Great plains dexterity source code programming tips for developer

As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into Microsoft Great Plains and Microsoft Business Solutions is in process of merging all its accounting applications: Great Plains, Solomon, Navision and Axapta into somewhat granular: Microsoft Financials, Microsoft HR, Microsoft Distributions, Microsoft Project Accounting, etc. So the original design of Great Plains should be deemphasized. But even now - Great Plains is written on the programming language and technology, created in early 1990-th, named Great Plains Dexterity. And the graphical interface looks very user friendly and nice - these are all Dexterity forms and screens. In some cases of Dexterity customization you need access to Dexterity Source code (DYNAMICS. DIC with all the scripts). Currently MBS doesn't offer new MBS Partners this program - you can only have access to the source code if you was in the program when it was available for newcomers. Assuming that you are developer, who have access to the source code, read this if you are new to it. Usually you need source code in the following cases Zoom Buttons. Imagine - you need to select the customer from the list of customers and you want to use Great Plains Customers and Prospects screen to make you live easy. You need to know what kind of code is behind zoom button in GP original code. I'll help you in this specific case, but for other similar scenarios you got to have source code: open form Customer_Lookup return to 'Customer Number'. set 'Customer Sort By' of window Customer_Lookup of form Customer_Lookup to 1. run script 'Redisplay Button' of window Customer_Lookup of form Customer_Lookup. When you use GP source procedure This is when you want to use GP procedure in your logic and you know that in order to create similar procedure you need to spend weeks. Typical example - you need Sales Order Processing screen customization - when you introduce margin % field and want it to be editable and update cost or price. When you edit such margin field - you should try to call existing Great Plains logic. When you transfer GP logic into your SQL application. Imagine - you have to feed data into Great Plains and you don't want it to be processed there - but you need all the info, like taxes, summaries, etc be properly calculated and recorded. In this case you need to analyze original Great Plains Dexterity logic available in Source Code. Integration with legacy systems or with front end web custom application are typical cases What to do if you don't have source code? Try these technologies eConnect - this one was created to address eCommerce application integration. This is SDK with VB samples Place a call to GP Tech support - they'll tell you that they can help you in this specific one case - but you have to pay for placing the case Happy customizing! if you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum. com

Learn how to safely backup your hard drive

We all know that we should back up our system as soon as possible. But if you're like most of us, you will get to it tomorrow. The problem is that tomorrow rarely ever comes until you experience a serious computer failure and then its too lake. Taking the time to backup your data or entire hard drive is not as painstaking as it may seem. And the rewards of doing so will be great should your system experience a crash. WINDOWS AND OTHER BACKUP SOFTWARE If you have Windows XP you willl need to install the new Windows backup ultility from the Windows XP cdrom. Just place the WinXP cdrom in your cdrom drive and locate the line D:VALEADDMSFTNTBACKUP. Here you see the first letter as D but if your optical drive have a different drive letter, exchange the D with your drive's letter. To install the utility, click on the file named NTBackup. msi. The backup utility will be installed to the system tools group. Click Start, All Programs, Accessories, System Tools, and Backup. There is a neat wizard that will walk you through the backup process. WinXP's backup utility will backup your entire hard drive and will make a recovery disk to boot. One neat third party backup software you can try is NewTech InfoSystems at http:// ntius. com where you can download their trial version and put it to use for 30 days. And if its your cup of tea, the full version will run you about $79.95 INCREMENTAL OR DIFFERENTIAL BACKUPS You should back up your entire hard drive when you perform your first backup. After that it is best to perform an Incremental backup. This type of backup only allow you to backup files that have changed since your last performed backup. Differential Backups copy changed files and files that have been added since you last did your entire backup. This type of backup is more detailed than incremental backups and is easier to restore. BACKUP STORAGE DEVICES You can backup your files on cdroms and have the files compressed to save both space and backup time. WinXP will compress folders, subfolders, and files during backup. You can purchase compression software that will do the same saving you cdrom storage space. The compressed files are automatically uncompressed once they are restored unto your hard drive. You can also use a second hard drive as your backup storage device. We use two backup hard drives to be certain Ultimate PC Repair is up and running 24/7. You can either purchase an internal hard drive in install it to your ide cable or you may want to purchase an external hard drive that connects to your Universal Serial Bus or USB Port. The advantage of the external drives is that they have very large amount of storage space, transfer data fast, and can be moved from your computer to any other computer. We use the Western Digital 170 Gigabyte External Hard Drive and we simply bounce it around to either one of our four computers with the greatest of ease. USING ONLINE BACKUP SERVICES You may also consider online services for backing up your data. If you lose all your backup data, say due it a natural dissaster such as a flood, your online data is right there waiting for you. Another advantage of online backups is that you can access, upload, or download your data from any location. It is best to use high speed internet access if you're considering online data storage. One such online backup service is Istorage located at http:// iomega. com/istorage and charges from $2.49 a month for 50MBs to $17.95 a month for a big 1,000MBs of storage. Or you can check out FilesAnywhere located at the url http:// filesanywhere. com Still another online service to try is CapSure located at http:// capsure. com Backup your system now in one way or another if you have not done so. If you have critical data that you simply cannot due without, take the time to invest in a backup device or one of the many online backup services. Stop and perform those backups as soon as possible. You will be thankful you did should something go wrong with your computer. Its always better to be safe than sorry.

