Sunday, February 28, 2016

What Is SSL (Secure Sockets Layer)


SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook).

SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. Normally, data sent between browsers and web servers is sent in plain text—leaving you vulnerable to eavesdropping. If an attacker is able to intercept all data being sent between a browser and a web server they can see and use that information.

More specifically, SSL is a security protocol. Protocols describe how algorithms should be used; in this case, the SSL protocol determines variables of the encryption for both the link and the data being transmitted.
SSL secures millions of peoples’ data on the Internet every day, especially during online transactions or when transmitting confidential information. Internet users have come to associate their online security with the lock icon that comes with an SSL-secured website or green address bar that comes with an extended validation SSL-secured website. SSL-secured websites also begin with https rather than http.     

NetBIOS (Network Basic Input/Output System)

NetBIOS (Network Basic Input/Output System) is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a de facto industry standard. NetBIOS is used in Ethernet and Token Ring networks and, included as part of NetBIOS Extended User Interface (NetBEUI), in recent Microsoft Windows operating systems. It does not in itself support a routing mechanism so applications communicating on a wide area network (WAN) must use another "transport mechanism" (such as Transmission Control Protocol) rather than or in addition to NetBIOS.

Saturday, February 27, 2016

What is IPv6

The IETF identified the problem with the rapid exhaustion of the IPv4 address space several decades ago. Despite the invention of classless IP addressing, it was assessed that a new addressing protocol was required to address long term needs. IPv6 was then designed as the succeeding standard to IPv4 and released in 1995. The resulting address space was then increased from 32 to 128 bits (16 octets) and deemed to be adequate for at least the mid-term requirements for Internet growth. The design of IPv6 incorporates the idea of allowing efficient aggregation of subnet routing prefix at the router level. This results in the reduction of routing table sizes and actual address utilization rates being small on any IPv6 network segment. The design also allows for the separation of the addressing infrastructure of a local segment’s space from the addressing used to route to or from external network traffic. The large number of network addresses also allows large blocks to be assigned for a specific purpose and when required aggregated for more efficient routing. The need for more complicated addressing conservation methods such as now used in Classless Inter-Domain Routing (CIDR) is also eliminated with the implementation of IPv6.
Similar to IPv4, IPv6 reserves blocks of IP address for private use. In IPv6; however, these are referred to as unique local addresses (ULA). This block of addresses uses the routing prefix fc00::/7 that is then divided into two /8 blocks that have different implied policies. The addresses include a 40-bit pseudorandom number which minimizes the risk of address collisions if packets are routed inappropriately or sites merge. None of the current or legacy IPv6 private address prefixes are supposed to be routed on the public Internet just like the behavior expected from IPv5. Finally, despite the majority of modern operating systems now providing support for IPv6, it has not yet seen widespread deployment in the home networking, VoIP, and networking peripheral fields.

What is an IP Address?

An Internet Protocol (IP) address is a numeric label consisting of a 32 bit number assigned to a network capable device that uses IP for communication. The address fundamentally serves two purposes: location addressing and computer host or network interface identification. The address indicates where the connected device resides with the majority of hosts/devices still using the IPv4 (Internet Protocol Version 4) form of addressing. A significant limitation of the legacy IPv4 addressing is that it supports less than 4.3 billion total addresses. Based on the rapid growth of the Internet and related technologies, the use of IPv4 is not sustainable for the long term. In the mid-1990’s, the new IPv6 technique was developed which makes use of 128 bits for the IP address. IPv6 technology continues to be deployed, albeit slowly. The Internet Assigned Numbers Authority (IANA) is responsible under the IETF for management of the IP address space allocation globally. Beneath the IANA, there are five regional Internet registries (RIRs) that are responsible for allocating IP address blocks to Internet service providers (ISPs) and other trusted organizations.

IP address classes

There were five IP address classes in use before the majority of industry switched to classless routing. There were A, B, C, D, and E. Class A addresses were used for networks with a very large number of total hosts. Class B was designed for use on medium to large networks, and C for small local area networks (LANs). Class D and E were set aside for multicast and experimental purposes. In the following table, the four octets that make up an IP address (a, b, c, and d respectfully) are displayed in how they were distributed in classes A, B, and C.
classes A, B, and C.
Class 1st Octet Decimal Range 1st Octet High Order Bits Network/Host ID (N=Network, H=Host) Default Subnet Mask Number of Networks Hosts per Network (Usable Addresses)
A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (27 – 2) 16,777,214 (224 – 2)
B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 (214 – 2) 65,534 (216 – 2)
C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 (221 – 2) 254 (28 – 2)
D 224 – 239 1110 Reserved for Multicasting
E 240 – 254 1111 Experimental; used for research

PowerEdge R320 rack server



Processor

  • Intel® Xeon® processor E5-2400 and E5-2400 v2 product families
    Intel Xeon processor E5-1410
    Intel Pentium® processor 1400 product family

    Processor sockets 1

    Cache 2.5MB per core; core options: 4, 6, 8, 10

    Internal interconnect Intel DMI 2.0

Operating System

  • Microsoft® Windows Server® 2012
    Microsoft Windows Server 2012 Essentials
    Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V®)
    Novell® SUSE® Linux Enterprise Server
    Red Hat® Enterprise Linux®
    Virtualization options:
    Citrix® XenServer®
    VMware® vSphere® ESXi ™
    Red Hat Enterprise Virtualization®

Chipset

  • Intel C602

Memory1

  • Up to 192GB (6 DIMM slots) 2GB/4GB/8GB/16GB/32GB DDR3 up to 1600MT/s

Storage

  • Maximum internal storage
    Up to 16TB

    Hard drives
    Hot-plug hard drive options:
    2.5” SATA, nearline SAS, SAS (15K, 10K), SAS SSD, SATA SSD, SAS 512n (15K) 
    3.5” SATA, nearline SAS, SAS (15K)

    Cabled hard drive options: 3.5” SATA, nearline SAS, SAS (15K)
    Self-encrypting drives available

Drive Bays

  • Up to eight 2.5” hot-plug SAS, SATA or SSD
    Up to four 3.5" hot-plug SAS, SATA or SSD

Slots

  • 2 PCIe slots: One x8 PCIe slot with x4 bandwidth, half-length, half-height
    One x16 PCIe slot with x16 bandwidth, half-length, full-height

RAID Controllers

  • Internal controllers: PERC S110 (SW RAID)
    PERC H310
    PERC H710

    External HBAs (RAID): PERC H810

    External HBAs (non-RAID): 6Gbps SAS HBA

Network Controller

  • Embedded NIC:
    Broadcom® 5720 Dual Port 1Gb LOM

    I/O adapter options:

    1Gb Ethernet:Broadcom 5720 Dual Port 1Gb NIC
    Broadcom 5719 Quad Port 1Gb NIC
    Intel I350 Dual Port 1Gb stand-up adapter
    Intel I350 Quad Port 1Gb stand-up adapter

    10Gb Converged Ethernet:Brocade® BR1020 Dual Port 10Gb CNA
    QLogic® QLE8262 Dual Port 10Gb DA/SFP+
    Broadcom 57810S Dual Port 10Gb Base-T CNA
    Broadcom 57810S Dual Port 10Gb DA/SFP+ CNA

    10Gb Ethernet:Intel X520 Dual Port 10Gb DA/SFP+ server adapter
    Intel X540 Dual Port 10Gb Base-T adapter

    FC8/FC4 HBA:QLogic QLE2460 4Gb Single Port FC HBA
    QLogic QLE2462 4Gb Dual Port FC HBA
    QLogic QLE2560 8Gb Single Port FC HBA
    QLogic QLE2562 8Gb Dual Port FC HBA
    Emulex® LPe-12000-E 8Gb Single Port FC HBA
    Emulex LPe-12002-E 8Gb Dual Port FC HBA
    Brocade 815 8Gb Single Port FC HBA
    Brocade 825 8Gb Dual Port FC HBA

Power

  • Platinum efficiency, hot-plug, redundant 350W power supply
    Bronze efficiency, cabled 350W power supply
    Auto-ranging power supplies

Availability

  • High-efficiency, hot-plug, redundant power supplies; hot-plug hard drives; TPM; dual internal SD support; fan fault tolerance; optional bezel; luggage tag; ECC memory, interactive LCD screen; ENERGY STAR® compliant

Chassis

  • Form factor 1U rack

Management

  • Remote management
    Basic management (default)
    iDRAC7 with Lifecycle Controller
    iDRAC7 Express (upgrade option), iDRAC7 Enterprise (upgrade option) 8GB or 16GB vFlash media (upgrade options)

    Systems management
    IPMI 2.0 compliant
    Dell OpenManage™ Essentials and Dell Management Console
    Dell OpenManage Power Center

    Dell OpenManage Connections:
    OpenManage Integration Suite for Microsoft® System Center
    Dell plug-in for VMware® vCenter™
    HP Operations Manager, IBM Tivoli® Netcool®, and CA Network and Systems Management

