system. Once you know your PC is stable, you can begin the process of data recovery after formatting.

Do-It-Yourself Data Recovery After Formatting

The easiest way to get proof of your system’s stability is to upload some non-critical files, so that if they become corrupted you will not have lost anything. Try opening and closing the files, and as long as you do not get a message saying they have been corrupted, you can be fairly certain that your system is functioning normally and storing ant retrieving your data properly. You can move now move on to the data recovery after formatting process.

During the data recovery after formatting process you’ll upload all your recovered data, and for some systems this can take a considerable amount of time. You’ll need to monitor the data recovery after formatting process in case your system flashes messages with question or pinpointing errors on specific files. You’ll need to make a record of every file mentioned in a message, and when the data recovery after formatting upload is complete, do individual checks on each of them. Often an error in one file can compromise the performance of an entire program.

When your data has been completely uploaded, you can go through the key files in each of your programs one at a time, and open them to see if all their data is intact. In some cases, you may have to delete and reinstall some of your software. For more indo see http://www.pcdatarecoveryhelp.com/Data_Recovery_After_Formatting/ on Data Recovery After Formatting.

Software For Data Recovery After Formatting

Another approach to data recovery after formatting is to purchase Windows data recovery software. The data recovery after formatting software can give you step-by step guidance in retrieving data lost sue to formatting, deletion, or partition damage as long as your hard drive has not been physically damaged.

Formatting your hard drive will change your data partitions, and data recovery after formatting software can retrieve data from the previous partitions or even from corrupted sectors. It is designed to support data recovery after formatting for both older file allocation table (FAT) and new technology file systems (NTFS). That covers all Windows operating systems as far back as Windows 98.

Data recovery after formatting can be both challenging and time-consuming. But being able to restore all you key files, either through your own efforts of with the help of user-friendly software, can save you a tremendous amount when compared to the fees of a data recovery specialist.

Wireless Networks: How Do They Work?

Wireless networks use radio waves instead of wires to transmit data between computers. Here's how:

The Binary Code: 1s and 0s

It's well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of beeps. These beeps are so fast that they're outside the hearing range of humans.

Morse Code: Dots And Dashes

It works like Morse code, which is a way to transmit the alphabet over radio waves using dots (short beeps) and dashes (long beeps). Morse code was used manually for years via telegraph to get information from 1 place to another very quickly. More importantly for this example, though, it is a binary system, just as a computer system is.

Wireless networking, then, can be thought of as a Morse code for computers. You plug in a combined radio receiver and transmitter, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from here to there.

Wavelengths And Frequencies

You might wonder how the computer can send and receive data at high speed without becoming garbled nonsense. The key to wireless networking is how it gets around this problem.

First, wireless transmissions are sent at very high frequencies, which allows more data to be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a frequency similar to mobile phones and microwave ovens. However, this high frequency produces a wavelength that is very short, which is why wireless networking is effective only over short distances.

Wireless networks also use a technique called "frequency hopping." They use dozens of frequencies, and constantly switch among them. This makes wireless networks more immune to interference from other radio signals than if they transmitted on a single frequency.

Internet Access Points

The final step for a wireless network is to provide internet access for every computer on the network. This is done by a special piece of wireless equipment called an access point. An access point is more expensive than a wireless card for 1 computer, because it contains radios capable of communicating with around 100 computers, sharing internet access among them. Dedicated access points are necessary only for larger networks. With only a few computers, it is possible to use 1 of them as the access point, or to use a wireless router.

Industry Standards

Wireless equipment from different manufacturers can work together to handle these complex communications because there are standards which guide the production of all wireless devices. These standards are technically called the 802.11. Because of industry compliance with these standards, wireless networking is both easy to use and affordable today.

Wireless Is Simple To Use

If all this talk of frequencies has you worried -- relax. Wireless networking hardware and software handle all of this automatically, without need for user intervention. Wireless networking, for all its complicated ability, is far simpler to use than you might expect.

Wireless Installation Checklist

Buyer Beware - Ignorance can be a financial waste and a lot of hassals. Before you buy any wireless equipment, you need to be sure about what you're doing. There's nothing worse than having everything there and finding that it doesn't work in your house, or with your computers, or over the distances you need. Here's a handy checklist of the things that you really ought to do before you go out and spend any of your hard-earned cash on wireless networking equipment.

Interference Checks

While it won't stop a wireless network from working altogether, interference in its frequency range can slow it down significantly, as well as reducing its range. If something is causing interference, the first thing you'll know about it is when your connection stops working -- unless you know what to look for.

There are two very common causes of wireless interference: wireless phones and microwave ovens. 2.4Ghz, the most common wireless networking frequency, is also a commonly-used wireless phone frequency. It is possible, though, to find phones that use other frequencies. Microwave ovens, on the other hand, operate at around 2.4Ghz by definition. It should be alright to have devices like these in your house, but certainly not in the same room as any computer that you plan to use a wireless connection with.

Wall Construction

Wireless can, in theory, pass through walls and other partitions easily. In practice, though, some walls are more solid than others, which means that they are more likely to block some of the signal. Note that it's only your interior partitions that matter, not the exterior ones. This does, however, include your floors, if you want the connection to work between levels.

Wireless does well with partitions made from: drywall, plywood, other wood (including doors), glass.

Wireless has trouble with: brick, plaster, cement, metal, stone, double-glazed glass.

Basically, it's all to do with how porous the materials are -- ones that let more of other things through also let more of your wireless signal through.

If you have a wall made of one of the 'bad' materials, it's not the end of the world. It just means that your wireless connection might have a slower speed or a shorter range. You may want to spend more than you otherwise would to get better equipment and overcome this problem.

Decide Your Budget.

You need to stand back, take a look at your needs, and decide how much you're going to spend. Do you have long distances to cover? Do you want your connection to go through stone walls? Each factor will help you decide how much you should be looking to spend -- remember that the more problems you have, the more power you will need. On the other hand, if you live in a small wooden house, you can probably just go for the cheapest thing you can find.

Read Reviews.

It's well worth searching a site like amazon.com for wireless equipment, and taking a look at people's reviews to see what the different brands out there are like, and what you can get for your money. It is always a very bad idea to buy something without getting a second, third and fourth opinion, especially if you're buying it online. If you can, try to get to a computer shop and see some wireless networking equipment in action before you commit yourself.

Install and Update Windows XP.

