Jump to content
xisto Community

rohitwebmaster

Members
  • Content Count

    41
  • Joined

  • Last visited

Posts posted by rohitwebmaster


  1. Hay i found this types of problem in my friend desktop computer. After finding many of topics i don't find any solving process. By the way i'm a IT expert from India. This types of problems may occur due to power mismatch/leaking inside your computer.1> check the power supply of SMPS cable is stable.2> check earthing cable is properly working.3> reinstall the motherboard (please use anti connector paper between mother board and cabinet of CPU.4> reinstll the RAM and battery of CPU.It will solve this problem!!


  2. Google+ and orkut will never beat facebook, I'm a big fan of facebook & i can connect with all of my friends, i can share, post, comments, chat even in mobile.

    My experience with google+ : At first look, its looks same as facebook. but i have slow internet connection and its takes more time to load. 2ndly my no single friend now using google+ so i can't use. google+ is not available for low version of mobile.

    google+ circle is also very confusing and page not loading properly in opera and firefox. but facebook is supported by every browser.

    You know Facebook giving free access with many of mobile telecom company. I have a Airtel connection, n i can use free facebook by going http://0.facebook.com/error/?err=zc&std&refsrc=http%3A%2F%2F0.facebook.com%2F&_rdr .

    Facebook is best in pages, we can follow any company like twitter. but no one like to subscribe through google+.

    conclusion : google+ is a company og google, so people want to try, but trust me no one is happy with google+ , we all know about orkut, orkut was popular till 2010, but now maximum people left orkut because facebook is best. and in our busy life we can assess facebook from anywhere like computer, mobile smartphone, USSD based gsm plateform (need no internet).


  3. hay friends, i like 2 know about warn 20% means?Today my friend send me a email with mysql backup topics, and i don't know that was copied from some other site. and i warned 20% by a moderator of Xisto forum. Is this harm for me and my account? means its a temporary or permanent warning??i'm sorry that what i did. please remove the warn20% from my account.(sorry again i don't find where to write this, too confused about this forum, i'm a newbie.)Hope you will understand my problem..


  4. As many people now know, connecting to a public, unsecured wireless network can have serious risks. Itâs known that doing this can provide an opening for all manner of data theft, particularly passwords and private information.
    The specifics of why an unsecured connection can be a problem is more obscure, however â as are the methods that can be used to beef up your security even when using an unsecured public hotspot. Letâs have a look at the exact WiFi security risks of public networks, and the solutions available to counter those risks.
    Ah! My Airwaves!

    security of wifi connections:

    The problem of unsecured wireless networks is a part of the way radios work. Unless specifically designed to do so, a radio wonât broadcast in any particular direction. It will send information across the airwaves in all directions.

    As a result, anyone nearby can potentially pick up the data sent by a wireless radio, and if that data is unsecured, it can be read. WiFi security works by encrypting the data sent. It can still be picked up, but canât be easily read because of the algorithm used to scramble it.

    Most people understand this broad summary of the issue, but itâs actually a bit misleading, because it seems to imply that someone can simply open a notepad, connect to a public network, and watch passwords drop in. In truth, obtaining data even over a public WiFi network requires a certain level of knowledge about software.
    but in practice some technical knowledge is usually required to do anything truly malicious.

    It is a great technology that offers many benefits. As the saying goes, however, with privilege comes responsibility. A responsibility that is unfortunately much too often ignored by the person implementing it. A wireless network needs to be properly secured as it poses a number of extremely serious risks and dangers if left wide open and exposed, which many users are unaware of.

    Why secure a wireless network?

    If you are thinking right now that you have nothing important on your network and that you have no need to secure your wireless network, I guarantee you that you will reconsider your opinion after reading the next few paragraphs. Consider the following dangers of having an unsecured wireless network.

