Thursday 27 March 2014


Configuring A Dfs Root

To create a Dfs Root, an existing share can be used or a new one can be created. To use the Es-Net share as a Dfs root, click on Start.Select Administrative Tools. Select Distributed File System. This is the Dfs management console. To create a new Dfs root right-click on Distributed File System. Select New Root. The New Root Wizard will appear. Click on Next to continue. Select Stand-alone root to create a new Stand-alone root. Click on Next to continue. The name of the host server must be typed in or browsed for. Click Next to continue. The root name of the folder to share
must be typed in. Click Next to continue. This is the summary page. If all settings are correct then click on Finish to create the new Dfs root. The new Dfs root is displayed in the Dfs management console. Dfs links can now be added to the new Dfs root.



Dfs Replication

Using Domain-Based Dfs, the Dfs root structure can be stored on more than one server. The Dfs root folder will still be accessible if one of the servers goes down. The location of the Dfs root server is published in Active Directory and can be found easily by using its DNS name.In order to use Dfs replication, two or more domain servers are required. The domain es-net.co.uk has two Domain Controllers; Admin1 and Admin3. Open the Dfs management console. Right-click on Distributed File System to create a New Root. Select New Root. The New Root Wizard will appear. Click on Next to continue. The Host Domain for the Dfs root is going to be ES-NET.CO.UK. Click Next to continue. The shared folder Es-net is going to be used for the Dfs root. The Dfs root name is going to be Es-net and will be accessed using the UNC path, \\ES-NET.CO.UK\es-net. N.B. The location of the server isn’t needed, since Domain-based Dfs makes use of DNS. Click Next to continue. Check the summary page. If all settings are correct then click Finish.  The new Dfs root appears in the Dfs management console. To create a root target on ADMIN3, right-click on the Dfs root. Select New Root Target. Type in the name of the second server to host the Dfs root, N.B. This has to be a domain server. Admin3.ES-NET.CO.UK will also host the Dfs root. Click Next to continue. The share Es-net on admin3 will also be used to host the Dfs root. Click Finish to close the wizard. The \\ES-NET.CO.UK\Es-net Dfs root is displayed in the management console. The Dfs root is stored on two machines; admin1 and admin3. Once configured correctly, if either of the servers goes down the Dfs root will still be accessible. Information contained in the root folders needs to be replicated. To configure replication right click on the DFS root.  Click Properties. Click next to continue. Before replication can take place a folder will need to be selected  as an initial master. Select \\admin1\es-net. Then click next.Click Topology.
  • Ring: files replicate to computers in a circular configuration.
  • Hub and Spoke: One computer is designated as the hub. All other connected computers are spokes. Hub replicates with the spokes and vice versa, spokes never replicate directly with each other.
  •  Full Mesh: Every computer has a connection to every other computer. Files created on one computer replicate directly to all computers.
Select Custom. Click Finish to continue. Connections will have to be created before replication can be started. Click OK. Right Click the DFS root.  Select Properties.  Select Replication.  Select Customize.  Select New.  Select Servers to be connected. Click OK to continue.


Configuring Dfs Fault Tolerance

Although the Dfs Root is fault-tolerant, if any links inside the Dfs go down then they will be lost until the server is recovered. To create a fault-tolerant Dfs link, right-click on the Dfs root.Select New Link. Type a Link name and the location of the Target. Accounts will link to \\Admin1\accounts. Click OK to continue. The new link is displayed in the Dfs management console. If admin1 was to go down then the root folder would still be accessible, but Accounts would be unavailable. To create a new Dfs link replica right-click on Accounts. Select New Target. Type in the network location of the folder to be used as a replica of Accounts. Click OK to continue. Accounts will point to both shared folders \\admin1\accounts and \\admin3\accounts allowing for fault-tolerance. To enable replication click on Yes.Replication wizard starts Click on next to continue. Before replication can take place a folder will need to be selected  as an initial master. Select \\admin1\accounts. Click next to continue. Click on Topology.  Select Custom.  Click on Finish to continue. Connections will have to be created before replication can be started. Click OK.
Right Click on Accounts.  Click on Properties.  Select Replication.  Select Customize.  Select New.   Select the servers to connect.    Click OK to continue.  When all connections are complete, click OK. Replication is enabled. Right click accounts to check its status. Select Check Status.  A green tick indicates that all is as it should be.   Further links can now be added.