Finally, your wireless life will really be improved if you have the latest version of Windows. Because wireless is such a new technology, it wasn't really around in any significant way back when Windows 98, ME and 2000 were released, and support for them wasn't built in to the system. You'll have a lot more trouble getting wireless to work on systems like these than you would on Windows XP.

Even if you've got Windows XP, though, that doesn't solve the problem entirely. Windows XP Service Pack 2 (an updated version of Windows XP) contains much easier-to-use tools for configuring and using wireless than the un-updated versions do. If you've been using your copy of Windows for a while without updating it, you should really make sure you've got all the latest updates from http://windowsupdate.microsoft.com before you go any further.

Wireless Home Security Camera

Home security is an important issue for any person. A person’s home is their castle and they want to feel safe and secure. There are several security measures that can be implemented to ensure security such as alarms but one that ensures peace of mind is a wireless home security camera package.

What’s need in the package is a camera to fit either just outside the front or back door that transmits a wireless signal. The best one to buy would be one that has night vision to ensure you can see everything at night. The second would be a receiver. Some receivers have screens so you can watch what’s going on no matter where you are and others need to be connected to a computer or television to see the transmission.

If connected to a computer or television the live feed from the camera can be directly recorded to a hard drive or a cassette or DVD depending on which is convenient. Several cameras can be implemented to get several signals meaning more coverage of the home and the surrounding area.

These wireless home security packages are common and can be purchased at most electronics stores. They are on the expensive side but are worth the purchase for the kind of technology it has. With almost everything becoming wireless these days it was only a matter of time until cameras became wireless also.

Most people need some sort of security measure in place, not for protection, but for peace of mind that they are safe in their home. Although there are several other measures that can be implemented in terms of security, the wireless home security camera is a valuable tool for keeping an eye on things at all times. It will complement any other security measure you have in place and will not disappoint.

Windows Server 2003 Active Directory and Network Infrastructure

It is a hierarchical representation of all the objects and their attributes available on the network. It enables administrators to manage the network resources, i.e., computers, users, printers, shared folders, etc., in an easy way. The logical structure represented by Active Directory consists of forests, trees, domains, organizational units, and individual objects. This structure is completely independent from the physical structure of the network, and allows administrators to manage domains according to the organizational needs without bothering about the physical network structure.

Following is the description of all logical components of the Active Directory structure:


Forest: A forest is the outermost boundary of an Active Directory structure. It is a group of multiple domain trees that share a common schema but do not form a contiguous namespace. It is created when the first Active Directory-based computer is installed on a network. There is at least one forest on a network. The first domain in a forest is called a root domain. It controls the schema and domain naming for the entire forest. It can be separately removed from the forest. Administrators can create multiple forests and then create trust relationships between specific domains in those forests, depending upon the organizational needs.


Trees: A hierarchical structure of multiple domains organized in the Active Directory forest is referred to as a tree. It consists of a root domain and several child domains. The first domain created in a tree becomes the root domain. Any domain added to the root domain becomes its child, and the root domain becomes its parent. The parent-child hierarchy continues until the terminal node is reached. All domains in a tree share a common schema, which is defined at the forest level. Depending upon the organizational needs, multiple domain trees can be included in a forest.


Domains: A domain is the basic organizational structure of a Windows Server 2003 networking model. It logically organizes the resources on a network and defines a security boundary in Active Directory. The directory may contain more than one domain, and each domain follows its own security policy and trust relationships with other domains. Almost all the organizations having a large network use domain type of networking model to enhance network security and enable administrators to efficiently manage the entire network.


Objects: Active Directory stores all network resources in the form of objects in a hierarchical structure of containers and subcontainers, thereby making them easily accessible and manageable. Each object class consists of several attributes. Whenever a new object is created for a particular class, it automatically inherits all attributes from its member class. Although the Windows Server 2003 Active Directory defines its default set of objects, administrators can modify it according to the organizational needs.


Organizational Unit (OU): It is the least abstract component of the Windows Server 2003 Active Directory. It works as a container into which resources of a domain can be placed. Its logical structure is similar to an organization's functional structure. It allows creating administrative boundaries in a domain by delegating separate administrative tasks to the administrators on the domain. Administrators can create multiple Organizational Units in the network. They can also create nesting of OUs, which means that other OUs can be created within an OU.
In a large complex network, the Active Directory service provides a single point of management for the administrators by placing all the network resources at a single place. It allows administrators to effectively delegate administrative tasks as well as facilitate fast searching of network resources. It is easily scalable, i.e., administrators can add a large number of resources to it without having additional administrative burden. It is accomplished by partitioning the directory database, distributing it across other domains, and establishing trust relationships, thereby providing users with benefits of decentralization, and at the same time, maintaining the centralized administration.

The physical network infrastructure of Active Directory is far too simple as compared to its logical structure. The physical components are domain controllers and sites.


Domain Controller: A Windows 2003 server on which Active Directory services are installed and run is called a domain controller. A domain controller locally resolves queries for information about objects in its domain. A domain can have multiple domain controllers. Each domain controller in a domain follows the multimaster model by having a complete replica of the domain's directory partition. In this model, every domain controller holds a master copy of its directory partition. Administrators can use any of the domain controllers to modify the Active Directory database. The changes performed by the administrators are automatically replicated to other domain controllers in the domain.

However, there are some operations that do not follow the multimaster model. Active Directory handles these operations and assigns them to a single domain controller to be accomplished. Such a domain controller is referred to as operations master. The operations master performs several roles, which can be forest-wide as well as domain-wide.


Forest-wide roles: There are two types of forest-wide roles:

Schema Master and Domain Naming Master. The Schema Master is responsible for maintaining the schema and distributing it to the entire forest. The Domain Naming Master is responsible for maintaining the integrity of the forest by recording additions of domains to and deletions of domains from the forest. When new domains are to be added to a forest, the Domain Naming Master role is queried. In the absence of this role, new domains cannot be added.


Domain-wide roles: There are three types of domain-wide roles: RID Master, PDC Emulator, and Infrastructure Master.

RID Master: The RID Master is one of the operations master roles that exist in each domain in a forest. It controls the sequence number for the domain controllers within a domain. It provides a unique sequence of RIDs to each domain controller in a domain. When a domain controller creates a new object, the object is assigned a unique security ID consisting of a combination of a domain SID and a RID. The domain SID is a constant ID, whereas the RID is assigned to each object by the domain controller. The domain controller receives the RIDs from the RID Master. When the domain controller has used all the RIDs provided by the RID Master, it requests the RID Master to issue more RIDs for creating additional objects within the domain. When a domain controller exhausts its pool of RIDs, and the RID Master is unavailable, any new object in the domain cannot be created.