    Bandwidth Parasite

    In a âbestâ case scenario, all the intruder does is use the victimâs broadband connection to get online without paying. Maybe just to surf the web, maybe to download pirated music or software. This does not cause any direct harm to the compromised network, but it can slow down Internet or network access for the victim, the legitimate user of the network, if an intruder leeches off his bandwidth. This could mean substantial additional ISP cost for the victim if the ISP meters used bandwidth and charges for actual usage.

    Masking criminal activity

    An unauthorized user could abuse the victimâs connection for malicious purposes like hacking, launching a DoS attack, or distributing illegal material. Since the intruder is a part of the private network and sits behind its gateway device, any traffic between him and the Internet will appear to be coming from the public IP address the ISP assigned to the victim. The ISP has no idea how many computers are behind the gateway, who they belong to, and what they are used for. If the criminal activity is discovered and investigated, the origin of the attack will be traced back to the victimâs broadband account. It is a pretty safe bet that nobody wants to be accused of and go to jail for distributing child pornography or hacking into restricted company or government networks (just to mention a few examples) if the crime was in reality committed by a cracker from behind an innocent victimâs network. Reviewing ISPâs Terms of Service usually reveals a clause that not only allows the ISP to reveal customer information to the authorities to assist with legitimate criminal investigations, but also holds the customer responsible for any activities the connection is (ab)used for.

    Free access to private data

    A wireless network is also a direct backdoor into the victimâs private network â literally. Instead of intruding from the public side of the gateway device, the intruder connects directly to the network on the private side of the gateway device, completely bypassing any hardware firewall between the private network and the broadband modem. Most people assume that since they are behind a gateway device with a built-in firewall their private network is safe, hence letting down their guard, sharing drives, and being generally careless. The intruder can completely take advantage of this by snooping around undisturbed and getting access to confidential data. This could be in form of personal information such as financial data, tax records, wills, and more that can be abused for identity theft for example, or in form of work-related information such as confidential specs, development information, trade secrets, and more that the victim has brought home from the office. By employing a sniffer an intruder can even sniff email or FTP user names and passwords because they are usually transmitted in cleartext, and use that information to gain unauthorized access to email accounts or web servers without the victimâs knowledge.

    Backdoor into corporate networks

    In addition, a wireless network could also be an indirect backdoor into a corporate network. An intruder can specifically target an employee of a company whose confidential information is valuable to him for monetary or competitive reasons. If that employee establishes a VPN connection either permanently from his gateway or from a machine behind his gateway to the company network, the intruder can then piggyback on the VPN tunnel and gain unauthorized access to company resources, a serious security breach and every network administratorâs nightmare.

    Thatâs why

    By now the danger should be pretty clear: Unsecured wireless networks are unacceptable due to the extremely high risks involved. Yet there are countless unsecured wireless networks out there. A train ride through the Silicon Valley East Bay area revealed about 60 wireless networks, 40 of them wide open and insecure. A drive around a residential neighborhood covering just a few blocks revealed over 30 wireless networks, 20 of them wide open and insecure.

    What is even scarier is that it does not take any skill to discover and gain unauthorized access to wireless networks. One does not have to be a programmer, Linux expert, or network specialist. All it takes is a laptop with a wireless network card, and some software (also available for Windows) that can be easily downloaded for free from the Internet. Armed with these basic tools anybody can drive around, detect open wireless networks, and connect to them. With a Linux machine, additional software, some advanced knowledge, and some time and patience it is even possible to break into wireless networks that use encryption.

    Notice from Yordan:
    This text is copied, probably the main part from http://forums.xisto.com/no_longer_exists/ and from http://forums.xisto.com/no_longer_exists/ :unsure:


  5. WAP = Wireless Access Point; ‘hotspots’ (public access) require no pass phrase and are ‘open’ (and dangerous to use).

    WEP = early form of encryption; seldom used by knowledgeable administrators of a network because of inherently weak architecture (easy to crack & establish ‘man-in-the-middle’ attacks)

    WPA = mid level encryption; decent security; preferred by many admin’s. with good architecture.

    WPA2 = the best of all current common methods; some computer hardware will not support this level.

    What is WPA?

    WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment. WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.

