Sunday, September 30, 2007

Cisco Certification: The Cisco Three-Layered Hierarchical Model

Cisco has defined a hierarchical model known as the hierarchical internetworking model. This model simplifies the task of building a reliable, scalable, and less expensive hierarchical internetwork because rather than focusing on packet construction, it focuses on the three functional areas, or layers, of your network:

Core layer: This layer is considered the backbone of the network and includes the high-end switches and high-speed cables such as fiber cables. This layer of the network does not route traffic at the LAN. In addition, no packet manipulation is done by devices in this layer. Rather, this layer is concerned with speed and ensures reliable delivery of packets.

Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer ensures that packets are properly routed between subnets and VLANs in your enterprise. This layer is also called the Workgroup layer.

Access layer: This layer includes hubs and switches. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network. This layer ensures that packets are delivered to end user computers.

Figure INT.2.1 displays the three layers of the Cisco hierarchical model.

When you implement these layers, each layer might comprise more than two devices or a single device might function across multiple layers.The benefits of the Cisco hierarchical model include:

High Performance: You can design high performance networks, where only certain layers are susceptible to congestion.

Efficient management & troubleshooting: Allows you to efficiently organize network management and isolate causes of network trouble.

Policy creation: You can easily create policies and specify filters and rules.

Scalability: You can grow the network easily by dividing your network into functional areas.

Behavior prediction: When planning or managing a network, the model allows you determine what will happen to the network when new stresses are placed on it.

Core Layer

The core layer is responsible for fast and reliable transportation of data across a network. The core layer is often known as the backbone or foundation network because all other layers rely upon it. Its purpose is to reduce the latency time in the delivery of packets. The factors to be considered while designing devices to be used in the core layer are:

High data transfer rate: Speed is important at the core layer. One way that core networks enable high data transfer rates is through load sharing, where traffic can travel through multiple network connections.

Low latency period: The core layer typically uses high-speed low latency circuits which only forward packets and do not enforcing policy.

High reliability: Multiple data paths ensure high network fault tolerance; if one path experiences a problem, then the device can quickly discover a new route.

At the core layer, efficiency is the key term. Fewer and faster systems create a more efficient backbone. There are various equipments available for the core layer. Examples of core layer Cisco equipment include:

Cisco switches such as 7000, 7200, 7500, and 12000 (for WAN use)

Catalyst switches such as 6000, 5000, and 4000 (for LAN use)

T-1 and E-1 lines, Frame relay connections, ATM networks, Switched Multimegabit Data Service (SMDS)

Distribution Layer

The distribution layer is responsible for routing. It also provides policy-based network connectivity, including:

Packet filtering (firewalling): Processes packets and regulates the transmission of packets based on its source and destination information to create network borders.

QoS: The router or layer 3 switches can read packets and prioritize delivery, based on policies you set.

Access Layer Aggregation Point: The layer serves the aggregation point for the desktop layer switches.

Control Broadcast and Multicast: The layer serves as the boundary for broadcast and multicast domains.

Application Gateways: The layer allows you to create protocol gateways to and from different network architectures.

The distribution layer also performs queuing and provides packet manipulation of the network traffic.

It is at this layer where you begin to exert control over network transmissions, including what comes in and what goes out of the network. You will also limit and create broadcast domains, create virtual LANs, if necessary, and conduct various management tasks, including obtaining route summaries. In a route summary, you consolidate traffic from many subnets into a core network connection. In Cisco routers, the command to obtain a routing summary is:

show ip route summary

You can practice viewing routing information using a free CCNA exam router simulator available from SemSim.com. You can also determine how routers update each other's routing tables by choosing specific routing protocols.

Examples of Cisco-specific distribution layer equipment include 2600,4000, 4500 series routers

Access Layer

The access layer contains devices that allow workgroups and users to use the services provided by the distribution and core layers. In the access layer, you have the ability to expand or contract collision domains using a repeater, hub, or standard switch. In regards to the access layer, a switch is not a high-powered device, such as those found at the core layer.

Rather, a switch is an advanced version of a hub.

A collision domain describes a portion of an Ethernet network at layer 1 of the OSI model where any communication sent by a node can be sensed by any other node on the network. This is different from a broadcast domain which describes any part of a network at layer 2 or 3 of the OSI model where a node can broadcast to any node on the network.

At the access layer, you can:

Enable MAC address filtering: It is possible to program a switch to allow only certain systems to access the connected LANs.

Create separate collision domains: A switch can create separate collision domains for each connected node to improve performance.

Share bandwidth: You can allow the same network connection to handle all data.

Handle switch bandwidth: You can move data from one network to another to perform load balancing

Friday, September 28, 2007

Understanding Dot Pitch

Looking for a monitor and want a better understanding of all the options available? Well in this article we will explore the Dot Pitch. Dot Pitch is a measurement of the smallest visual component on the display (a Dot). At the highest resolution (more on this in the next article) each pixel will equal the one Dot, at lower resolutions a pixel will encompass more than one Dot.

The Dot pitch is measured in millimeters, with the measurements ranging from .30mm to .15mm. The smaller the Dot pitch is the sharper the image will be and the higher the resolution you will be able to set.