Diagnosing paper jams in hp laser printers

There are many things that can cause paper jams in HP printers, and diagnoses vary from one model to the next. In this article I will discuss some of the most common causes of printer jams and possible solutions. Where is the paper jamming? When you answer this question you are close to solving the problem. 1. If the printer will not pick up paper from tray two or three there are several causes. Try using a lower weight paper. HP does not recommend printing a higher weight than 20lbs from and tray but tray one. If this does not work the paper rollers probably need to be changed. These come with every maintenance kit, but most end users do not change them, they just change the fuser. If you do not have rollers available try cleaning them with a lint free cloth and wipe away any paper dust or other debris. 2. The paper is picked up from the tray but does not make it to the toner cartridge. Typically this is the paper feed assembly or the registration assembly. These are not easily replaced and I suggest consulting a professional. 3. The paper gets to the toner cartridge and then jams. Try replacing the toner cartridge. If you have a newer model printer (most HP models) check to make sure that the toner transfer bar is not stuck in an upright position. Check for debris. If there is debris in the paper path this can cause jamming. Debris can be a torn piece of paper, a stable or just a build up of paper dust. DO NOT touch the roller. It will hold the oil form your skin and cause print defects. 4. The paper enters the fuser, but gets jammed inside. Unfortunately, the fuser will probably have to be replaced, but check for any debris on the rollers before replacing. Also clean the paper path with a lint free cloth. DO NOT touch the rollers. They will hold the oil form your skin. This does not cover all possible causes, only the most common. Donald Broda Senior Technician Specialist brtoner. com donald@brtoner. com

It specialists are non profits a viable market

Yes, non-profits are viable. But there are certainly more financially rewarding sectors for IT specialists. Let's first take a look at the pros of non-profits. o It's easy to reach non-profits because they belong to trade groups and you can get your hands on the publicly available directories. o You can get a lot of tremendous emotional satisfaction and gratification knowing you're helping a particular cause.

The two biggest downsides of non-profit: o Thin profit margins o Bidding wars Bid situations reduce your firm to a commodity. Additionally, when you bid against someone else's specs, your competitor may be shortcutting. Thus lowering the bid price and keeping you from quoting a more realistic solution. Non Profits and Government Bids Are Tricky for IT Specialists For most IT specialists, selling to private sector small businesses is going to be a lot easier than trying to navigate the waters of non-profit and government bids. The unfortunate part is, in most cases, non-profits and government agencies are legally bound to take the quoted price. The Downside of Bidding Wars for IT Specialists When you're getting into a bidding situation, you really don't have the luxury of the trust, personality, and credibility factors helping you all that much. It really usually boils down to who can post the bond, who can follow the rules, and who can get the bid in on time. Then, on top of everything else, bidding requires you to do a ton of non-billable upfront work that you can normally bill for in the private sector. This non-billable work consists of researching, developing configurations, and bringing it all together. And the reality is this: getting the contract may be a real long shot. Bidding Wisely If you are going to try a competitive bid, don't bet your whole company on it. Make sure that your bid chasing time is no more than 20% of your business development efforts. Unless your company is 100% focused on selling to non-profits or government agencies, you're usually better off concentrating on the traditional private sector small businesses. If a government agency is looking to outsource support services, and it's a well thought out request for proposal (RFP), it becomes a more interesting proposition. If the agency however is just looking to buy hardware and some one-shot deal installation services, you're going to run into a lot of profitability challenges. The Bottom Line on Non Profits for IT Specialists Non-profit and government are still better niche options for IT specialists than just going down the retail path. But non-profit and government are anywhere near as attractive as the sweet spot of small business computer consulting. Copyright MMI-MMVI, Computer Consultants Secrets. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Introduction to isdn part ii

In the previous ISDN article, we looked at how and why one router dials another using ISDN. Just as important is knowing what keeps the link up once it is dialed. Why? Because ISDN acts as a phone call between two routers, and it’s billed that way to your client. The two routers that are connected by this phone call may be located in different area codes, so now we’re talking about a long distance phone call. If your ISDN link does not have a reason to disconnect, the connection could theoretically last for days or weeks before someone realizes what’s going on. This is particularly true when the ISDN link is used as a backup for another connection type, as is commonly the case with Frame Relay. When the Frame Relay goes down, the backup ISDN link comes up when the Frame Relay link comes back not billed for all that time. To understand why an ISDN link stays up when it’s not needed, we have to understand why it stays up period. Cisco’s ISDN interfaces use the idle-timeout to determine when an ISDN link should be torn down. By default, this value is two minutes, and it also uses the concept of interesting traffic. Once interesting traffic brings the link up, by default all traffic can cross the link.

However, only interesting traffic resets the idle-timeout. If no interesting traffic crosses the link for two minutes, the idle-timer hits zero and the link comes down. If the protocol running over the ISDN link is RIP version 2 or EIGRP, the most efficient way to prevent the routing updates from keeping the line up is expressly prohibiting their multicast routing update address in the access-list that is defining interesting traffic. Do not prevent them from crossing the link entirely, or the protocol obviously won’t work correctly.

With OSPF, Cisco offers the ip ospf demand-circuit interface-level command. The OSPF adjacency will form over the ISDN link, but once formed, the Hello packets will be suppressed. However, the adjacency will not be lost. A check of the adjacency table with show ip ospf adjacency will show the adjacency remains at Full, even though Hellos are no longer being sent across the link. The ISDN link can drop without the adjacency being lost. When the link is needed, the adjacency is still in place and data can be sent without waiting for OSPF to go through the usual steps of forming an adjacency. This OSPF command is vital for Cisco certification candidates at every level, but is particularly important for CCNA candidates. Learn this command now, get used to the fact that the adjacency stays up even though Hellos are suppressed, and add this valuable command to your Cisco toolkit.

One myth about ISDN is that Cisco Discovery Packets keep an ISDN link up. CDP is a Cisco-proprietary protocol that runs between directly connected Cisco devices. There is a school of thought that CDP packets have to be disabled on a BRI interface in order to prevent the link from staying up or dialing when it's not really needed. I've worked with ISDN for years in the field and in the lab, and I've never seen CDP bring up an ISDN link. Try it yourself the next time you're working on a practice rack! Keep studying! Chris Bryant Cisco Certified Internetwork Expert #12933