PDC Emulator: The PDC emulator is one of the five operations master roles in Active Directory. It is used in a domain containing non-Active Directory computers. It processes the password changes from both users and computers, replicates those updates to backup domain controllers, and runs the Domain Master browser. When a domain user requests a domain controller for authentication, and the domain controller is unable to authenticate the user due to bad password, the request is forwarded to the PDC emulator. The PDC emulator then verifies the password, and if it finds the updated entry for the requested password, it authenticates the request.

Infrastructure Master: The Infrastructure Master role is one of the Operations Master roles in Active Directory. It functions at the domain level and exists in each domain in the forest. It maintains all inter-domain object references by updating references from the objects in its domain to the objects in other domains. It performs a very important role in a multiple domain environment. It compares its data with that of a Global Catalog, which always has up-to-date information about the objects of all domains. When the Infrastructure Master finds data that is obsolete, it requests the global catalog for its updated version. If the updated data is available in the global catalog, the Infrastructure Master extracts and replicates the updated data to all the other domain controllers in the domain.

Domain controllers can also be assigned the role of a Global Catalog server. A Global Catalog is a special Active Directory database that stores a full replica of the directory for its host domain and the partial replica of the directories of other domains in a forest. It is created by default on the initial domain controller in the forest. It performs the following primary functions regarding logon capabilities and queries within Active Directory:


It enables network logon by providing universal group membership information to a domain controller when a logon request is initiated.

It enables finding directory information about all the domains in an Active Directory forest.

A Global Catalog is required to log on to a network within a multidomain environment. By providing universal group membership information, it greatly improves the response time for queries. In its absence, a user will be allowed to log on only to his local domain if his user account is external to the local domain.


Site: A site is a group of domain controllers that exist on different IP subnets and are connected via a fast and reliable network connection. A network may contain multiple sites connected by a WAN link. Sites are used to control replication traffic, which may occur within a site or between sites. Replication within a site is referred to as intrasite replication, and that between sites is referred to as intersite replication. Since all domain controllers within a site are generally connected by a fast LAN connection, the intrasite replication is always in uncompressed form. Any changes made in the domain are quickly replicated to the other domain controllers. Since sites are connected to each other via a WAN connection, the intersite replication always occurs in compressed form. Therefore, it is slower than the intrasite replication.

Why use URL shorteners?

You must have seen them. Web addresses like http://tinyurl.com/2gj2z3 which, when you click on them, take you to another web page. Why use them? Are there any risks in using them?

URL stands for Uniform Resource Locator. It's the posh technical term for a web address. Web addresses normally take the form http://www.somesite.com/somepage.html, which is not too much of a problem. But some site names can get very long, and so can page names. The increased use of database-driven sites mean that URLs can get very long indeed, and most of them is computer gobbledygook. They are impossible to type in, if you are reading them in a print article, and often get corrupted by word-wrapping when they appear in an email or blog posting.

An URL shortener is a web service that takes a long address that's hard to type, and turns it into a short one. You should use them in articles for print publication, classified ads, emails, blog and forum postings, anywhere there is a danger that the full address may be corrupted, or that someone may need to type the address into a browser manually.

But there is a danger in using short URLs that may make people afraid to use them. The short address disguises the real destination. This makes it easy for somebody to post an innocent looking message encouraging people to click on a link that takes them to a site which infects their computer with spyware, or something equally undesirable.

Some URL shortening services have tried to address this problem. The most well-known service, TinyURL.com, has an optional preview page that shows you the target address before you go there. But you have to know to type "preview" in front of the address, or visit the site and set it as a permanent option. Those who don't know about this are still vulnerable to deception.

A safe URL shortener would not allow the creation of links to undesirable sites. It would also always display a preview page, so the user always sees where the link is taking them before they go there. xaddr.com uses Internet blacklists to prevent its use to disguise sites that are advertised by spam. Its preview page offers a link to McAfee's Site Advisor, which can be used to check the safety of the destination.

Next time you need to write a long web address, use an URL shortener. But to encourage confidence that no harm will come from clicking the link, pick a safe one.

What is search engine gateway?

Navino launched its search engine gateway service recently. For most of the Internet surfers, search engine gateway is a pretty new concept compared with meta search engine or multi search engine. Put it in simple, it is a web service, which can let you search the best information from the best content providers in one website.

When we try to find information everyday, most of us might go to Google.com. Yes, it's true. Most of the time, Google works well. But does Google return the best information? I guess you would agree that the search engine's ranking algorithm could only give a good answer, but not the best. Well, you may ask, where can I get the BEST? The best weather information? The best book information? The best price for your favorite mp3 player? The short answer is from the brain, from the hand picked information. Therefore, Navino's editors and their users give out that the best weather website is weather.com, the best book website is amazon.com and the best price information is froogle.

Besides best hand picked information resources, Navino also provide the search engine gateway technology. Using this technology, you can search all the best website at Navino. All you need to do is to add a unique search name before your searching keywords.

For example, if you want to search New York's weather, you can search with ‘weather New York' and you will be forwarded to weather.com with the keyword ‘New York'. If you want to search finance books, you can search with ‘book finance' and you will be forwarded to amazon.com with the keyword ‘finance'. If you want to search the best price for your favorite mp3 player, you can search with ‘price mp3 player' and you will be forwarded to froogle with the keyword ‘mp3 player'.

Navino search engine gateway is very convenient for your everyday web surfing. Besides that, Navino also provides its users to customize their own search engine gateway and allows its users to recommend search names for public use.

What Is An Intranet? Definition and Uses...

An intranet is basically a private web based network. It uses all of the technology of the internet but is safe and protected behind a firewall that keeps unauthorized personnel out. Companies have been using them for years as a method of streamlining their internal communications.

Because a web browser can run on any type of computer, the need to maintain multiple paper copies of documents that are constantly changing can be eliminated. Documents like training manuals, internal phone books, procedure manuals, benefits information, employee handbooks, requisition forms, etc. can be maintained as electronic documents and updated at almost no cost. The savings in paper and other material costs can be significant

But the most powerful aspect of an intranet is its ability to display information in the same format to every computer being used. That allows all of the different software and databases a company uses to be available to all employees without any special equipment or software being installed on their systems.