Wednesday, September 26, 2007

Kill The Messenger (Service)

You are familiar with the software applications that you run on your computer, but you may not be familiar with the dozens of programs running in the background on your computer. These programs, called "services" handle tasks like event logging, spooling files to the printer, and networking. One of these services, the Messenger Service, can be reconnoitered by spammers.

The original purpose of the Messenger Service was to allow system administrators to send a message to some or all of the users on a network. The message appears in a popup window to alert the users. Messenger Service is not instant-messaging. It does not allow the users to respond.

All Windows versions install Messenger Service and turn it on by default. A program freely available from the Internet allows spammers to control the Messenger Service on hundreds of thousands of computers on the Web. Users receive popup spam windows that are not generated by the website they are visiting.

If your computer is on a network behind a firewall, or you have a firewall application installed on your computer, it can be configured to block access to the Messenger Service. Most firewalls are configured by default to block access to the Messenger Service. If not, configure your firewall to block port 135, the port used by Messenger Service.

Microsoft, in their ignorance of computer security, likes to leave "back doors" to your computer open. But they finally wised up and Windows XP Service Pack 2 turns off the Messenger Service. If you are running Windows XP, your best bet would be to install Service Pack 2 to turn off the Messenger Service and close several other security holes.

If you are running Windows 2000, you can turn off the Messenger Service manually. Select "Run..." in the Start menu and in the "Open:" text box type services.msc, then click on the "OK" button. In the "Services" window that appears, right-click on "Messenger". In the "Properties" dialog box that appears, click on the "Stop" button and then in the "Startup Type" drop-down list select "Disabled". Then click on the "OK" button.

If you are running Windows NT, select "Services" in the "Adminstrative Tools" utility. Then disable the Messenger Service as described above. If you are running Windows 95/98/Me, you can't disable Messenger Service, you need to remove it. Use the "Add/Remove Programs" utility in Control Panel to view the details of "System Tools". Uncheck the box next to "WinPopUp".

Now, with the Messenger Service on your computer disabled or removed, spammers will have to go back to annoying you the old fashion way - with spam email.

--

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

Monday, September 24, 2007

CCNA 640-801 Certification Primer

The Cisco Certified Network Associate (CCNA) Certification is meant for career enhancement as well as gaining knowledge of the LAN/WAN technologies currently available for implementation. Hence, CCNA Certification can be obtained by IT professionals who have been a part of the industry for a considerable time and are interested in furthering their career in terms of role enhancement and salary. Individuals who are beginning their career and want to move towards LAN/WAN management may also pursue the certification, as it is a basic level certification and there are no prerequisites.

Details About CCNA Certification

The CCNA Certification is an ideal foundation in the field of networking. CCNA Certification equips professionals with skills to select, install, configure, troubleshoot, and operate LAN/WAN, and dial access services for small networks. CCNA Certification also equips professionals with the knowledge to employ access lists and use of protocols such as IP, IGRP, Serial, Frame Relay, IP RIP, VLANs, RIP, and basics of the Ethernet Technology, purpose and use of Access Lists.

Pre Requisites: Nil

The CCNA exam has no pre requisites. The aspirant should be comfortable with basic concepts of LAN for his/her own convenient approach to the exam.

CCNA Exams

CCNA Exam Options

Single Exam Option

640-801 CCNA: Introduction to Cisco Networking Technologies and Interconnecting Cisco Networking Devices

OR

Multiple Exams option

1. 641-821 INTRO Beta: Introduction to Cisco Networking Technologies (INTRO)
2. 640-811 ICND: Interconnecting Cisco Networking Devices

The recommended course(s)/training From Cisco are:

Interconnecting Cisco Networking Devices (ICND 2.0 or ICND 2.1 )

Introduction to Cisco Networking Technologies ( INTRO )

CCNA Recertification

With the retirement of 640-607 in September 2003, the available options to recertify are 640-801 or any other Professional or Cisco qualified specialist track.

Validity

CCNA certifications are valid for three years.

Cisco Agreement

Accepting the terms of Cisco Career Certification and Confidentiality Agreement is a very important part of obtaining Cisco Certification, failing which the application processing of certification may be halted.

Exam Description

The 640-801 is the exam available for aspirants pursuing Cisco Certified Network Associate (CCNA) Certification. Since 640-607 has retired, the article solely concentrates on the 640-801. The CCNA (640-801) exam focuses on the Interconnecting Cisco Network Devices (ICND) course as well as the new Introduction to Cisco Networking Technologies (INTRO) course. The courses and the exam ensure that the successful candidate has the important knowledge and skills necessary to select, connect, configure, and troubleshoot the various Cisco networking devices. The exam also includes topics on Extending Switched Networks with VLANS, Determining IP Routes, Managing IP traffic with Access Lists, Establishing Point-to-Point connections, and Establishing Frame Relay Connections.

Objectives

The following topics listed are the most likely ones on which the testing will focus during the exam. Topics related to this may probably be tested further in detail too.