Rack Support

ReadyRails™ II sliding rails for tool-less mounting in 4-post racks with square or unthreaded round holes or tooled mounting in 4-post threaded hole racks, with support for optional tool-less cable management arm

ReadyRails static rails for tool-less mounting in 4-post racks with square or unthreaded round holes or tooled mounting in 4-post threaded and 2-post (Telco) racks

PowerEdge R720 rack server

Processor

  • Intel® Xeon® processor E5-2600 or E5-2600v2 product family

    Processor socket:2

    Internal Interconnect:2 x Intel QuickPath Interconnect (QPI) links; 6.4 GT/s; 7.2 GT/s; 8.0 GT/s

    Cache:2.5MB per core; core options: 4, 6, 8, 10, 12

Operating System

  • Microsoft® Windows Server® 2012
    Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V®)
    Novell® SUSE® Linux Enterprise Server
    Red Hat® Enterprise Linux®
    Virtualization options:
    Citrix® XenServer®
    VMware® vSphere® ESXi ™
    Red Hat Enterprise Virtualization®

Chipset

  • Intel C602

Memory1

  • Up to 1.5TB (24 DIMM slots) 2GB/4GB/8GB/16GB/32GB/64GB DDR3 up to 1866MT/s

Storage

  • Maximum Internal Storage:32TB
    Hot-plug hard drive options:2.5” PCIe SSD, SAS SSD, SATA SSD, SAS (15K, 10K), nearline SAS (7.2K), SATA (7.2K), SAS 512n (15K)
    3.5” SAS (15K), nearline SAS (7.2K), SATA (7.2K)
    Self-Encrypting Drives available

Drive Bays

  • Up to eight 3.5" drives or up to sixteen 2.5" drives

Slots

  • 7 PCIe slots:One x16 full-length, full-height
    Three x8 full-length, full-height
    Three x8 half-length, half-height

RAID Controllers

  • Internal controllers:PERC S110 (SW RAID)
    PERC H310
    PERC H710
    PERC H710P
    External HBAs (RAID):PERC H810
    External HBAs (non-RAID):6Gbps SAS HBA

Communications

  • Broadcom® 5720 quad-port 1GbE Base-T (no TOE or iSCSI offload)
    Intel I350 quad-port 1GbE Base-T (no TOE or iSCSI offload)
    Intel X540 dual-port 10GbE Base-T with 2 x 1GbE (FCoE capability enabled on the 10GbE ports)
    Broadcom 57800S dual-port 10GbE Base-T with 2 x 1GbE (TOE and iSCSI offload available on 10GbE ports)
    Broadcom 57800S dual-port 10GbE SFP+ with 2 x 1GbE (TOE and iSCSI offload available on 10GbE ports)
    Broadcom 57840S quad-port 10GbE SFP+ Rack NDC (NPAR1.0, SRIOV, DCB, iSCSI and FCoE offloads and CEM)

Power

  • Titanium efficiency, hot-plug redundant 750W power supply
    Platinum efficiency, hot-plug redundant 495W, 750W or 1100W power supplies
    Auto-ranging power supplies

Availability

  • High-efficiency, hot-plug, redundant power supplies; hot-plug drive bays; TPM; dual internal SD support; hot-plug
    redundant fan; optional bezel; luggage-tag; ECC memory, interactive LCD screen; extended thermal support; ENERGY STAR® compliant, extended power range; switch agnostic partitioning (SWAP)

Management

  • Remote Management:
    iDRAC7 with Lifecycle Controller
    iDRAC7 Express (default), iDRAC7 Enterprise (upgrade option)
    8GB vFlash media (upgrade option), 16GB vFlash media (upgrade optional)

    Systems Management:
    IPMI 2.0 compliant
    Dell OpenManage™ Essentials
    Dell OpenManage Power Center
    Dell OpenManage Connections:
    • Dell OpenManage Integration Suite for Microsoft® System Center
    • Dell plug-in for VMware® vCenter™
    • HP Operations Manager, IBM Tivoli® Netcool®, and CA Network and Systems Management

Rack Support

  • ReadyRails II sliding rails for tool-less mounting in 4-post racks with square or unthreaded round holes or tooled mounting in 4-post threaded hole racks, with support for optional tool-less cable management arm
    ReadyRails static rails for tool-less mounting in 4-post racks with square or unthreaded round holes or tooled mounting in 4-post threaded and 2-post (Telco) racks

Monday, February 15, 2016

Apple to launch new iPhone, iPad in March: 9to5mac

Unmanned Sub Hunters & Robot Battle Managers On the Horizon, DARPA Says

Space battles, unmanned submarine hunters and artificial intelligent systems that help human commanders make split-second decisions may sound like science fiction fodder, but military researchers are hard at work trying to make them a reality.
The U.S. military's Defense Advanced Research Projects Agency (DARPA) has put millions of dollars into projects to develop such technologies, as well as other projects to make cheap, reusable rockets and war technology, officials with the agency said Wednesday (Feb. 10) in a news briefing.
New foes, new technology

The U.S. has typically faced big, monolithic adversaries (think the USSR during the Cold War) or hostile nation states (like Iraq during the Gulf War), and over the past few decades, it has been incredibly dominant, said Steve Walker, the deputy director of DARPA. [Humanoid Robots to Flying Cars: 10 Coolest DARPA Technologies]
In the future, however, "we can't pick the next hotspots in the world and we can't necessarily focus on the fights we can win," Walker said.
Instead of a limited set of well-known foes, the U.S. now faces a myriad of quickly shifting and interconnected threats, from traditionally hostile nation states to criminal organizations to terrorist networks. Fighting those enemies may require something beyond the large, expensive military systems that take ages to design and build.
"We need to mix it up," Walker said.
Robot and man
Toward that end, DARPA is investing in a number of technologies that make warfare cheaper and more flexible.
For instance, the agency is investing in the development of a futuristic, relatively cheap space plane called the XS-1. The reusable plane would launch into suborbital altitudes, flying at hypersonic speeds of Mach 10, to deliver fleets of mini-satellites, then return to repeat the process.
Other proposed projects would take humans out of at least some of the equations of modern warfare. For instance, the agency is designing an unmanned warship that could hunt down ultraquiet diesel submarines — all without a human aboard. The first prototype, dubbed the Sea Hunter, is a 130-foot-long (40 meters) behemoth that took its maiden voyage in the waters off Portland earlier this month and will be christened in April. Such ghost ships could be connected in an invisible grid with other manned vessels, constantly communicating to dynamically assess threats.
Another project aims to put artificial intelligence (AI) in the cockpit with human pilots. The AI would then be used to sabotage the enemy's communication networks.
"The way we would do that is by first of all scouring the spectrum in real time and then second of all applying some of the most amazing technology from the frontiers of artificial intelligence and machine learning to learn what the adversary is doing in the electromagnetic spectrum, start making predictions about what they're going to do and then adapt the on-board jammer," said Arati Prabhakar, the director of DARPA.
Currently, completely unknown signals must be sent back to a central command station, where they sometimes take months to decode, she said.
And the newly proposed Hallmark program would leverage artificial intelligence systems to rapidly assess dynamically changing data in futuristic space battles — then present a set of two or three decisions to a human commander, who would be able to make decisions more quickly than he or she otherwise would.
"You don't want to overload the human; you want to give them exactly what they need to make the decision," Walker said.

Wednesday, February 10, 2016

hard drive unhide

 Click Start
Click Run
 Run Dialogue Box show
  Run Dialogue Box-type gpedit.msc then enter
  show the Group Policy Window 
 Local Computer Policy   User Configuration then click
  then right side double click Administrative Template
double click Windows Components
double click Windows Explorer
in the Setting  click “Hide these specific drives in My computer” 
in the under Windows Explorer  click Display Properties
Hide these specific drives in My computer" box show
 in the Setting- select Not Configured
click apply,click ok 

Pendrive bootable by command prompt

 Step 1:
Open your PC's PowerShell or Command Promt with administrative rights.
Step 2:
After inserting your USB pendrive, run DISKPART from the PowerShell.
Step 3:
Type the command LIST DISK. The result will be as shown below:

Here DISK 0 is the hard disk and DISK 1 is the pendrive I have used.

Step 4:
In my case, the USB drive is DISK 1. So in this step, I enter the following command:
SELECT DISK 1. According to your disk number, the "1" in the command will change.


Step 5:
After the USB drive is selected from DISKPART, enter the following commands one by one:

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN
And at last, enter EXIT command

Step 6:
Exit PowerShell and insert your Windows 7 installation disk. Now open 'My Computer'.


Note the drive letters of both - Your pendrive and Windows 7 installation disk. In my case, they are G: and H: respectively.

Step 7:

Again start PowerShell and enter following commands one by one:

H:

CD BOOT

BOOTSECT.EXE /NT60 G:

Note the drive letters I used here are H: and G: according to my drives and these letters may be different for you.
Now your pendride has become a bootable one. 

Tuesday, February 9, 2016

how to animate individual cells, rows, or columns in my table in powerpoint

Duplicate the slide that has the table you want to animate. Leave the first instance of the slide untouched. For now, it ...