Sunday, March 16, 2008

Cisco CCNP / BSCI Exam Tutorial: Not All Static Routes Are Created Equal

As a CCNP candidate, as a CCNA, and in getting ready to pass the BSCI exam, you may be tempted to breeze through your static route studies, or even skip them! That s because static routes are easy enough to configure, and as long as you remember the syntax of the ip route command, you re in good shape.
But there s one vital detail regarding static routes that many exam candidates miss. That s because many CCNA and CCNP books say "the administrative distance of a static route is 1", but that is not quite accurate.
You know from your CCNA studies that the ip route command is used to create a static route, and that you have the option of configuring a local exit interface or a next-hop IP address at the end of the command. However, the administrative distances are not the same. The AD of a static route that uses a local exit interface is zero! (That s because the router considers a static route with a local exit interface to actually be a directly connected network.) The AD of a static route with a next-hop IP address is 1.
Therefore, if the router has the following two ip route statements to consider...
Router(config) ip route 172.1.1.1 255.255.255.255 fast0
Router(config) ip route 172.1.1.1 255.255.255.255 210.1.1.1
... the prefix lengths are the same, so the static route using the local exit interface fastethernet0 will be preferred due to its lower AD, and will be installed into the routing table.
Keep the details in mind on the job and in the exam room, and you re on your way to CCNP exam success!
Chris Bryant, CCIE 12933, is the owner of The Bryant Advantage (http://www.thebryantadvantage.com), home of free CCNA and CCNP tutorials, The Ultimate CCNA Study Package, Ultimate CCNP Study Packages, and CCNA CBT video training. Pass the CCNA exam , BSCI exam , and BCMSN exam with Chris Bryant, CCIE 12933!
For a copy of his FREE ebooks, How To Pass The CCNA and How To Pass The CCNP , visit the website and download your copies! You can now get a FREE CCNA and CCNP exam question every day with no email registration required. Get your http://www.thebryantadvantage.com">CCNA study guide from The Bryant Advantage!



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Friday, March 14, 2008

IT safety: the burning thing to think over

In order to understand what we do to for IT-safety, we have to pay attention to its base - computer safety. And we should remember that there are any not important parts of our data, even if it is just benchmark, we have to do everything to protect it from hackers.
The majority of hacker frauds are possible because of existing software vulnerability. More and more harmful code appears in Web. This code implements to the computers, makes planned actions and continues the further spread. Nowadays such vulnerabilities are sought intentionally, by the hackers as well as by the producers. The first are trying to use bags in order to get access to the information resources, the second are trying to keep own reputation and clients information resources safe. E.g., if in 2004 the ratio of frauds was 1 fishing to 943 e-mails, in 2005 the ratio was 1 fishing to 304 e-mails.
What about IT companies? What is their responsibility for such state of affairs? Let us recollect some facts. In 2005 there were 812 "bags" in the Windows OS. 29 of them were not removed, that s why Windows got the status of critically dangerous OS.
Microsoft during their month software product update issue patches with vulnerabilities. Several of them are characterized as critically dangerous and can be used with the aim of destructive operations performance. For example, all OS Windows (except Server 2003) have the bag that is successfully used by hackers. It is connected with Microsoft XML Core Services 4.0, as well as with XMLHTTP 4.0 ActiveX Control. This bag allows getting the full operational system control. The fix has not been available yet.
The damage caused by hackers differs. In 2004 the sum total was up to 17 billions dollars, in 2004 it raised to 155, 5 billions dollars.
The major safety element is the computer OS. The most safe platforms are considered to be Apple Mac OS X and UNIX - BSD (Berkeley Software Distribution). Linux and Microsoft Windows were considered as the most vulnerable. Such conclusions were made after successful hackers attacks analyses (2003- 2004).
According to Eugene Kaspersky, the amount of Trojan programs raised double the amount. Nowadays nearly 75 % hackers attacks are turned to crack the banks accounts of to get the outlawed information. Due to same forecasts, this amount will increase. If 10 years ago hackers sent viruses just to hooligan (remember Trojan Love Letter), nowadays th situation changed cardinally.
Asia region deals with the online games fraud, Portuguese and Hispania steel from banks, Russia and Commonwealth of Independent States counties attack proxy-servers, steal personal data, and DOS-attacks, that are less and less popular.
And how people react to such situations, what measures do they implement in order to protect their metrics and scorecards? Statistics states that only 14 % of people don t take care about it. All other people try to protect themselves from hackers fraud. They carry out system facilities certification testing, increase security administrators qualification through various trainings. How else can they provide the effective protection? Everybody has to think about it for us to overcome the IT-crises in our country and avoid the irreversible consequences.
About the Author: If you are interested in information security metrics, check Sam Miller new web-site.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Wednesday, March 12, 2008

website-hosting-reviews-free - The best resource for website hosting comparison

"The moment you think of buying a Web Hosting Plan, you know one thing So many choices, which one to choose? Whether you would want to choose Shared Linux Packages or a Unix Package or do you want to go for a shared windows package or packages reseller for hosting? Trust me, a lot of individuals stand confused when they see that there are thousands of plans yet very little resource of comparison.
Click on the link website-hosting-reviews-free and you would know why a lot of people consider this link as top notch hosting reviews or hosting directory site. When you spend some time in this website, you would realize that a lot of information presented in this website is extremely unique only to this site and you would not find this anywhere else.
Their information structuring
You will find a common format across all the hosting directories. We have information structured on three bits Shared Unix or Shared Linux Packages, Shared Windows Packages, Reseller Packages. Each Hosting Directory Categories has a list of plans. Each plan is accompanies by a short synopsis of the plan details. Hence, expect to find the price, the web space, Data Transfer ability and the operating platform.
At one shot, you would be able to sort these plans by any of the following factors Price, rating, Web Space, Data Transfer. With such a high range of flexibility in filtering of data, you could almost be assured of making the right choice as long as your hosting company is considered.
Web Talk forums
We are one of the ones that provide web talk forums for you to discuss with other members of the forums. Basically, through these forums you could ask your questions about a particular plan and in essence also gather information on the best hosting plan for their needs. In fact, these forums would give you a good opportunity for you to get your questions answered.
Our Unique Selling Point
Unlike some of the other web hosting reviews, this website offers you reviews for free. You just do need to pay us a dime for all the information you get. It does not matter if you search Shared Unix, Shared Linux Packages or Shared Windows Packages. Our idea is to provide you quality information. We leave the decision up to you once we think we have done a good job of the deal. "
Beny Lam is the author of this article, talks about the website hosting and its features and functionalities as a hosting review directory.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Role Of Music In Relieving Stress

Life today is full of stress and anxiety and especially in metropolitan cities situation is the worst. No need to explain, you can easily analyze when you are in hurry to reach the office thinking of some of your personal tensions and then the whole day hectic schedule where there is no time to relax and release your stress. On top of all, there is noise pollution, air pollution leading to a whole distress and discomfort. Music is a great way to relive your day to day stress and is also used for therapeutic purposes. Even researches have proved that music s ubiquity and portability has made it the number one stress buster. It is a matter of fact that everyone on this earth has an inclination towards listening good quality music. The passion for music differs as per genre whereby youngsters mostly love fast and groovy numbers. People of the older times love classical music whereas kids like rhymes and children music. Not only this, many are attracted to listen natural sounds such as chirping of birds, water falling from the mountains and religious chants. It may be any form of music but when you sit down for a moment, close down your eyes to listen, your heart rate and breathing slows down with your thoughts. As you get tuned to the music you get free of all the worries and concerns of the outer world and an inner journey begins. Within a couple of minutes, you will find yourself refreshed and renewed as if the sound has washed you and cleaned. You just need to have a CD player and a quality CD and some leisure time for this wonderful experience. Many people even find pleasure and refreshed by playing music. It depends upon the individual as to which form of musical instrument he is able to play. Playing music in a routine brings comfort and joy that is immeasurable. It may be a piano or guitar but when you touch its keys or strings it contributes to a calming ritual allowing one to relax and unwind. Visit our recommended website music-future.com Olivia Andrews, writer of music-future.com is a freelance journalist and has written many reviews on subjects such as finance, education, health, entertainment, music, gifts, crafts, travel, apparels and mobile phones.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com