Planning & Designing

* Design a simple LAN using Cisco Technology
* Design an IP addressing scheme to meet design requirements
* Select an appropriate routing protocol based on user requirements
* Design a simple internetwork using Cisco technology
* Develop an access list to meet user specifications
* Choose WAN services to meet customer requirements
* Implementation & Operation
* Configure routing protocols, given user requirements
* Configure IP addresses, subnet masks, and gateway addresses on routers and hosts
* Configure a router for additional administrative functionality
* Configure a switch with VLANS and inter-switch communication
* Implement a LAN
* Customize a switch configuration to meet specified network requirements
* Manage system image and device configuration files
* Perform an initial configuration on a router
* Perform an initial configuration on a switch
* Implement access lists
* Implement simple WAN protocols

Troubleshooting

* Utilize the OSI model as a guide for systematic network troubleshooting
* Perform LAN and VLAN troubleshooting
* Troubleshoot routing protocols
* Troubleshoot IP addressing and host configuration
* Troubleshoot a device as part of a working network
* Troubleshoot an access list
* Perform simple WAN troubleshooting

Technology

* Describe network communications using layered models
* Describe the Spanning Tree process
* Compare and contrast key characteristics of LAN environments
* Evaluate the characteristics of routing protocols
* Evaluate TCP/IP communication process and its associated protocols
* Describe the components of network devices
* Evaluate rules for packet control
* Evaluate key characteristics of WANs

Since troubleshooting is very simplified and methodic when the OSI layered model concepts are clear, the extensive focus on the OSI model still remains in 640-801 exam along with the rest of the basic content. The enhancement is in the Dial on Demand Routing (DDR) and the Config-register and some switching concepts.

Exam specifics

The CCNA exam I took had 58 questions to be answered in 90 minutes with a passing score of 849. The exam may have question numbers ranging from 55 to 65. The time allotted will be 90 minutes and the pattern of questions may vary from exam to exam, i.e., depending on the number of questions against the time given, the number of multiple-choice response, drag-and-drop and simulators may vary.

Exam Pattern

There will be router/switch simulator questions, many multiple choice questions and a few drag-and-drop questions along with a few multiple choice single response and fill in the blank type of questions.

When switching between the simulator-based questions and the rest of the exam, the simulator engine may seem a little slow. For some simulator-based questions, you will be presented with scenarios. You need to remember configuration commands and listing commands to grasp the scenarios and troubleshoot them. Remember to have a blank sheet on which you can mark important points and remember to save any changes you make on the simulator relating to the configuration. The simulator is very much like the real one on the routers and switches except that abbreviated editing and help commands may not be available. Ensure that you do not try these abbreviated commands and waste time, it is always better to use the entire syntax of any command you may be required to use.

Some concepts like the OSI model, the Access lists, the Subnetting etc, are the type of questions that may be time consuming, as they require single-minded concentration, very clear basics and some amount of calculation. The scenario type of questions needs an eye for detailed and clear analytical abilities. Be clear with the command line configuration commands and their switches and have an insight to the kind of testing the vendor may employ. That should help you have a CCNA certificate under your belt.

The various testing methods a vendor (Prometric in this case) may employ are as follows (pertaining to the CCNA exam):

Single-Response Multiple Choices

The simplest one of the lot, usually comes in between many complicated questions to relax your brains and prepare you for the worst to come, sometimes may not fetch much score. If you are not aware of the answer, do not waste time guessing it. Skip the question and move to the next. It is the most common question type used in most exams, the response choices will be adjacent to radio buttons, this indicates there can be only one correct answer to the question.

Multiple-Response Multiple Choice

Checkboxes will replace radio buttons to indicate that there can be more than one choice to the correct answer, and it may range from two up to four at times. The questions may at times, state the number of correct choices. But the tricky part is when the question states, choose all that apply. Here, even if one choice is skipped the answer may not be complete and may not fetch the desired score.

Another hint here is, more number of choices presented to the candidate to choose from, more may be the choices, when compared with usual. If there are 5 or 6 choices presented, it means there will be at least 3 correct choices out of the available choices.

Fill in the Blank

The standard fill in the blank may have a single choice answer. It may also have 3 blanks to be filled and all three in a single choice, making it a single response or may have the three blanks mentioned as three individual choices too, making it a multiple response type of a question. In other words the fill in the blanks question may be a single response or a multiple response with definitely multiple choice to choose from.

Drag-and-Drop Questions

With this type, a number of elements may be presented and you may be required to drag the element from its current placeholder to the appropriate location on the screen to arrive at the correct choice of answer. You will usually be presented with more items than required to complete the picture, to confuse the correct choice. This type of a question may appear as a graphical match the following or a logical diagram of a particular process or theory slightly out of place, which you may have to re arrange.

Simulator Questions

These types of questions simulate the administrative environment and are very similar to the real one and expect you to carry out an administrative task to complete the question task. For example, you may be presented with a hyper terminal screen and asked to remotely configure a switch or a router as you would in real environment using the relevant commands. The final result will be graded, versus the path or the process you took to arrive at the result; therefore if the question says use the easiest method to achieve the task when there is more than one way of doing it and you choose the less easier one you will not receive the expected scoring at all.

You've learned the details about the Exam, its pattern, objectives, etc. Now it's time to learn how to master the course and prepare scientifically. You can do that with the help of CCNA Exam Preparation Guide.