This universal availability of information is sparking an era of collaboration unlike anything ever seen before. The departmental barriers that exist in many companies are slowing breaking down because now colleagues can share information readily using the company intranet.

Options for implementing an intranet

There are a variety of options for setting up an intranet. They include building your own intranet technology, purchasing and installing third-party software, or purchasing access through an extranet ASP. Here is a quick summary of the advantages and disadvantages of each approach:

1. Building it yourself
Advantages: Complete control of user interface design; ability to customize level of functionality; integration into internal systems, and direct access to user activity.

Disadvantages: High up-front development cost; requires staff expertise in the development of extranets, commitment of internal staff for 6 months to a year for planning, execution, review and implementation; and an ongoing commitment of internal staff for internal and client support, hosting, maintenance and upgrades.

2. Purchasing/installing third-party software
Advantages: Proven track-record of packaged solution; ability to choose functions and to
customize user interface, more rapid implementation compared to building it yourself.

Disadvantages: High up-front purchase cost; commitment of internal staff for customization and implementation; on-going commitment of internal staff for internal and client support, hosting, maintenance and upgrades; and extensive internal and client training

3. Using a Service Provider (ASP)
Advantages: Proven track-record of the application; low cost of entry and predictable cost over time; virtually immediate implementation; no commitment of internal staff for internal support, hosting, or maintenance; and upgrades at no cost by extranet experts, and savings on internal server use.

Disadvantages: Less freedom in user interface design, and fixed functionality.

In the final analysis…
The approach you choose depends on how you work, the technical and financial resources at your disposal, and how rapidly you need to move forward.

Web Servers and Firewall Zones

Web and FTP Servers

Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic.

However some services such as web or FTP servers require incoming connections. If you require these services you will need to consider whether it is essential that these servers are part of the LAN, or whether they can be placed in a physically separate network known as a DMZ (or demilitarised zone if you prefer its proper name). Ideally all servers in the DMZ will be stand alone servers, with unique logons and passwords for each server. If you require a backup server for machines within the DMZ then you should acquire a dedicated machine and keep the backup solution separate from the LAN backup solution.

The DMZ will come directly off the firewall, which means that there are two routes in and out of the DMZ, traffic to and from the internet, and traffic to and from the LAN. Traffic between the DMZ and your LAN would be treated totally separately to traffic between your DMZ and the Internet. Incoming traffic from the internet would be routed directly to your DMZ.
Therefore if any hacker where to compromise a machine within the DMZ, then the only network they would have access to would be the DMZ. The hacker would have little or no access to the LAN. It would also be the case that any virus infection or other security compromise within the LAN would not be able to migrate to the DMZ.

In order for the DMZ to be effective, you will have to keep the traffic between the LAN and the DMZ to a minimum. In the majority of cases, the only traffic required between the LAN and the DMZ is FTP. If you do not have physical access to the servers, you will also need some sort of remote management protocol such as terminal services or VNC.

Database servers

If your web servers require access to a database server, then you will need to consider where to place your database. The most secure place to locate a database server is to create yet another physically separate network called the secure zone, and to place the database server there.
The Secure zone is also a physically separate network connected directly to the firewall. The Secure zone is by definition the most secure place on the network. The only access to or from the secure zone would be the database connection from the DMZ (and LAN if required).



Exceptions to the rule

The dilemma faced by network engineers is where to put the email server. It requires SMTP connection to the internet, yet it also requires domain access from the LAN. If you where to place this server in the DMZ, the domain traffic would compromise the integrity of the DMZ, making it simply an extension of the LAN. Therefore in our opinion, the only place you can put an email server is on the LAN and allow SMTP traffic into this server. However we would recommend against allowing any form of HTTP access into this server. If your users require access to their mail from outside the network, it would be far more secure to look at some form of VPN solution. (with the firewall handling the VPN connections. LAN based VPN servers allow the VPN traffic onto the network before it is authenticated, which is never a good thing.)

Valuing Network Certifications - Is The Time, Money And Effort Worth The Bother?

There are many ways to get any of the large number of network certifications now available. There's not only software certification like those offered from Oracle, Java, Microsoft, etc. but there's also direct network hardware certifications from strong companies like Cisco and then there's the server administration, hardware repair, security and several sub category type certifications. All are available but the question is if these have any real value in the marketplace.

The answer, unfortunately is not simple. This is because while many companies demand a certain certification, they will also bend the requirement and allow you to get certified once you have the job. There's also people in the marketplace who are strong proponents of certification or another. The reason for this is usually because they have that certification and by requiring it, they somehow believe it validates their decision to obtain the training and pass the tests.

The reality is that like a good resume and education pedigree, certifications help get you in the door. Think about it for a moment. If you were hiring a network administrator, you would probably ask for the usually experience and basic education and some type of networking certification. If 100 people claiming the same skills and experiences levels all apply and all have at least the single required certification while 10 have not only the network cert but also maybe several MS and a security certificate, which candidates applying would probably get scheduled for interviews? Right! It would be the ones with the better paper qualifications.

So the value of a certification can be measured by it's recognition as important by employers, and the relative value they place on such training. If you're applying in network shops that value certifications, then they will naturally place a premium on the fact that your have that training and will probably reflect that in an increased earnings range.

The real key however is to recognize that employers are NOT employing you because you have a certification. You must have the skills necessary to do the job and meet the requirements of the position. No amount of certifications can make up for a strong work ethic and solid experience. With today's study materials, almost anyone can learn enough to pass the required tests and become certified. This however does not make anyone competent to work on a network anymore than walking into a garage makes one a mechanic. It's skills, talent and knowledge that are truly desired.

Microsoft Certifications are one of the most widely pursued and acclaimed professional certifications in the IT industry. Preparing MS certification tests, however, is a significant undertaking whether you're just out of college or have been in IT field for years. IT professionals are continuously demanded to acquire new knowledge in order to perform well on their jobs as new technology in the IT industry emerged at a pace that has never been seen before. Regardless what certifications (Microsoft Certified Professional or MCP, Microsoft Certified System Administrator or MCSA, Microsoft Certified System Engineer or MCSE ) you are pursuing, a thorough planning will increase the chance of success.

The importance of hands-on Experience, no matter if it's your own little network at home or at your job, experience matters! Being able to apply the knowledge gained by the study necessary to obtain your certification is just as important as the exam itself.

