Saturday, August 30, 2008

Groping On Trains And Busses



Berkely The paper defines five types of RAID implementation with the addition of a technique called non-redundant striping RAID 0.


Striping: disks are logically combined in one unit.

RAID 0. This is an array but not redundant, then the name was incorrect RAID but universally accepted. This is actually concatenated disk striping: instead of in sequence, the data capacity of each disk is partitioned into small functional units called stripes and joined together in an overall logical unit that includes all disks stripig. The process of interleaving (pass me the term taken from the world of memories) is possible through a technique called round-robin. The size of the stripes is variable and configurable. RAID 0 offers no fault tolerance but also significantly increases the performance since the read and write operations can occur simultaneously on all disks. The minimum number of disks required to implement RAID 0 is two.



Raid 0: drives combined round-robin improve the transfer since more I / O occur simultaneously satisfied by all disks in the array.


RAID 1: disk mirroring. Two disks are configured as a copy of the other and then record both the same data. Redundancy is assicuratadal fact that in the event of failure of one, the other disk can continue to operate by providing access to data. The performance improved in reading since the applications are fulfilled simultaneously by all the disks, while in writing remain the same, having to write to both disks. the minimum number of disks required to implement RAID 1 is two.
Raid 1: both discs recorded the same data: it is given a writing at a time but multiple reads simultaneously satisfied by all disks in the array.


RAID 2. In this old configuration of at least three disks, two are striped, and one contains information ECC fault tolerance. Because now each disk contains its own error correction code this implementation has been abandoned. Furthermore, the data are arranged (ie, distributed by a method of spanning) among all the disks and reading and writing should therefore continue to access data arranged in different positions, moving from one disk to another and slowing the flow of throughput.



Raid 2: each operation (reading and writing) is distributed among all disks. The record ECC records information of fault tolerance.


RAID 3. It 'similar to RAID 2, except that instead of having more units that handle information ECC, there is a drive that records only the parity bit. If a drive fails the missing stripe can be restored by calculating the XOR (parity information) of stripes positioned equally on other disks and restoring the data perduto.Per able to achieve this feature requires that the recorded data is smistino among all disks in the array in order to have a transfer of shares of each record in parallel, maximizing speed. However since the size of the stripes should be small, smaller than a typical record, should be strengthened demands of long sequential data except that the continuous parallel access to disks slow down operations, also allows only RAID 3 operation I / O time wing, limiting Workgroups environment with many users.


example equal

Disk 1 Disk 2 Disk 3 equal

1 + 3 + 6 = 10
2 + 1 + 7 = 10 + 2 + 3
x = 10

parity - disk1 - Disc 2
x = X = 5 (since restored)



Raid 3: each operation is distributed among all disks.


RAID 4. In this implementation, a minimum of 3 drives are the same features as RAID 3, except that the stripe is larger than a typical record, allowing him to reside entirely in a single drive array. This division of the records allows more read operations simultaneously, thus a greater flow of data. However, every write must update the parity drive specific so it can not be more than one time.



Raid 4: each write to update the parity. More I / O simultaneously.


RAID 5. With a technique called distributed parity, RAID 5 overcomes the limitations imposed by the single drive to RAID 4 for the equal, in dedicating each disk sectors. The total space distributed between disks dedicated to parity is equal to that of a single whole drive, allowing multiple write operations occur simultaneously, as well as readings. A slight delay is dall'update equality. In addition, the stripes can be defined in size, adapting the array to your working environment.



RAID 5 distributed parity. More I / O simultaneously.

Tuesday, August 26, 2008

Ephysema Vs Bronchitis

How to Create a Server 2003 domain based

This guide is not meant to be exhaustive in all aspects of running a domain and assume that you have a good network connections based on TCP / IP and LAN on client / server architecture, and operating systems Server 2003 and Windows XP/2000.
Operating Systems used:

-Windows Server 2003 Standard Edition, Windows XP Professional


First you need to install two separate machines in the operating system Windows Server 2003 and in the operating system Windows XP / 2000
Done that we proceed to enter two cars in the same workgroup, so that both you ping to manage to get out on the Internet.
Once the two machines operate on the network should proceed in this manner:


1. In 2003 server go to Start --- All Programs --- --- Administrative Tools Configure Your Server Wizard to install Active Directory, DNS, DHCP



2. Perform Typical installation for a first server domain, you will be prompted the installation CD of Windows Server 2003 and wait a few minutes.



The wizard must choose the domain name, for simplicity of implementation is better that the domain has the same workgroup name.
Once installed on the AD server, DHCP, DNS and AD need to create a "computer" and an object "User".
Then go to Start --- All Programs --- --- Administrative Tools Active Directory Users and Computers



It has a screen similar to Windows Explorer and the Active Directory console



Select the tab "Users" then move to the right of the screen and with the right mouse button click on the "New User "---""
fill in the various fields by becoming conscious choice of username and password that must meet the safety criteria (length and complexity).



Once you create the new user must create the computer account and can be done in 2 ways: 1
. automatically, simply by starting the new PC and click Control Panel --- System - Name Change ---- Computer, enter the Domain name on the tab "Member of" at this point, logging in as the Admin Server will generate 2003 the computer account automatically.
2. Server 2003 on Start --- All Programs --- --- Administrative Tools Active Directory Users and Computers tab, select the "Computers and then position on the right of the screen and with the right mouse button select "New Computer "---""



Fill in the "Computer Name" and finish the procedure.