Well, with all this information you are well armed to take up the CCNA 640-801 exam and score well too!!! Best of Luck!!!

Useful Reference Resources

* Books
* CCNA Official Cisco Course Ware
* Cisco Press books
* Sybex Series

Discussion Forums and Groups

Even though you have access to all the resources listed above, you may want to hear about the experiences of other people. There are places for these too:

* Exam notes
* Whizlabs CCNA Certification Forum

Exam Simulators

There are many ways to prepare for certification exams, one of them being through the use of exam simulators.

Check out Whizlabs CCNA 640-801 Exam Simulator

Besides identifying your weak areas, and giving you a feel of the exam environment, Whizlabs Exam Simulator nurtures your potential to acquire domain expertise so that you not only succeed in your certification exam but succeed in your career too.

Friday, September 21, 2007

Easy to Execute!

Plug and play equipment or hardware solves the problem of driver installation, re-starting routines, and generally speaking, “hassle”, for those who are not technically proficient.

If your computer supports “Plug and Play”, then, as the name suggests, you simply plug it in and play. For people who are “word perfect”, plug and play might sound somewhat misleading. Peripherals, such as your mouse, keyboard, monitors, scanners, network adaptors, or printers are included in this.

This long awaited technology is made possible via your U.S.B. port. U.S.B. is an abbreviation for UNIVERSAL SERIAL BUS. Using this port, your computer detects such peripherals, and after detection, configuration is automatic, in so far as you have no further input.

Prior to “plug n play”, you would have to insert a floppy disc or cd, to supply and install the necessary software or “driver”. To put it simply, your computer cannot see or indeed smell or intuitively know what a device, its properties, requirements and priorities are.

Most computers have two USB ports, usually situated on the back of your unit. A U.S.B. “hub” will effectively increase this number. Basically, it is like an electrical adaptor which allows up to seven devices to be connected to it. If you are a big “gadget” fan, you can simply plug another hub into the first one, and so on.

U.S.B. is classified as Serial communication, as opposed to parallel communication.

This means that it transmits data/info/signal, if you like, one “bit” at a time. Conversely, it receives it in a similar fashion. This is done or executed, in one wire or cable.

Did you ever notice the “big” or “wide” ends on your cables? These cables are parallel and transmit/receive data/info/signals, many “bits” at a time. Therefore, parallel communication needs many cables/wires and consequently more connections, at its port.

U.S.B. ports and cables are smaller. Just pop around to the back of your P.C., and you will immediately notice the difference. On the machine that I am currently working on, I noticed that the printer has both types of ports and that the parallel port and cabling is the option that the technician used. The serial option would have worked just the same, at this level, where transmission speeds are of little relevance.

In summary, Plug ‘n Play is welcomed and embraced by everyone and is a major step towards “user-friendly” computing.

Wednesday, September 19, 2007

Alien Intruders!

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.

Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.

So what is a virus?

A virus is a program that can self replicate or reproduce itself.

These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.

They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.

A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.

Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation

A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.

What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.

Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.

Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.

Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.

Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.

Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.

These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.

If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.

Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.

Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.

Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.

Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.

Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.

Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.

Monday, September 17, 2007

Postal Service Wants 5 Cents an Email

You may have received an email about how the US Postal Service is trying to push through a bill that would allow them to charge 5 cents per email. I can understand why people would think that it's true. The Postal Service had nothing to do with the email being sent and they aren't going to give you anything for the 5 cents. Sure sounds like a government agency.

The email is a hoax. What's amazing to me is that it started in 1999 and is still making its way around the Internet. If you haven't seen the email, you can see an example of the email and more information about it on the Urban Legends Reference Page (http://www.snopes.com/business/taxes/bill602p.asp).

I wouldn't be surprised by the Postal Service wanting to do something like this, which is one of the reasons this email has been mistaken by so many people as being real. The U.S. Postal Service currently has an electronic postmark available to businesses who want to use it. You send your email through the Postal Services servers and they put a postmark on it for a price. It works similar to snail mail - you send email to their server and it may or may not make it to your recipient. USPS website (http://www.usps.com).

If you want to know about a bill before the Senate or Congress, go to the source. You can check on any bill before Congress or the Senate at Thomas - The US Congress on the Internet (http://thomas.loc.gov).

If the Postal Service did put a 5 cent tax on email, it wouldn't be the end of the Internet. There are a number of ways to communicate without using email.

Prior to the Internet groups used Bulletin Board Systems (BBS) to communicate and trade files by dialing into a central computer and establishing a connection over a phone line. Yahoo Groups and Topica Groups are basically doing the same thing now, but over the Internet. These BBS systems allow people to trade messages without the use of email.

Something I'm looking into for my ezine is Really Simple Syndicator (RSS). The idea behind this is to post headlines on my website and a program running on your computer would read these when they're available. No email needed. With the problems of Internet Service Providers (ISPs) blocking email, even from trusted sources, in the future it may be a necessity for ezine publishers to continue to publish.

I know it's old fashioned, but there's always the option of using the Fax and Phone to communicate.

Finally there's the possibility of a private Internet that bypasses government involvement altogether. Most of you that work for a company of any size are using an intranet - a company-wide Internet that is only accessible to people who work for your company. An extranet is an intranet that allows access from people outside the company. By connecting the extranets, it would be possible to create a private Internet.

Saturday, September 15, 2007

Optimizing Your Dead Links!

I have been reading, with great interest, all the online advice about how to optimize a website. We have a financial planning business in Victoria, BC. Like most towns, there are lots of financial planners, investment advisors, insurance agents, brokers, dealers, and Starbuck’s locations here. Somehow we needed to find a way to stand out, perhaps by getting our meta-tags in order.

For a time, we were looking fabulous in searches on Google, but our site couldn’t be found on Yahoo! Then we got the Yahoo search engine figured out … but promptly disappeared off of Google. Now I thought this optimizing thing would fix it once and for all.

The strategy made sense. You have your title designed, and it ties in with your meta-tags and content. You have your meta-tags match your content. You think about what content you actually want to have. I spent an hour or three on several of our site’s pages optimizing like crazy. Poof!

We were nowhere on Google and now I had successfully torpedoed our site on Yahoo! There were old (really old) dead link pages cropping up in searches for us on Yahoo. The brand spanking new, optimized pages were nowhere to be found. Huh?

Perhaps I needed to wait for the spiders and robots to visit. Day after day I would check. Financial Planning Victoria? Nope. Financial Planner Victoria? Nope. CFP Victoria BC? Nothing.

And then, today, I checked Yahoo and there we were #1 or #2 on Yahoo for all kinds of different search terms! It works!!! We were top ranked for at least three dozen different search terms! Financial Planner Victoria - #1! Retirement Victoria BC - #1! Tax planner Victoria - #1! And so on. I was thrilled.

I sent an email to everybody in the office bragging about it, and then set about creating our e-newsletter which tells clients about our website updates each month. I uploaded the new articles. One was about the wonders of technology. I encountered some weird loading prompts. I checked the website. It was extremely slow in loading. I checked it again. The main page was a dead link this time! I checked again, and while the main page loaded, the navigation bar only loaded partially. Dead link. Slow load. Nothing!

Here I had spent all this time optimizing pages and on the day it works, people will be clicking through to dead links! So I am now leaning out the second storey window, holding the computer by the cords in one hand, whilst finishing this article in the other. Should I drop the computer on the street? Come on! Lemme do it! Please! I'm swinging it around now like a lasso. I think I can hang it up on the telephone wires like an old pair of sneakers!

Wednesday, September 12, 2007

What is Contract Programming? An Alternative to the Conformity of Everyday Employment

What is contract programming, you ask? Well, when companies need specific computer programming expertise, for temporary periods of time, they generally hire a contract programmer or an employee of a consulting firm. Contractors almost always have a higher hourly wage than a salaried employee and are often paid for overtime. Contracts can last from one to three months to many years, depending on the situation. A contract programmer generally does one thing: program (code) for the duration of the contract. So, contract programming is just an area of computer consulting. Other areas of computer consulting include custom developers, network consultants and information technology (IT) consultants. The contract programmer can work via two forms of contracts: 1) “W-2 ” contracts and 2) “1099” contracts.

There's the "W-2" contractor

The “W-2 contractor” receives the typical IRS W-2 form at tax time and works as a temporary employee of a contract broker or some form of employment agency. The contract broker basically acquires a contract with a client company and hires the contractor to work on that contract for them. Brokers make their money by charging the client an amount over your agreed upon hourly rate. In this form, the contract programmer is a temporary, hourly employee of the broker’s company and this is the form that is easiest for the newcomer to obtain.

And the "1099" contractor

As a “W-2 contractor”, your broker a.k.a.: temporary employer or agency will collect taxes from your paycheck, just as if you were a regular employee. The “1099 contractor”, can still work through a broker, but gets paid on an IRS form 1099 and must take responsibility for paying all applicable taxes herself. This “1099” form is for, in IRS lingo, “Independent Contractors.” Independent contractors have more work to do before they get a contract: they have to market themselves like any other business. This includes brochures, business cards, web sites, networking, etc. They have to consider obtaining more forms of insurance that may include general business liability and errors & omissions insurance. They also generally have to form a corporation in order to work for certain companies. The pay back for this extra work is a higher hourly rate. To the beginning contractor, I always suggest starting out as a “W-2” contract programmer because it is generally the quickest and easiest path to becoming a contract programmer and the best way to determine if contracting is the right career choice.

The "W-2" contractor is like a typical employee...almost

The main differences between a full-time employee and an hourly, contract employee working for a broker are, the contractor:

1) Will probably have to pay for his or her own health and disability insurance, which amounts to very little compared to the increased income one usually sees.

2) Generally gets paid top-dollar for his or her work. Many earn $100 or more per hour for 40+ hours a week.

3) Can take as much time off from work as he or she pleases, while in-between contracts.

4) Has independence from corporate politics.

5) Has the chance to live wherever she wants or live in different places as determined by the particular contract.

6) Is often seen as an expert in his or her field.

More work for “1099" contractor

These points apply to the “1099 contractor” as well, but the “1099" contractor has more work to do in filing taxes, corporate paperwork, advertising and searching for her next contract as opposed the “W-2 contractor,” who basically makes a few calls to her favorite brokers and tells them she is ready for another contract and the brokers do the job-searching for her. Now, everything I’ve said thus far is pretty cut-and-dry, so let’s take a look at a more elusive topic: what qualities make a good contract programmer.

Signs of a good contract programmer

Over the last decade, I have met and worked with many varied computer programmers. From this experience, I have devised the following list containing what I believe makes a good potential contractor programmer. A good contract programmer:

1) Makes computers an avid hobby of his. When he comes home from work he plays with or hacks the computer trying to improve its performance.

2) Tries to learn more about computers than his peers do and he also likes to program the computer to have it do “cool” things.

3) Has often dreamed of being an expert, high-paid computer professional.

4) Has learned how to master the art of studying computer science.

5) Spends his free time reading computer books and magazines — yes kind of geeky!

6) May like to build his own computer systems and enjoys tweaking and upgrading them to extract the most performance from them.

7) Is very professional and humble.

You've got to love to do it!

These really are just some of the basic qualities of someone who loves computers and loving computers is really the main ingredient for a successful career in contract programming. If you don’t love doing it, you will not survive. If you do love it, it will be a joy to go to work every day and to continually update your skills. The computer field changes rapidly and only someone who really loves computers and makes it his hobby will have the desire to continually upgrade his skills and be the best he can be at all times. If you possess most of the seven qualities listed above and like the idea of using your hobby to catapult yourself into a high-paid, fulfilling career, even if the economy is down, you should consider a career in contract programming.

Sunday, September 9, 2007

Let The Email Wars Begin

Things just got a lot hotter in the hyper-competitive world of online email providers.

In response to Google's announcement that their soon-to-be-launched "Gmail" service will offer users 1 gigabyte of email storage, Yahoo! announced an upgrade of their free email service to allow users 100MB of free email storage along with other enhancements.

Microsoft's Hotmail will surely also announce a free upgrade in email storage space.

On the surface it might just appear like a simple case of one-upmanship, but it actually represents major forces digging in online and preparing to do battle.

It appears Yahoo! simply wanted to take the issue of email storage space off the table as a consideration for users as to which email service to choose.

Google enjoyed considerable media and public attention over the past few weeks with the media marveling at how Google intended to give hundreds of megabytes more space to its users than Yahoo! or Hotmail.

With this move, Yahoo! made storage a "non-issue," but the real war has only just begun.

Email ranks as the number one most popular online activity according to virtually any survey you care to read.

When people go online, they spend the single biggest chunk of their time sending, receiving, and reading email.

Online email providers understand that eyeballs on a page looking at advertising and responding to offers is what makes them money.

By increasing loyalty among email users in order to repeatedly draw them back to the same website (often several times a day), email service providers like Yahoo!, Hotmail and Google can keep people looking at revenue generating ads.

Despite the best efforts of government regulators, private organizations, software filters, ISP's and others, over half of all email sent online rates as unsolicited commercial email (SPAM).

Besides storage space, Google, Yahoo! and Hotmail will start claiming that their spam filters rate better than the rest.

These online powerhouses hope to attract users with the promise of cutting down and even eliminating the avalanche of get-rich-quick, pornography, and ink-jet cartridge offers (among others) that bombard virtually anyone with an email account more than 15 minutes old.

This will, however, lead to another problem that many of them won't talk about, which involves filtering legitimate email as spam.

Unfortunately, the sword cuts both ways on this issue.

So where does it all end? Never! Hotmail will enter the fray with expanded storage capacity as well as the promise of less spam and a more "friendly" interface to make your email life even easier.

Yahoo! and Hotmail will most likely copy Google and start serving context sensitive advertising based on the content of each email message as it get viewed.

Privacy advocates will weigh in to claim that all of the filtering and serving of ads based on an email message's content violates our rights to privacy and heralds the arrival of "Big Brother."

But all this jockeying for position and enticing users from one email service to another actually represents a great boon for the average Internet user.

It will force three of the Web's biggest players to wake up and improve their services after 2 or 3 years of "business as usual" and we can all expect a few valuable innovations to result.

Friday, September 7, 2007

Your Computer May Be Infected. Here's How To Check.. (NOT about virus)

NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference.

A recent research revealed that 80% of the computers today is infected with these dangerous spyware and most of the users not aware of it. (Your computer could fall into this lot too.) The most dangerous fact is, even though the anti-virus software is running, these software can even inactivate them and take over your PC.

Have you experienced any of the following?

* Awsome popups comes out of nowhere, when browsing the web
* Home page reset to some other site

How can this happen?

- The components installed when viewing certain sites, starts up and running as soon as it's finished installing (or after the page is completely loaded) and with every windows startup since then. Their job is to collect information and report (or transfer) it to an external computer.

What is deceptive software? (Reference: www.microsoft.com)

Spyware and unauthorized adware are two examples of "deceptive" software. Deceptive software includes programs which take over your home page or search page without first getting your permission. There are a number of ways deceptive software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of adware in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

Sometimes deceptive software gets silently installed on your system without any warning at all. If you use Internet Explorer as your Web browser, this can happen if your Internet Explorer security setting is set to its lowest value. Make sure to keep this setting at the medium level or higher. Doing so will help you control what is being installed on your computer.

Have you ever had an experience where you were repeatedly asked to accept a download even after you said "no"? Creators of deceptive software often use such tricks to get you to load their software. If this happens to you, do not click "yes". Instead, try to close the Web page that first asked you to accept the download by hitting the "X" in the corner of the window. Alternatively, quit Internet Explorer and restart it to begin browsing the Internet again. If you visit a Web page that continually displays these tricky pop-up windows, that Web site may not be worthy of your trust.

Your computer may be infected by now, but you may not know. Just have a checkup with a software specifically designed for it, to know the status of your computer. You must clean infections once you find it and the game is not over yet. The spyware might reinfect your PC. So it's highly recommended that you run a firewall on your system after the clean up. This will allow you to monitor every single communication occurs with your computer and block the ones which you feel unnecessary. The firewall acts as a barrier between your PC and the external world (Internet / Network).

A good spyware detector recommended by most people is, http://noadware.cjb.net and it shows you all the infections and potential dangers in great detail. It's free to scan but not to clean. It's a good idea to have a scan even you have no idea of cleaning, since you know the status of your PC in great detail. This gives two advantages.

Firstly, if there are minor infections and if you have a fair knowledge on registry settings and how to edit them, you may have a try to clean them up. Secondly, if it shows that there are major infections, you can avoid using credit cards and doing other confidential stuff, until you clean it up later.

You must run a firewall. In many new operating systems (eg. Windows XP), there is a built-in firewall. Google search on how to activate it. Others may try one at http://www.download.com

You may have a question by now. What is the purpose of these spyware? Even though we cannot give an explicit and clear cut answer, we can safely state that every thing boils down to the urge of more profits. How? The spyware collects all your personal information and transfer it to an external computer. The information is reviewed by a software in the receiving computer and then deleivered targeted popup ads to your PC. There are many things that spyware does in addition to this. The most dangerous of those is that collecting the credit card numbers.

If you have some technical knowledge on your PC, here's a technical explanation on what trouble does the spyware cause.

1. An extra process is running to monitor and log your activities in your PC.

2. Constant transfer is taking place between your PC and the spyware writer's computer.

The first process in it self is an unneeded process and it contributes to slow down your PC. Second is the most harmful. It transfers logged info to the external PC (spyware writer's PC). Then the external PC transfers targeted popups to the infected PC. This, in addition to slowing down your PC because of these extra processes, it also slows down the internet connection, as the bandwidth is shared. In short, PC with a spyware is like a dumping ground for snakes. Once its there and up and running, it can do almost anything with your PC.

Please pass this on to all you know. The most risk is for people who use Internet Explorer, as it is the most popular web browser and that very fact has drawn more attention of many malicious software developers.

Wednesday, September 5, 2007

5 Ways To Make Night-And-Weekend-Computer-Life Rich

Are you a computer-worm? Do you thrive on a computer 24/7? A “computer-worm” is analogous to “book-worm” – a person who spends most of the time working on a computer. Do you expend most of your time reading or writing emails, chatting with friends, watching movies, listening to music, cyber-window-shopping, etc? Do you relegate your important tasks of completing a school assignment, working on a contingency project, etc to realize later that you spent the prime-time idly? In this article, you would discover few ways of improving your cyber-life – how to make your working on a computer more useful and much more effective.

Technology revolution has supplemented the ease and increase of computer usage. The overall at-home global active internet use for a number of selected countries grew by two-thirds of a percentage point from February 2004 to March 2004 (Nielsen//NetRatings). Switzerland exhibited the largest growth rate at over 3 percent, while U.S. added the most active Internet users over the month. With this enormous increase in internet usage you have to keep the following 5 ideas in mind that would help increase the efficiency of work that you do while on your computer off-work.

1) Chat or email kills your time-

Avoid opening a chatting application, or an email application as your first window. When you find one of your friends on the chatting window (or email from one of your friends), you inadvertently start conversing with the person. On the other hand, if you do not find any friend, you search for a new chat-buddy. In both the cases you deviate yourself from important tasks. This hinders you from working on essential activities that you intended to do when you started the session.

Instead, make a habit of completing tasks that you planned before opening a chat window or an email window. Treat yourself with a chatting session (or an email session) for completing the daily (important) tasks.

2) Audio speakers add to your entertainment-

Turn on your pair of audio speakers, if you have one. Listen to online news, success stories, motivational speeches or jokes while working on your important tasks.

Online news is becoming common day after day. You can view and listen to news on many websites. You would find it easy to access online news channels if you have a “superpass” with Real Networks (http://www.real.com/superpass/). Nevertheless, websites like MSN (http://msnvideo.msn.com/), ABC News (http://abcnews.go.com/) offer feeds to news and other interesting stories available for free download.

3) Do smart-browsing not the hard-browsing-

When you read on the internet, do it intelligently. One way of intelligent reading is to increase your vocabulary. Look up difficult words in the dictionary when you read documents on the web. You can use innovative internet tools like XemanteX (http://www.xemantex.com) that provide an online-running-dictionary. You can read through the document with a built-in dictionary. Just double click the word to get the meaning on the same screen.

4) Online games as concentration tools-

Play online games. Games not only give you entertainment but also help you increase your concentration. There are many websites that offer free subscription to the games on their website. Perform a Google search on “free online games” that would bring up thousands of resources. Enjoy playing a game, improving your personal skills at the same time.

5) Help your mind concentrate-

Split your entire sitting into various sessions. You would be able to give out more every session. Take a coffee or tea break every 45 to 60 minutes. This would help your mind free up its resources and get back on track after the break. Moreover, this would help you avoid narrow thinking. One gets to think through a narrow channel when deep concentration.

Okay, I told you 5 simple and common ways to make your off-work computer life easy. Try them out and feel the difference. You would be happier and feel more accomplished. As you know internet has redefined human’s life. Computer, which was used only by intellectuals and elite a few years ago, is a basic requirement for a common man now. To add fuel to the fire, internet has supplemented its power transforming them the best communication tool. Instant messaging, emailing, electronic news, etc allow for fast and easy communication among the internet users. Very soon, computers would be indelible parts of our life. You should realize that the tremendous power that this internet has can only be harnessed when it is put to use in the most efficient way.

Monday, September 3, 2007

The Benifits of Assembling Your Own Computer

Thinking about getting a new computer, but with all the choices out there are you getting a little overwhelmed? Well why not look into building your own computer? By building your own computer you can get all the options you really want, whether you need a graphics design machine, game machine or just a simple word processor. You can tailor the computer to your specific needs. Now I know what you are thinking, “Isn’t building a computer difficult? I don’t want to screw anything up.” Well with a little reading, assembling your computer will be cake.

Most computer parts will only fit in the slots that they are intended for, so there is little possibility of plugging something in the wrong spot, but a little preparation and reading can go a long way. There are literally hundreds of sites on the web with tutorials that you can check out. Now be careful because some will be better than others, try to read a few so that you can really get a feel for what you are going to do. One of the sites I recommend you check out is http://www.cheap-computers-and-parts.com.

When you go about purchasing the parts, like any other big purchase, price them out, you may find that the price of parts varies between stores. Usually you’ll be able to make a deal with one of the stores around to give you all the parts at the lowest price you found, saving you some cash, and the hassle of driving all over town picking up parts.

Once you’ve got all parts you want and need, and you’ve read a few tutorials, its time to put it all together and enjoy your very own brand new computer.

Saturday, September 1, 2007

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!

Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.

Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. Unfortunately many people actually start to do backup copies only after they lose data.

This article will explain how one can create a Outlook Express Backup copy ( as Outlook Express lacks a backup function ) This email program is usually installed with the Windows operating system and is probably among the most commonly used email programs today. While using Outlook Express is fairly easy, finding and backing up the emails can be a little more complicated. Since there are a large number of files and folders on a computer running Windows, the first problem is to find the files containing the emails. Outlook Express stores emails in .dbx files and there might be several different dbx files depending on how many email folders you have created in Outlook Express. If you are using Windows 98, you can probably locate your emails somewhere in the Windows directory. In Windows 2000 and XP, emails are usually stored somewhere in the user data or application data folder.

The easiest way to find out exactly where your emails are stored is to start Outlook Express, go to the Tools menu, and open the Options dialog box. In the Options dialog box, select the Maintenance page and click the Store Folder button. Here you can find the path to the folder containing your emails. To open the folder, copy the path and paste in the address field of the Windows File Manager. You should see a number of .dbx files and possibly some other files, too.

After locating the email folder, you can simply select all the files and press Ctrl-C. Then open the folder where you want to keep the backup copies (on another hard disk, a DVD or a network drive, for example) in Windows Explorer, and press Ctrl-V.

To backup the Address Book, you can follow these steps:

* Select Tools | Address Book... from the menu in Outlook Express.
* Choose File | Export | Other Address Book... from the address book's menu.
* Select Text File (Comma Separated Values) as the export format.
* Click Export.
* Select the location you want to export your address book to using the Browse... button.
* Give your backup copy a meaningful name.
* Click Next.
* Select the fields you want to include in your backup.
* Finally, select Finish.
* Click OK.
* Click Close to end the process (successfully, I hope).

Additionally, there are several email backup utilities which can make the backup operation much easier. Outlook Express Backup Genie is one piece of software that can offer peace of mind by creating compact backup copies of emails, attachments, address book, signatures, blocked list, mail rules and settings periodically. The difference between using a automatic email backup utility and manual backups, is that the first can be scheduled to create backups quiet in the background at specified time intervals, and that it will include all email information ( signatures, blocked list, etc ) which otherwise would be more difficult to save. Also if ever the backup is needed, the application will ensure that the restore process is made smoothly. And, it works with top 9 popular email clients. The downside of using a automatic email backup utility is that it costs money, usually about 20-30 USD as one time payment, while the manual backups are ofcourse, free.

The conclusion is that either manual or automatic, backing up emails is a critical operation for every computer user that would regret losing them.

A trial copy of Outlook Express Backup Genie can be found at: http://www.amicutilities.com/outlook-express-backup/

Alexandru Marias