Saturday, July 28, 2012

How to Test the Quality of Cat5e Cable

When you want to establish a network system, the most critical component that you must prepare is Cat5e Ethernet cable. Without this cable, it is quite difficult to establish such system. You may be able to establish the network wirelessly, but wireless network is not very reliable if the network that you want to establish is rather large and extensive. If you want to make such network at your large home, office facility, a church, or other places where there is not only one or two nearby computer that you have to include in your network, but several computers located in different parts of the facility where your network will be established, Cat5e Ethernet cable is inevitably needed.

Because the network that you want to establish is a large network, you need to procure Bulk Cat5e cable in order to establish connection between computers in the network. The most important thing to consider when you want to buy Cat5e cable for your network is that your cable is high-quality cable. There are several ways to determine the quality of Cat5e cable that you want to use. Firstly, kink the cable and do it repeatedly along the length of the cable. If it breaks, then it is low-quality cable. Secondly, good Cat5e cable has a thick jacket. Therefore, if its jacket is thin, discard it because it is not reliable cable. Thirdly, buy a 1000’ spool of Cat5e cable and weigh it. If its weight is significantly less than 15 pounds, then it is not good cable. The best way to test your cable is by finding out how fast it transmits data. Therefore, use it to connect your computers and observe how long it takes to transmit data from one computer to another.

If you need more clues to find out the quality of Cat5e cable that you want to use, you can visit online forums or buy the cable from online stores that have good reputation.

Sunday, June 24, 2012

How Do Windows Tablets Differ From The First Generation Of Traditional Tablets?

Microsoft is well on its way to establishing a top position in the tablet market. Windows tablets have continuously evolved to meet the demands of consumers and business professionals on the go. Each new tablet release has incorporated newer technologies and features. This is particularly the case with the release of the new Windows 8 tablets. With all the technological advancements included in the newest tablets, they have evolved and now differ greatly from the first generation of traditional tablets.

Within the Windows tablet, there is an actual hard drive rather that the traditional flash drive that was found in earlier versions. These new and improved tablets have many more features than the first generation of traditional tablets such as USB slots that permit other devices to be connected to it as well as a memory card slot that effectively becomes portable storage for the tablet. Many now come equipped with an HDMI port that gives users the ability to directly connect to HDMI devices and screens. In the past tablets were more of a stand-alone device used for personal entertainment. Now they can be fully integrated in your arsenal of high tech gadgets and devices used to get work done.

The hardware that comes with these new and improved tablets provides many important benefits. The most notable is the capability to run full desktop applications, again making these devices full work horses instead of one trick ponies.

Tuesday, June 19, 2012

Innovative Implementations of Rackmount LCD Monitors

Technology has to go into some unusual places. It's fun to find out how people have taken a technical solution such as a rackmount LCD and found a way to implement it in a unique situation. This article describes a couple of ways to use these devices in a manner you may not have previously considered.

Ask any IT person where they use a rackmount LCD monitor and they will probably tell you that they are used to support and monitor servers located in a datacenter. The monitor is normally mounted inside a server cabinet or rack. When combined with a keyboard/monitor/trackball device and KVM system they offer reduced power and space requirements over assigning a monitor and keyboard to each computer system. Instead, one rackmount LCD is used to manage several computers.

Now that you understand that these devices save space, energy and money, your mind may start thinking about where you could use this type of solution. Here are some ways others have put the rackmount LCD to use.

Tuesday, June 5, 2012

Driving Asset Management Efficiencies With Field Service Software

For any facilities management, building maintenance or housing provider, a full stock condition survey is not only a costly exercise but an extremely time-consuming one.

Maintaining survey is one toughest part of the job for someone tasked with managing stock, so when a full stock survey is required it can cause a multitude of problems. These include confidence that asset data are up to date, easy access to information and the logistics in quickly gathering missing data.

Effective asset management

Field service software can help to drive efficiencies and tackle many of the challenges in relation to effective asset management. Central to such software will be the seamless capability to integrate with mobile devices.

