• TECH MANTRA

Enjoy a fast, responsive and cost effective Remote IT Support service to solve your IT issues quickly and with the minimum of fuss.Focused on building innovative solutions that create value for businesses and consumers. Our solutions are built around the following three founding principles - Unique Technology; Distinctive Information / Content; and Innovative Services. Our solutions combine these three, leverage our global services delivery capabilities and ensure that we are able to provide unmatched, superior resolution to specific customer problems.


Techmantra

Monday 10 July 2017

RAID - REDUNDANT ARRAY OF INDEPENDENT DISKS

The RAID concept is simple: use multiple disks to provide disks hardware redundancy, thus greatly reducing the risk of data loss due to a disk failure, and provide enhanced disk subsystem throughput through the use of multiple drives.
Common RAID levels.

RAID 0

Simply provides enhanced performance. RAID 0  stripes data across multiple disk drives. This system increases throughput by increasing the livelihood that the disk subsystem will be able to fetch different portions of the same file  from multiple spindles at the same time.
This system has no fault tolerance. Any one of which can fail and ruin the volume .
* High performance ( when  data loss is not critical )


RAID 1

Consists of either disk mirroring ( maintaining the same data on multiple disks ) and/or disk duplexing (maintaining mirrors on separate disk controller to eliminate the risk of controller failure.
Provides both fault tolerance and greater performance , because the same data can be read from multiple disks or controllers.
* Costly
* Good read and write performance
* Mirroring
* High reliability



RAID 5

stripes at the block level , it also stripes the parity data across all disks. This eliminate the performance bottleneck of maintaining parity data on one disk, thus enabling the system to perform write operation more quickly. However this can make RAID set rebuilding slower.
*Distributed parity
*Spreads data and parity among all N+ drives.




RAID 1+0

* High fault tolerance
* High data availability
* Good Read/Write performance
* Very expensive



RAID CONTROLLER

is a hardware device or software program used to manage Hard-Disk or SSD in a computer or storage array so they work as a logical unit.

SNIFF OUT WIRELESS INTRUDERS



Even if you take every possible step to keep out wireless intruders ( e.g.. Hiding SSID, Limiting the number of ip address, filtering MAC address, Encryption ) , someone can still slip into your network. You can use several methods to regularly check your network.
For example, a free program called Airsnare keeps weather eye out for wireless intruders. If it finds any, it notifies you,  shows you their activity, and even sends the intruder an alert..

Before you can use Airsnare, you must download and install a library of tools the program needs. Get the wincap library from http://wincap.polito.it/install/default.html
Download and install Airsnare.
http://home.comcast.net/~jay.deboer/airsnare
After you install the program , goto c:\program files\Airsnare. Open trustedMAC.txt , and add the MAC addresses of all the network adapters on your network. Enter the MAC address on a new line follow it by a space, and then type in a description of the computer.
Go to C:\program files \ Airsnare and run Airsnare.exe
Choose your network adapter.
Whenever an unwelcome devices slips onto your wireless network, Airsnare will alert you. You can monitor the activity, including the sites they visit. You can even log their activity to a file and send them personalized alerts.

HIDE YOUR EMAIL ADDRESS ON WEBSITE

One of the best way to keep your email address off spam list is to not list it on any websites. But that is not always possible. You might have a personal or professional website where you want to include contact information. In this case, you'll have to publicly post your email address.

But there are ways you can post it and still hide it from spammers. Spambots harvest names by scanning through the text on web pages, identifying which text is an email address, and then harvesting the address. So when it finds xxxy@xxy.com , for example, it recognizes it as an email address and suddenly you're in spam city.

Spambots can't decipher graphics.

Step 1.

To quickly and easily hide your email address , create a graphic ( image file .jpg, png etc) of your address and include this image on your webpage as <img src> tag in html.

Step 2.

You can use Html characters (ansi codes ) for your address  rather than Palin text. When a browser comes across the html character it displays the code as a plain English character.

For example the html code &#112 displayed as "p" in browser. Spambots only see &#112
(*prefaced by &#. Separate each character by a semicolon ; and leave no spaces between characters.

For more html characters refer to
www.alanwood.net/demos/ansi.html

BLOCKING SPECIFIC FILE EXTENSIONS IN OUTLOOK

Many pests that spread via email specifically target Outlook. They do this for several reasons. "The most popular email software, and outlook is a part of Microsoft Office, and includes the same scripting features as the rest of office. Pest creators can use those scripts and macros to do their dirty work.
If you lear about a dangerous file type, you can tell outlook to block it, but you must edit the Registry.

1. OPEN REGISTRY

Run -> type regedit
Press enter.

2. GOTO THE HIVE.

for 2007 go-to HKEY_CURRENT_USER \ Software \ Microsoft \ Office \ 12.0\Outlook \ Security,
Which handles security for Outlook 2007.

3. EDIT THE STRING

Select Edit -> New-> String Value.
Type Level1Add , and press enter to create a nee string.
Select Edit-> Modify.

4. ADD EXTENSIONS YOU WANT TO BLOCK.

Type the extensions you want to block, such as .jpg . You can add multiple file types and separate them with commas.


:Outlook 2010
HKEY_CURRENT_USER\Software \ Microsoft\Office\14\Outlook \ Security
Outlook 2013
HKEY_CURRENT_USER\Software \ Microsoft\Office\15\Outlook \ Security
Outlook 2016
HKEY_CURRENT_USER\Software \ Microsoft\Office\16\Outlook \ Security

THE FIVE REGISTRY HIVES

The registry has thousands of settings; in fact , it often has tens of thousands. Three are organized into five main Registry sections, called Registry hives.

1. HKEY_CLASSES_ROOT

This hive contains information about file types, file extensions , and similar information. It instructs how to handle every different file type, and it controls basic user interface options, such as double clicking and context menus.

2. HKEY_USERS

This hive contains information about every user profile on the system.

3. HKEY_CURRENT_USER

This contains configuration information about the system setup of the user currently logged into. It controls the current user's desktop, as well as specific appearance and behavior for the current user. This hive also manages personal preferences, security rights, network connections, and connections to devices such as printers. This hive also includes Security Identifiers (SID), which uniquely identify user of the pc and contain information about each user's rights, settings, and preferences.

4. HKEY_LOCAL_MACHINE

This hive contains information about the computer itself, as well as the operating system. It includes specific details about all hardware , including the keyboard, printer ports and storage devices. In addition, it has information about security, installed software, system start-up, drivers, services, and the machine specific configuration.

5. HKEY_CURRENT_CONFIG

This hive contains information about the current hardware configuration of the system, in the same way the HKEY_CURRENT_USER hive contains information about the current user of the system.

Popular Posts

0x00000709 How to Fix “Operation could not be completed error” Error When Installing Shared Printer? Windows 11 22h2

  0x00000709 How to Fix “Operation could not be completed error” Error When Using Shared Printer? Windows 11 22h2 1. Via Group Policy Press ...

Popular Posts

Search This Blog

About

Enjoy a fast, responsive and cost effective Remote IT Support service to solve your IT issues quickly and with the minimum of fuss.Focused on building innovative solutions that create value for businesses and consumers. Our solutions are built around the following three founding principles - Unique Technology; Distinctive Information / Content; and Innovative Services. Our solutions combine these three, leverage our global services delivery capabilities and ensure that we are able to provide unmatched, superior resolution to specific customer problems.