Once the procedure for entering user and computer, you must enter the new PC in the domain, and then you can safely logare with the new credentials that are configured on Windows Server 2003.





WARNING * VERY IMPORTANT * All clients who are going to join the domain should have as their default gateway Dns server and default the ip address of windows server 2003.

Friday, August 22, 2008

Best Rugby Initiation

Dekart Private Disk 9.2

Operating System: Windows
Homepage: http://www.private-disk.net/
License: Free Trial / Commercial
Application: Creating and managing encrypted disks.




Today more and more users use their system to process and store sensitive data this leads to an inevitable question: "SECURITY & PRIVACY.
network are present on many tools that help protect your data from prying eyes and one in particular I was struck by the power and ease of use.
Dekart Private Disk is a very simple but at the same time reliable and powerful by its ability to encrypt a hard disk (both internal and external), Floppy Disks, CD, CD / R, CD / RW, MO, MD, ZIP -disks, flash drives, all types of flash memory cards, PDAs and even digital cameras, the algorithm with NIST-certified AES 256-bit.
Once installed, the light setup (1,265 Kb) and launched the program you are in front of a screen composed of four tabs that represent the four sections are required to create and manage virtual disks.

The first section, "Disco" allows us to:

1. to activate a disk already on our support;

2. of create a new

3. to erase a

4. to change an existing setaggi

The second section, "Options" is the many program options such as disabling all encrypted disks after a certain period of inactivity.

The third section, "Recover" has a special feature, as well as activities for the recovery of encrypted disks and back them up, if you have forgotten the password to access our
good record encrypted program allows us to launch an attack " Brute Force to retrieve it.

The fourth section "Customize" button allows you to customize keyboard shortcuts.
Our encrypted virtual hard disk is seen by the system as a normal drive with a lot of logical drive letter, but when we disconnected it can easily carry it wherever and whenever we want is nothing more than a simple file.

Pros: The program is localized into 13 languages, ease of use

Cons: As the virtual disks of normal files, you can mistakenly delete.

Films Voor Polaroid Ee66

anonymous surfing with Torpark

Operating System: Windows All
Homepage: http://www.torrify.com.nyud.net:8080/
License: Open-source
Version: 1.5.0.7 Application
: Browsing


In a society
spied on, where we can all be controlled through technology that surrounds us daily, we use the ATM at the supermarket to the GSM mobile, Internet browsing is not excluded from this form of control.
But now there is a tool that allows us to increase our privacy, this is a version of Torpark Mozilla Firefox integrated with the Tor system (http://tor.eff.org/index.html.it), a knitting machines spread all over the world who communicate via TCP, forming an encrypted tunnel in which the data travels from one node to another, where each node along the way knows only the node that provided the data. When a user types
an address on your browser sends a request to the DNS (Domain Name System is a distributed Internet directory service) that turns the address in http://www.miosito.com ip address 200.100.50.10 from here on the data that will and sends the user to this address will go through various machines encrypting and changing each time the ip, then you will not leave his ip address more sites you visit.
The convenience of this tool is that it does not need installation, so you can
use on a USB key, or any other portable media to be used for example when you go to an internet cafe.
Once downloaded, the program must
unzip to a directory of your choice or on a USB drive and launches the executable, the first screen is a "Warning" indicates that the potential of the product, but warns us not use "orthodox".
After this, the program connects to the Tor circuit and we are ready to sail.
The GUI is very similar to the traditional Firefox but you can change, you can add extensions, plug-in, and above all we can place our Bookmarks.
This system is not designed to guarantee anonymity to criminals because it only helps to improve their privacy and the difficulty traffic control, and attention was not compensated at 100% and you have to be always with open eyes.

Pros: In a single browser there is a navigation system configured Tor and ready to use, no installation, is located in more than 35 languages, ease of use.

Cons: does not guarantee anonymity to 100%, a slight slowness in surfing, it supports both open instances of Firefox mozilla ie either the original or start Torpark is start Firefox.

Driving License Name Change India

with Wireless Network Monitoring WirelessMon 2.0 Sandboxie

Operating System: Windows All
Homepage: http://www.passmark.com/products/wirelessmonitor.htm
License: Free Trial / Commercial
version. 2.0 build 1006



802.x protocol is spreading a lot for your convenience and for its efficiency in the field of productivity as a result are always the new programs to design and manage Wi-Fi networks.
WirelessMon is one of them in fact once installed and launched the executable we have a very flexible and easy to use to monitor and develop its network
Fig.1 Main Screen
wireless.


The very interesting feature of this tool is the ability to graph the signal emitted by the various access points, giving an idea quality and power of the same.
The main window is divided into 5 tabs, stands out for its uniqueness and the utility tab 5 "Map" from here we can go to make up our hypothetical wireless network directly to a plan previously charged environment (Fig. 2).
Once the program executes a

scans for access points, provides a list of those protected and those accessible allowing the connection.
WirelessMon 2.0.1006 is a very useful tool for creating and optimizing a wireless network (eg an office) by going to predict and simulate those situations that would otherwise have to deal

Fig.2 Environment Plan at the time of installation, operation and plan spending.
You can also use a GPS unit to a geographic location and real-time display of the signal source.
short, a tool that should not be missing in the case of a system administrator in both professional and in household areas.

Pros: easy and intuitive, graphical representation of the wireless network

Cons: Trial version is limited in time and performance