Friday, May 11, 2012

Java Software Development Skills Focus on Growth

Java programming has become the most popular platform for users all over the world. It is mainly used for the development applications for web, mobile, Java and many more. It focuses on advancement and growth in the different development fields. Many different sectors are taking the advantages of Java and its associated features and technologies. Java software development companies are growing day-by-day and delivering the best infrastructure optimization services and solutions to the customers. Java is the most frequently used programming language to develop software applications for domestic as well as offshore clients. The Java software service providers offer well-aimed solutions according to the requirements.

Business organizations can take the help of professional developers and their services to procure cost-effective and reliable solutions. The reputable service providers offer many advantages to their targeted customers.

Major Benefits of Java Programming:

The object-oriented programming language allows programmers to create modular programs. They can use Java code many times during development process.

Tuesday, May 8, 2012

Physical Hard Disk Destruction Methods and the Benefits

Files in the computer as we know today, are causing danger to an individual, a business, or a company. A basic file deletion will just send it to the recycle bin and can be recovered anytime. A brilliant idea is to skip the recycle bin or empty it as soon as sensitive information is deleted. However, if the thief is desperate, he can use advanced tools to get to the permanently deleted file.

What actually happens when a file Is deleted

When a file is fully deleted, they are not actually overwritten. A distinctive mark is set into the file or folder to consider it as a data no longer needed in the disk. The description (meta-data) also remains into the file system waiting to be reused again. Nevertheless, it is rare to see such a file being reused and, it only occurs when a disk space is required.

There is a different file removal method for each file system type. Below are some common files systems and what it does when a file is deleted.

NTFS: When there is nothing written in the disk, after deleting the file, the data are intact.

FAT: The information about where the file fragment is lost immediately. If the file is not fragmented, then you can recover the file in full. The more you change things, the more you add files, the more the disk becomes fragmented.

Wednesday, April 25, 2012

How to Make a Computer Faster and Save Your Sanity

As computers get older they tend to get slower. Sometimes this is caused by the software getting more and more complicated as time goes by. Do you remember the days when you could load a program on to your computer from a floppy disc which contained just 1.4 Megabytes of information? Now a typical word processor program requires 2000 Megabytes of disc space available before you can install it!

Newer versions of software packages usually take up more computing resources than the old versions of the same package, so one of the simplest ways to make a computer faster is to downgrade to older versions. The disadvantage is that you will inevitably lose some functions, and if you've got used to having all the latest toys you may not want to.

The other main options for improving performance are increasing the power of your PC or making it work less. Increasing computing power is going to cost money - more memory or a faster processor will require actual hard-earned cash to be spent. Fortunately it's not always necessary to take such drastic action!

Tuesday, February 21, 2012

Computer Security

As computers are very delicate equipments they are very of chips, damage of data by viruses, data corruption, data error in reading by disk heads etc. They are sensitive to heat, light, smoke and dust. The possible calamities are burning
Computer security refers to the protection of the computer resources from accidental, intentional, or natural disaster including theft, physical damage, heat, power management, illegal access, data privacy, virus infection etc. The protection of computer, its accessories, data and programs for a long lasting of computer system is termed as computer security. Computer security is a branch of technology known as information security as applied to the computers. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability as defined by the security. The computer security is concerned with physical security of building, the protection of the software and hardware etc. Security can be defined by as safety against attack or failure. Computer systems also need to be protected from attack or failure.

The steps taken to protect against the attack or failure are known as security measures. There are different problems we face while working in a computer system environment. Power or supply to a computer may fail especially in bad weather; program or packages may contain bugs. Computer Media such as disk or hard disk or tapes may become corrupted, data may be lost. Even the working staff may be careless or do some criminal type of activities.

Threats to security
Today’s organizations are dependent on their information system and most could not survive the devastating effects of their destruction. Threats to the information system include the human error, computer crime, natural disaster, war or terrorist activities and hardware failure.

