Posts

Showing posts from December, 2020

What is Task Manager on a PC

  Use the End Task feature to clean up unneeded apps and processes running in Task Manager on your Windows 8 computer. However, should proceed with caution. When forcing an app to close in this way, you lose any unsaved data. If you force an important system process to end, elements of your computer may stop working properly. Only close processes you've researched to ensure they're not essential to the running of your computer. Step 1 Press "Ctrl-Shift-Esc" to launch Task Manager. You can also open Task Manager by typing "Task" on the Start screen and then clicking "Task Manager" on the Apps list. Step 2 Click the "More Details" button in the bottom-left corner of Task Manager to display all of the program's tabs. Step 3 Select the application or process you want to close. Apps are listed under the Apps heading. Processes are listed under the Background Processes heading. Step 4 Click the "End Task" button in the bottom-righ...

What is Work Item Shortages in Networking issues

    Redirector This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so m...

What is Port States in RSTP

  Rapid Spanning Tree Protocol (RSTP), a standard inter-switch protocol, ensures a loop-free forwarding network topology at Layer 2. This protocol was defined by the IEEE 802.1w standard and is an extension of the 802.1D Spanning Tree Protocol (STP). RSTP is an improvement over STP as it provides faster convergence after a network topology change or failure. RSTP introduces new port roles, and the original five port states of STP are reduced to three. To build a loop-free topology, switches (bridges) determine the root bridge and compute the port roles. To do this, the bridges use special data frames called Bridge Protocol Data Units (BPDUs) that exchange bridge IDs and root path cost information. BPDUs are exchanged regularly, typically at two second intervals, and enable switches to keep track of network topology changes and to start and stop forwarding on ports as required. Hosts should not send BPDUs to the switch ports and to avoid malfunctioning/malicious hosts from doing so,...

What is Rapid Spanning Tree Protocol

  Rapid Spanning Tree Protocol (RSTP), a standard inter-switch protocol, ensures a loop-free forwarding network topology at Layer 2. This protocol was defined by the IEEE 802.1w standard and is an extension of the 802.1D Spanning Tree Protocol (STP). RSTP is an improvement over STP as it provides faster convergence after a network topology change or failure. RSTP introduces new port roles, and the original five port states of STP are reduced to three. To build a loop-free topology, switches (bridges) determine the root bridge and compute the port roles. To do this, the bridges use special data frames called Bridge Protocol Data Units (BPDUs) that exchange bridge IDs and root path cost information. BPDUs are exchanged regularly, typically at two second intervals, and enable switches to keep track of network topology changes and to start and stop forwarding on ports as required. Hosts should not send BPDUs to the switch ports and to avoid malfunctioning/malicious hosts from doing so,...

Creating a multiprocessor from a number of single CPU

  The simultaneous growth in availability of big data and in the number of simultaneous users on the Internet places particular pressure on the need to carry out computing tasks “in parallel,” or simultaneously. Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software engineering. During the early 21st century there was explosive growth in multiprocessor design and other strategies for complex applications to run faster. Parallel and distributed computing builds on fundamental systems concepts, such as concurrency, mutual exclusion, consistency in state/memory manipulation, message-passing, and shared-memory models. Creating a multiprocessor from a number of single CPUs requires physical links and a mechanism for communication among the processors so that they may operate in parallel. Tightly coupled multiprocessors share memory and hence may communicate by...

Server Work Queues of microsoft lan manager

    Redirector This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so m...

What is Active Hub work in Networking

  A network hub is a networking device that connects to one or more equipment. For example, a computer can connect to a server, printer and another computer through a network hub. It is useful in sharing of resources and broadcasting data it receives. It helps connects these devices together without having to connect to each other directly. There are three types of network hubs: Passive Hubs, Active Hubs and Intelligent Hubs. Passive Hubs One of the types of a network hub is the so-called passive hub. It's a pass-through that does not do anything more than just broadcast signals it receives through its input port, then sends it out through the output port. It does not do anything to regenerate or process the signals because it only functions as a connector of different wires in a topology. Active Hubs An active hub works more than just a connector but also regenerates the data bits to ensure the signals are strong. Another name for an active hub is a multiport repeater. It provides...