Configuring Dfs Fault Tolerance

Although the Dfs Root is fault-tolerant, if any links inside the Dfs go down then they will be lost until the server is recovered. To create a fault-tolerant Dfs link, right-click on the Dfs root.Select New Link. Type a Link name and the location of the Target. Accounts will link to \\Admin1\accounts. Click OK to continue. The new link is displayed in the Dfs management console. If admin1 was to go down then the root folder would still be accessible, but Accounts would be unavailable. To create a new Dfs link replica right-click on Accounts. Select New Target. Type in the network location of the folder to be used as a replica of Accounts. Click OK to continue. Accounts will point to both shared folders \\admin1\accounts and \\admin3\accounts allowing for fault-tolerance. To enable replication click on Yes.Replication wizard starts Click on next to continue. Before replication can take place a folder will need to be selected  as an initial master. Select \\admin1\accounts. Click next to continue. Click on Topology.  Select Custom.  Click on Finish to continue. Connections will have to be created before replication can be started. Click OK.
Right Click on Accounts.  Click on Properties.  Select Replication.  Select Customize.  Select New.   Select the servers to connect.    Click OK to continue.  When all connections are complete, click OK. Replication is enabled. Right click accounts to check its status. Select Check Status.  A green tick indicates that all is as it should be.   Further links can now be added.


 

Thursday 20 February 2014

 

400 Android Games Collection + HD + Emulators [PAID APPS ONLY]

 

 

Description

--------------------------------------------------------------------------------------------

The 400 most popular games from Android Market! This torrent includes all games

from my other torrents. If you liked my others collection you gonna love this, 

it's definitely worth to download "again".                                    

                                                                               

My 300 android collection was included more than 50 games who was not able to  

install - all this is now deleted. So this torrent includes more than 150 games

than my 300 Android games collection!                                          

--------------------------------------------------------------------------------------------

The Torrent is including:                                                      

                                                                               

400 Android Games - Paid Only                                                  

7 Android Emulators - Paid Only - Free roms can be found at RomHustler.net     

ASTRO Manager Pro - Just install and your ad is disable                                                                                           



Please check in utorrent to know the GAMES!                                    

--------------------------------------------------------------------------------------------

Install apps with the .apk extension:                                          

                                                                               

1) Go to settings - applications - enable the 'unknown sources' option.        

2) Put the .apk files somewhere on your SD card.                               

3) Open your file manager on the device (like Astro Manager from market). You can

delete the Ad using the key in ASTRO.Manager.Pro map.                          

4) Select a .apk file.                                                         

5) If you get the 'complete action using' pop-up, choose 'package installer'.  
Click Here          

 

Need For Speed Rival

DESCRIPTION

Erase the line between single player and multiplayer in this street-racing rivalry between Cops and Racers.

Seamlessly join a world where your friends are already racing and chasing. Forget isolated game modes. There are no lobbies; no waiting. You and your friends can all share the same race as paths cross and experiences merge.
• All-drive: Imagine your race and your friend’s pursuit colliding—creating a world where no two events feel the same. Don’t want to play with others? Then simply choose to make Redview County yours alone and dominate the advanced Racer and Cop AI.

• High-stakes rivalry: Racers are lone wolves out for glory; driving agile cars built for high-speed racing and epic chases. Cops work in teams to hunt down and bust racers using the full power of the police force. Switch roles whenever you like, and watch the stakes grow through a new scoring system that puts your speed points on the line.