How to choose a fire wall software program

In the real world a "fire wall" is a fireproof wall that is built to stop the spread of fire from one part of a building to others. In the Internet world a firewall has a similar purpose in that it stops the spread of harmful viruses and attacks from entering your home or office network. Because of the ever-increasing threats that are appearing on the Internet you no longer have to be in business to need the protection of a fire wall. In fact, every computer that is connected to the internet should have one installed. You'll be a lot happier once you know that you have protected your personal files, information, and financial data, such as credit cards and bank account numbers, from being shared with every crook on the internet. Here are some questions that you should consider before you choose a fire wall for your PC: What features do I need? Do I want to be protected from viruses, Trojan horses and worms? Am I at risk because I use programs that access the Internet automatically? How much am I willing to spend on a firewall solution? Here are the common features that are available in almost any software-based fire wall program: Inbound filtering - protects unknown users or programs from accessing your PC Outbound filtering - Protects your PC from sending information to the Internet without your permission Application integrity verification - Verifies that any program you are running aren't sneaking around behind your back and doing things that they shouldn't be doing. Data encryption - Automatically scrambles any sensitive data that you do allow to be transmitted. Stealth mode - Hides that fact that your PC is even connected to the Internet so that hackers can't see you. Pop-up ad blocking - Stops those annoying ads. Cookie blocking - prevents web sites from sending you cookies without your permission Spyware protection - Blocks dangerous spyware from operating on your PC There are many software-based firewall programs that can be downloaded from the internet. Most of them come with free trials so you can test each one and choose what's best for you. Although you won't have to be King Geek to install and set up your firewall, there are some adjustments and settings that will have to be tweaked. All of the better firewall programs come with decent instructions and many of the products have help available at their web site. If you notice that some program that used to work stops working after you install a fire wall then you'll have to make a change in the fire wall's configuration that will enable the program to operate freely. If you find that there is no way to let your previously operating program pass through the firewall then that might be a good indication that you need to try a different fire wall. Be sure to check with the makers of both the software program and the firewall before you give up and change.

Microsoft great plains customization freight forwarding transportation industry example

With this small article we'll begin series of industry solutions highlights for Microsoft Great Plains, Microsoft CRM, Microsoft RMS, Navision and cross-integrations. Check our website on logistics, distribution centers, warehouse management, barcoding, store inventory item count, shipping/receiving, online web ordering, ecommerce, international business, EDI, wholesale. Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great Plains eEnterprise/Dynamics 7.0, 6.0, Dynamics C/S+ 5.5 and 5.0 serve USA, UK, South Africa, Australia, Middle East horizontal market. As being relatively inexpensive solution, it is reasonably open to be customizable to fit specific industry niche. In this small article we’ll give you highlight on how Great Plains could serve specific vertical demands of transportation and freight forwarding industry Industry requirements: Agent Monthly Settlement invoicing. Freight Forwarders use agents and usually pay them on the monthly basis, depending on the results. Freight Forwarded pays fees and collects money from customers, and if collection exceeds fees – it pays to the agent, in the opposite case it issues debit memo. Agent should receive detailed invoice. Shipment Inquiry Form. Usually each Freight Forwarding has custom or standard shipping tracking system. This system is primary source of information about the shipment, then all the collections and fees and associated customer and vendor invoices are moved to Accounting Application, such as Microsoft Great Plains. From this accounting/ERP system we need Shipment Inquiry functionality with the report on the profit/loss from this specific shipment Microsoft Great Plains realization: Technology. Microsoft Great Plains sits on MS SQL Server platform and typical technologies are: Stored Procedures and also Great Plains Dexterity for Screens and Reports – this is Great Plains Software (currently Microsoft Business Solutions) proprietary software development language and IDE Integration – is usually realized through Microsoft SQL Server linked server architecture and distributed queries. These queries might be triggered or placed as MSSQL Server overnight job. Transactions come to Sales Order Processing (SOP) and Purchase Order Processing (POP) modules, where they are placed into batches. Batches then should be processed by AP/AR departments Agent Monthly Settlement. This should be realized as Great Plains Dexterity custom window, with two scrolling windows on it, where you should list SOP Invoices and POP Shipments with Invoices Shipment Inquiry Form. Use the same Great Plains Dexterity custom window technology. Reports – you are free to use either Dexterity report or Crystal Reports designer Good luck and you can always seek our help in customization, implementation, integration and support. Call us: 1-866-528-0577 or 1-630-961-5918, help@albaspectrum. com

How to earn cisco s ccnp certification

Congratulations on your decision to earn your CCNP certification! As a CCIE, I can tell you that Cisco certifications are both financially and personally rewarding. To earn your CCNP, you first have to earn your CCNA certification. Then you're faced with a decision - take the three-exam CCNP path, or the four-exam path? They're both quite demanding, so let's take a look at each path. The four-exam CCNP path includes the Building Scalable Cisco Internetworks exam (BSCI), Building Cisco Multilayer Switched Networks exam (BCMSN), Building Cisco Remote Access Networks (BCRAN), and Cisco Internetwork Troubleshooting (CIT) exam. The three-exam path combines the BSCI and BCMSN exams into a single exam, called the Composite exam. I'm often asked what order I recommend taking the exams in. After earning your CCNA, I recommend you begin studying for the BSCI exam immediately.

You will find the fundamentals you learned in your CCNA studies will help you a great deal with this exam. You're going to add to your CCNA knowledgebase quite a bit when it comes to OSPF and EIGRP, as well as being introduced to BGP. I don't have a preference between the BCMSN and BCRAN exams, but I do recommend you take the CIT exam last. You'll be using all the skills you learned in the first three exams to pass the CIT. It's a very demanding exam, and it's a little hard to troubleshoot technologies that you haven't learned yet! The CCNP is both financially and personally fulfilling. Once you complete your CCNA studies, take a little breather and then get started on your CCNP studies. The more you know, the more valuable you are in today's ever-changing IT job market.

Microsoft great plains 8 0 microsoft rms 1 2 multi store integration overview

Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS) are originally developed by different software vendors, who had no idea that in the remote future (now) these two applications will be owned by Microsoft and will need to be tightly integrated. Current integration between the two is not an easy thing. At this time MBS has RMS integration on the General Ledger and Purchase Order level into Great Plains out of the box. This integration has some advancements in comparison to old product: QuickSell, but it is still GL and PO only. We do understand the need for midsize and large retail companies, structured as clubs and selling on account to their members to have more adequate integration when you can synchronize your Sales information and have robust Great Plains reporting. There is third party integration available on the market and supported by Alba Spectrum Technologies.

