Senin, 19 September 2011

How to Install Joomla 1.5

How to Install Joomla 1.5
This tutorial quickly leads you through installing Joomla 1.5. It details both a local installation for testing (if you do not have a hosting account or have a slow internet connection) and a real web server installation.
Joomla is a complex series of PHP scripts that run on a web server. When you browse a Joomla site, these scripting are being generated on the fly and creating what you see on the pages of the site. The key words here are web server.

Running and Testing Joomla Without a Hosting Account

You cannot download Joomla and try to run it on your computer like an exe file. It has to have a web server, which means you need to have a hosting account. Sounds obvious, but I have had a couple of people if they needed windows XP to run Joomla!
Now, before we shell out our hard earned money for a hosting account, there is something else you can do first. You can actually run a web server on your local computer, in other words, your desktop or laptop. This is known as having a localhost. It may sound like I just contradicted myself from the previous paragraph, but not quite. You canÂ’t "run" Joomla itself on your own computer, but you can install a localhost web server for it to "run on".
What you need to pull this off is some software that runs Apache, PHP and MySQL on your computer. These are the same software packages that power websites. There are two popular ones, WAMP (www.wampserver.com/en/index.php) and XAMPP (www.apachefriends.org/en/xampp.html) and they are both free (PGL license)
I am going to quickly run through setting up WAMP, not that this package is windows specific.
Download WAMP from the above link, and then install it. It will create a folder c:/wamp/www
Run WAMP, you should get a handy icon in your system tray:

You need the dial to be white to continue. Note if you run Skype, it interferes with WAMP and so you have to start WAMP without Skype running (and then start Skype if you need it)
Now open a browser and go to localhost (no "www")
You should see the following page:

If you are not seeing this then you should stop and figure out why. You have to get this page before you can proceed. The WAMP site has some helpful troubleshooting FAQ's and a forum.
You should see your folder called "Joomla" in the list of Your Projects. Click on that folder and you will get taken to that "website".

Installing a Joomla Site on a Hosting Account

So let's assume you either have a hosting account, or are going to get yourself one. There are some minimum requirements for Joomla to run, and they are slightly different for the different versions.
Here are the minimum requirements for Joomla 1.0
You must ensure that you have MySQL, XML and Zlib support built into your PHP.
help.joomla.org/content/view/34/132/
For Joomla 1.5 itÂ’s recommended you have PHP 4.4.3 or above (for enhanced security).
A thread on the Joomla forums lists various hosting companies who are active Joomla community members. The list can be found at forum.joomla.org/index.php/topic,6856.0.html
Note that from now on, the steps are more or less the the same whether you are installing Joomla on a localhost or on a remote web server.

Getting the Joomla Files

This part is easy. Head on over to www.joomla.org and you will see a link to the download section on the home page, it looks like this:

The version number is the number given. This image shows that it's the 11th release in the 1.0 series.
Or you can head straight to the Forge and you will see all possible downloads:
forge.joomla.org/sf/frs/do/viewSummary/projects.joomla/frs
All versions are here as well as various upgrades from one release to another, important if you already have an installation of Joomla.

Important Note:

You cannot upgrade from Joomla 1.0 to Joomla 1.5. There are significant enough changes in the code that simply over writing files would break your site. The developer team has carefully chosen to talk about migration.
"Joomla 1.5 does not provide an upgrade path from earlier versions. Converting an older site to a Joomla 1.5 site requires creation of a new empty site using Joomla 1.5 and then populating the new site with the content from the old site. This migration of content is not a one-to-one process and involves conversions and modifications to the content dump."
dev.joomla.org/component/option,com_jd-wp/Itemid,33/p,107/
This has been a deliberate choice to minimize the number of users who might attempt the "overwrite the files" technique. More can be found in the forum:
"Joomla 1.5 is so significantly changed from 1.0 that there is no 'upgrade' path. This is the reason that we are providing a migration path. The concept is to build a new site and to migrate data from the old site. Extensions need to be installed and configured as if the site is new. The core data migration does reconstruct menu items for core elements and also keeps core module records with configuration settings."
David Gal - forum.joomla.org/index.php/topic,63232.0.html

Unzipping the files

You need to unzip, or unpack the big Joomla files you have onto your server. If you are running as a localhost, your server would be the WAMP directory mentioned above. If you are on a web host, you will need to upload the file and then unpack it. Perhaps the easiest way to do this is with cpanel. Almost all hosting companies provide it. Use your file manager to upload the zip file to public_html (or whatever you have on your host). You can then use file manager to extract the files.
Note:
I donÂ’t recommend using Fantasico. Many hosts provide it but donÂ’t always have the most current file releases.

Installing Joomla through a Web Browser

If you have got this far that means you have unzipped the Joomla package to either a remote web host or your local computer. Now for the fun stuff!
Using your browser of choice (Firefox of course), navigate to the location of all the localhost/Joomla. You will see the first installation screen.

Choose Language:


Here is the first look at some of the internationalization features of Joomla 1.5, you can select amongst many languages for the installation instructions.

Pre-Installation Check


A critical part in the installation process, this checks if all the minimum system requirements are met.
The first set are required minimums, if they are red (not met) then you need to find a new environment (change hosts), talk them into changing their environment (upgrading PHP for example). Note that the last item is a permissions issue on a file that is much easier to rectify. You can usually change permissions through the cpanel provided by your host. This tool is generally an industry standard.
The second set is recommended settings. If you don't meet them you can still install Joomla but it you experience problems with functionality and security.
Once you are green to go, click next.

License


Joomla is released under a GNU/GPL license. One of the most common questions regarding this license is “can I remove the footer link that says Powered by Joomla”. It’s actually perfectly OK to do this, you just have to keep the copyright statement in the source code. However, I would recommend that you keep the link.
Why?
Joomla is an open source project, it receives no funding from any kind of revenue from selling its software. The bottom line is that thousands of developers around the world are developing this software that you are using right now. If you had to buy it from a commercial company, it would cost tens of thousands of dollars, but you are getting it for free. In return, keep the link, it will help the project gain in popularity and grow. DonÂ’t hide the fact that you are using Joomla, be proud of it! And donÂ’t be concerned about any kind of SEO dilution with an extra link off your page. Links to authoritative sites actually help you SEO!
OK, IÂ’ll get off my soapbox nowÂ…

Database Configuration


This is one of the main pages of the installation process, itÂ’s where you need to enter important information about the database that your Joomla site will use. Note you will see a drop down for the database type. Joomla 1.5 only really runs on SQL, but some of the foundation has been laid for the next release, 2.0, to use more types, for example Oracle.
The hostname will almost always be “localhost”
The Username and password will have been provided by your hosting company, usually in an email you got when you created the account.
If you are installing on a localhost using WAMP or XAMPP, the Username is usually “root” and the password is nothing/blank.
Once you have entered this information, click Get Privileges and the Joomla installer checks to see if that user has rights to create a database. You should see this message:

If you made an error, or the user does not have sufficient permissions, then you get this message (after a small delay):

If the user you have does not have permissions then you can ask your hoster to pre-create a SQL database for you to use.
Available collations refer to various character sets available for different languages. When you click the button you get a list of what is available:

Pick a Database name for the SQL database that Joomla will use. Use some sort of name that is not confusing. Other scripts use SQL databases and before you know it you might have several on your server and will need to tell them apart. DonÂ’t use spaces in the name.
If you are running several Joomla sites but only have access to one database, you will need to use a table prefix to distinguish them. YouÂ’ll need to enter the prefix in the advanced settings (below)
Note if your user did not have database creation privileges and you were provided with a database instead you would obviously put that in as the name.
The advanced settings are concerned with what content the site starts with and also the table prefixes mentioned above.

If you have an existing site and you are reinstalling over the top, you will need to select Drop Existing Tables. If you need to keep a back of them, select Backup Old Tables. Using “jos” as a table prefix is conventional unless you have multiple sites in the same database.

Main Configuration


The Main Configuration page determines how you will insert content into your site. You have three choices:
  • Install Sample Data
    This installs the default Joomla content that you have probably seen all over the web with “Welcome to Joomla”. Note that is also includes all the menus, navigation links and sections/categories. If you are learning how to use Joomla this is highly recommended. Its easier to adapt and revise than to start from scratch.
  • Load SQL script
    This is a SQL file that might have a customized set of content
  • Migration from previous versions
    This is a special function that is part of a process to migrate a Joomla site running on 1.0 to 1.5 and requires a special component to do so. This is discussed more in the Appendix.
Give your site a name (pay attention to SEO keywords) and then enter the super administration information. This will be the first user in the site and automatically gets that status. Note that if you donÂ’t change the password, it will use the one shown on the left. Make sure you write it down!
Cross your eyes, close your fingers and click next. Hopefully you will see this screen

If you do get this result, you can investigate different language options, view the site or jump right to the administration of your site.
If you donÂ’t get this page, then you have some work to do. Often issues arise because of server environments. If the solution is not obvious, a useful step is to copy the error message or the main part of it and then search for it both on the Joomla help forums, forum.joomla.org and in Google. The chances are if you get an error, someone else has before you.

Source :  http://www.compassdesigns.net/joomla-tutorials/how-to-install-joomla-15

Rabu, 14 September 2011

Viruses

The Eternal Struggle

Helen Butler, an Internet user in Randolph, Mass., was plagued. After opening an attachment in an email message she thought was from a friend, she started getting a slew of ecards from Blue Mountain, as many as 50 a day.
"This was one of the most frustrating experiences I have encountered. The Blue Screen of Death and system crashes are all minor annoyances compared to this," Butler says.
Butler was blasted by the Blue Mountain worm (W32.HLLW.Cult.C@mm) an irritating bug that masquerades as an ecard from popularand innocent site BlueMountain.com, but gives hackers free access to your computer once it's been launched.
Blue Mountain is part of the new trend in worm/viruses called blended threats. Blended threats combine aspects of viruses and hacker attacks to drill into your computer, often providing a back door for malicious programmers to hijack your system or steal your data.
"What used to be called a virus several years ago is now a virus and then some," says Timo Kissel of antivirus firm Symantec.
Recent wars and global crises have also led to a rise in politically motivated viruses, says Chris Beltoff of antivirus firm Sophos. Spats between India and Pakistan and the ongoing Israeli and Palestinian conflict have led virus writers to join the fray, he says, and your computer may end up as collateral damage.
"I think that people are very disgruntled about some political or religious issue are going to be heard through the use of malicious code," says Beltoff.
Fortunately, even blended threats fail before the might of a good antivirus program. Although it's always best to head off viruses before they attack, Butler successfully killed off the bug and hasn't had a relapse since. "I submitted this information to McAfee, my antivirus program, and within a few days I received a pop-up notification on my PC that the worm was detected and deleted and I have had no problems since," Butler says.

Vanquish Viruses

The best cure for a virus is not to get one. With that in mind, here are some tips for avoiding and curing what the experts call "malware": malicious, infectious software.
Don't Open Those Attachments - The top method for malware to spread itself is still email. Elf bowling, screen savers, online greeting cards . . . folks, if you didn't actually ask for it, don't open it. Send an email message to the person who sent the attachment to you and find out if it's OK. Remember, worms can fake your friends' email addresses.
Ratchet Up Security - To prevent Web sites from infecting your computer, go to your Control Panel. Go to Internet Options (click Start, Settings, and Control Panel). Double-click Internet Options, click the Security tab, and click the Custom Level button under Custom. On the long list of options, change everything possible to Prompt or High Safety except for*Active Scripting*, which should remain set to Enable. (So many Web pages use scripting that to disable it would make it difficult to surf.) That way, when Web sites try to activate programs, your computer will generally ask you first. Refuse requests from sites you don't trust.
Get Antivirus Software - TechiWarehouse recommends any of the leading commercial antivirus programs, such as Norton Internet Security ($14.95) or McAfee VirusScan ($8.88). It's critically important to keep your antivirus software updated, so the now-expired trial version that came with your computer just won't do.

Pop-Ups: Saving Your Eyeballs

In the battle between Web surfers' eyeballs and advertisers' determination, one of the most annoying weapons is the pop-up ad. For the past few years, advertisers have been forcing their messages in front of your window of choice, with dubious results.
At one point in 2001, pop-up king X10, which sells mini video cameras (http://www.x10.com, but don't encourage them by going there), was the fifth most viewed site on the Internet, according to research firm Jupiter MediaMetrix. X10 doesn't release its finances to the public, but anecdotally, TechiWarehouse couldn't find anyone who had actually bought anything from Xl0. The figures likely include numerous inadvertent visits as a result of clicking the ubiquitous pop-up ads.
"When we do surveys of people to find out what the most annoying things on the Internet are, pop-ups actually come out pretty high," said Tom Powledge of Symantec.
The most annoying form of pop-up ad is the mousetrap. Pioneered by porn sites, mousetraps open new windows when you try to close ads. Eventually, you have to quit your browser.
A close second in annoyance are those pop-up ads that appear to be system messages; they're just sleazy and spread fear. Any messagecontaining the word "optimize" that pops up while you're surfing is an ad, as are those "browser checkers" that claim you have security flaws in your system. Don't click the ads; click the X in the upper-right corner to close.
Along with pop-up ads go pop-under ads. Supposedly less annoying than pop-up ads, these windows appear under your main browser window, so they don't interrupt your browsing. But they do clutter your Taskbar with dozens of meaningless Internet Explorer windows, making it tough to find the right window when you have minimized Explorer.
Pop-up ads have been steadily increasing as a percentage of all Internet advertising, according to research firm Nielsen/NetRatings. By the first quarter of 2003, pop-up ads made up 4.8% of all Internet ads, up from only 1.8% a year previously. (The online ad market is still dominated by banner ads. And important for our returning visitors is to note is that TechiWarehouse is working onto eliminating pop-up ads on our site totally.)
But browser manufacturers and software companies are on top of the pop-up ad problem. Internet Explorer may dominate the browser world, but other browsers, such as Mozilla, Opera, and Apple's Safari, have responded to consumers' calls by making it simple to cancel pop-up ads. All three browsers detect attempts to open windows without a user's request and simply stop them.
"Our users really wanted the ability to control pop-up ad blocking," said Kurt Knight, Internet product manager at Apple. "This was one of the things we really wanted in our browser."

Once You Pop, You Can Stop

Pop-ups can be occasionally informative (Orbitz's pop-ups often show great air fares), but they're usually pretty annoying. Fortunately, there are several things you can do to disable invasive ads.
Don't Encourage Them - If you dislike pop-up ads, don't click them. That'll send the message to advertisers that pop-up ads aren't an effective form of getting their messages out.
Ditch Explorer - Alternate browsers Mozilla (http://www.mozilla.org) and Opera (http://www.opera.com), and for the Mac, Safari (http://www.apple.com/safari), all provide antipop-up ad options.
Get A Pop-Up Stopper - IE partisans can buy separate pop-up blocker programs to smooth their surfing experiences. Comprehensive Internet security programs, including Zone Labs' ZoneAlarm Pro ($39.88) and Symantec's Norton Internet Security ($14.95), block pop-up ads, but if you want the ad-blocking features but don't want those programs' antivirus and personal firewall functions, we have previously tested and recommended Alexa's latest browser toolbar (http://www.alexa.com). ISP EarthLink also provides a free pop-up ad blocker to all of its subscribers.

Source : http://www.techiwarehouse.com/engine/6a876b0f/Can-There-Be-a-More-Annoying-Place-Than-This?

Spyware: A Growing Threat

Spyware: A Growing Threat

It may call itself a "browser helper" and fill your screen with ads or pump your Favorites list full of porn. Or it may quietly sit in the background, sending information about your surfing habits to advertisers without your permission.
Spyware and browser hijackers are a growing problem on the Internet. These programs either automatically install themselves when you visit a Web site or piggyback on the installer of an existing program (such as popular file-sharing application Kazaa). Beyond imperiling your privacy, they can damage the stability of your PC, and they're often very difficult to remove.
"We have some anecdotal information that as many as 40% to 50% of the people who call into our tech support have some sort of spy- ware on their machines," says Jim Anderson of EarthLink.
Most of the spyware average Internet users run into exists to spread advertising. Programs, such as Gator and Cydoor, track your browsing habits, serving up ads to fit your preferences, and share the profits with free software vendors who let adware piggyback on their installers. Gator and Cydoor are annoying, but not necessarily harmful.
"Advertising spyware and adware spread with popular file sharing programs such as Kazaa, Imesh, and Grokster. As more people install these programs, they also install the spyware that pays for them," says Mike Healan, a spyware tracker who publishes a newsletter at http://www.spywareinfo.com.
Browser hijackers, on the other hand, are noxious. Sites such as Lop.com and Xupiter.com install toolbars, add Favorites, and change your home page, often without your permission. New .Net and WebHancer integrate themselves into your network settings, making them difficult to remove and potentially crashing your browser or your computer, according toHealan. "Lop.com will hijack your browser, and you'll end up with casino and porn links on your Desktop and in your Favorites. It's pretty nasty," says Michael Wood of antispyware firm Lavasoft.
The makers of Lop.com, C2 Media, claim that its software is always installed voluntarily. Every spyware expert we spoke to says that's not the case, and that on systems with low security settings, Lop.com simply walks in and takes over.
Then there are porn dialers, another kind of hijacker. If you get an email message or see a site that advertises "free porn" if you run a "viewer" or "dialer program," stay away. The viewer program will disconnect your dial-up line and try to reconnect to a service provider overseas, charging as much as $5 a minute to your phone bill. This is an old trick (we saw it back in 1999), but it's still going strong.

Smash Spyware

Keeping your Internet security settings high is the key to avoiding and disabling spyware. For now, ISPs don't provide antispyware tools, although EarthLink plans to introduce one later this year. Until then, here are some tips:
Shields Up - Change your Internet security settings so nothing gets installed without your knowledge. Go to Internet Options (click Start, Settings, and Control Panel). Double-click Internet Options, click the Security tab, and click the Custom Level button under Custom. On the long list of options, change everything possible to Prompt or High Safety. That way, when Web sites try to activate programs, your computer will always ask you first. Refuse requests from sites you don't know and trust.
Wall It Off - Spyware tries to secretly talk to the Internet, so a personal firewall can help identify and foil malicious software. There are plenty of free firewall programs out there; in the past, we've recommended the free Sygate Personal Firewall (http://soho.sygate.com) and the Zone Labs ZoneAlarm (http://www.zonelabs.com).
Eliminate Explorer - Mozilla and Netscape are more resistant to browser hijackers and "helpful" toolbars. "Lop.com can infect Mozilla/Netscape, but only if you choose to run a downloaded installer," Healan says.
Disinfect and Destroy - Several freeware applications can rid your PC of spyware and browser hijackers. Healan recommends the free Spybot Search & Destroy (http://security.kolla.de). Another well-respected product is Lavasoft's Ad-aware (http://www.lavasoft.de/software/adaware), also free. Run these programs frequently to keep bad guys at bay.

Source : http://www.techiwarehouse.com/engine/6a876b0f/Can-There-Be-a-More-Annoying-Place-Than-This?

Internet Enemy No. 1

Spam: Internet Enemy No. 1

If you think you've been getting more spam recently, you're right. According to antispam company Brightmail (http://www.brightinail.com), which processed 55 billion messages in March 2003, the level of "Make Money Fast!" and "Naked Girls XXX" email messages has boomed to never-before-seen levels.
"We're definitely predicting that by the end of the year, more than 50% of all email will be spam," says Brightmail CEO Enrique Salem. "At some point spam, renders email useless."
The most offensive spam, of course, is porn spam-especially when it ends up in children's mailboxes. But finding the spammers can be nearly impossible, as the most explicit solicitations are sent out by fly-by-night, mom-and-pop Web site operations and foreign companies(especially firms in Russia), often using hijacked mail servers or other ways to cover their tracks.
At press time, 30 states had enacted some spam-regulation legislation (see Spam laws.com at http://www.spamlaws.com/state), and Washington is finally getting angry. In April, senators Conrad Burns (R-Mont.) and Ron Wyden (D-Ore.) reintroduced a bill to make it a federal crime to send spam with a false address. Rep. Zoe Lofgren (U-Calif.) has another bill requiring spammers to tag their messages in the subject line, and Sen. Charles Schumer (D-N.Y.) promised a third bill to create a national "do not email" list.
In early May, the FTC and state law enforcement officials announced 45 legal cases they'd opened against spammers, and with EarthLink's help, the state of New York charged the alleged "Buffalo Spammer," who had sent more than 825 million email messages, with identity theft and forgery.
But legislative remedies can only go so far. U.S. laws don't affect foreign spammers, and criminal spammers don't care much about the lawanyway. So the antispam software business is also booming; programs both ISPs (Internet serviceproviders) and individual computers run detect spam by detecting telltale words, phrases, or patterns.
The spam world is a lot like the virus world; as antispam software gets more effective, spammers come up with new strategies to avoid the filters. Spammers' latest tactic, according to Salem, is to embed invisible HTML (Hypertext Markup Language) codes between the words of their messages or turn pans of their message text into graphics; both tactics help them evade pattern-matching filters which rely on being able to read the text of a message to zap it. "These techniques weren't being used six months ago," Salem says.

Slam That Spam

Spam may seem unstoppable, but there are ways to prevent your inbox from ever again being exposed to what the FTC (Federal Trade Com-mission) tactfully refers to as "organ enlargement' solicitations.
Complain, Three Ways - Lawmakers are responding to a wave of popular anger, and to keep them fighting spam, you have to keep their feet to the fire. Email your senators and representatives encouraging them to vote for the Schumer, Lofgren, and Burns-Wyden antispam laws. Then forward spam both to the FTC at uce@ftc.gov and to your ISP's abuse department, which is usually at abuse@yourispname.com. For instance, EarthLink's abuse department is abuse@earthlink.net. Use your mailer's forward command and don't delete any of the spam message; the good guys need all the header info to find the perpetrators.
Use a Spam Address - Keep your regular email address only for family and friends. Use a separate account (another screen name on AOL or a free account at Yahoo! or Hotmail) to fill out forms, post on discussion boards, and slap up onto Web pages. The spam address will get all the spam.
Obscure Your Name - If you have to put your email address on the 'Net, a report from the Center For Democracy & Technology (http://www.cdt.org) found that obscuring it helps. For instance, if your address is joe@aol.com, put on your page that it's "joe at a-o-l dot com" or even "xyzjoel23@Yaol.com without the xyz or the 123." It's a little bit of a puzzle, but it stumps the automatic address-harvesters spammers use to find you.
Use An Obscure Name - A common spam tactic, the dictionary attack, randomly emails common names and short combinations of letters, so using a complex email address, such as Redjoe30@aol.com, is better than just plain joe@aol.com.
Use An Antispam ISP - Many ISPs nowadays claim to filter spam, although some are better than others. When we compared AOL 8.0 to MSN 8, for instance, we found AOL received far more spam. The current gold standard of ISP antispam products is Brightmail, which AT&T WorldNet, EarthLink, MSN, Verizon DSL, and some smaller providers use.
Get A Desktop Antispam Solution - Even the best ISP still misses some spam. For your PC, we recommend McAfee's SpamKiller ($22.00).

McAfee's SpamKiller �McAfee's SpamKiller

Hey, That's Not 56K

Your modem says 56Kbps (kilobits per second) on it, right? You think that means it'll connect to the Internet and transfer data at 57,600 bits per second? Wrong!
"You'll never get a 56K connection on a dial-up connection. It just doesn't happen," says Rob Lancaster, Internet analyst at research firm The Yankee Group. "You're going to get 50Kbps, tops, depending on your Location."
It's actually impossible to get a 56Kbps connection (even if your computer claims it's happening), because the FCC restricts the voltage on phone lines so that only 53Kbps speeds are possible. And even if you're able to connect at 53Kbps, dial-up modems only receive information at 53Kbps, and you'll be sending data to the Internet at no more than 48Kbps.
If your connection is slow, don't blame your ISP. The problem is almost always in your phone line or in some piece of old, decaying phone company equipment, says Tom Pryzgoda, director of global marketing of modem manufacturer US Robotics.
"There are areas where they have equipment that's old, where the telecoms haven't been spending, and some people will never connect above 26.4Kbps," he says. "It's not the ISP; it's the phone line."
There are ways to speed things up even if you're connected at 26.4Kbps, though. Several ISPs have started to sell accelerated dial-up products, which compress text files and sometimes degrade graphics before they're sent to you, to speed up the appearance of Web pages. They don't speed up email messages, but that's probably fast enough already, they don't speed up streaming video or file downloads, but that's technically difficult if not impossible.
"When you go to a page that is predominantly text, it'll be the fastest," says Mark Goldstein, CEO of United Online, which runs the Juno and NetZero ISPs. "Whenever you're using a graphic, you won't see as much of a speed increase. But we're going to speed up your dial-up experience no matter what."
On the other hand, if you find yourself suddenly knocked offline in the middle of reading a long email message, there's usually something you can do about it. To make maximum use of their phone lines, ISPs often boot off anyone who hasn't exchanged data within the past 10 to 15 minutes. You can fool your ISP into keeping your connection alive with some simple software tricks.
If those tricks don't help, once again, your phone line's probably to blame. And phone companies are often less than enthusiastic about upgrading ancient copper cables to squeeze out a few more bits per second.
"In a lot of cases the phone company doesn't try to fix your analog line. They'll try to sell you DSL(Digital Subscriber Line) instead," Pryzgoda says.

Cure Connection Catastrophes

Whether you're getting cut off or just not getting the speed you deserve, there are several ways to make your Internet access speedier and more reliable.
Keep It Alive - If getting cut off is your bane, set your email program to get mail every three minutes; that should prevent your ISP from thinking you've stepped away. Or use Gammadyne Software's freeware Connection Keeper (http://www.gammadyne.com/conkeep.htm) to keep your link alive.
Check The Lines - Switch to a different dial-up number, in case there's a problem on one of your ISP's lines. Then call your phone company and see if there's a problem on your line.
Optimize - There are various system settings you can change to speed up a dial-up connection. Or get a connection-optimizing program, such as High Mountain Software's iSpeed ($10.95 with 21-day free trial; http://www.hms.com).
Go External - If you're using an older computer with a so called win-modem, a built-in, software based modem, you may get better speeds if you buy an external modem. Win-modems are dependent on your computer's processing power, so if the computer is working too hard or memory is too full, you won't get great performance.
Accelerate - If most of your Internet use is Web surfing (as opposed to, say, downloading music) then a dial-up accelerator might help. Juno, NetZero, and EarthLink all offer accelerated services. If you have another ISP (including content provider AOL), you can use Propel Accelerator (http://www.propel.com).
Get Broadband - The only way to guarantee a fast, easy connection, all the time, is to switch to cable or DSL. As broadband providers like to remind you, high-speed access doesn't cost much more than a second phone line plus an Internet service, and it really does transform your 'Net experience into something much more pleasant.

Source : http://www.techiwarehouse.com/engine/6a876b0f/Can-There-Be-a-More-Annoying-Place-Than-This?

Sabtu, 10 September 2011

Examining your network with commands

Examining your network with commands:

Ping

PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with.

Ping returns different responses depending on the computer in question. The responses are similar depending on the options used.

Ping uses IP to request a response from the host. It does not use TCP

.It takes its name from a submarine sonar search - you send a short sound burst and listen for an echo - a ping - coming back.

In an IP network, `ping' sends a short data burst - a single packet - and listens for a single packet in reply. Since this tests the most basic function of an IP network (delivery of single packet), it's easy to see how you can learn a lot from some `pings'.

To stop ping, type control-c. This terminates the program and prints out a nice summary of the number of packets transmitted, the number received, and the percentage of packets lost, plus the minimum, average, and maximum round-trip times of the packets.

Sample ping session

PING localhost (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=2 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=3 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=4 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=5 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=6 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=7 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=8 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=9 ttl=255 time=2 ms

localhost ping statistics

10 packets transmitted, 10 packets received, 0% packet loss
round-trip min/avg/max = 2/2/2 ms
meikro$

The Time To Live (TTL) field can be interesting. The main purpose of this is so that a packet doesn't live forever on the network and will eventually die when it is deemed "lost." But for us, it provides additional information. We can use the TTL to determine approximately how many router hops the packet has gone through. In this case it's 255 minus N hops, where N is the TTL of the returning Echo Replies. If the TTL field varies in successive pings, it could indicate that the successive reply packets are going via different routes, which isn't a great thing.

The time field is an indication of the round-trip time to get a packet to the remote host. The reply is measured in milliseconds. In general, it's best if round-trip times are under 200 milliseconds. The time it takes a packet to reach its destination is called latency. If you see a large variance in the round-trip times (which is called "jitter"), you are going to see poor performance talking to the host

NSLOOKUP

NSLOOKUP is an application that facilitates looking up hostnames on the network. It can reveal the IP address of a host or, using the IP address, return the host name.

It is very important when troubleshooting problems on a network that you can verify the components of the networking process. Nslookup allows this by revealing details within the infrastructure.

NETSTAT

NETSTAT is used to look up the various active connections within a computer. It is helpful to understand what computers or networks you are connected to. This allows you to further investigate problems. One host may be responding well but another may be less responsive.

IPconfig

This is a Microsoft windows NT, 2000 command. It is very useful in determining what could be wrong with a network.

This command when used with the /all switch, reveal enormous amounts of troubleshooting information within the system.

Windows 2000 IP Configuration

Host Name . . . . . . . . . . . . : cowder
Primary DNS Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . :
WAN (PPP/SLIP) Interface
Physical Address. . . . . . . . . : 00-53-45-00-00-00
DHCP Enabled. . . . . . . . . . . : No
IP Address. . . . . . . . . . . . : 12.90.108.123
Subnet Mask . . . . . . . . . . . : 255.255.255.255
Default Gateway . . . . . . . . . : 12.90.108.125
DNS Servers . . . . . . . . . . . : 12.102.244.2
204.127.129.2

Traceroute

Traceroute on Unix and Linux (or tracert in the Microsoft world) attempts to trace the current network path to a destination. Here is an example of a traceroute run to www.berkeley.edu:

$ traceroute www.berkeley.edu

traceroute to amber.Berkeley.EDU (128.32.25.12), 30 hops max, 40 byte packets

1 sf1-e3.wired.net (206.221.193.1) 3.135 ms 3.021 ms 3.616 ms

2 sf0-e2s2.wired.net (205.227.206.33) 1.829 ms 3.886 ms 2.772 ms

3 paloalto-cr10.bbnplanet.net (131.119.26.105) 5.327 ms 4.597 ms 5.729 ms

4 paloalto-br1.bbnplanet.net (131.119.0.193) 4.842 ms 4.615 ms 3.425 ms

5 sl-sj-2.sprintlink.net (4.0.1.66) 7.488 ms 38.804 ms 7.708 ms

6 144.232.8.81 (144.232.8.81) 6.560 ms 6.631 ms 6.565 ms

7 144.232.4.97 (144.232.4.97) 7.638 ms 7.948 ms 8.129 ms

8 144.228.146.50 (144.228.146.50) 9.504 ms 12.684 ms 16.648 ms

9 f5-0.inr-666-eva.berkeley.edu (198.128.16.21) 9.762 ms 10.611 ms 10.403 ms

10 f0-0.inr-107-eva.Berkeley.EDU (128.32.2.1) 11.478 ms 10.868 ms 9.367 ms

11 f8-0.inr-100-eva.Berkeley.EDU (128.32.235.100) 10.738 ms 11.693 ms 12.520 ms


Source : http://www.techiwarehouse.com/cms/engine.php?page_id=d9e99072

IP Addressing

IP Addressing:

An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.

Example: 140.179.220.200

It is sometimes useful to view the values in their binary form.

140 .179 .220 .200

10001100.10110011.11011100.11001000

Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.

Address Classes:

There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.

Class A addresses begin with 0xxx, or 1 to 126 decimal.

Class B addresses begin with 10xx, or 128 to 191 decimal.

Class C addresses begin with 110x, or 192 to 223 decimal.

Class D addresses begin with 1110, or 224 to 239 decimal.

Class E addresses begin with 1111, or 240 to 254 decimal.

Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses.

Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n).

Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn

Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn

Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn

In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200).

In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section.

Private Subnets:

There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses

Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.

Subnet Masking

Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number.

For example, using our test IP address and the default Class B subnet mask, we get:

10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address

11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask

10001100.10110011.00000000.00000000 140.179.000.000 Network Address

Default subnet masks:

Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000

Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000

Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000

CIDR -- Classless InterDomain Routing.

CIDR was invented several years ago to keep the internet from running out of IP addresses. The "classful" system of allocating IP addresses can be very wasteful; anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organizations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet.

People realized that addresses could be conserved if the class system was eliminated. By accurately allocating only the amount of address space that was actually needed, the address space crisis could be avoided for many years. This was first proposed in 1992 as a scheme called Supernetting.

The use of a CIDR notated address is the same as for a Classful address. Classful addresses can easily be written in CIDR notation (Class A = /8, Class B = /16, and Class C = /24)

It is currently almost impossible for an individual or company to be allocated their own IP address blocks. You will simply be told to get them from your ISP. The reason for this is the ever-growing size of the internet routing table. Just 5 years ago, there were less than 5000 network routes in the entire Internet. Today, there are over 90,000. Using CIDR, the biggest ISPs are allocated large chunks of address space (usually with a subnet mask of /19 or even smaller); the ISP's customers (often other, smaller ISPs) are then allocated networks from the big ISP's pool. That way, all the big ISP's customers (and their customers, and so on) are accessible via 1 network route on the Internet.

It is expected that CIDR will keep the Internet happily in IP addresses for the next few years at least. After that, IPv6, with 128 bit addresses, will be needed. Under IPv6, even sloppy address allocation would comfortably allow a billion unique IP addresses for every person on earth

Source : http://www.techiwarehouse.com/cms/engine.php?page_id=d9e99072

Types of Servers

Types of Servers:

Device Servers

A device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a "closed box," delivering extreme ease of installation, minimal maintenance, and can be managed by the client remotely via a Web browser.

Print servers, terminal servers, remote access servers and network time servers are examples of device servers which are specialized for particular functions. Each of these types of servers has unique configuration attributes in hardware or software that help them to perform best in their particular arena.

Print Servers

Print servers allow printers to be shared by other users on the network. Supporting either parallel and/or serial interfaces, a print server accepts print jobs from any person on the network using supported protocols and manages those jobs on each appropriate printer.

Print servers generally do not contain a large amount of memory; printers simply store information in a queue. When the desired printer becomes available, they allow the host to transmit the data to the appropriate printer port on the server. The print server can then simply queue and print each job in the order in which print requests are received, regardless of protocol used or the size of the job.

Multiport Device Servers

Devices that are attached to a network through a multiport device server can be shared between terminals and hosts at both the local site and throughout the network. A single terminal may be connected to several hosts at the same time (in multiple concurrent sessions), and can switch between them. Multiport device servers are also used to network devices that have only serial outputs. A connection between serial ports on different servers is opened, allowing data to move between the two devices.

Given its natural translation ability, a multi-protocol multiport device server can perform conversions between the protocols it knows, like LAT and TCP/IP. While server bandwidth is not adequate for large file transfers, it can easily handle host-to-host inquiry/response applications, electronic mailbox checking, etc. And it is far more economical than the alternatives of acquiring expensive host software and special-purpose converters. Multiport device and print servers give their users greater flexibility in configuring and managing their networks.

Whether it is moving printers and other peripherals from one network to another, expanding the dimensions of interoperability or preparing for growth, multiport device servers can fulfill your needs, all without major rewiring.

Access Servers

While Ethernet is limited to a geographic area, remote users such as traveling sales people need access to network-based resources. Remote LAN access, or remote access, is a popular way to provide this connectivity. Access servers use telephone services to link a user or office with an office network. Dial-up remote access solutions such as ISDN or asynchronous dial introduce more flexibility. Dial-up remote access offers both the remote office and the remote user the economy and flexibility of "pay as you go" telephone services. ISDN is a special telephone service that offers three channels, two 64 Kbps "B" channels for user data and a "D" channel for setting up the connection. With ISDN, the B channels can be combined for double bandwidth or separated for different applications or users. With asynchronous remote access, regular telephone lines are combined with modems and remote access servers to allow users and networks to dial anywhere in the world and have data access. Remote access servers provide connection points for both dial-in and dial-out applications on the network to which they are attached. These hybrid devices route and filter protocols and offer other services such as modem pooling and terminal/printer services. For the remote PC user, one can connect from any available telephone jack (RJ45), including those in a hotel rooms or on most airplanes.

Network Time Servers

A network time server is a server specialized in the handling of timing information from sources such as satellites or radio broadcasts and is capable of providing this timing data to its attached network. Specialized protocols such as NTP or udp/time allow a time server to communicate to other network nodes ensuring that activities that must be coordinated according to their time of execution are synchronized correctly. GPS satellites are one source of information that can allow global installations to achieve constant timing.

Source: http://www.techiwarehouse.com/cms/engine.php?page_id=d9e99072