+44(0) 1234 567 890 info@domainname.com

Thursday 14 February 2013

How to Finding Old Web Pages



The Web changes constantly, and sometimes that page that had just the information you needed yesterday (or last month or two years ago) is not available today. At other times you may want to see how a page's content or design has changed. There are several sources for finding Web pages as they used to exist.
The Internet Archive’s WayBack Machine allows users to search for web pages that are no longer online. According to the Internet Archive, "the average lifespan of a web page is 44 -75 days," making it that much more important to preserve the designs and styles of our Internet past.
The WayBack Machine actually saves working versions of millions of sites and billions of pages (85 billion as of June 2008), an amazing resource for designers looking to see the look of the internet, and specific sites, going back as far as 1996.
To use the WayBack Machine, simply type a URL in the search field, and you are given a list of approximate dates that the archive has stored pages from. Choose a date and view a saved version of the site. While you will often come across broken links and images, this does not take away from the value of the service, as this huge archive of old web pages is a great research tool.
Some Screenshots : Google.com's History



















No comments

Thursday 31 January 2013

What is Electronic Cigarette




What is Electronic Cigarette
The electronic cigarette is microelectronic vaporizing tool, which uses an advanced atomization system. Basically the device creates vapors which taste like nicotine (or other interesting flavors) by atomizing the liquid in the cartridge.
Having 3 parts:


  • A battery, which cleverly enough, activates automatic when you inhale. It is responsible with the supplying energy for the atomizer and the LED.
  • A Atomizer, which vaporizes the liquid in the cartridge.
  • A cartridge which is soaked in the e-liquid. You are advised to lean the cigar down, 30 degrees in order for the liquid to reach the atomizer.
Taking care of your electronic cigar:


  • Cartridges can be refilled approximately 10 times, after these uses the cotton in them will become smaller and less efficient and as a result the taste will change. Although there are some non-conventional ways of reconditioning your cartridge, you might end up destroying your device.
  • The atomizer also requires some maintenance. If you truly want to experience the electronic cigar at its best you should clean the atomizer at least a week. To clean it you have to unscrew the battery, take the cartridge out and insert a piece of cotton or a napkin. The next step is to blow from the opposite side. If you do not clean your atomizer for more than 5 weeks, you will have to immerse it in refined alcohol for 12 hours in order to eliminate the dry residues. However this method may irreparably deteriorate it, and should be used only in cases of extreme need.
  • The battery doesn’t usually require any cleaning, but there are cases when the liquid might come in contact with it, so it is advisable to clean it once a week.
If you are worried about the lifespan or quality of your e-cigar, you should take a look at the great BluCigs deals and offers. Some cigarettes are so dependable that they offer warranties. However good they are, it is however possible for the nichelin filament in the atomizer to weaken due to excessive use, and no matter how much we try to clean it, it will never function the same. Like the filament in the light bulb, the atomizer filament is bound to become worn out in time. All in all it is very easy to take care of your electronic cigar, it only takes a few minutes every week to clean it, and it is totally worth it.



And this tooo




No comments

Tuesday 29 January 2013

What is Active Directory and its Logical Structure





Active Directory

The Active Directory directory service is a distributed database that stores and manages information about network resources, as well as application-specific data from directory-enabled applications. Active Directory allows administrators to organize objects of a network (such as users, computers, and devices) into a hierarchical collection of containers known as the logical structure. The top-level logical container in this hierarchy is the forest. Within a forest are domain containers, and within domains are organizational units.

Benefits of Logical Structure
  • Increased network security. The logical structure can provide security measures such as autonomy for individual groups or complete isolation of specific resources.
  • Simplified network management. The hierarchical nature of the logical structure simplifies configuration, control, and administration of the network, including managing user and group accounts and all network resources. 
  • Simplified resource sharing. The logical structure of domains and forests and the relationships established between them can simplify the sharing of resources across an organization.
  • Low total cost of ownership. The reduced administration costs for network management and the reduced load on network resources that can be achieved with the Active Directory logical structure can significantly lower the total cost of ownership. 
Domain

Domains are container objects. Domains are a collection of administratively defined objects that share a common directory database, security policies, and trust relationships with other domains. In this way, each domain is an administrative boundary for objects. A single domain can span multiple physical locations or sites and can contain millions of objects.

Domain Tree




Domain trees are collections of domains that are grouped together in hierarchical structures. When you add a domain to a tree, it becomes a child of the tree root domain. The domain to which a child domain is attached is called the parent domain.
A child domain might in turn have its own child domain. The name of a child domain is combined with the name of its parent domain to form its own unique Domain Name System (DNS) name such as software.pcprompt.net. In this manner, a tree has a contiguous namespace.

Forest




A forest is a complete instance of Active Directory. Each forest acts as a top-level container in that it houses all domain containers for that particular Active Directory instance. A forest can contain one or more domain container objects, all of which share a common logical structure, global catalog, directory schema, and directory configuration, as well as automatic two-way transitive trust relationships. The first domain in the forest is called the forest root domain. The name of that domain refers to the forest, such as pcprompt.net. By default, information in Active Directory is shared only within the forest. In this way, the forest is a security boundary for the information that is contained in that instance of Active Directory.

OU




Organizational units are container objects. You use these container objects to arrange other objects in a manner that supports your administrative purposes. By arranging objects in organizational units, you make it easier to locate and manage them. You can also delegate the authority to manage an organizational unit. Organizational units can be nested in other organizational units.
You can arrange objects that have similar administrative and security requirements into organizational units. Organizational units provide multiple levels of administrative authority, so that you can apply Group Policy settings and delegate administrative control. This delegation simplifies the task of managing these objects and enables you to structure Active Directory to fit your organization’s requirements.
No comments

Friday 25 January 2013

How to Lock USB Drive and Make it Read Only




USB drivers are considered as one of the sensitive ports of a computer. After the launch of USB portable drivers, they can be easily attacked by different viruses and malware woes, but only if you behave sketchily. A research claims that in the last two years, around 70 percent of the businesses have somehow lost their confidential data to USB flash memory sticks.
But you can avoid this mess to a large extent by locking write access to your USB drive and making it protective from any kind of autorun file. In this step by step guide, we have used Windows Registry Editor and a dedicate Windows tool to do this task.
Step 1: Using Windows Registry Editor

At first, you have to open Windows Run and type the command regedit. This will open Windows Registry Editor. The command will only ru
n if you are a computer administrator.


Step 2:  When Windows Registry Editor opens, navigate toHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies. Most of the time the key StorageDevicePolicies is available by default, but if it’s not there, you will have to make a new one. To make it, you need to right-click on Control folder in the sidebar and click on the option New -> Key.


Step 3: Afterwards, open StorageDevicePolices and make a new DWord which can be found on the right-click context menu.
 
Step 4: Type WriteProtect under the Value name, and double click on it to adjust its value. Type 1 under the Value data and save the settings.



Step 5: All done. You can now edit any file on any removable device inserted in to your USB drive. You can also use a tool USB Write Protect for this purpose.










Referance : Internet





No comments