Its features: Accounts Receivables transactions move from RMS to Great Plains Multiple Stores – Multiple Great Plains companies mapping Sales Order Processing transaction integration (settings allow you to have either AR or SOP transactions created in GP) Purchase Order Processing POs and Receipts integration (it also imports Open POs - Partial Receipts) Automatic new customer move from RMS to GP Automatic new vendor import From technical side – integration is a set of SQL stored procedures and Great Plains Dexterity custom setup form. You can also schedule integration as SQL job to run overnight, looping through all your RMS stores Recommended settings – targeting RMS Headquarters database (after daily transactions migration from Stores to Headquarter), however you could use linked SQL server to your Store Operation databases and pull daily transactions directly from there Happy integrating! if you want us to do the job or use our product - give us a call 1-630-961-5918 or 1-866-528-0577! help@albaspectrum. com

Podcasts are giving people a voice future internet 4

This article has an accompanying image that can be viewed at http://m6.net/articles/images/padcastfinalv2.jpg I may seem a little bit slow but not all of us make it onto the 'boat of innovation' as fast as others. When I think about it, I have been missing the boat most of my life, but there's a new phenomenon that's come to town and I don't think I'm the last to hear about it. Podcasts, what are they? Well today I finally got my act together and brought my head out of the pit of ignorance where it had been dwelling in relative bliss. I have now experienced podcasts and I think I have an idea as to why and how this new form of Internet communication can bring a whole new level of intimacy to our human community. Podcasts are like blogs in the sense that they give any individual or group a means to express their ideas to the wider society. The difference is that you can now listen to the actual person's voice as well as to whatever information they have recorded for their visitors, like music or samples from other media sources. The force that grabs me is the power of connection one feels when you realize that you are hearing an individual person's thoughts. Some podcasts seem to be stream-of-consciousness dialogue, so you really feel like you are getting to know the essence of a so-called 'stranger' that you may never actually meet in the flesh. Other podcasts are set up so you can read the blog on the computer screen while at the same time getting to hear the voice of the author, which adds a whole new dimension to expressing oneself. I typed 'podcasts' into google. com and found this site, which has a list of many podcasts deemed to be the 'freshest in the known Universe': http://audio. weblogs. com/. I listened to a few on the list, including one called http://podchef. libsyn. com/. This is an average guy who happens to be a chef. He usually talks about all things gastronomical, but also shares his views on life in general. As I sat listening to this guy chatting away I couldn't help picturing him in his house, where he says he lives on an island on the coast of the USA. I had to wonder, what makes someone sit down at his or her computer at home and attempt to talk to the world? Does he know someone will be listening or is he just taking a chance that someone will? If there is someone hearing his thoughts, why does he want us to hear what he's saying anyway? I think the answers lie deep within our bloodlines, within our tribal instincts, which so much of the time lie dormant in the wine cellars of our minds. In our present planetary society of approximately 6 billion human souls, one can often feel that they are alone, that no one else knows they even exist. We get to hear the perspectives of the major billion-dollar media corporations about what life is supposed to mean to us, about what is 'important' to us. Many of us are feeling left out of the circle. We feel empty and strange because others don't mention the things that are relevant to us. This can often lead us to thinking that we are insignificant, disconnected, and that we don't 'fit in'. We have now reached a new era in our species' history. People are figuratively screaming out into the dark emptiness, pleading to be heard by someone that will understand them, and connect with them in a social relationship. A great society will be the one where individuals (people who have decided to interpret life for themselves through their own experience) reach out and realize the power of the people around them. Like a giant tribe, or a hive, we will learn to appreciate the skills, attributes, and voices of the whole team. This may result in all of us working together for the collective good of all, where we all feel that we are an imperative, important part of the group. I checked out a few other podcasts that were interesting in their own right like http:// twistedlittlegnome. com/ Here two brothers that live on opposite sides of their country have conversations about 'geeky' ideas on-line. It's pretty cool, two people talking to each other, while we can listen and comment on their perspectives. http://dreammaker. libsyn. com/ is a very simple podcast that shows how you can use this medium to play music, showing others what you've made, or letting them know what you like to listen to. http://wichitarutherford. libsyn. com/ is a good example of how to incorporate photos or pictures to enhance the listening experience. http://oldtymeradioman. libsyn. com/ is a podcast dedicated to listening to old-style radio shows of the past. It's ironic that the construct of these old shows is being relived in this futuristic context, as many people are incorporating music and sound effects within their dialogue. It exemplifies the cyclic course that much of humanity's creativity travels over time. Like blogs and now vlogs (video blogs), podcasts are a sign that individual people need to connect with others in the community and are starting to speak out to the world. Listen to the voices of your fellow human beings and you might just come to realize that there are others like yourself, and that the way you see life in the Universe is a valid one. One day soon you too may decide to share your mind with the rest of us. You never know whom you may meet through the process. You also could find out more about yourself, when you hear your own voice speak its mind out loud.

Security and rss feeds

RSS is growing at a lightening speed. What was once only known as a "techie tool", RSS is becoming a tool that is continuously being used by the general population. Along with the good comes, the not so good. And while some have mentioned the emergence of RSS spam, where content publishers dynamically generate nonsensical feeds stuffed with keywords, the real concern relates to security. While an annoyance to the search engines, spam in RSS feeds pales in comparison to the possible security concerns that could be in RSS' future. Security Implications Related to RSS. As RSS gains momentum security fears loom large. As publishers are quickly finding innovative uses for RSS feeds, hackers are taking notice. The power and extendibility of RSS in its simplest form is also its achilles heel. The expansion capabilities of the RSS specification, specifically the "enclosure" field which has launched the podcasting phenomenon, is where the vulnerabilities lie. The enclosure field in itself is not the problem, in fact the majority of RSS feeds do not even use the enclosure tag. The enclosure tag is essentially used to link to file types, things like images, word documents, mp3 files, power point presentations, and executables and can be thought of in similar terms to email attachments. The fact that RSS can be used to distribute these file types has opened a myriad of doors to users of the syndication standard, but also has created cause for concern. Most people do not feel that the risk is significant because people "choose" the content that they receive, and while it might make the distribution of malware, viruses and spy applications via RSS less prevalent, their is still the inherent risk of a infected file being distributed. The problem is one of both technology and lack of education. The danger lies in the fact that many RSS readers, news aggregators, or pod-catchers automatically download the information contained in the enclosure field regardless of its file type or source. Most RSS developers acknowledge the risks associated with the enclosure field, but few have had the forethought to include filtering, screening or authentication capabilities and many automatically download enclosures. Nick Bradbury of Bradsoft/NewsGator seems to be proactive, designing FeedDemon with security in mind. FeedDemon uses an editable safelist of file types as well as allowing users to monitor what files are automatically downloaded. FeedDemon also contains hard-coded warnings related to specific file types. Developers of ByteScout took a different approach to the handling of enclosure files, ByteScout does not automatically download anything without user intervention for each download. Unfortunately, not all RSS readers, aggregators and podcatchers consider the possible security implications associated with RSS feeds and podcasts, some will automatically download enclosures without warning or any thoughts of security. Be sure to examine how your RSS reader handles files contained in the enclosure field of an RSS feed. With the increased use of RSS and podcasting, the security risks increase with it. Their is cause for concern, however proactive users and conscientious developers can easily subvert the risk by taking precautions seriously. Computer viruses and malware are cause for legitimate concern, there is ample time and action that can avert potential problems.