     

     

    How does WPA work?

    WPA uses Temporal Key Integrity Protocol (TKIP). TKIP is designed to allow WEP to be upgraded. This means that all the main building blocks of WEP are present, but corrective measures have been added to address security problems.

     

     

    How WPA improves on WEP

    The weaknesses in WEP have been well publicized. TKIP’s improvements are described below. IV values can be reused/IV length is too short The length of the IV has been increased from 24bits to 48bits. Rollover of the counter is eliminated. Reuse of keys is less likely. In addition IVs are now used as a sequence counter, the TSC (TKIP Sequence Counter), protecting against replaying of data, a major vulnerability in WEP.

     

    Weak IV values are susceptible to attack WPA avoids using known weak IV values. A different secret key is used for each packet, and the way the key is scrambled with the secret key is more complex. Master keys are used directly in WEP Master Keys are never used directly in WPA. A hierarchy of keys is used, all derived from the Master. Cryptographically this is a much more secure practice.

     

    Key Management and updating is poorly provided for in WEP Secure key management is built-in to WPA, so key management isn’t an issue with WPA. Message integrity checking is ineffective WEP message integrity proved to be ineffective. WPA uses a Message Integrity Check (MIC) called, Michael! Due to the hardware constraints the check has to be relatively simple. In theory there is a one in a million chance of guessing the correct MIC. In practice any changed frames would first need to pass the TSC and have the correct packet encryption key even to reach the point where Micheal comes into operation. As further security Michael can detect attacks and performs countermeasures to block new attacks.

     

     

    Conclusion

    WPA (TKIP) is a great solution, providing much stronger security than WEP, addressing all the weaknesses and allowing compatibility and upgrades with older equipment.


  6. MySQL databases increasingly power production applications - whether these be web based collaboration tools or CRM applications. A well thought through backup plan and configuration will go a long way to ensure that you can recover your database - when a system or user error deletes important data stored in MySQL - without impacting your business.

     

     

     

    1) How fast and how easy do you want the MySQL Recovery process to be?

     

    Just like planning any other backup implementation, the most important consideration is the recovery process. Here are two key recovery objectives:

     

    To what point in time will you need to recover your database?

    The Recovery Point Objective (RPO) defines to what point in time you have to recover your database. For example, if a user dropped a table by accident at 12:55 pm, you might want to recover to a point in time just before the delete command. In some circumstances you may want to selectively exclude some rogue transactions during the recovery process.

    How much time will you have to recover your database?

    The Recovery Time Objective (RTO) defines how much time it will take to recover the database. You should carefully consider how long your MySQL application can be offline while you do a recovery.

    Therefore, you will need to determine RPO and RTO for MySQL database in your environment and implement your backup solution accordingly.

     

    When planning the recovery process, remember that different circumstances will require different levels of recovery. Depending on the situation, you may need to recover:

     

    The whole server - all databases (in case of disaster recovery)

    Specific database

    Specific table

    Specific transactions

    Make sure to periodically test your recovery procedures by actually conducting recoveries. Actual recoveries happen under stress and this is not the time for practice. Once again it is all about recovery when planning your MySQL Backup solution!

     

     

    2) What will be the impact of MySQL Backup process on your Application?

     

    Backup window refers to the time it takes for backups to complete. During the backup window your MySQL applications will be either offline or degraded (in performance or functionality or both).

    Some backup methods, e.g. offline backup make MySQL databases totally unavailable.

    Other, e.g. mysqldump make the database unavailable for update.

    Still others (replication, snapshots) have very minimal impact on the MySQL databases and applications

    The size of your database and rate of transaction activity will determine how long your backup window will be. Depending on these factors and the business requirements of your MySQL based applications you will need to decide on the scheduling of your backup window. You will also need to plan on potentially wide gyrations of the backup window duration - e.g. if some business activity results in a huge number of updates to your database. Ideally your implementation should also be aware of the current activity on your database - e.g. if your database is presently loaded with transactions, your implementation can intelligently postpone a scheduled backup run for a few hours.