Network Administrator Roles

  The area of ​​information technology, especially in regions with technology company hubs such as the South and Southeast, even with the crisis, are not affected as impactfully as other areas. This reflects the growing need for technology resource management, and is a motivation for future professionals who are still in doubt about which area to pursue. If you are interested in one of these job trends in information technology, one of the recommendations is the Network Technologist course. Once completed, the student acts as a network administrator. Let's look at some general duties of a professional in this area. Network Administrator Roles In addition to working autonomously, a recent graduate in the south and southeast begins earning a base salary working in the support area of ​​at least $ 2,000, but this amount depends on the state and the company. As experience is gained the salary goes up, either within the company itself or with proposals from other companies, climbing the...

Windows Programming Conversion

  Once upon a time, the world of developers was split into two halves: One half was composed of Windows developers, who created most of the productivity apps that powered PCs (and, occasionally, servers). The other half comprised Linux and Unix developers, whose work focused on server-side development.Today, however, as the worlds of Windows and Linux move ever closer together, the distinction between Windows and Linux developers is disappearing. Gone are the days when you had to specialize in one ecosystem or the other. One was a set of programming languages and frameworks that were designed primarily for the Windows world, like C# and .NET. Although Windows developers sometimes also worked with languages like Java, which was engineered as a cross-platform language, you knew you were a Windows dev if you found yourself touting the importance of coding in a “pure” object-oriented language like C#. Most Windows developers were also united by Visual Studio, the IDE of choice in the W...

Creating a multiprocessor from a number of single CPUs

    The simultaneous growth in availability of big data and in the number of simultaneous users on the Internet places particular pressure on the need to carry out computing tasks “in parallel,” or simultaneously. Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software engineering. During the early 21st century there was explosive growth in multiprocessor design and other strategies for complex applications to run faster. Parallel and distributed computing builds on fundamental systems concepts, such as concurrency, mutual exclusion, consistency in state/memory manipulation, message-passing, and shared-memory models. Creating a multiprocessor from a number of single CPUs requires physical links and a mechanism for communication among the processors so that they may operate in parallel. Tightly coupled multiprocessors share memory and hence may communi...

Server Work Queues

  This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so much more you ...

Operating system attacks

  Today’s business is non-stop. Employees need access to corporate systems and data wherever they are, around the clock. Only mobile devices provide the flexibility to allow employees that kind of constant connectivity. However, mobile devices introduce new kinds of security risks. Businesses need to consider using mobile device management (MDM) and enterprise mobility management (EMM) software to protect against these mobile device threats: 1. Operating system attacks Much like computers, mobile devices run a range of operating systems and versions, each with its vulnerabilities to attacks. Vendors provide patches, but when employees use their own devices, it’s up to every employee to download and install the upgrade. Protect against these threats by using your MDM software to prohibit connections from devices that aren’t using the latest, safest operating systems. 2. Application attacks If an application isn’t securely coded, it can have vulnerabilities such as storing passwords ...

How hackers to place a virus than a Windows PC or Android smartphone.

  The operating system of your iDevice is always protected against viruses. The closed environment with its hidden file system makes it much harder for hackers to place a virus than a Windows PC or Android smartphone. In addition, you only need to load your apps from the App Store. Apple scrupulously checks every software. New programs are released for use only when everything is OK. Unlike Windows and Android, iOS does not require you to be afraid of viruses and other malware that can damage or disable your system. However, your data is not always necessarily in a safe place on iOS. Most recently, in 2019, a  major security vulnerability was  discovered in iOS that gave hackers access to a host of sensitive data, including contact data and WhatsApp chats. The hacker's favorite: The jailbreak Manipulate the system by  jailbreaking , open hackers the door to your smartphone. The file system is open here and is especially vulnerable to malicious attacks. What a jailbre...