How to avoid spam robots

Despite the fact that Federal legislation (the CANSPAM act) made it illegal, harvesting email addresses from the web using automated robots remains alive and well. Spammers who need fresh email addresses release software spider programs that comb the Internet and suck email addresses off Web pages, guest books, and anywhere else you might post your email address. Once they get your email address, spammers will trade it around like 5th graders with a new pack of Pokemon cards at recess and you can expect the avalanche of email to begin flooding your inbox. In order to combat this still rampant practice of stealing email addresses from websites and sending people email they don't want, the following tips should help protect you. ** Break It Up ** Obviously the best way to avoid getting picked up by an email harvester is not to post your email anywhere on anyone's website (including your own). If the only way someone can get your email is if you give it to them, that creates a similar situation to operating with an unlisted phone number. If telemarketers can't get your phone number, they can't call. If you must post your email address, post it in a way that a robot won't recognize it as an email address. Instead of posting YOURNAME@YOURDOMAIN. COM, you can put YOURNAME (AT) YOURDOMAIN. COM and then, in parenthesis, put (replace AT with @ to email me). Though it seems like an extra step for legitimate email, you'll find it a very effective technique. ** Use An Image ** Currently, online spiders (ANY spider, including search engines) cannot read text that appears in a graphic or picture. If you must display an email address on a page, then do it by typing your email address into your favorite graphics program and saving the image as a. gif or. jpg. Then post the image onto your web page so people can see the email, but spiders cannot. This too creates an extra step for people because they must type in your email address, but it's an effective solution if you must display an email address on your own website. ** Use An Email Form ** Another way to cut down on spam originating from your own website is simply not to display an email at all. Instead, allow customers and prospects to contact you through a form where they fill in fields, click a button, and your website emails you their message. A note of caution: make sure the form script you use does not keep your email address visible in the form code. If the form code contains the email address, spam robots can find it even though you don't see it on the page. ** Make It Hard To Guess ** Sometimes you'll get unsolicited email because a spammer guessed your email address. It's not a far stretch to imagine that someone probably has the email Jim@yourdomain. com, so spammers will do a "dictionary" attack on common usernames. One way to defeat this is to place a "dot" (.) in your email address, such as Jim. Edwards@yourdomain. com. The dot makes it virtually impossible for spammers to guess your email address. © Jim Edwards - All Rights reserved http:// thenetreporter. com

Keeping passwords secure

As the web has evolved, so have the methods of collecting personal information. A large number of websites require visitors to register to gain access or participate. While the need for registration is understandable, tracking user names and passwords can be burdensome. Consider using software to store your passwords, in a safe accessible manner. Most websites have privacy policies, but the value of privacy statements are only as honorable as the people behind the websites. Here are suggestions for keeping passwords and your information secure: change your password frequently never share your password with anyone try to choose a password so it doesn't need to be written down, but not so obvious others would easily guess the password be sure your password is at least 6 characters don't use a password containing all the same characters don't send your password via email or provide it over the phone don't use pet, family or friend names don't use your telephone number, zip code or address use a different password for each account don't use user name deactivate accounts for terminated employees don't allow shared accounts password contains upper, lowercase letters, non-letter characters and numbers Resources Password Software - http:// password-software. com Passwords are not foolproof. Do not rely on a password alone to protect sensitive information. Monitor accounts closely to ensure that security is not breached.

The gift idea of bling

Jewelry is a favorite gift idea to give or receive. Whether the jewelry is costume or the finest gold and diamonds, everyone loves a little bling-bling. This is a gift that almost any woman and many, many men can enjoy. Gifts of jewelry can range in price from a few dollars into the hundreds of thousands of dollars or even more. Those who are fortunate enough to be able to purchase anything they desire can spend millions of dollars on jewelry. For most people, however, a gift budget constrains exactly what jewelry can be given. The exact jewelry selected depends largely on the recipient and their relationship to the giver. The jewelry a man gives to his wife is much different than the jewelry a teen age girl gives to another young lady who is also in high school.

Not only will the prices probably differ drastically, but how personal a gift is appropriate will also differ. A man should have no problem coming up with a gift idea of jewelry for his wife. Most women love anything with diamonds. Whether the diamonds are large or small, many or few, the very idea of receiving "a girl's best friend" is thrilling. Of course, the larger the better but most husbands must stay within a gift budget. Frequently, a husband will chose a ring, earrings or a necklace for his beloved wife. A tennis bracelet is another jewelry gift that can be quite affordable since the stone A teen may give a girl with whom she is friends costume jewelry such as earrings, bracelets, anklets, a necklace or even a small ring. Scatter pins and brooches for dressing up outfits are also a nice gift idea. A wonderful gift for a mother is a mother's ring. This ring contains a birthstone from each of the mother's children, creating a unique ring all her own. Another popular mother's gift is a mother's necklace which has a birthstone embellished charm in the shape of a girl or boy for each child. Mothers also love necklaces, earrings, bracelets, pins and broaches. In fact, mothers love almost anything one of her children gives her in the line of jewelry! Fathers, husbands and boyfriends can enjoy nice gifts of jewelry as well. Some men simply do not like and refuse to wear jewelry, but other men really love the shine and sparkle of a little bling. Bracelets and neck chains are the most frequently given men's jewelry gifts. Watches are considered to fall into this area as well. You can find a jewelry gift for just about anyone you might need to purchase a gift for. Even babies can receive the gift of jewelry. Little girl babies are often given a bracelet or necklace by a family member. Baby rings are another great gift idea for the littlest ones on your list.