Threats to security Example

Human error Mistakes in data entry
Program error
Operator errors(using wrong data or instruction)

Computer crime Hacking (unauthorized access) and stealing data
Modify data illegally
Injecting viruses or logic bombs or WORMS
Natural disasters Fire, earthquake, hurricane, flood
War and terrorist activity Bombs, fire

Hardware failure Power failure
Disk head crash
Network failure

Risks Analysis

The first step in defining a security policy is to establish a clear picture of what the risks are and what the company stands to lose of disaster strikes. This risk analysis could include finding- the nature of data being stored in the system, the data used, the access to the system, money the company stands to lose if the data is lost, corrupted or stolen.

The computer security can be categorized in to hardware security and software security. They are: -
 Hardware Security
 Location
 Regular Maintenance
 Ventilation and light
 Protection from theft
 Fire Protection
 Electric Power Supply
 Air Conditioning (Dust free)
 Furniture
 Access Control
 Computer
 Building Construction and Design(Building and equipment security)
 Insurance

 Software Security
 Security of Data
 Safety from viruses

Hardware security
The protection of all hardware components used in computer system is known as hardware security. Hardware security includes all types of checks to detect the errors and even to correct them. Now a day’s modern computer (processors) includes special engineering controls inside it. Such type of controls detects the malfunctions arising or existing in the system and records them so that engineers can remove the faults afterward. Some hardware diagnostic facilities are available to find the faulty components or units of the computer system.
With the help of the parity check disk and tape transport system checks are carried out to ensure that data is correctly stored.

Such hardware checks are included by the manufacturers. The user also should feel his responsibility to keep the secure and properly working computer system. Other factors affecting the computer’s hardware security are as follows: -

The location where computers are kept determines many of the risks that affect it. Any such location (site) is subjected to many natural risks such as stability of ground and weather conditions. Thus, the risks inherent in the computer location need to be assessed. The other factor or conditions affecting the location are:
Wind, Rain, Snow, Ice, Floods, Lightening, Land slip, Fire etc.

Regular maintenance
Computers are delicate machines. They need regular maintenance, cleaning and configuration of new hardware, removal of unnecessary files, etc.

Ventilation and light
The temperature of the room is to be maintained i.e. about 18 to 24 degree Celsius. Very cold temperature or very hot temperature can affect the computer and lead t cease the work. The room should be clean bright, and closed so that no dust can enter the room. Exhaust fans are to be installed to blow the dull and humid air out of the room.

Protection from theft
There should be certain preventive measures for the protection from the theft. Grills in the windows and safety lock are required on the doors of the computer room.

Electrical power supply
No computer can operate without power supply. Computer needs 220 Volts (AC) to 240 Volts (A.C) supply as the input voltage to its Power Supply Unit. The voltage fluctuation may damage integrated circuits of computer chips because these are the most sensitive parts of the computer. Frequency of AC (Alternating Current) Supply should be 49.5 Hz to 50 Hz.

An Uninterrupted Power Supply (UPS) is the One which provides uninterrupted supply of power incase of failure of regular supply to the computer system. Whenever there is power cut or supply problem, automatic switches takes place between regular supply line and the UPS and without interruption, a continuous or constant supply to the computer is maintained. Hence data or program loss or any electric damages to any unit or circuit will not take place. It acts like a buffer between incoming power supply and the computer system. It constantly monitors the quality and characteristics of the power supply. A standby generator with battery supported UPS can maintain supply. Such a generator need very high capital cost.

Volt guard
Volt guard is another important power protection device. It provides constant output voltage to the computer system in case of high input voltage coming from the source. High and low voltage can affect the computer system. It plays an important role to save the computer system from the damage due to high voltage. In case high input voltage comes from the source, it provides constant output voltage between the ranges of 220 to 240 volt.

Spike guard
Lightening occurs mostly in the rainy season that can cause sudden increase in the voltage level of the AC line supplied to our house. The voltage can increase up to 2000V in our normal 220V supply. It can severely damage our electric device. This sudden over voltage is known as spikes. Spikes are very brief over voltages up to 2000V or more caused due to lightening, power line faults etc. To protect our electric devices from these spikes we need the special equipment called spikes guard. Spike guards are the electronic devices that remove the spike and prdvent it from entering into the main system.

Fire Protection
Fire protection is also necessary for the computer security. Computers can easily catch fire. The electronic circuits and the hardware components get damaged due to fire. So it should be protected from fire. Fire extinguisher must be installed in the room.

