Monday, April 28, 2008

Cisco CCNA Certification Exam Tutorial: Access List Details You Must Know!

To the CCNA test we must write and troubleshoot access lists. As you climb the ladder to the CCNP and CCIE, you see more and more applications for ACLs. Therefore we had better know the basics!
The use of " host " and " any " confused some newcomers to ACLs, so we take a look at the first.
It is acceptable to configure a wildcard mask only ones or all zeros. A wild card mask 0.0.0.0 means the address in the ACL line must match exactly a wildcard mask 255,255,255,255 means that all addresses are line.
Wildcard with the masks have the opportunity to work with the word host represent a wildcard mask of 0.0.0.0. Consider a configuration in which only packages from source IP 10.1.1.1, and all other packages denied. The following two ACLs do that.
R3 conf t
R3 (config) access-list 6 permit 10.1.1.1 0.0.0.0
R3 (config) conf t
R3 (config) access-list 7 allow host 10.1.1.1
The keyword, anyone can used to mask a wildcard 255.255.255.255.
R3 (config) access-list 15 permit any
Another often overlooked detail is the order of the lines in an ACL. Even in a two-or three-ACL line, the order of the lines in an ACL is vital.
Consider a situation where packages are from 172.18.18.0 / 24 is rejected, but all the others are allowed. The following ACL would that.
R3 conf t
R3 (config) access-list 15 deny 172.18.18.0 0.0.0.255
R3 (config) access-list 15 permit any
The previous example also shows the importance of the ACL configuration with the lines in the correct order to ensure the desired results. What would be the result if the lines were reversed?
R3 conf t
R3 (config) access-list 15 permit any
R3 (config) access-list 15 deny 172.18.18.0 0.0.0.255
If the lines were reversed, the movement of 172.18. 18.0 / 24 would be matched against the first line of the ACL. The first line is the " permit any ", which means that all traffic is permitted. The movement of 172.18.18.0/24 hit this line, the traffic is permitted, and the ACL stations running. The statement denying the traffic from 172.18.18.0 is never run.
The key to the letter and resolving access lists, to name just another moment to read it over and make sure it is to do what you intend to do it. It is better to realize your mistakes on paper, once the ACL & 39; s been applied to an interface!
Chris Bryant, CCIE 12933, is the owner of the Bryant Advantage (http://www.thebryantadvantage.com), home of free CCNA, CCNP tutorials, The Ultimate CCNA Study Package, Ultimate CCNP Study Packages, and CCNA CBT Video Training. Pass the CCNA exam, BSCI exam, and BCMSN exam with Chris Bryant, CCIE 12933!
For a copy of his Free ebooks, " As to the CCNA " and " How to CCNP " available on the website and download your copy! You can now Get a free CCNA, CCNP exam question every day without e-mail registration required. Get your CCNA study guide from the Bryant advantage!