Personal firewalls for home users

What is a Firewall? The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. The primary goal of a firewall is to implement a desired security policy; controlling access in both directions through the firewall, and to protect the firewall itself from compromise. It wards off intrusion attempts, Trojans and other malicious attacks. Personal Firewalls: They are meant for the home user in a networked environment. They aim to block simple attacks, unlike the enterprise level firewalls that the corporate world uses at the server or router end. There are many ways to implement a firewall, each with specific advantages and disadvantages. Are they really needed? Nowadays organizations and professionals use Internet technology to establish their online presence and showcase their products and services globally. Their endeavor is to leverage digital technology to make their business work for them. All the organizations and professionals are shifting from Dialup to broadband and getting a fixed IP. It has led to an increase in security attacks, bugs in everyday working. This does not mean that Dialup being anonymous dynamic link or the firewall of the ISP network make you pretty safe. Now if your machine was under attack, you must have wondered what went wrong making your system crash suddenly. So I would rather like to say, it’s not necessary for anyone to actually know about you or your IP address to gain access to your system. If you system is infected or prone to intrusions, then beyond the anonymity of your Dialup connection or a dynamic IP, your system can be hacked. Types of Attacks Intrusion: There are many ways to gain unauthorized access to a system. Operating system vulnerabilities, cracked or guessed passwords are some of the more common. Once access is attained, the intruder can send email, tamper with data, or use the system privileges to attack another system. Information Theft and Tampering: Data theft and tampering do not always require that the system be compromised. There have been many bugs with FTP servers that allow attackers to download password files or upload Trojan horses. Service Attacks: Any attack that keeps the intended user from being able to use the services provided by their servers is considered a denial of service attack. There are many types of denial of service attacks, and unfortunately are very difficult to defend against. "Mail bombs" are one example in which an attacker repeatedly sends large mail files in the attempt at filling the server’s disk filesystem thus preventing legitimate mail from being received. Types of Attackers Joyrider: Not all attacks on computer systems are malicious. Joyriders are just looking for fun. Your system may be broken into just because it was easy, or to use the machine as a platform to attack others. It may be difficult to detect intrusion on a system that is used for this purpose. If the log files are modified, and if everything appears to be working, you may never know. Vandals: A vandal is malicious. They break in to delete files or crash computer systems either because they don't like you, or because they enjoy destroying things. If a vandal breaks into your computer, you will know about it right away. Vandals may also steal secrets and target your privacy. “In an incident a Trojan was being used to operate the web cam. All the activities being done in the house were being telecasted on the websites.” Spies: Spies are out to get secret information. It may be difficult to detect break-ins by spies since they will probably leave no trace if they get what they are looking for. A personal firewall, therefore, is one of the methods you can use to deny such intrusions. How Firewalls work? Firewalls basically work as a filter between your application and network connection. They act as gatekeepers and as per your settings, show a port as open or closed for communication. You can grant rights for different applications to gain access to the internet and also in a reverse manner by blocking outside applications trying to use ports and protocols and preventing attacks. Hence you can block ports that you don’t use or even block common ports used by Trojans. Using Firewalls you can also block protocols, so restricting access to NetBIOS will prevent computers on the network from accessing your data. Firewalls often use a combination of ports, protocols, and application level security to give you the desired security. Firewalls are configured to discard packets with particular attributes such as: Specific source or destination IP addresses. Specific protocol types TCP flags set/clear in the packet header. Choosing a firewall: Choose the firewalls which have the ability to ward of all intrusion attempts, control applications that can access the internet, preventing the malicious scripts or controls from stealing information or uploading files and prevent Trojans and other backdoor agents from running as servers. The purpose of having a firewall cannot be diminished in order to gain speed. However, secure, high-performance firewalls are required to remove the bottleneck when using high speed Internet connections. The World-Wide-Web makes possible the generation of enormous amounts of traffic at the click of a mouse. Some of the good firewall performers available in the market are below: BlackICE Defender eSafe Desktop McAfee Personal Firewall Neowatch Norton Personal Firewall PGP Desktop Security Sygate Personal Firewalls Tiny Personal Firewall Zone Alarm Zone Alarm Pro Most of these firewalls are free for personal use or offer a free trial period. All the personal firewalls available can’t ensure 100% security for your machine. Regular maintenance of the machine is needed for ensuring safety. Some of the tasks advised for maintaining system not prone to intrusions: Disable file and print sharing if you are not going to be on network. Update your antivirus signature files regularly. Use a specialized Trojan cleaner. Regular apply security patches to your software and operating system. Don’t open email attachments if you have don’t know the contents it may contain. Don’t allow unknown applications to access to the internet or to your system. Regularly check log files of your personal firewall and antivirus software. Disable ActiveX and java and uninstall windows scripting host if not required. Turn off Macros in Applications like Microsoft Office and turn macro protection on. Check the open ports of your system and see them against the common list of Trojans ports to see if they are being used by some Trojan. Log Off from your internet connection if not required. Being online on the internet for long duration gives any intruder more and sufficient time to breach system security. Unplug peripherals like web cam, microphone if they are not being used.

