Tuesday 11 February 2014

Are you guys getting bored from your Old Whatsapp which give you simple as it is theme from day one & same emotions? 

Try New WhtasApp Plus  which give you 100 of New Themes as well as new emotions.

The best messaging and the most popular IM app now has multifarious replacements. WhatsApp is already facing a tough competition from other IM apps, and now we bring to you, Whatsapp+.

To Download Click On  " WhatsApp Plus " From Their Official Site Only

yaabot whatsapp plus Introducing   WhatsApp Plus!

What is New features in WhatsApp Plus APK?

Whatsapp+ is a mod of Whatsapp by XDA developer rafalense. WhatsApp+ allows users to modify and theme WhatsApp in ways not achievable on the original Whatsapp application – for example, you can hide your last seen status. Additionally, WhatsApp+ circumvents many functional barriers in WhatsApp to give you a better overall experience. For eg, no more image quality reduction when sending files.
Hide your last seen with WhatsApp+
Of course, since WhatsApp is a propriety application, the company has sent a DMCA takedown notice to WhatsApp+. Fortunately, it is still available online. So is WhatsApp+ really as good as it sounds? We find out -

Special Features:

  • Image quality has always been an issue with WhatsApp. While higher quality images are reduced in quality and size in the old WhatsApp, the new one does not face any such problem. Go ahead, share high quality pictures with your friends!
  • The media sharing default limit is set to 16 MB in WhatsApp+ and can be increased till 50 MB. This new setting is an advantage over the old WhatsApp, whose media uploading limit was only 12 MB.
  • Bored of refreshing your contact list and then clicking on your friend’s contact to see their current status? Well, WhatsApp+ frees you of this extra work by showing your contact’s status right below the chat.
  • The green colour of the WhatsApp icon no longer seems appealing to you? Change the colour of the WhatsApp+ icon from its default blue to red, cyan, pink, gray, orange. And if you miss the original WhatsApp icon, you can change it to green again !
 yaabot whatsapp+ screen4 Introducing   WhatsApp Plus!
 
  • There are innumerable themes which you can download in WhatsApp+ which wasn’t the case with the previous WhatsApp.
  • You can attach your location, send voice messages and send or forward multiple messages.
No image quality reduction when you send files on WhatsApp+

yaabot whatsapp+ screen Introducing   WhatsApp Plus!
  • You can modify the entire look of your chat screen, main screen, conversation screen, header background , contact icons. You can round up the corners of your contact pictures, change the colour of the chats, modify chat headers and rows, contacts headers and rows, change the colour of the notify bar and a lot more. You can personalise this app completely according to your choice.
yaabot whatsapp+ screen3 Introducing   WhatsApp Plus!
  • Like Hike, you can hide your online status in WhatsApp+. Though this is a paid service for which you need to download Plus Donation app from Play Store.

Verdict

NOT available on the Play Store Since it is an unofficial mod, WhatsApp+ app is NOT available on Play Store. Consequently, it faces stability issues on many devices. The app is known to crash from time to time. This remains the biggest put-off for the app, which if fixed, would ensure much higher downloads. You can download it from 3rd party sites. The download should be an apk file which you can install directly on your phone once transfer.
Caution: The original WhatsApp must be uninstalled before you install WhatsApp+. Your conversations will automatically be restored when you install WhatsApp Plus.
Attractive and appealing, with an interface which can be totally modified according to the preferences of the user, for me WhatsApp Plus is a sure shot replacement for the original WhatsApp.

To Download Click On  " WhatsApp Plus " From Their Official Site Only

What To Do When Error Like In Feed Burner : " Your feed file size is larger than 576K. You need to reduce its size in order for Feed Burner to process it"

 Tips for controlling feed file size with Blogger can be found in Tech Tips on FeedBurner Forums, our support site."

This happens when original feed from your blog if it is greater than 576K in size

How to solve  this?
  • Sign in to your FeedBurner account.
  • At the dashboard, click on the feed in which you are facing problem.
  • Now click on "Edit feed details" just below your feed name.
  • In "Original feed" area, add "?max-results=3" at the end of that feed.
    • Eg:- http://computerknowledgeadda.blogspot.com/feeds/posts/default?max-results=10
  • Now press Save Feed Details
Note: You can increase the feed result by increasing the number. That means if you want to see 10 results instead of 3 the change 3 to 10(?max-results=10).
 
Note : you Can Create New Feed with Above Tips with out doing anything with your current feed.

Overview of Active Directory Domain Services

Active Directory Domain Services (AD DS) is a directory service from Microsoft that stores information about different network objects , such as printers ,databases and users at a centralized location and makes this information available to all the users of the network.

For example :

 AD DS stores data related to different user accounts , such as ids , passwords and email ids at a central location and provides secure access of these information to the authorized users.