Air Conditioning (dust free)
Large computers dissipate too much heat, so ventilation is required to maintain temperature. For a mainframe computer or a mini computer certain environment is needed. A dust free atmosphere is to be maintained which is possible with air conditioning plants. Rise in temperature inside the computer room leads to over heating of computer (i.e. IC chips, transistors etc.), moisture precipitation. Computer components are delicate to dust and smoke. To protect from dust and smoke they should be kept in neat and clean rooms which are air conditioned.

The furniture required in each computer differs from office to office, place to place. However the height of the keyboard and the chair should not be more than 10 inches. The eyelevel and the screen should be at the same level.

Access Control
Unnecessary persons should not be allowed inside the computer room. The entry and exit point of the computer room should be controlled and monitored properly.

We should all know how to use a computer. We should check the computers regularly. The computer and other electrical devices are not to be connected from the same point. They are to be connected with voltage stabilizer to the main power supply point.

Building Construction and Design
Proper building or Housing for the computer system makes an important contribution to the security of computers. The structure of the building should have fire resistance and sound construction. Sufficient space should be kept for expansion of the computer equipments. There should as few doors as possible to the exteriors. The number of doors and windows should be less. Emergency doors and windows are to be constructed.

Personal computer requires a small space, about a normal size room table and a chair while mainframe and mini computers require quite a large space. The walls may be painted white or pink so as to control dust and smoke. There can be Smoke detector.

Wall to wall carpeting of Vinyl Asbestos is advisable as it protects from static charges of electricity. The room needs frequent cleaning with vacuum cleaner because no dust should be thrown in a computer room. Besides biometric methods including fingerprint, hand print etc. can be used to gain access to a room or to a particular terminal.

Computer needs insurance as it helps the user to reimburse in case of occurrence of any calamities of theft, loss of data, fire etc.
These are the main preventive methods for long life of computer and its accessories.

Software Security
Protecting our computers from viruses, security threats, and other technology risks has been a top priority for ensuring data safety and computer functionality is called software security. Computer security software can help us protect important documents, maintain program stability, and even prevent hackers and Trojans from entering our internal networks.

Software security is one of the important security measures required for a safe computer. The security of software includes security of both application programs and system software. From the security view point, Operating System (OS) is the most important which controls and monitors the entire system. If the system software has been designed with adequate security protection features, different types of computer abuse and malpractice can be prevented.
The operating system should include a set of security features to provide automatic protection. Generally the manufacturer incorporates security features as a part of the operating system or they added as a security package to the operating system. Software security is mainly required for:-
1. Prevention of loss of data.
2. Prevention of data and software program privacy.
3. Prevention of corruption of data
4. Prevention of error reading of data.

Whether it’s a small computer or the one that is for personal use, computer security software is essential for maintaining a well protected computer system and tracking all the program files.
The software having proper security system is able to:
1. Identify each and every system user.
2. Maintain a log of all usage.
3. Maintain properly the access control over data, program, resources, so that only the authorized user are allowed to access them.

Security Of data

The security of data is concerned with the control of circulation of information or data. The protection or security of data is the ethical use of data. It imposes the restrictions on the data stored in the computer system and the purpose for what it is to be used. Other aspect of data security is that inaccurate data should not be used.

Safety from Virus
Computer Viruses are a small computer program written by the computer criminals. The computer viruses affect the computer system resulting top the malfunctioning of the system. It is an agent insinuating into a program or a disk and forcing its host to replicate the virus code. It behaves as a destructing agent to the computer hardware or software. Today’s most common threats include computer viruses, Trojans, and worms, online ID theft, malware downloads false security threats by malicious self-called ‘anti spy ware’ program and unauthorized program downloads that can lead to system instability.

The following are the major harmful activities done by the viruses to the computer system:
a. They change the orderly arrangement of the program (e.g. package with or some other programs or hangs after running).
b. The data are lost whenever infected by some virus.
c. The size of file is altered.
d. When a file is infected by a virus there is every chance that it spreads to most of the other important files.

Viruses are mostly made to protect programs from the privacy, to introduce entertainment during the use of program, and to let the software companies to earn more money.

There are more than three thousand types of virus but according to the nature they are classified into three categories:-
a. Start up infector
b. system infector
c. General purpose application infector.
Thus, Viruses arises many problems, loss of programs and data which in turn results into wastage of money and manpower. So it’s wise to prevent our system from viruses. These are the following steps to be protected from viruses:
 Do not download any program from infected floppy disks or any networks to the hard disk of our computer unless we are confirmed that it is virus free.
 Not booting our computers with virus infected disks.
 Checking any diskette from friend or a unknown person before inserting into the drive.
 Keeping backups of our programs or data whenever we update it.
 Always keeping the backup of .Com, .Exe and Data files.
 Regular check of viruses in the computer and their elimination
 Using firewall from protecting from downloading of cookies containing viruses.
 Installing Antivirus software that isolates a file containing virus in a special directory and leaves a warning message on the screen.

Software should not only be free from viruses but also from other bugs and errors. Some software measures are:-

1. Password
To prevent the computer the user ca put the password system in the computer. Password protection prevents unauthorized access. We should prevent the use of computer by unnecessary persons. We should have password protection for our software access.

Maintenance of hard disk using defragmentation of files to manage and store fragmented files should be done. The passwords should change time to time and should not be revealed to others. Access rights will be assigned to each user depending upon their position in the organization.

2. Hard lock key
Hard lock key is a kind of checking point available within the software during its running time. The user must type a kind of password when the software asks the hard lock key to be typed. If it matches the software runs, otherwise it doesn’t work. Thus it protects the software piracy.

3. Backup
Sometime the software or the database stored in the hard disk could be damaged due to crash of the disk or due to virus. This can lead to a great deal of loss if we don’t have the backup files. Thus to prevent this problem the user must create the backup from time to time.

Operational security
Many PC LAN security packages include an audit control. It tracks what happens to a network. Like:-
1. Which user have logged on, from where and for how long.
2. How many times a server have been acbessed by which user?
3. Which software has been used?
4. Which files have been accessed by which users?
5. How many unsuccessful attempts were made to log on from any terminal (To detect hackers trying to guess the password)?

Security Policy
Proper security policy is to be made without costly overkill. A typical security policy will cover the following aspects:
• Awareness and education:
- Training and education requirements
- Timetable for training/ education
• Administrative controls:
- Defining formal procedures and standards
- Careful screening of personal during the hiring.
- Disciplinary procedures in the event of security breaches.
• Operational Controls:
- Backup procedures
- Control of the access to the data centers by means of smart cards, ID badges, sign- in sign- out registers.
• Physical protection of data:
- Controlled access to the sensitive areas
- Protection against fire and flood
- Uninterruptible power supplies
• Access control to system and information
- Identification and authentication of the users
- Password protection
- Different levels of access for different users according to their needs
- Different access rights, e.g. read only, read write, read – write- update, etc.
- Encryption of sensitive data.
- Detection of misuse and multiple attempts to get a password correct.
• Disaster recovery plan

Beside we can scan the files using scandisk that finds the files corrupted and repairs them and essential files should be encrypted i.e. should be converted into codes.
Also communication security measures like callback, hand shaking and encryption can be used.

These are some of the ways ve can protect, prevent, and secure our computer components from different factors and keeping it safe and secure for the prosperity of the user as well as computer and its contents.

Tuesday, January 3, 2012

CAN Info-Tech 2012 from January 26 to January 31

The Computer Association of Nepal (CAN) is organising the 18th CAN Info-Tech 2012 from January 26 to January 31 in Bhrikut-imandap, Kathmandu.

The fair will showcase the latest ICT products and services.

Over 100 companies dealing with hardware sales and maintenance, power solutions, mobile accessories, printing services, telecommunications, internet service and colleges and training school are taking part in the event.

Huawei Technologies of China and Ericsson India are some of the foreign companies that will be participating in the event, said Suresh Karna, president of the CAN at a press conference here on Monday.

“The show will be the best place for knowing about products and solutions and buying at attractive prices.”