The tech heads need to build new software that makes obtaining information and collective communication a simple process for the average human

Being the total opposite to a technical person, it is hard to imagine future Internet software advances. The techno-humans have come up with incredible ideas and subsequently their ideas have come to fruition. It seems like anything a human puts their mind to can be done. Our species has come such a long way, but I feel the key to the next part in our evolution of technology and consciousness is to integrate the ideas of the average person. Who do we build all this technology for anyway? I think it’s made for humans to have a better life. It’s time to start making the technological advances in computing with the non-computer-based people of the world in mind. A famous American journalist Sidney J. Harris once said, “The real danger is not that computers will begin to think like men, but that men will begin to think like computers.” Computer and Internet specialists have to realize that they have gone so deep into their fields that they now can no longer see what the computer world looks like to a novice like myself. All this techno-jargon and hundreds of different types of software can be quite overwhelming to a normal person who just wants to take part in this new way of interacting with reality and society. We’ve got to simplify if we want this awesome force to be integrated into our lives in its highest form. I know the Internet is growing at an incredible rate already. One only has to look at the example of India to see the incredible mark Information Technology has made. You can go into a tiny village that looks relatively the same as it has been for fifty years; the general infrastructure is shocking: broken traffic lights, decrepit buildings, power lines splaying out in chaotic patterns. But, something big has changed; each town now has a satellite dish, and an ISP connection (Internet Service Provider)! This is truly amazing. However I believe it is only the beginning of a new revolution that will arrive when we simplify the information and communication processes. So what’s the special answer to the sacred question? Well, I haven’t got all the ideas, but I know of six billion human souls out there who I’m sure would have an opinion if you asked them. Find out what people really want and need. Recently I wrote an article on how great it would be if we could get our News from multiple sources instead of the one-to-many, top-down structure that feeds us so much negativity today. An opportunity to only read relevant News to the individual’s liking also sounds like a great project to take on. Wouldn’t it also be great if we could communicate easily with others of similar interests? E. g.: Finding the blogs and websites that interest us without having to search for days on end to find them! These are just a couple ideas the software masters could approach to make the new revolution of collective consciousness and independent thinking a reality. I truly believe the Internet could be the gate of entry into a new dimension for the average citizen of Earth, a dimension that thrives on the sharing of knowledge from multiple perspectives, communication that involves everyone, and incredible access to individuals who you’ve always wanted to meet. Come on people, let’s get with the program! Humans are a resilient, powerful race of creatures; it’s time to duplicate all this energy we’ve put into producing technology and put it into making it easily used by the masses for positive means. The plant has grown into a tall healthy tree, now it’s time to harvest the fruit of all our labor.

A lot of beepen and tooten but no booten

You start your computer and all you get is a blank screen and some beeping noise. You panic because you think you have some very serious computer problems. Actually, your concern is justified. The reason your computer is beeping is because it has a serious problem that prevents it from communicating via its standard output, the screen. But don't lose hope, here are some troubleshooting steps you can take. The beeps coming from your computer are most likely not coming from your sound board or on-board sound circuitry.

They are coming from a tiny PC speaker mounted inside the computer case for the specific purpose of communicating with humans when it can't communicate via the screen. You may have noticed that every time you start your computer the beeps come in the same pattern. They are not random beeps. The computer is sending a special beep code. Beep codes are programmed into the computers BIOS (Basic Input Output System). Unfortunately, there is no standard for beep codes. Each BIOS manufacturer has their own patterns.

They are not even standard by manufacturer. They vary by the BIOS version, the motherboard, and computer manufacturer. Your first step is to look in the information that came with your computer for the meaning of beep codes or for the identity of your BIOS. If you didn't get that information, try to find it at the web site of the manufacturer of your computer.

If you can't find it at there, you'll need to open the case of your computer and read the manufacturer's name and BIOS version off the BIOS chip. Although there are thousands of different computer and motherboard manufacturers, fortunately there are only a few BIOS manufacturers. Below is a list of the major BIOS manufacturers websites. AMI (American Megatrends, Inc.) megatrends. com Phoenix Technologies ptltd. com IBM us. pc. ibm. com If you can't find useful information about your computer's beep codes at the computer manufacturer's or BIOS manufacturer's web site, you'll need to troubleshoot by process of elimination. A single beep when your computer starts is not an error. It's to test the PC speaker. If you don't hear a single beep, either your computer's power supply, motherboard, or PC speaker is bad. It's unlikely that you have a bad keyboard, but a bad keyboard can cause a computer to emit beep codes, and changing out the keyboard is cheap and easy. Open your the case of your computer and perform a close inspection of the motherboard with a magnifying glass. It's unlikely but possible that something like a staple has been sucked into the case and is causing a short. A common cause of beep codes is a problem with RAM. Make sure the memory modules are installed correctly by gently but firmly pushing down on each module. If that doesn't fix it, remove all but one memory module. Usually a single memory module must be installed in the first bank. If that doesn't fix it, swap out that module with the next one. You may need to identify the type of memory your computer uses and try a brand new memory module. The reason your computer is emitting beep codes may be because the video circuitry is bad. If your motherboard has on-board video, try disabling it and installing a video adapter card. If your computer uses a video adapter card, try replacing it or removing it and enabling on-board video. If that doesn't fix the problem, try removing any expansion cards (except the video adapter card) and disabling any I/O circuitry such as USB ports. If that doesn't work, try replacing the power supply. If your computer still has a blank screen and is emitting beep codes, the only posibility left is a bad component on the motherboard. It could be a CPU failure, but replacing the CPU is usually expensive - if the type your motherboard uses is still available. Replacing a motherboard involves almost totally isassembling the computer and may require reinstalling and/or reactivating the operating system, and replacing some drivers. Hopefully, you will find information about the meaning of the beep codes, and they will indicate a problem easier to fix than replacing the motherboard. Copyright(C) 2005 Bucaro TecHelp. Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