     

    Your applications may have data stored in files outside of MySQL database. E.g. the configuration files for your application. While implementing a MySQL backup solution make sure to create a process of backing up and recovering these files, which will be needed to completely recover your MySQL based applications.

     

     

    3) What will your backup configuration look like?

    i.e. - the What, Where, When, and How of MySQL Backup.

     

    Your MySQL backup implementation will depend on the specific server and database configuration in your environment. You will need to take an inventory of the following:

     

    Number of MySQL servers

    Size of MySQL databases

    Storage engines in use (InnoDB, MyISAM, NDB-MySQL Cluster). Note that you may introduce a new MySQL storage engine in the future. Your backup implementation should be flexible to incorporate a new storage engine.

    Database activity

    Is there a particular time that your database is less active

    Nature of activity (selects, inserts/updates)


    Use of MySQL replication

    MySQL versions being used

    Use of MySQL stored procedures

    While deciding on what databases and tables to backup, make sure to include all databases and tables needed to be backed up together to ensure data consistency at your application level.

     

    Choosing the right location for backup images is also a critical decision. Store backups as far away from the original data as possible! You will be surprised how many DBAs keep the backups on the same RAID as the original data.

     

    A related decision is where you want to recover your database during the recovery process. If recovery is initiated after a simple user error, you may choose to recover the database at its original location. Keep in mind that hardware failure and disaster might require recovering to a different host that could have a different location, hardware, operating system, or version of MySQL. In ideal case, you should have a standby server where you periodically audit your recovery process.

     

    Depending on the size of your databases and your recovery location criteria (i.e. whether you will recover at the same location as your current database or a different location) you will need to plan for allocation of space for backup and recovery purposes. If space is at a premium you can also choose to compress your backup images - although this uses computation resources both at backup and recovery stages.

     

    If you are using MySQL replication for high availability or load balancing, it can also be leveraged for backup purposes - backups can be performed on a slave server without effecting the master server.

     

     

    4) How will you manage your backup process and backed up data?

     

    Backups should almost always be automated. Backups must be taken consistently and regularly and relying on human intervention should be avoided. Backup catalog should be automatically kept up-to-date keeping track of all copies of backup images.

     

    In typical backup implementations, important pre-backup and post-backup procedures need to be performed. E.g. A pre-backup procedure can check whether needed storage will be available for the upcoming backup run. At the other end, a post-backup procedure can remove no longer needed binary logs after a successful backup has finished. Your backup implementation should seamlessly integrate such pre-backup and post-backup procedures.

     

    Security of your MySQL database is a key consideration while implementing a backup solution. While backing up your MySQL database you need to consider whether encryption of your data is required. Just like compression, keep in mind that encryption has a computation cost both during backup and recovery. Also, if you are backing up your data remotely - say from your service provider site to your local data center or vice versa - you should make sure that the transportation mechanism being used is secure against eavesdroppers.

     

    Proper planning should be done as to which personnel in your organization can perform the recovery of the MySQL database. These personnel need to have appropriate (technical and business) permissions to recover, for example, the Accounting database. Proper training for the personnel is essential before performing a recovery.

     

    Appropriate security and access to backup images also plays into the compliance requirements that your organization may have, which leads us to the next top consideration.

     

     

    5) What kind of tracking, reporting and compliance requirements does your business have from your MySQL backup implementation?

     

    Your MySQL backup implementation should provide timely notifications for critical events such as backup failures. Mechanisms may include email, SMS, or RSS feed captured on an administrator's dashboard.

     

    It is likely that multiple personnel in your organization would be interested in receiving reports of MySQL backups. This is especially true if your environment has multiple entities using MySQL databases for different purposes. MySQL Backup reports can also be used for other interesting purposes, e.g. identifying durations of high MySQL update activity.

     

    Your MySQL backup implementation should automatically implement your Retention Policy - i.e. how long you want keep to your backed up MySQL data. Your backup procedures should account for the possibility that different types of data may have different retention policies - depending on compliance and business requirements. The expired backups should be automatically purged.

    hope it will help others.