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Saturday, April 26, 2008

Choosing The Right Web Host - The Hardest Customer Task To Solve

Can we take this whole Internet thing one step forward and assume our site on your own computer? Well, the main answer to this question is no! If you want to live site quickly or cheaply, it can be almost impossible to do so yourself. Outsourcing these tasks to professional web hosting prividers, that will save you money and headaches. The company will submit your site on the web server, make the necessary connections between a domain name and server configurations, and then you up and running. Your site is out there on the internet for all. But there are so many web pages. How can anyone choose between them?
Different companies offer different plans, features, speed and support levels, so how you can choose what is suitable for you?
The problem is that there are so many, and some shoppers, there are a lot of technical jargon that can enter into the image to select the right choice. This article is intended to simplify matters a bit, giving reasonable way to assess the value of the site.
The first thing to do is to decide what you need your page do.Is, this personal site, business site, or any organiztion site.Do you think selling things on your site, or, maybe management forum, you need to hit ect.These fight only some of the questions you want answered before even beginning to choose themselves.
There more factors that will determine the best hosting provider for you and this will be the main objective of this artcle.
First case to consider: warehouses and Transferring data
A small website or personal site, typically require only a few megabytes of disk space, however, data transmission, depending on the size of your page offer your visitors multiplied by the number of visitors. Thus, popular and graphics on the site of heavy requires more than the monthly translation of the site. You must look at least 2 GB (2000 MB) of data transfer a month. Ask the company that they can update your account if your site increases its demand for storage or monthly data transfer. Prepare for growth now that you do not have to leave the guard for unforeseen expenses when you go to expand their services.
Second case to consider: reliability
For online business, uptime is critical. You absolutely can not go to the host, who uptime less than 95%.
No Web host can have 100% uptime, and this can not be guaranteed. Avoid any hosts more promising than they can deliver. Most claims 99,9% uptime, but because of the nature of computers and communications equipment, and will disconnect occur occasionally. You can contact the company and ask, but they will tell you they are very reliable. Instead, ask a couple of sites they currently host that you can check themselves. Word of mouth is probably the most powerful in helping to judge these companies.
Third case to consider: Technical Support
Critical to success, you need a web-hosting, who can quickly solve problems with the least possible disruption to the work of your site. Because most hosting companies offer including technical support, you do not pay extra for it. If you do not offer 24 hours / 7 days you have to look elsewhere. Most nodes email support, but also to preserve eye for the hosts, who have phone numbers listed. This is obviously more valuable. While some pages have excellent turn around at the postal service requests, there is no alternative to actually be able to talk to someone if you need to.The test is to contact the company and ask questions. If they do not respond within 48 hours, or not respond at all, consider another hosting company. A good company must respond within 24-48 hours.
Fourth case to consider: Added functions
Various Internet hosting companies offer a variety of services. Web hosters provide a list of functions for the vast hosting plans to entice you to the arrival of their services. However, more importantly, what features you need and which ones you do not need. Make a list that you know your website should be able to do and find out if the company you can make it happen study for you.
If you get paid for the website, you have to be receiving mailboxes and FTP access. Do not dwell on the site without them. Make sure the e-mail addresses for your domain, rather than on hosting the domain. FTP access is crucial you intend to do any number of uploading files to your server. Do not dwell on Web applications. In addition, you will want to hold that provides the user to control these two features. Examples of services also include visitor counts, e-mail forwarding options, real-time chat, shopping cart functions, as well as web statistics. The list goes on. What is required in advance to list in hand, you do not forget to ask important questions.
Fifth case to consider: the pricing structure
If previous four steps to check, then you need to consider and this price can vary widely. You need to consider installation fees, monthly fees, discounts and plan optional additions in your calculations. Do not let price be the main factor in your decision if you start the personal page. For e-commerce, enterprises and organizations, service quality is more important. Some companies offer no monthly fees, but check the fine print before agreeing to anything. Free sites almost always have a pop-up window space or require invasive banners. Not just look at the lowest price. You should know how much prices will rise as you expand its services and customer base. Ask about the various scenarios. For example, small business owner who knows he will only need a small site to start should ask about the internet service provider hosting prices for medium-sized web sites with a large number visitors.Think for the future!
Keep also note that the most expensive plan is not necessarily the best and the biggest name of the company may not be the right match for you.
Many perfectly fine packages for small business is currently run between $ 15 - $ 25 a month. Some people say that there are three types of Web Hosts: free hosts, cheap and good hosts hosts - and there is more than a grain of truth in this matter.
A good hosting companies will not bind you in the long-term contract, which will not let you move if you do not like the service.
Final words:
The most important thing to remember is to research and shop around. These options and functions, which offer a wide range of web hosting services, which are necessarily satisfied. More Requirements for you, most likely, you pay more. But pay for quality hosting service provider is a good investment, especially if your business will in future become more dependent on the Internet. Finally, do not hesitate to ask questions and get information on services web pages - you do not want to regret it later.
Finally you can find more detailed information on hosting services by visiting my site http://www.itstandard.net/.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Wednesday, April 23, 2008

Virus Strains

What we need is the Dewey Decimal System to go digital ...
Specifically, someone has to coax maintenance for putting them into some logical order on the manner in which computer viruses are sorted.
Recently, warnings abounded on the Kama Sutra virus to proliferate rapidly cyberspace, joining the Grew.A and Nyxem.E as serious threats to the security of computer files. However, only those who took a closer look at these strains were able to discover that they all had something in common.
They were virtually the same virus.
There is uniformity in the library world when it comes to catalogging the millions of books contained therein, thanks to Dewey. The weather service managers do their bit for personnification breathing a little charm in that infamous tropical storms towards the allocation of names in alphabetical order each year. They key to both of these facts is that someone devised half universal identification of something that assists the general public to cope with it.
The time is fast approaching when someone needs to step forward and put some order in the world villainous computer infections.
New viruses emerge so suddenly and spread so quickly that those whose job is to find and destroy them have little time to muse over what to name them. With Lady Sutra, for example, destroy its file program appears to be spreading junk e-mail enticements to visit porn sites. The story ran with the media this topic and gave him a title-grabbing handle; Kama Sutra, of course, is the legendary lovemaking compiled a guide to classify the creativity of ancient Hindu hedonism.
Geeks, however, have their own perspective when they put a spin on things. As banks need stately names, spyware apparently has to carry Matrix-like titles to make them appear darker, more foreboding and a worthy challenge. After all, who among them will want to cancel the Kama Sutra? Is not confirm that the geek image as a cyber-eunuch?
Thus, titles like Grew.A and Nyxem.E was coined to see much more imposing and in need of professional help to eradicate.
F-Secure is a Finnish fighter viruses and widely acclaimed as one of the best of its kind in the market. His stature is such that when the identification of an intrusive program, warning others and accept the name you give. In this case, F-Secure saw the program code-sharing with the techniques and cetain file destroy predecessors, by what happened with & 39; Nyxem.E & 39;, derived from the acronym for the New York Exchange Mercentile, whose site is intended for the initial culprit.
Other sellers noted that this program destroyed files instead of overloading Web sites with fake traffic. Using a logic known only to one of the gnomes in the backroom of his employment, this meant that & 39; Grew.A & 39; was the most appropriate description. I can only think that asking for a clarification that the decision may cause most of us as much of a headache, like trying to remove the program after it has come to our computers.
Anyway, in these difficult times of terrorism alerts, if nobody else is ready to tackle the task of classifying viruses, elevators rock-and cobweb sweepers in the U.S. the Department of Homeland Security are willing to step into the fray. They have devised a system of names of the virus across the enumeration common malware, or CME. Outbreaks are assigned a random number, which in this case proved & 39; 24 & 39;.
We & 39; ll see if such a system captures the imagination of the public.
This is an important point, because if a unified command virus identification system to be effective, must immediately raise a general awareness so that the virus can be spread & 39; better shape.
If nothing else, & 39; Kama Sutra & 39; generated enough clicks quickly spread the word that a cyber-invader was to merodear by. Once designated as such, a program that had been circulating for weeks but began to destroy files only on the third day of each month, finally came to public attention. This gave vendors time to update their products and warn customers.
Incidentally, this strain is known to corrupt documents using the most common file types, including & 39;. Doc & 39;, & 39;. Pdf & 39; and & 39;. Zip & 39;. It affects most versions of Microsoft& 39;s Windows operating system, which caused the most widely heard warning of the problem.
Given the recent full of animosity against monopolies demand brought by the U.S. government against the software giant, makes it seem like their efforts to raise awareness of this virus has been necessary for becoming the proverbial strange bedfellows.
It the only fitting that something called Kama Sutra will be common. It is inevitable that are in this position. The task now is for them --- --- and everyone else to agree on what to call it.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Friday, April 11, 2008

A few simple steps to keep your computer running fast and problem free

Software Maintenance: Just like your car your computer needs some basic maintenance. The most common problems can usually be traced to the software that is on your hard drive. We all want to keep our Computer System running quickly and at peek performance. Here are a few easy tips that will insure that your Computer continues to function properly. First and most important is that a up to date Anti Virus software, such as Symantec s Norton Anti Virus, is installed on your Computer. Once a week the Anti Virus software should scan the entire system and make sure that no Viruses have been installed. You will also want to make sure that your Anti Virus software has the latest update. The second most important program to have installed is an Anti Spyware software. This software should also check the entire system once a week. If there has been a lot of internet activity you may want to check the system after browsing the internet. The next step to making sure that your system operates correctly is to Check for Errors on your hard drive. Simply right click your hard drive icon. Click properties, Click Tools then check for errors. You may have to shut down and restart for this application to complete. Things to remember: Always check to make sure that your Anti Virus Icon is on the task bar and is working. As soon as you believe that your software has been compromised follow the steps listed above. If they do not solve the problem then a professional should be called. Usually if the problem is caught within a few days it can be fixed without having to loose all of your data and programs. Hardware Maintenance: A majority of Hardware problems are caused by dust. Your computer case is designed to pull air from the front of the case over the motherboard and out through a fan in the rear of the case and rear of the power supply. Every three months the side of the computer case should be removed and the hardware should be cleaned of dust. The easiest method of dusting is by using a can of compressed air. The air should be sprayed on the computers heatsinc and fan, case fans, power supply fan and any other fans. You may want to check you video card as they typically have fans and are sometimes hard to see. By removing dust you will insure that heat generated from they computer is properly vented. Fan failure is typically the main cause of computer noise and power supply failure. The next cause of hardware problems is loose connections. Once a year the inside of the computer should be inspected. All cables to the hard drives, floppy drive and Optical drive should be inspected. Any add on card such as a video, sound card, modem should be checked to make sure that it is properly seated on the motherboard. It is also a good idea to make sure that the ram is making a good connection on the motherboard. Final thought: If you believe there is a problem with your computer. Backup what you can and try to fix the problem immediately or call someone who can. Most problems will not just go away they will usually get worse. About the Author Evan Freedman is an author for The Computer Geek and CSSZafco.com, distributor of computers and accessories. Evan has been diagnosing and fixing computer for over 25 years. Please visit the site to view a huge assortment of Computer Technology.  



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com