Web safe fonts for your site

Choosing the right typeface for your website copy is important, since it will affect the way your readers perceive your page (serious and formal, or friendly and casual). Aside from this, there are also important usability concerns. For example, some font types are more easily readable than others, and some are more widely available. You want to choose font types that: fit the character of your site, are easy to read on a computer screen, and are widely available across many browsers and operating systems. There are basically two types of fonts: serif and sans serif. Serif fonts are those that have fine cross-lines at the extremities of the letter. Sans serif ("sans" being the French word for "without") are fonts that don't have serifs. The most common serif font is probably Times New Roman. Arial is an example of a common sans serif font. Let's go briefly through the most popular font types and evaluate their availability, readibility and character: Arial: Availability.- Thoroughly available. It is probably the most common sans serif font. It is the default font for Windows, and it first shipped as a standard font with Windows 3.1. Readability On Screen.- Not the worse but definetely not the best, especially at small sizes, when it becomes too narrow and the spacing between characters too small. Character.- Has a streamlined, modern look but is also plain and boring. * For Mac users, the equivalent of Arial is Helvetica. Times New Roman: Availability.- Thoroughly available. It is probably the most common serif font. It is the default font for web browsers. It was first shipped as a standard font with Windows 3.1 Readability On Screen.- Acceptable for font sizes of 12pt. and up, but terrible for smaller sizes. Character.- Serious, formal and old fashioned. For Mac users, the equivalent of Times New Roman is Times. Verdana: Availability.- A widely available sans serif font, Verdana was first shipped with Internet Explorer version 3, when the exponential growth of the Internet demanded a new font that was easy to read on the screen. Readability On Screen.- Exceptional. It's wide body makes it the clearest font for on-screen reading, even at small sizes. Character.- Modern, friendly and professional. Georgia: Avaliability.- Good. It is a serif font introduced by Microsoft with Internet Explorer version 4, when the need for a serif font which much better readability than Times New Roman became evident. Readibility On Screen.- Very good. It is the best serif font for on-line reading, since it was specifically designed for that purpose. Character.- Modern, friendly and professional. Microsoft has also popularized two more fonts: Comic Sans Serif and Trebuchet. Comic Sans Serif was launched with Internet Explorer verion 3 and mimics the hand writing used in comics. It is easy to read and is informal and friendly, but it is not considered appropriate for more serious, professional sites. Trebuchet is another sans serif font, similar to Arial but with more character, although it can be difficult to read in small sizes. Finally, we can mention Courier New, a serif font that was widely popular with old, mechanical typewriters, and that is now used only to present simulated computer code (if you need to present snipets of sample HTML code in your web pages, this is the font to use.) Therefore, from a usability perspective, the clear winner is Verdana. If you are inclined to use a serif font, Georgia is the best option. Arial remains a good option for specific parts of text, like headlines and titles, where a different font must be used and you can use larger sizes. ----- You can freely reprint this article. Just include the following resource box at the end:

Classification of computers

Computers are available in different shapes, sizes and weights, due to these different shapes and sizes they perform different sorts of jobs from one another. They can also be classified in different ways. All the computers are designed by the qualified computer architectures that design these machines as their requirements. A computer that is used in a home differs in size and shape from the computer being used in a hospital. Computers act as a server in large buildings, while the computer also differs in size and shape performing its job as a weather forecaster. A student carrying a laptop with him to his college is different in shape and size from all the computers mentioned above. Here we are going to introduce different classifications of computers one by one. We will discuss what are in classifications and what job they perform. Super computer The biggest in size, the most expensive in price than any other is classified and known as super computer. It can process trillions of instructions in seconds. This computer is not used as a PC in a home neither by a student in a college. Governments specially use this type of computer for their different calculations and heavy jobs. Different industries also use this huge computer for designing their products. In most of the Hollywood’s movies it is used for animation purposes. This kind of computer is also helpful for forecasting weather reports worldwide. Mainframes Another giant in computers after the super computer is Mainframe, which can also process millions of instruction per second and capable of accessing billions of data. This computer is commonly used in big hospitals, air line reservations companies, and many other huge companies prefer mainframe because of its capability of retrieving data on a huge basis. This is normally to expensive and out of reach from a salary-based person who wants a computer for his home. This kind of computer can cost up to thousands of dollars. Minicomputer This computer is next in he line but less offers less than mainframe in work and performance. These are the computers, which are mostly preferred by the small type of business personals, colleges, etc. Personal computers Almost all the computer users are familiar with the personal computers. They normally know what the personal computer is and what are its functions. This is the computer mostly preferred by the home users. These computers are lesser in cost than the computers given above and also, small in size; they are also called PCs in short for Personal computers. This computer is small in size and you can easily arrange it to fit in your single bedroom with its all accommodation. Today this is thought to be the most popular computer in all. Notebook computers Having a small size and low weight the notebook is easy to carry to anywhere. A student can take it with him/her to his/her school in his/her bag with his/her book. This is easy to carry around and preferred by students and business people to meet their assignments and other necessary tasks. The approach of this computer is also the same as the Personal computer. It can store the same amount of data and having a memory of the same size as that of a personal computer. One can say that it is the replacement of personal desktop computer. This is one of the unique articles posted weekly on http:// computer-and-printer-reviews. com.

Cisco ccna ccnp home labs developing troubleshooting skills

CCNA / CCNP candidates are going to be drilled by Cisco when it comes to troubleshooting questions. You're going to have to be able to analyze configurations to see what the problem is (and if there is a problem in the first place), determine the meaning of different debug outputs, and show the ability not just to configure a router or switch, but troubleshoot one. That's just as it should be, because CCNAs and CCNPs will find themselves doing a lot of troubleshooting in their careers. Troubleshooting isn't something that can just be learned from a book; you've got to have some experience working with routers and switches. The only real way to learn how to troubleshoot is to develop that ability while working on live equipment. Of course, your company or client is going to take a very dim view of you developing this skill on their live network. So what can you do? Assemble a Cisco home lab. When you start working with real Cisco equipment, you're doing yourself a lot of favors. First, you're going to be amazed at how well you retain information that will become second nature to you before exam day. But more importantly, both for the exam room and your career, you're developing invaluable troubleshooting skills. Don't get me wrong, I'm not saying knowing the theory of how routers and switches work is unimportant. Quite the opposite - if you don't know networking theory, you're not going to become a CCNA or CCNP. But the ability to apply that knowledge is vital - and the only way you can get that is to work on real Cisco routers and switches. As for these "router simulators" on the market today, ask yourself this simple question: "When I walk into a server room, how many router simulators do I see?" I often tell students that they'll do their best learning when they screw something up. I've had many a student tell me later that I was right - when they misconfigured frame relay, ISDN, or another CCNA / CCNP technology and then had to fix it themselves, it not only gave them the opportunity to apply their knowledge, but it gave them the confidence to know they could do it. And you can't put a price on confidence - in the exam room or in the network center!

[ 1 2 3 4 5 6 7 8 9 10 135 ]