Friday, March 30, 2012
Best Downloading Sites for iPod
Conference Calling Programs
Friday, March 23, 2012
Blu-ray DVD to iPod converter
iPod a longer battery life Tips
Saturday, March 17, 2012
Super iPhone Apps
Best iPhone 4 Cases
Wednesday, March 14, 2012
Linux File System
1. /-> It is the parent of file system.
2. /bin-> Contains user command information in binary.
3. /sbin-> Contains administrator command information in binary.
4. /boot-> System booting information.*
5. /dev-> Special device files.
6. /etc-> Contains administrative configure files(like program files in windows).
7. /home-> Contains directory assigned to each user with a login accounts.*
8. /mnt-> Default mount point.
9. /proc-> Provides a mechanism for the karnel to send information to processor.
10. /root-> Represent the root user home directory(root means admin).
11. /temp-> Contains tempory files.
12. /usr-> Contains user docouments such as games, graphical files.
13. /var-> Help files. Read More
LINUX COMMAND
# NTLDER-> Windows boot louder
# GRUB & LILO-> Linux boot louder
Server Name
NFS-> Used for linux to linux connection.
SAMBA-> Used for linux to windows connection.
PDNS, SDNS, Web/WWW/HTTP, mat, proxy, Gateway, DHCP etc.
Drive Information
v Drive Information
o hda means primary master (pm)
o hdb means primary slave (ps)
o hdc means secondary master (sm)
o hdd means secondary slave (ss)
o Drive C -> hda1 to hda4
o Drive D -> hda5 , Drive E -> hda6 ……………….
Primary Requirements
v Primary
Ø CPU
o For text mode->200 MHz
o For graphical mode->400 MHz
Ø RAM
o For text mode->64 MB
o For graphical mode->128 MB
Ø Hard Disk
o Personal-> 1.7 GB
o Server-> 800 MB
o Workstation-> 2.1 GB
o Custom-> 6 GB
Sunday, March 11, 2012
Track a mobile phone
Definitely not. Tracking application for the growing demand for hand-phones, and many will take advantage of this. As a suggestion, I have website that looks unprofessional and is recommended to scrutinize suspicious. Some of impossibly low-cost software for the mobile phone tracking, must be careful, there may be a jerk! If in doubt, it is considered suspicious, and move on.
For this reason, most people who buy this phone and the other is the type of application, however, containing the owner to use the phone. For example, parents with their children, husbands and wives who have a phone from them, and their employees, business owners and managers who will be a call to a phone.
Cell phone users can call that person to follow the software remains invisible. These activities are managed by individual record. This will create a detailed record of the call. This means that the number of calls and even listen to the conversation, you can allow.
Avoid Your iPhone Battery Getting Drained
A cell phone is nothing more annoying for the user when the phone is its battery power when you are loosing the phone. This is for everyone, or at least simultaneously, it may occur as a complete surprise to you. When you have a cell phone using the iPhone as powerful, it is easy to understand why the battery power is easier to drain. When you have your favorite songs from that, listen to your e-mail and text messaging several friends at once, checking, you need a lot of cell phones. So, you have your cell phone's battery life will begin to drain more quickly than you think. Even Apple's website, iPhone battery life, they are clearly defined. And only if they include information on an application you are running. Unfortunately, the iPhone is always a time for a short battery life that can be done is to multitask.
There are several things that you can extend your battery life. If you follow these tips then you have an iPhone that will be more than you could even imagine. The iPhone may have a point that anyone can follow, just off your Bluetooth if you are not using it. Did you know that if you keep your Bluetooth turned on, but you are getting your battery? This is because a set amount of capacity and energy to retrieve the Bluetooth section of your iPhone because the phone is constantly searching for other Bluetooth devices that are controlled. Read More
Sunday, March 4, 2012
Mobile Security
As mobile phones are lost is often recommended that the password is not saved automatically. This defeats the purpose of blocking the phone in the first place. In fact, it is advisable to have passwords stored on the phone for banking websites. Ambitious thieves could easily defraud victims, stealing their bank accounts in a timely manner. It is recommended to people with email access on their phones will not open any attachments. Malware and spyware can easily infiltrate into the phone and install itself.
You may not be immediately aware of self-installation of spyware or malware. An important clue is a noticeable drop in processing speed of your laptop. Some forms of malware actually masquerading as security software anti-virus, infiltrating your computer fraudulently. Always check the control panel of your laptop for a list of installed programs and take note of any suspicious programs or unrecognized. Despite freeware or shareware can be tempting, it is possible that such programs are infected with malware that could steal important data and eventually destroy the hard drive.
Mobile Device Security
In addition, security patches are often late and sometimes only apply to specific versions of previous system. These poor practices are bad for businesses, individuals and companies alike.Enterprise customers should demand stronger security features like Google and Apple. These existing mobile providers operating system needed to respond with a higher level of security functionality. And now we can see that new, more secure mobile operating system arise.
The use of mobile devices such as tablets and smartphones and tablets continue to grow and gradually erode the market for laptops. Productivity tools such as docking stations give mobile devices the ability to act as a permanent job, while sacrificing mobility.
Because of this, the security issues will become more visible and urgent security solutions. We'll have to see a greater emphasis on the development of safety-related applications and solutions. There is a huge market opportunity for companies willing to offer effective solutions for mobile security.