• Next-gen racing: Experience speed that you can truly feel in the fastest racing game around, powered by the Frostbite 3 engine. Every detail of the game world is rendered in stunning, high-definition graphics. Race and chase in snow, hail, rain, dust storms and heavy fog.

Download Link

http://kickass.to/need-for-speed-rivals-skidrowcrack-t8184155.html#main

Saturday 4 January 2014

Transmission Control Protocol/Internet Protocol (TCP/IP)

In order for communication to occur on a network  all parties must use a common language. In IT networks this is known as a protocol.  There are many different protocols available for computer networks. The most common and widely used being TCP/IP.

TCP/IP is the standard protocol that is used on the internet. In order for any network to access the internet you must use the TCP/IP protocol suite. TCP/IP is required by Active Directory. For this reason, TCP/IP is the default protocol for Windows XP and 2003.

Protocols

Reference is often made to the TCP/IP stack. This consists of layers of mini applications which perform the discrete job of  sorting and filtering the data packets picked up by the NIC and then passing the packet on to the next layer for further processing. Eventually a coherent message pops out of the top of the stack into the operating system for the user to read. The reverse is also true i.e. converting of the reply into data packets that can be sent over the network media.
The layers in a TCP/IP stack write headers for network messages as well as decoding them.  Each level in the stack adds a portion to the network packet which its counterpart in the receiving computer will understand.  Strictly speaking, the NIC isn’t part of TCP/IP, but protocols are bound to a particular adapter.
At the receiving computer, the headers are stripped off as they pass up through the  TCP/IP stack until only the bare payload is presented to the user.

The DOD Four Layer Model

Transmission Control Protocol/Internet Protocol (TCP/IP)TCP/IP is often referred to as the TCP/IP protocol suite. TCP/IP is in fact a group of protocols/applications working together to provide network communication. TCP/IP was invented by the US Department of Defence (DOD) to allow machines to communicate over a network. It is a simpler model than the 7 layer OSI model.  The different components of TCP/IP all function at different layers. These layers group the different components into four different categories.

The Application Layer

The Application Layer contains the applications that use TCP/IP such as Internet Explorer and Outlook.  The Application Layer also contains Application Programming Interfaces (API) such as Winsock, which enables applications to use TCP/IP.

The Transport Layer

The Transport Layer is responsible for the transfer of data on the network.  There are two different transport protocols TCP and UDP. Both protocols provide transport but work in different ways.

Transmission Control Protocol (TCP)

TCP is a connection-orientated protocol. Both sides confirm that the data is being sent and received.

User Datagram Protocol (UDP)

UDP is a connectionless-orientated Protocol. Both computers presume the other side has received the data.  As an example, name resolution uses UDP. If the query fails then a TCP name query is made.

The Internet Layer

To send data the sender must have a method of distinguishing the recipient. This is called an IP address and they take the form of a unique number on the network . The Internet Protocol is responsible for these addresses.  The Internet Control Messaging Protocol (ICMP) is used to test connectivity between machines by sending ICMP messages using the PING command.  The Internet Group Messaging Protocol (IGMP) is used to send data to groups of machines, e.g. Streaming Video. This is known as Multicast.  The Address Resolution Protocol (ARP) is responsible for changing an IP address into the network card’s physical address. Every network card has a unique physical address hardwired into the card itself which is needed for communication on a network.

The Physical Layer

The Physical Layer is responsible for the actual physical media and how the data is sent to another machine, e.g. Fibre Optic, ATM.  There are many ways to send data down the cable, the most common technologies for LANs are Token Ring and Ethernet. In order for two machines to communicate they must be using the same technology or be connected via a bridge .