I am going to give a brief introduction to various elements of AD, such as domain controller - DC , domain , tree ,forest , trust relationship ,organizational unit - OU and site that collectively form an AD infrastructure. it also explores the forest and domain functional levels.

Lets begin with a brief of the AD infrastructure.

Exploring Active Directory Domain Services

Some benefits of AD DS are as follows:

- It follows a hierarchical organizational structure

- It provides fault tolerance , which means the ability of a system to provide services even in the event of a component failure

- It provides a single point of access to network resources

-It creates a trust relationship with external networks running previous versions  of AD

Windows Server 2008 introduces the following new features with regard to AD :

- RODC - Read-Only Domain Controller

- Server Core

- Fine-grained password policies

- Improved graphical user interface - GUI

- Improved auditing of AD modifications and deletions

- Ability to start and stop AD as a service without the need to restart the DC

Elements of Active Directory

- Domain Controller-DC

- Domain

- Tree

- Forest

- Trust Relationship

- Organizational Unit - OU

- Site

Domain Controller Installation - Step by Step

Once you install the AD DS role , the files required to perform the role are installed on the server .However, in this case, the server is still not promoted to a DC, You must therefore promote the server to act as a DC by launching the Active Directory Domain Services Installed Wizard by using the dcpromo.exe command.

Lets perform the following steps to promote the server to a DC and create a abc.com forest :
1. Click Start --> Run . The Run dialog box opens.


2. Type the dcpromo.exe command in the run dialog box and click the OK button.

   - The Active directory Domain Services binaries start installing -
 The Welcome to the Active Directory Domain Services Installation Wizard page of Active Directory Domain Services Installation Wizard appears.


3. Click the Next button.

   - The Operating System Compatibility page appears.

4. Click the Next button.

   - Then Choose a Deployment Configuration page appears. -
5. Select the Create Domain in a new forest radio button and click the Next button.


 - Then Name the Forest Root Domain page appears.

6. Type the complete DNS name of your domain .In this case ,I type abc.com and click the Next button.

- The computer checks to confirm that the DNS and the NetBIOS names on the network , are not in use.

After the verification process , the Set Forest Functional Level page appears

7. Select the Windows Server 2008 option from the Forest functional level drop-down list. The details relating to each of the functional levels are displayed in the Details section of the page . Selecting Windows Server2008 domain functional level, thereby enabling all the new features of Windows Server 2008.

8. Click the Next button.

  - The Additional Domain Controller Option page appears. Notice that the DNS server cehck box is selected by default.The wizard , during the AD DS installation process , creates the DNS infrastructure.
In the Additional Domain Controller Option page , also notice that the Global catalog check box is selected and disabled. Similarly, the Read-only Domain Controller (RODC) check box is clear and disabled .This is because the first DC within a forest must always be a global catalog (GC) server and cannot be an RODC.


9. Click the Next button.

  - A static IP assignement message box appears.

10. Click the Yes, computer will use a dynamically assigned IP address (not recommended) button.

  - Active Directory Domain Service Installation Wizard message box appaers stating that you will have to create delegation for this server.

11. Click the Yes button.

 - The Location for Database, Log files , and SYSVOL page appears , Notice that default locations are specified for the database file , directory service log files , and SYSVOL files.In a production environment , it is best to store these files in three different volumes that contain on application or files related to AD DS.

12. Click the Next button.

 - The Directory Service Restore Mode Administrator Password page appears.

13. Type a password in both the Password and confirm and Confirm password text boxes. This password is used to restore AD in case it is lost or correpted.

14. Click the Next button after the password is confirmed.

   - The summary page appears, displaying a summary of the selections you made so far. In case you want to make any corrections, click the Back button.
15. Click the Next button.


 - The configuratin process of AD DS starts, after the AD DS installation is complete , you are required to reboot the computer, which can also be done by selecting the Reboot on completion check box.After you have succcessfully created a forest and rebooted the computer, you can view the Server Manager Console to view the newly created forest.

( After creating a Domain Controller , you can now create users in the domain )

Server 2008 vs Server 2012

Posted by Unknown | 14:08 Categories: , ,

Server 2008 vs Server 2012

Server 2008 Features : 
  • Virtualization
  • Server core
  • IIS
  • Role Based Installation
  • Read Only Domain Controller - RODC
  • Enhanced Terminal Services
  • Network Access Protection
  • Bit locker
  • Windows Power Shell
  • Better Security
  • Cache / Proxy Management
  • Server core Installation
Server 2012 Features :
  • IIS 8
  • Power shell 3.0
  • Direct access
  • Cluster Shared Volumes
  • De-duplication
  • Hyper-V 3.0
  • Hyper-V Replica
  • iSCSI
  • NFS 4.1
  • SMB 3.0

pfsense - An Open Source Firewall

pfsense is a free, open source customized distribution of FreeBSD, as a software firewall it is powerful and flexible.the current version pfsense 2.0 includes most all the features in expensive commercial firewalls, and more in many cases.
The following is a list of pfsense 2.0 features. The main advantage of pfsense is we do not need to touch anything at the command line.