  7. hello everyone, i'm trying to speedup my site through CSS and some tricks:

     

    Optimize Images: always use the “Save for the web” feature included on image editing software. Images represent the heavier load on virtually any website so make sure you are optimizing them. Alternatively you can also turn to an online image optimizer.

    Image Formats: apart from optimizing images it is important that you choose the right format. JPEG format is suitable for photographs or true-color images. The GIF format should be used with flat-color images like logos or buttons. PNG works very similar to GIF but it supports more colors.

    Optimize Your CSS: most websites are designed with CSS nowadays. Make sure to aggregate and clean your CSS. CleanCSS is an online tool that will merge similar selectors, remove useless properties and remove the whitespace from your code.

    Use a Slash on Your Links: when a user opens a link on the form “http://forums.xisto.com/no_longer_exists/ the server will need to figure what kind of file or page is contained on that address. If you include a slash (/) at the end of the link the server will already know that this is a directory page, reducing the load time of the site.

    Use the Height and Width Tags: many people forget to add the Height and Width tags on image codes. Those tags will make sure that the browser knows the size of the image before loading it. The result is that it will reserve a spot for the images while loading the rest of the page, speeding up the whole process.

    Reduce the HTTP Requests: when opening a web page every object (images, scripts and the line) will require a round trip to the server. This latency can add several seconds to the load time of your site. Make sure to reduce the number of objects and to combine CSS files and scripts together.

    friends i tried all this steps found on some blogs on goolge, and its working. but i want to know more.. reply if you know something about this.

  8. hmmmmm its very easy.. 1st you need to install opera browser, you can install it from http://www.opera.com/ then open the web page you want to copy data, then go to Menu-> developer tool -> Source (CTRL+U).just remove security javascript -> and save page(now page will refreshed) and right click is enable now.2nd method: use any browser and save the whole page. right click the .html/.php file and remove the security javascrit. save it and open.'hope you will enjoy my post!!


  9. Its very hard question. As our needs we should decides whats to buy.1st Laptop for whose who travel a lot for just buying a laptop for fun or listening music. we can't use laptop roughly like pc. other hand in computer we can do any types of jobs.2ndly Loptop need more money to repair and in other hand computer is too cheap to repair,even we also can solve any problem of PC.3rd is We can install many of PCI devices in computer and can change internal devices like LAN cards but in laptop we can't do anything.4th laptop need min power, other hand home computer need more power to use. so here laptop wins.At end we ca say both are best in their place and our use.


  10. I have windows Vista Home Basic and it goes extremely slow at startup is there any way I can fix this or speed my computer up in general?

    hmm Vista or windows7 need more RAM then older version of windows. If we install the 512MB graphics card to our system may fastup your computer more then 5times. Or try to increase the RAM upto 4GB.

  11. My computer has been acting in a weird way for some time, and I don't remember doing anything that could cause this hardware-wise. I'll try to describe it:After some time powered on, the system suddenly *poof* shuts down in a harsh way. I press the Power button but it doesn't turn on. Then, I remove the power cable from it's back, wait for some hour(s) and turn it on ok, until it turns off again. I'd risk also to say that the 'uptime' I get after a shutdown is somehow proportional to the time I left the power cable off it.

    Some would say it's overheating, but I don't think so, since it has a nice cooling and it didn't change from some time to now. I (just wonder, no clue) think it could be some voltage issue, some hard disk problem, power cable issue, possibly some wire overheating (!?!), maybe too many devices connected to the power socket. Could his be caused by any BIOS configuration? By the way, it's running with no memory or processor overclock.

    Someone people give me a light, or suggest some expert forums I could post my issue on.
    Until the next shutdown, see you.



    first Its may happened with overheating of CPU/Processor. You can check CPU temperature through BIOS/CMOS.

    secondly It may happened conflict with some device driver.

    Hope you will solve this!!
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.