Troubleshooting TCP/IP

These are the two main utilities for troubleshooting TCP/IP:ping – used to test connectivity
ipconfig – used to view IP address information.
Before launching into detailed settings investigation, always check that the hub/switch has power to it, or that the network cable hasn’t been pulled out.
The ping command does the following:
Verifies connections to one or more remote computers by sending ICMP echo packets to the computer and listening for echo reply packets.
Waits for up to one second for each packet sent.
Prints the number of packets transmitted and received.
Each received packet is validated against the transmitted message to check that no data loss occurs.
The first  item to ping is the local NIC. The loopback address is 127.0.0.1. (Pinging “localhost” does pretty much the same thing.). If this fails then either your TCP/IP stack isn’t installed correctly, or the network card is not functioning.
Troubleshooting TCP/IPThe first  item to ping is the local NIC. The loopback address is 127.0.0.1. (Pinging “localhost” does pretty much the same thing.). If this fails then either your TCP/IP stack isn’t installed correctly, or the network card is not functioning.
Note that an address or computer name can be pinged.
Here a computer “jacklap” (ip address 10.1.0.104) can’t be pinged. This doesn’t necessarily imply a connection problem. It may be a name resolution problem, and can be tested by pinging the ip address.
If you can ping your own machine and others on the local network, then try pinging the default gateway. A message such as the one above implies that either the address is a wrong one, or if the report reads destination host unavailable then there may a problem with the gateway machine (router).

Ipconfig

Default gateways or DNS servers can be discovered using the Ipconfig utility.
Typing Ipconfig at a command prompt brings up useful information. No settings can be altered from this window, but it reports the current settings for TCP/IP.
Typing Ipconfig with the /all switch presents additional items such as the adapter’s MAC address and name resolution information.

Internet Connection Firewall

Windows XP ships with a basic built-in firewall. The firewall helps protect the computer from outside attacks on the internet. A firewall controls which network traffic is allowed in and out of a computer. It does this by opening and closing ports.
When communications take place between two machines different port numbers are used depending on the service. As an example a Web Browser will communicate with a Web Server on port 80, which is the default port for HTTP (The language used to display web pages).
There a thousands of port numbers available many of the lower range numbers being reserved for common services. A few of the common port numbers are listed below.
Port 80:    HTTP (Web Pages)
Port 21:    FTP    (File Transfer Protocol)
Port 25:    SMTP (E-Mail)
Port 110:   POP3   (E-Mail)
Port 443:   SSL     (Secure Web Pages)
A hacker can sometimes compromise security on a machine by gaining access to the machine through an unused port. A Trojan horse virus opens a port on a client machine allowing a hacker to gain access to the machine.  A firewall can be configured to allow only specific ports in and out of the computer thus greatly reducing the risk of a cracker gaining access.
Internet Connection FirewallTo enable and configure the Internet Connection Firewall navigate to the properties of your network connection and selected Advanced.
Check the Internet Connection Firewall box to enable the firewall.
And select Settings to configure it.
A list of services allowed to connect to this machine is shown. New services can be added by selecting Add.
And filling out the details for the service.
For example this machine is hosting a Puma chat room server. Click on OK to add the service.
Connections on port 270 are now allowed to connect to this machine.
The Security Logging Tab specifies settings relating to the security log. For example you can log any unsuccessful connections.
The ICMP tab can be used to configure ICMP packets on the computer. ICMP packets are used during ping requests.
The options for the Internet Connection Firewall have been improved slightly for Windows XP Service Pack 2 however the principals remain exactly the same.  Although the firewall is good enough to protect home users, for larger corporate networks and servers a third-party firewall should be used such as Microsoft ISA server.

Configuring TCP/IP

This free lesson will teach you how to configure TCP/IP in windows and how to use the ipconfig command.
To configure TCP/IP click on Start.
Right-click on My Network Places.
Select Properties.
Configuring TCP/IP
Right-click on the connection you want to configure and select Properties.
Highlight Internet Protocol (TCP/IP).
Select Properties.
This machine is currently configured to obtain an IP address automatically. Select Use the following IP address and fill out the relevant details.
Additional gateways and IP addresses can be added by clicking the Advanced Button…
..and configuring the appropriate options.

Using the ipconfig command

The ipconfig command can be used to display IP address information from a command prompt
Running ipconfig with /all switch produces a much more verbose display.