 -Firewall

- NAT (Network Address Translation)

- State Table

- Redundancy

- Load Balancing

- VPN (Virtual Private Network)

- Reporting and Monitoring RRD Graphs

- Real Time Info

- Dynamic DNS

And more....

The List of DNS record types

Posted by Unknown | 14:06 Categories: , ,

The List of DNS record types

     The Records or Information held by Primary zone, Secondary zone and Stub zone are of various types. Some of the commonly-used record types are :

Alias (CNAME) :

    Refers to domain name aliases, that is , creating an alternate record or DNS name for the name already specified as another type in a particular zone. It is normally found with computers on the Internet perform multiple tasks, such as Web server and Chat server. Under such a situation, the CNAME records may be used to specify multiple names to a single computer.

Host (A or AAAA records) :

    Resolves an IP address to a device. The host records are essential only for the computers sharing resources on network. A records are used for IPv4 and AAAA records are used for IPv6.

Mail Exchange (MX) :

    Identifies mail server and routes the email messages to the specific domain. for .Example,while sending an email to abc@@sonaby.com, your mail server first looks the MX record for sonaby.com to locate the mail server that handles the mail messages for abc@sonaby.com .The mail server further looks the host (A) records to connect to specific IP address.

Pointer (PTR) :

     Used to add the reverse lookup capabilities within a specific domain namespace. For example, a lookup for the domain name for IP address 192.168.0.210 is done through the query of the PTR record in the 0.168.192 form.

Service location (SRV):

    Specifies the location of a TCP/IP service.The SRV records are also used to specify  a specific port for a particular service. For example, a Web server service may be running on a specific port 9090 instead of 80.

Understand Full and Incremental Backup

     Backup ensures that the data of an organization is protected or can be recovered under the following circumstances :
  •      Hardware failure
  •      Accidental deletion or modification of data
  •      Restoration of the old version of a file
  •      Unauthorized deletion or modification of data
Below I mentioned the types of backups that can be performed in Windows Server 2008,

Full Backup

         Performs the backup of the selected files and also marks them as backed up. Full backup is usually performed when you need to take a complete backup of the system . You should select this type of backup when you are taking backup of the server for the very first time.

Incremental Backup

        Performs the backup of either the files marked for backup or the modified files. Incremental backup is performed in conjunction with full backup. That is , data of files from full backup is restored first and then the data of incremental backup is restored. Therefore, you should select this type of backup when you want to save data that has changed since the last backup.


Thank you for Visiting my Blog,
Do share your thoughts about this post, your comments will make my future posts better.

Full Server Backup - Using WBADMIN command

            Windows Server 2008 also provides the wbadmin command utility to create system state backup. Perform the following steps for the system state data backup by using the webadmin command :

            Click the Start button and then right-click Command Promt and select the Run as administrator option.
   The Administrator: Command Promt appears.

           -   Execute the following command:

         _______________________________________________________________
                       wbadmin Start SystemStateBackup -backuptarget :D:
         _______________________________________________________________


In the preceding command:

  wbadmin : Performs backups and restores the backed up data from the command-line with the help of batch files and scripts

StartSytemStateBackup : Runs the system state backup in Windows Server 2008

-backuptarget : Specifies the backup target drive

After executing the preceding command, the Do you want to start the backup operation? [Y] [N] message appears.

Enter Y for the Yes option and press the Enter key to continue the backup process. The backup process begins and the wbadmin command creates the shadow copy of the C drive in the D drive. After the backup process is complete, the summary is displayed.

RAID Levels - Easy to Understand

             RAID in Windows 2008 is implemented not only for fault tolerance but also for improving the performance. It is a technology that provides storage functions and reliability through redundancy. Therefore, you can define RAID as group of technologies that use multiple drives, in multiple  configurations, to store redundant data.

 In Windows Server 2008 , two types of RAID are implemented:
  
                      - Software based RAID : Specifies that to implement RAID array the system processor uses special software routines. This type of RAID is usually implemented at the OS Level.

                      - Hardware based RAID : Specifies that to implement RAID array controllers use proprietary disk layouts.

RAID Levels:

 RAID 0  (Min. 2 disks required)

     Provides no fault tolerance but helps in improving performance as read and write operations occur on all drives simultaneously. However, in case of failure of one disk causes loss of data on all volumes.

RAID 1  (Min. 2 disks required)

    Provides increased fault tolerance. In case of failure, there is no loss of data as long as one disk remains operational.