When preparing for any certification test, have a network available to physically learn the principles being taught. You network might only be a couple of old PC's and a switch but it's enough to understand the principles and basic information. You gain valuable skills that cannot be obtained any other way except through hands on work.

Finally, consider using CBT's or computer based training as part of your test preparation. These tools are a great way to take your level of understanding to a new level. This is also true of practice exams.

If you develop the skills necessary to support the certifications, all your training, costs and effort will pay off handsomely. With your knowledge and training, you can expect to be have an easier time getting considered for positions, moving up in a company, and enjoying a solid work career.

There’s no mystery in the IP address!

The Computer is a very complicated device we use for our every day comfort and the importance of some of its numerical aspects is sometimes neglected. For example: a different number is given to each computer when its user goes online or when it is part of a network. This number is the IP address and knowing about it is like knowing where you live…

What’s my IP and what do its numbers stand for?
IP stands for Internet Protocol and the address is formed from 4 numbers separated by periods. The IP address format is a 32 bit numeric one and each number can be from 0 to 255. The IP address consists of two parts: first one represent the network number and it is similar for more than one user (like the number of a street) and second represents the host name which is different for each user (like the house number). To increase the number of available IP addresses within big networks with a lot of users or small networks with few hosts, the address is divided into 4 classes (A, B, C, and D)

Having an IP address it’s like having a last name in a network. To identify a computer in a network (LAN-local area network, WAN-wide area network or on the Internet) it has to have an IP address. This number is similar to a phone number or to a zip code. It is unique and without it the device or computer can not be used in a network area. Within an isolated network the computers can be assigned different random IP addresses, but if a private network needs to be connected to the Internet the IP has to be registered so that its uniqueness is verified.


Where do I find my IP address?
Connect to a site that recognizes your IP address and let you see it also. You can visit this site for example: iprelated.com. These IP Lookup sites are very easy to use and very useful for others. An IP address can offer a lot information about the person who logs in on the Internet and engages in a certain activity.
This is how illegal activity is sometimes detected and violations are reported. The IP address says less about the user if it is a dynamic one because it changes every time the user logs in.
Another interesting aspect is that some people who have the information from your IP address are interested in taking you computer over and using its resources. This is not impossible! They can use software that enables them to do this so it is better to hide your IP when you are online.

Who gives me my IP address?
The IP address can be static or dynamic, meaning it can be the same every time you are online or it can change. The IP address is provided by a server through a service called DHCP (Dynamic Host Configuration Protocol)

Although things can get pretty complicated when explaining numbers and their significance, this is just a small and easy to understand introduction about the IP address that does not involve technical terms. The importance of these details is very high because starting from these brief explanations one can truly comprehend the necessity and implications of the IP address and of virtual geo location.

The Simplest Way to Get Online Passive Income

Based on my research, this seems to be the basic principle that website owners have been following to get passive income online:

* Get many people to come to your website
* Get them to click on your Adsense links

Sounds simple enough. Get people into your website from Google search, then link out to an Adsense Ad. Search In – Adsense Out.

Practically applying it to get sufficient commendable income, however, can be quite a challenge.

The first problem is how to get many visitors to your website.

That’s where Search Engine Optimization comes in. However, this is really easier said that done. It’s a bit of an artwork. You basically have to read the mind of an Internet user. What keywords would he use? Why would he visit your website? Do you have the content go get people interested enough to get to your website?

Basically, your goal is visibility. You have to be seen. You can do this using SEO or using traditional brand-building methods. Tell your friends, family and colleagues. If they have websites, politely ask if you could link with each other.

For those lucky few that are already on top of the search engines, this is not a problem. Others (including myself) would have to work hard at it. Look at FilipinoLinks.com. It’s been around for a very long time and has made quite a foundation. It would not be too difficult for its owners to tweak the website for SEO.

Experts have varied opinions on what to put in a website. Some say, put relevant important content – with around 500-1000 words on each of your website. Some say provide simple 300 word news posts.

Another option to get clicks would be to advertise online for keywords. Adwords is an example of a tool that can allow you to do this. There will be marketing expenses in this scenario. The goal here is to get more Adsense income than Adwords Expenses – which is really basic business sense. This is easier said than done, I tried it and got dismal results.

The next problem would be how to get visitors to click on Adsense links.

Well, the first thing that needs to be done is to get an Adsense account. It’s pretty easy to setup. After that, you need to put the Adsense links on your website. There are people who say make it blend it when the rest of your pages. Here, on my website, you can see my Adsense Ads that seem to be part of the overall theme.

Other experts say the more noticeable the advertisements, the more they will be clicked. In this case, the Ads stand out prominently – with a different, and sometimes contrasting color scheme. One tip given was actually position the Google Ad right next to an image/picture. Viewers tend to click on picture links, so more income potential income there.
What does this all mean for a Filipino Entrepreneur?

In my point of view, it means opportunities. Although I have just started experimenting on all of this myself, there seems to be a real possibility of gaining a little revenue. For example, I started this website (last January) and have,in my first month I gained US$7 from Adsense. It’s not much but consider this:

* My expenses so far have been the webhosting (US$4 monthly), and domain name (US$3 for one year – got it at a discount).
* If I continue getting US$7 a month, that would be, US$84 a year.
* My year’s hosting would be US$48
* My theoretical income for one year would be US$33.

There are other costs, of course, from writing the content for this website – electricity, less time to do other things, etc… I didn’t include it yet. If you had pre-existing content, this wouldn’t matter to you. Just upload it and you should be ready.

For example, if you had a song lyrics database, you could find a pretty reliable web developer, have him upload your database, and include AdSense. Optimize it for search and you should soon get some revenue. It will probably not be big, but enough to get you interested.

I remember on my last test with the wordtracker application, “Pinoy Ako Lyrics” were some of the top keywords I found. People were actually looking for lyrics of Filipino songs. Since new songs come out every month, whoever gets the lyrics out soonest would be found earlier.

If you had a database of all Philippine Lotto Results ever since it began, you could probably have a statistics analyzer custom-made from your website. It could give suggested lotto numbers based on historical info. That would be something a lot of people would go to.

There are probably other more interesting opportunities for the web-savvy Pinoy entrepreneur. As long as you get people to your website, and get them to click on an advertisement, there will be revenue.

The Pleasures of a Wireless Media Router

With everything becoming available wireless these days a great innovation is the wireless media router. What is a wireless media router? It’s a router that allows the transmission of signals from the router to anywhere in the house that has a receiver.

Wireless routers are becoming more and more popular. They have many uses, one of which is viewing pictures and movies from your computer on your television. This comes in very handy when you have media files that you can’t burn on CD or cannot be played on your DVD player.

A second use would be to transmit paid television. For example if you paid for HBO usually you would be able to only view it on one nominated television. With the wireless media router you can send the signal you television is receiving, HBO, to any other television in the house. You can even change the channel from the remote television while viewing.

The third use would be watching television at a location where an antenna is not available. This means no more long cables leading from room to room just to be able to watch television.

Depending on the amount of receivers you have you can receive the signal from multiple televisions. How does it work? The receivers are connected to the remote televisions. The router takes the signal from the source television and distributes it to the remote televisions by way of the receiver. On the remote television a certain channel is dedicated to this receiver meaning you can watch independent television, and easily switch the channel to the signal being received from the wireless router.

This also makes running your entertainment room a breeze. The receiver can also be hooked up-to a projector making it easy to view anything you wish. This means you will not need to purchase separate DVD players VCR’s for every room.

TCP/IP architecture model

1. Network interface(Data link) layer
2. Network layer
3. Transport layer
4. Application layer


Network interface layer
The lowest layer of the TCP/IP model. Its task is to provide access to the transmission physical medium and it differs according to the implementation of the medium.

Network layer
The network layer provides network addressing, routing and datagram transmission. Used protocols that will be of interest further regarding DHCP are IP and ARP.

IP protocol
It is the basic protocol of the network layer and in general the internet as a whole. It sends datagrams, which are independent units that contain information about the destination, source and the sequence number of the datagram. The sequence number is used for message reconstruction, since the delivery order of the datagrams might not be the same as their order in the message and delivery reliability isn't guaranteed at all.
IP protocol versions:
" IP v4 - 32 bit addresses. Provides approximately 4 billion unique addresses which aren't sufficient at present times.
" IP v6 - 128 bit addresses. The transition to v6 will bring (is bringing) higher security, QoS, packet segmentation and many more IP addresses. (the transition from IP v4 to IP v6 must be supported by the system provider)


ARP protocol
The ARP abbreviation stands for Address Resolution Protocol. This protocol is used to find the physical address (MAC) based on a known IP address. If required ARP sends information concerning the wanted address to all the stations in the network - Broadcast. The stations consequently answer with a message containing their MAC. If the wanted device/station is outside the node/segment, the appropriate router will answer instead of it.

Transport layer
The transport layer is implemented only in terminal devices and it adjusts the behavior of the network according to the requirements of the device/application.



Application layer
The application layer is composed of programs that use net services to fulfill the needs of users. Examples of specific protocols are for instance FTP, DNS and DHCP.
Application protocols use TCP, UDP or both services at the same time. So called ports are used to differentiate between application protocols, they represent a type of label of the application. It is possible to change the ports in the settings of the service, but each service has a default port that isn't changed for most services and is used as an unwritten standard.

" FTP = 21
" DNS = 53
" DHCP = 67 + 68

Small Business Server Business Tips

Top 3 Ways to Maximize Your Small Business Server Consulting Profits

Over the past 7 years, Microsoft Small Business Server (SBS) has gained traction as a widely-respected Small Business Server networking suite.

As a result, many small business computer consultants, systems integrators, and value-added resellers have jumped on-board the Microsoft Small Business Server bandwagon.

However, before you go ahead and bet YOUR company on Microsoft Small Business Server, consider the following three Small Business Server Business Tips… so you can maximize your Small Business Server consulting profits.

(1) Most small businesses in your area have never heard of Microsoft Small Business Server.

Although there may be hundreds, if not thousands, of small businesses in your area that would be excellent candidates for Microsoft Small Business Server, don't make the ultra-common mistake of assuming that the typical non-technical small business owner even knows what Microsoft Small Business Server is.

If you want to maximize your consulting profits and avoid commodity price wars, you're much better off leading off with a pitch for something that's more universally recognized… such as getting rid of computer viruses, stopping SPAM, or preventing computer security breaches.

(2) Sell your small business prospects on YOUR company first.

The real money in Small Business Server is NOT in reselling the Microsoft Small Business Server software. The real money comes from selling the RELATIONSHIP with the small business. So your company essentially becomes your clients' outsourced IT department.

Remember, no small business owner is going to wake up in the middle of the night, in a cold sweat, craving Small Business Server. However, small business owners DO constantly lose sleep over what will happen to their companies if their computer systems fail them. Become the solution to the more primal, survival instinct and you'll get plenty of opportunities to sell Small Business Server, once you've established a solid client/consultant relationship.

(3) Microsoft doesn't value computer consultants as much as they sometimes say.

Little known fact: the first version of Microsoft Small Business Server, planned in 1996 and released in 1997, was code-named “SAM”… because Microsoft's goal was for Small Business Server to completely bypass their reseller channel and be sold at “Sam's Club” warehouse clubs.

So the product team had the mandate to make the Small Business Server product SO simple that a non-technical small business end user could buy Small Business Server at the warehouse club and have the Small Business Server suite running in their office that same day.

Shortly after the first-version shipped, Microsoft realized that the most cost-effective way to reach small businesses with Small Business Server was through their reseller channel. And since then, Small Business Server resources have flowed toward the channel.

However, even today, you can often find 5-user versions of Microsoft Small Business Server in retail stores.

So the point: Microsoft isn't putting all its Small Business Server “eggs” in one basket, so why should you?!? Which brings us back to points one and two: Small business owners aren't actively shopping for a “Small Business Server”. So instead of “selling” Small Business Server per se, you're much better off selling a small business on YOUR company, BEFORE you sell Microsoft Small Business Server.

The Bottom Line

In this article, we looked at three Small Business Server business tips that every computer consultant, systems integrator and value added reseller needs to be aware when selling Microsoft Small Business Server.

Copyright MMI-MMV, SmallBusinessServerTips.com, All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Small Business Networking: Suggesting Dedicated Servers to Clients

PC-based servers and LANs may be relatively mature technologies. However, small businesses need your firm’s expertise, more than ever. For these businesses, you'll need to select, configure, customize, secure and maintain the right small business networking tools for their unique needs.

Real Small Business Networking Solutions Begin with Real Servers

How many times have you taken on a new small business client who insists that he or she is perfectly content with their peer-to-peer network? You know the peer-to-peer network is really causing a ton of problems.

Is Microsoft Windows peer-to-peer networking any way to run a small business? Perhaps it is for a two-or-three-person company, but those really tiny offices generally aren’t your most profitable client opportunities.

Convincing the Client They Need Small Business Networking

Clients come to you because they need a reliable, yet cost-effective small business networking solution. You know that their data, uptime, and security issues are important, and that there are some corners that aren’t worth cutting. Yet many small business networking prospects and clients still believe that they’re too small to need a dedicated or "real" server.

Cutting Corners Doesn’t Cut It

When you begin talking about a network upgrade, small business clients often dwell on out-of-pocket costs. They often neglect to consider the more substantial soft costs of investing shortsightedly in a small business network.

These include lost employee productivity when imprudent corners are cut, downtime when fault-tolerance is an afterthought, and support costs when difficult-to-support or "dead-end" solutions are selected solely because of their low price tag.

The Bottom Line about Small Business Networking

Often clients don’t recognize they have a small business networking problem until it’s too late. If you show your prospects and clients how a dedicated server can save them money by avoiding inevitable disasters (i.e. share some of your "before" and "after" client case studies), you’ll have a stronger chance of getting prospects and clients to see "the light."

Copyright MMI-MMVI, Computer Consulting 101 Blog. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Six Largest Mistakes Made when Hiring a Cabling Contractor

Cabling of data and voice systems is often ignored by many companies until the last minute just before relocation or new building takes place. Many information systems professionals view it as a low priority or something that just takes away from their budget for real network components such as servers or software. However having a state of the art easy to manage cabling system is just as important as good reliable servers on a network. Cabling is the backbone of any computer network; it ties all the components of the network together therefore it should receive as much careful consideration as any other network component.

Mistake number one – Blindly choosing the lowest bidder

This is the most common mistake made when installing voice and data network cabling. Often the lowest bidder is the contractor who is the smallest, has the least experience or the one that made a mistake on their bid. Prior to making this decision you should know your contractor. Find out how long they have been in business, visit some of the large installations they have done and by all means go visit their offices and warehouse. A site visit to their office will tell you most of what you need to know about an organization. Make sure your contractor has completed jobs of similar scope and size.

Mistake number two – Choosing the manufactures product that will be installed

Many companies have tried to standardize on a particular manufacture of cabling system. Some of the larger manufactures are Belden, Comscope, Ortronics, AMP and Leviton. You can’t go wrong with any of these big names. However IT managers and corporate executives get hung up on trying to standardize because they believe it will make things easier for the IT staff. The reality of the situation is that if you choose any of the larger names the only components that might not be interchangeable are the faceplates. Of course there are performance criteria as well and they all claim to be the best. Do your own research and choose a manufacture that you feel has a strong company that will be there to stand behind their product should you even need to make a warranty claim

Mistake number three – Paying too much for the latest cabling technologies

The fact is that today’s network components and network components of the future cannot exceed the specifications of Cat 5E and Cat 6 cabling components. Combine this with the fact that the average company moves every 3 to 4 years. You will find it hard to benefit from future proofing a building you don’t occupy. Look at you current infrastructure, what equipment or applications do you plan to add or upgrade? Is Gigabit or 10 Gigabit Ethernet an option for you in the near future?

Mistake number four – Not using universal wiring

The EIA/TIA and BICSI both recommend a universal wiring platform for your Communications Infrastructure. In the old days the average install would consist of a single voice grade cable for the phone system and a single data grade cable (Cat 3, Cat5, Cat5E or Cat 6) for their computers. This of course dedicates the usability of these cables to one system type. This is further exacerbated by the termination method used. Voice cables were traditionally terminated on 66 style blocks (66m1-50), which are not user friendly and require a special tool and cross connect wire to make changes. Telephony companies have made a killing for years just performing MAC work (Moves, Adds and Changes) because a customer was unable or unwilling to brave the telephone closet and perform the MAC work themselves.

The practice of using a true universal wiring platform is now the standard for all reputable cabling contractors. A Universal Wiring Platform is made up of all data grade components that are downward compatible for all voice applications. A common installation would consist of 3 Category 5E or Category 6 cables all terminated on a 110 type Patch Panel. At the wall plate all cable would be terminated on the matching grade of 8 position modular jack (incorrectly know as an RJ-45). This design not only allows for maximum flexibility were the customer could have 3 computers or 3 phones or 2 computer and 1 phone or any configuration that works for their application. The point is that now the customer is in complete control of their cabling infrastructure and does not need to pay a contractor to come out every time they move an office. In the long run this will also save you money on the overall cabling system as it will shift and flex to meet your needs without having to bring in your cabling contractor. Remember, having the contractor in after construction has completed will involve them pulling out ceiling tiles and standing on desks while you are trying to do business. The elimination of the disruption alone makes it worth while.

Mistake number five – No CAD pre installation and post installation CAD drawings.

Most customers really have no idea what their cabling platform will look like when they sign the paperwork. They rely on their contractor to “just do the right thing”. Do not make this mistake, if you don’t understand how your infrastructure will work or what it should look like, don’t sign. Your contractor should have the ability to take your building blue print and overlay his cabling plan on top of your electrical plans. This will give you a visual representation of what you are paying for and allow you to ask questions. Likewise, after the job is complete you should receive what is called an “As Built Drawing” showing all of your communications outlets with a standards based numbering system. Some contractor will even provide a scale elevation plan showing were your patch panels are and how much room you have left in each rack for growth and or other equipment. This should be provided to you both hard copy and in AutoCAD format for your architect to incorporate into your final building As Builts.

Mistake number six – Not getting a design before the job starts.

This seems to be all over the board, some people have no design plan what so ever. Some will pay $10,000 for an engineering firm to write a specification were they charge by the pound for the spec. Don’t be fooled that a large spec is a good spec. Often a specification filed with time consuming exercises for the bidding contractor and unnecessary pricing breakouts will only prevent good contractors from bidding on your project. What you want is a spec that clearly defines your realistic requirements, requires basic qualification with references and does it as quickly and simply as possible. Do not try to write a spec that will cover every contingency, you will drive your contractor away and you will only confuse the process more. Once you have selected your contractor based on an apple s to apple comparison, you can always and should always sit down to discuss the project and other options that they recommend. One more thing, always, always have the contractor provide you with a parts list with quantities, not individual prices, just quantities. This will help you weed out the contractors that did their homework when you start to compare their list of parts.

Mistake number six – No cable management

All cabling systems will look organized before they are used, that’s easy. Show me that cabling system after 6 months and I will tell you if the proper wire management was used. “Used” being the key word here. Remember, you can have the best wiring management in the world, if you don’t strictly enforce its use with your IT Staff, you will have a mess. That said, your contractor must provide you with a good design. My recommendation is, listen to your contractor, they know more than you do about this. Then, go visit some of the sites that are done the way they recommend. See how they look after being used a few months. Ask the customer how easy it is to keep organized. Don’t underestimate the value of this step. If your patch panels are a mess and you can’t effect changes in a rapid and orderly fashion then you would have been better off paying your contractor to do the MAC work for you.

Setting Up and Securing Your Wireless Network

There are more and more individuals opting to work from home than ever before. The advantages to this are many including avoiding the morning and evening rush hours, being able to spend time with your kids and significant other, and doing everything on your own time. Though the pitfalls are many, the one that I will be focusing on in this article is that of setting up a secure wireless network for your home based business. Right now somewhere out there, there is someone with a receiver waiting to pick up on an unsuspecting person’s wireless local area network. Their hope is to garner some sensitive information that may lead to identity theft, and stolen proprietary business information.

Most businesses owners are not technically inclined, though they may be power users, in general security settings is not one of the first things they want to mess around with in their day to day operations. This makes most wireless LANs a great target for information predators.

Here are some general guidelines to follow in setting up your wireless network. Though it may vary from vendor to vendor, the gist is more or less the same:

1. Setup the wireless access/router point via a wired client.
2. Always change the factory setting password to something difficult for someone to guess.
3. Enable 128-bit Wired Equivalency Privacy (WEP) encryption on both your access point and network card. From time to time change the WEP key entries. If your hardware does not support a minimal of 128 bit WEP encryption, then it may be time to replace this dinosaur. WEP is only a minimal security precaution, which is better than none at all.
4. Alter the factory default SSID on the access/router point to a convoluted difficult to guess string. Initiate your computer to connect to this configured SSID by default.
5. Setup your access point not to broadcast the SSID if available.
6. Block off anonymous internet requests and pings.
7. P2P Connections should be disabled.
8. Enable MAC filtering.
9. Enable firewall on the network router/access point with demilitarized zone function disabled. Enable client firewalls for each computer in the network.
10. Update router and access point firmware as updates become available.
11. Make sure the physical router is hidden so that a random person can’t reset the settings.
12. Position the physical router near the middle of the establishment as opposed to near windows to prevent others outside from receiving the signals.

These and other settings will collectively help prevent any unwanted intrusions on your private data.

Router - Transmitting Packets

In a previous article we discussed the basics of what a router did. We're now going to get into a more detailed, and yes technical, explanation of how packets are transmitted as well as a few other tech specs of how routers work. So put on your learning caps because you're in for a real mind bender.

Internet data, whether it be in the form of a web page, a downloaded file or an email message, travels over what is called a packet switching network. Basically what happens is that the data is broken up into individual packets because there is only so much data that can be transmitted at one time. Each packet is about 1500 bytes long. Each packet contains quite a bit of information including the sender's address, the receiver's address and of course the information being sent which includes the order of each packet how it should be put back together so that the end user can make sense of the data. The packet is sent off to its destination based on what the router believes to be the best route to follow, which is usually the route with the least amount of traffic and if possible, the shortest route. Each packet may actually given a different route depending on conditions at the time, which in a high traffic network can change every second. By doing this, the router can balance the load across the network so that no one segment gets overloaded. Also, if there is a problem with one piece of equipment in the network, the router can bypass this piece of equipment and send the packet along another route. This way if there is a problem, the entire message will still arrive intact.

In conducting this process, routers have to speak to each other. They tell each other about any problems on the network and make recommendations on routes to take. This way, paths can be reconfigured if they have to be. However, not all routers do all jobs as routers come in different sizes and have different functions.

There are what we call simple routers. A simple router is usually used in a simple small network. Simple routers simply look to see where the data packet needs to go and sends it there. It doesn't do much else.

Slightly larger routers, which are used for slightly larger networks, do a little bit more. These routers will also enforce security for the network, protecting the network from outside attacks. They are able to do a good enough job of this that additional security software is not needed.

The largest routers are used to handle data at major points on the Internet. These routers handle millions of packets of information per second. They work very hard to configure the network as efficiently as possible. These are stand alone systems and actually have more in common with supercomputers than with a simple server one might have in a small office.

In our next instalment we'll look at how to actually trace the path that a message has taken and some examples of transmitting packets.

Router - Tracing Your Packets

Few people will really care about the path that your packet takes when sending a message, but if you're one of those high tech egg heads then this article may be of great interest to you. It can become very addictive so proceed with caution.

If you're using a Microsoft Windows based operation system, then it's very easy to trace the route that your message has taken. Not only that, you can see exactly how many routers it took to get your message from point A to point B. You can do this by using a program that is on your computer called Traceroute. That is exactly what the program does. It traces the route a message takes to get to its final destination.

To run the program you have to go to a DOS prompt. After doing this, go to the C:\windows directory and type tracert followed by the URL of the Internet site you're connected to at the time. It will give you a rather technical spec sheet of every IP address it stopped at along the way until it got to its final destination.

The first number on the spec sheet tells you how many routers it went through to get to its final destination. Then each individual router listed on the page is numbered from 1 down to the last one which is actually the final destination. The next 3 numbers on each line for each router shows how long the packet took to get to that router. The next piece of information on each line is the actual name of the router the information went through. Yes, routers have names. This may be important to the users but is totally irrelevant to the router itself. Finally, the last piece of info on each line is the actual IP address of the router itself.

The amount of time it takes information to get from one router to another varies depending on how much traffic there is on that route at the time. Normally, it is no more than a couple of seconds. But occasionally, it can be longer. That is why sometimes you will be trying to access a web site and it seems to take forever. This can be for a number of reasons, but usually it is because along the way one of the routers is not working correctly and has to be bypassed. Sometimes the actual final location itself is down or having problems and the delay is the last router in the chain trying to connect to the network.

Traceroute is not limited to just checking the number of routers between you and an Internet site. You can use it to check the number of routers between you and any other computer on a network. As long as you know the IP address of the other computer you can trace the route of the packets between you and the other computer.

In our next instalment we're going to look at how routers handle denial of service attacks and other problems.