RAID 5  (Min. 3 disks required)

    Ensures that a block and its equivalent information are not stored on the same disk. This feature is very useful as in case of failure, it can rebuild the missing data when the drive is repaired or replaced.


[You should note that apart from the RAID levels that I listed above , There are 3 other types of RAID levels, namely:  RAID 3, RAID 4 and RAID 6. These are not implemented in Windows Server 2008]

How well do you know VOIP Protocols ?

    In computing , a protocol is a set of rules used by computers to communicate with each other across a network. It sets a standard that controls or enables the connection, communication and data transfer between computing endpoints.

  For example, HTTP and HTTPS are protocols used for communications over the Internet.

 Similarly, VOIP also communicates using standard protocols and they are;

  H.323 Protocols :

       H.323 is an umbrella recommendation from the International Telecommunications union ( ITU ).
It defines the protocols to provide audio-visual  communication sessions on any packet network. The H.323 standard address call signaling and control, multimedia transport and control and bandwidth control for point-to-point and multi-point conferences.

SIP Protocols:

    Session Initiation Protocol (SIP) is a signaling protocol. It is used for controlling multimedia communication sessions such as voice and video calls over IP. Other feasible applications of SIP include video conferencing, streaming multimedia distribution, Instant messaging and online games.

Proprietary Protocol:

    Proprietary protocols is a communications protocols owned by a single organization or individual. Proprietors may enforce restrictions through patents and by keeping them trade secrets. The restrictions are intended to give the owner complete control of the protocol. 

The most common protocols are SIP and H.323.

Difference between POP and IMAP

Post Office Protocol (POP):

- Best of you use only one computer to check email (Office users)
- Downloads your email to the particular computer you are checking it on.

- Allows you to keep a large size of email messages only limited by the size of your computer.

- Does not have web interface

- New messages are downloaded in their entirety ; you have to wait for the message to download.

- Clients connect to email server only for the time it takes to download any new messages. 

- Assumes that the currently connected client is the only client connected to the mailbox.

- Simple protocol and easy to configure.

- Less server loads and less costs for ISP and end users.

- Searching through mailbox does not depend on mail server resources.

Internet Message Access Protocol (IMAP):

  - Best if you use many different computers to check your email (mobile users)

- Your mail is always on the server

- You are limited by your mailbox size quota for how many messages you keep, although you can archive old messages and save them onto your computer manually.

- New message headers are downloaded so you see all your mail faster, the messages you want to read is not downloaded to your computer until you click on it.

- Users stays connected till the user interface is active.

- Allows simultaneous access by many users to the mail box.

- Protocol is complicated for both client and server implementation and more difficult and prone to error than POP3

- Higher server loads and higher costs for ISP and end users.

- Searching through mail boxes utilizes a lot of server resources.

Concept of Routing Table for Beginners

        Routers maintain routing tables that provide information about the path from router to the destination.In Windows Operating system, there are two commands available that allow you to view the routing table.

               - NETSTAT -  Allows the users to check the network configuration. It is to display protocol statistics and current TCP/IP network connections.There are several switches associated with this command.

                 * Netstat - n   - Used to display all the addresses and port numbers in the form of numbers.
                 * Netstat - r    -  Used to display the routing table.

              - ROUTE PRINT - Allows the user to view the current routing table. This command is similar to Nestat -t

     The routing table generally consist of a number of routes. Each route has information, which determines where the packed will be sent.
  • Network Destination - Indicates the IP address of the outgoing packet and refers to either to a single address or a network ID
  • Netmask - Similar to the subnet mask and is checked with the network destination to decide where the packet should be sent. A default netmask generally uses the class-full 0 and 255 values but they may also classless values.
  • Gateway - Indicates the gateway for the packet. for an IP client , this number is either the true default gateway for the network , the loopback, or the IP address of the client's Network Interface Card (NIC)
  • Interface - Indicates the NIC through which the packet should be sent out. for an IP client, It is either the loopback or the NIC's IP address.
  • Metric - Indicates the umber of hops to the destination. A single hop refers to the number of local networks the packet must move through.

Routing Protocols with the help of Diagram

 Routers communicates with each other using Routing protocols. The protocols help routers to learn the network topology and changes that occur in the network topology . routing protocols use routing algorithms to decide the best output path for the received packet. Routing algorithm is a part of network layer software and should be correct, stable and simple. It should decide the perfect path for the packet depending on the network topology and traffic. For finding the best path, router considers number of hops, time delay and communication cost of the packet transmission.

   A large Internet is divided into groups of networks called as Autonomous System -AS . An AS consists of network groups and routers which are managed by  a single organization. Interior routing is used within AS, whereas, Exterior routing provides routing between two ASs.

Protocol Diagram :

 

 

Thank you for Visiting my Blog,

Do share your thoughts about this post, your comments will make my future posts better.

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube