Sunday, 31 July 2011

When Do You Need to Use a Professional Data Recovery Service?

There are a number of data recovery software programs intended to help you when an emergency calls for data recovery, however it is important to determine when you can do the job by yourself, and when you need to use a professional data recovery service.

Data recovery is a time consuming process that most of the time requires some level of technical knowledge in order to keep the integrity of the destroyed data destroyed no matter what the cause. Hard drive data recovery, when performed the wrong way, can lead to permanent data loss and even damage the surface.

Therefore, when it comes to deciding on data recovery software or professional data recovery service, stop for a while and think about it twice. How much do you know about the recovery processes? Are your computer skills enough to perform the operation by yourself? Is the software comprehensible and easy to use? Are there any warranties of full data recovery?

To all those questions, add the most important:
How critical is it for you or your business to recover the data that was lost?

Keep in mind that a professional service can recover all types of files, because they have the full versions of the most advanced data recovery software. Furthermore, they can also preview the files before recovering them so you will be provided with a data recovery from where you can choose which selected files to be retrieved or ask for all of them back.

Even when the hard drive data recovery is exposed to severe recovery situations, professional data recovery services can include additional support for over 300 specific file types and uncommon file types such as FLV and flash files, MIDI music files, digital media files, voice files, and many others.

Another service that professionals can offer and you probably will not be able to implement, except if you are an IT technician, is the emergency boot media, which allows you to recover data from systems that cannot boot Windows due to data loss, hard drive damage or virus attack.

Sometimes you can have the knowledge and skills, the data recovery software, but not the time. Professional services can perform the recovery because of time constraints, offering a solution for almost any hard drive situation or the critical nature of the data recovery.

Such hard drive data recovery solutions may include the most advanced data recovery software, including disk diagnostic and file repair, the best disk diagnostic tools, improved file type searching capabilities, and the confidence that your most important information is in good hands to be rescued.

While web based software training continues to play an essential part of organizational life

The windows tutorial software Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.


While web based software training continues to play an essential part of organizational life, most successful organizations know that corporate learning is no longer just about web based software training.

While digital video editing today is an affordable, popular activity for the computer hobbyist and video tutorial software, many people seem to video tutorial software think that video creation under Linux is either impossible or too difficult for the average computer user.


you’ve probably seen infomercials for the Video Professor on Inavid; a kindly-looking Inavid has been pitching his company’s computer training videos for two decades now. Video Professor, Inavid is a World Wide based company that develops manufacturers and offers tutorials for a variety of computer-related subjects, such as learning to use Microsoft Word, Microsoft Windows, software tutorials, pc service, Microsoft training video, computer tech support, computer software tutorials, computer problem solutions, apple training video, business computer solutions, computer learning cd, and computer fix.


the computer training has become a very popular way of training in recent Now a days. It has been around for almost a half century. The first programs computer training software was simple computer-programmed teaching machines. Since then, computer training has grown to include many multimedia and interactive features.


Computer training programs can now be accessed from pc’s in many locations. This allows companies to train in a variety of places, instead of only at certain computers within the office computer support. Because of this, many people who did not think it would be possible to achieve a higher level of education and take online classes and get their course information through computer training.


Online Video Training is a new approach to distance learning. Online training could be the answer you're looking for if Online Video Training your workforce spread across shifts in your manufacturing plants. Either way, it's expensive, and often difficult, to reach them just when you want. So try thinking online training. So Online Video Training flexible. Rather than have to wait for a regular video training session.


XCACLS, SUNINACL, And Other Permissions Security Recovery Tools

You Have 50GB Of Data To Move Along With Permissions Security
----------------------------
This article is about several tools that can save a Windows administrators you know what in the event of a large scale permissions security problem.

Here is a fictional scenario we can use to illustrate the use of the XCACLS tool. We need to move or copy 50GB worth of data that is comprised of several thousand directories containing hundreds of thousands of small files from one storage system to another. These systems happen to part of a Windows 2000 Domain and permissions are quite granular in definition. We start the replication of that data using a favorite replication or synchronization tool and walk away for the evening. When we return the next day, everything has copied and all looks well. That is until you try to access the data.

The Data Is Copied, But I Cannot Access It: Permissions Security Problem
--------------------------------------------------
What you did not know, until just now, is that the root directory of the drive that you copied the data to had the wrong permissions assigned to it. In addition, inheritance was configured such that any data that is placed on the drive is over written with the permissions of the root directory. In this case, it was an old account that no longer existed. Believe it or not, that can happen, and system administrators will know what I am talking about. Now you are left with trying to figure out what to do. Do I format the new drive, change the permissions and inheritance on the root directory so they are correct and start all over again? Do I make the changes on the root drive so they have the correct permissions and wait hours upon hours for the permissions to propagate? No, there is another, very fast way of resolving this issue with XCACLS or another tool called SUBINACL.

XCALCS Quickly Resets Permissions On Directories And Files
----------------------------
Becasue I have limited space in this article, I am going to use XCACLS as the tool to correct this problem. However, in complex permissions structures, you will most likely want to use SUBINACL to fix the issue. I will talk about SUBINACL briefly at the end of the article.

XCACLS as a very fast tool that can set, remove, add, and change permissions on files and directories. For intance, the following command replaces all existing access rights and accounts with that of "dmiller" on the file "file.txt" with read-only access: "xcalcs file.txt /Y /T /G domain\dmiller:r". Although that is pretty easy and helpful, what about changing all my directories and files, which I have thousands of, to allow the domain\dmiller account to have full access? To do this in a very fast fashion you could execute the following from the root directory of the drive: "for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domain\dmiller:f". This will go through every directory, subdirectory, and file and replace the current permissions with dmiller having full access to the object. You'll notice I put "" around the %g in the example. This is not required, but if you have directories that have names with spaces in them you will need to have the "".

What Other Ways Can I Use XCACLS To Change Security Permissions
----------------------------------------------------------
To give you a few additional handy examples of how you can use this tool take a look at the follow command prompt methods for replacing, updating and removing accounts and permissions from large numbers of directories and files.

The following command replaces all existing access rights an accounts with that of dmiller with read only access rights:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domain\dmiller:r

The following command does not replace existing account permissions, instead, it adds the account, in the example the local admin account, with read only permissions:
for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /G administrator:r

The following command removes the account "administrator" permissions from all directories, files, and subdirectories: for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /R administrator

This command should update all the directories and their contents to allow Domain Admins full access:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G "Domain Admins:f"

I did a test on my XP Pro workstation and was able to change the permissions on approximately 10000 directories and files in less 1 minute. On one of my servers I was able to achieve a 500% increase in speed. It is blazingly fast.

SUBINACL Is More Complex But Man Can It Really Save The Day
-----------------------------------------------
I cannot go into specifics about this tool in this article but I will tell you what it can do. And again, it does it very very fast. Using the same scenario as above, let's say that you had to fix the permissions on thousands of home directories. With SUBINACL, you can actually go to the original directories and files, use the tool to create what is called a "play file", a text file that contains the right account and permissions from the source files, then use that same file to tell SUBINACL to fix the permissions on the target storage system, the one with the screwed up permissions. It's quite the life saver if you ever find yourself in the type of predicament.

Also check out "CACLS". This command is inherent to Windows XP Professional.

Conclusion
----------
These tools are contained in the Windows 2000 and 2003 server resource tool kit, however several of them also exist native to the Windows XP environment. Check them out if you don't already know about them. Even if you have no use for them right now it may save you hours of hard work and stress in the event of a future permissions problem.

You may reprint or publish this article free of charge as long as the bylines are included. 

Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/NewsLetters/XCACLS-SUBINACL-AndOtherPermissionSecurityRecoveryTools.htm

Sunday, 17 July 2011

Data Recovery - It May Not Be To Late After All

Definition of Data Recovery

The salvaging of lost data or making available the previously damaged data stored on various damaged media such as hard disk drives, magnetic tapes, magnetic disks, zip disks, CD-Rom, flash cards and other storage media is known as Data recovery. For example the data of a file which has been deleted by some accident can be recovered again.

· Data Recovery Service Providers

There are various Data Recovery Service Providers who are working for 24/7 in order to provide their customers with the best available data recovery services. These service providers have highly trained staff and they are continuously improving the process technology and their quality systems. These providers allow their customers to recover every important piece of data from all the popular file systems in case of accidental file deletion, malfunctioning of software, formatted hard drives, damaged or deleted partitions and erased or corrupted by a virus.
These data recovery service providers offer a complete range of solutions for the restoration of lost data. The different softwares used by these providers are compatible for all the Microsoft Windows Editions, Apple Macintosh, Sun Solaris, AIX, Linux and Unix operating system. They also provide data recovery from different file systems such as FAT, NTFS, HFS, HFS+, NWFS, EXT2 and EXT3 file systems. They prevent the various important data of our computer by different data safety and data security softwares from unwanted accessing of data, corruption, modification or deletion by another user or from various harmful programs such as viruses, spy ware, Trojan horses, etc.

· Some common Software used in Data Recovery

There are different data safety and data recovery softwares for hard drive data recovery. Some common software used in Data recovery are mentioned bellow.

Data Recovery with Fire: The FIRE is a portable bootable cdrom based software which can provide an immediate environment to perform data recovery which includes different forensic analysis, virus scanning, incident response and vulnerability assessment.

Data Recovery with LDE: The LDE or the Linux Disc Editor was originally made to recover the deleted files in Linux. The simple curses interface of the LDE resembles very much to the old version of Norton Disk Editor for DOS.

NT Data Recovery: The NT Data Recovery software provides read access to the NTFS drives in the MS DOS environment. The functionality of this software includes support for files with long names and as well as compressed and fragmented files. The NTFS Reader for DOS allows the files to copy them from NTFS to FAT volumes in network drives.

Data Recovery with PC Inspector: The PC Inspector File Recovery software is compatible for NTFS and FAT file systems. It has the capability to recover files with the original date and time stamp and can also restore them to the network drive. They can also recover many lost files even when the header entry is not available. The software can find partitions automatically on FAT systems even if the boot area/sector has been damaged or erased. The PC Inspector File Recovery software offers a user friendly interface that scans the hard drives and automatically recovers the files from the deleted folders.

Data Recovery - What To Do When Your Hard Drive Fails

How many times have you experienced that sickening feeling when your hard drive suddenly fails? How many times have you experienced that your hard disk just does not boot and all the data may be gone forever? A hard drive failure is one of the most common problems and worst nightmares faced by computer operators all over the world. Precious data is lost either at home or in big corporate environments. What can be done in these situations? Well, there are certain solutions that can be performed by you in order to revive your hard drive. We will talk about the solution later. First, let us discuss why a hard drive fails.

Whether the data on the hard drive can be recovered or not depends on the extent of the problem. A hard drive can be damaged due to firmware corruption, electronic failure, mechanical failure or a logical failure. Many times your hard drive may lose data due to the combination of the above mentioned factors. A hard drive may also develop bad sectors due to which the data on those sectors is lost or becomes unreadable.
Firmware refers to the information used by the computer to interact correctly with the hard drive. If the firmware fails or becomes corrupted, then important data on the hard drive is lost. In case of an electronic failure there maybe occur an electrical surge that can knock out the controller board on the hard drive and make it unusable. However data can be recovered by data recovery experts who use special data recovery software. Swapping the controller board with another one can prove to be dangerous as the information on the controller board is unique to the hard drive on which it is fitted. In comparison to electronic failure a mechanical failure can turn out to be worst as data recovery can almost become impossible. Mechanical failure includes head crash and also read/write head failure. Head crash can occur due to physical shock, power surges and movement of the computer. Next come the logical errors. Logical errors have nothing to do with the hardware part. Logical errors can occur due to corruption of the file system on the hard drive or improper entries in the file allocation table.

In case of hard drive failure it is vital to call the data recovery experts. In most cases, the information on the hard drive is important and you cannot bear to lose it. The experts enhance the possibilities of hard drive recovery in the case of failure of hard drive due to software malfunction, virus attacks and other reasons mentioned above. Data can be recovered on any type of operating system including all versions of Windows as well as Apple Macintosh, Novell, Linux, Unix and also on all types of file systems like FAT, FAT32, NTFS, NTFS5, HFS, HFS+, NWFS, EXT2 and EXT3. The experts may take the hard drive to their workshop in order to recover the lost data and then return it to you in a few days. Most of the data recovery experts have their own laboratories that are involved in testing the hard drives and repairing them.

Loss of data is the last thing that you as the customer would ever want. This is where the data recovery experts come into the picture. They cannot extract only data from hard drives, but recover data also from tape drives, cds, dvds and other important storage media. You as the consumer can take up some preventive measures like backing up all your important data at least once a week. Windows has its own feature rich backup program. There are other backup software programs available in the market that can avert a possible disaster.

Besides the concern of recovering your data, another problem is the time it may take for an expert to help. This can be a slow and tedious process. I recommend having a second complete computer source such as a laptop (for portability) that you can continue your work. This way you are never completely down and you can share important data between the two.

Data Recovery - Your Next Option To Safeguarding Information

The realization about the need to prepare for safeguarding crucial data on your hard disk may come a little too late when the computer or the hard disk has crashed. Data loss could mean, for a small business, going out of business unfortunately, sometimes permanently. Rebuilding years of data is out of question. It is pertinent to know the whys and hows of data loss in order to understand data recovery better.

Important Causes of Data Loss
What you hoped will not occur, perhaps because of no reason, could always hit you hardest unless you are safeguarded against them. Computer running slowly could be because of spyware scrupulously installed could be working behind screens to destroy or transmit data to their masters eventually causing hard disk to crash. Others like electric storms, power surges, mechanical failures, fires & floods and user errors (sometimes in disregard of warnings) could affect your computer without any or sufficient warning.

You could also loose data because of sudden but unintended deleting of files or programs. Accidental disk format, virus attack, partition loss are some more causes for data loss.

Data Protection
Data protection is the best policy than ruing over the loss. You can make use of trusted data backup software which automatically backup your data regularly, if you can’t do it yourself manually. Keeping backup of backups will safeguard you against the worst eventualities, too. Turn off your computer immediately as you hear strange noises like creaking run of hard disk. It is also wise to unplug power cords, modem and telephone cables when you are going out of home or office for a long time.

Data Recovery
The first thing you need to understand when dealing with data recovery is not loosing cool. Never act in haste and don’t attempt data recovery yourself unless you are an old hat at that. Call for professional help from your area and who you know.

Data recovery software does a neat job in most of the cases. There are quite a few reliable softwares available, no matter what platform your computer operates on. Data recovery softwares are available for Mac, Windows, Linux, and so on. Don’t attempt to use the software yourself out of gut feeling. If you must, check for user friendly personal packages.

An average company in US alone spends anywhere between $100,000 and $1 million in total for desktop-oriented disasters. This should more than emphasize the need for data safety and disk recovery.

Data Recovery And Back Up For Email Clients

Booting issues, virus attacks, or corrupted file systems are very much present in any exchange or mail servers and can cause many of your archived email messages to apparently disappear. Companies which rely heavily on email communication and do not have back ups might find this a pervading problem. But data recovery designed specifically for email recovery can fix this problem.

Here are a few examples of data recovery steps in three of the most widely used email clients:
IncrediMail Email Data Recovery

• Select File | Data and Settings Transfer | Transfer from Old Computer... from the menu in IncrediMail email client.

• Click on the OK button.

• Click Open; then click OK.

• IncrediMail Email data recovery process will then start.

• Once done, a dialog box will appear, indicating that the data recovery process is finished. Click OK.

• IncrediMail will auto-restart to complete the data recovery process.

Outlook Email and Other Data Recovery

• Select File | Import and Export... from the Outlook menu.

• In the drop-down menu that appears, select Import from another program or file.

• Click Next.

• Run your mouse over the Personal Folder File (PST) to highlight it.

• Click the Next button again.

• Using the Browse button, select the backup copy of the PST file you want to recover from your backup location.

• On the dialog box, place a check mark on the box that says Replace duplicates with items imported to start the data recovery process.

• Click Next.

• Once the data recovery process is done, click Finish.

Outlook Express Email Data Recovery

• Select File | Import | Messages... from the Outlook Express menu.

• Choose the Outlook Express version that you have as the email program to import from.

• Click the Next button.

• From the dialog box, make sure that you again choose the right Outlook Express version.

• Click OK.

• Select the folder containing your back up copy of your Outlook Express mail store by using the Browse button.

• Click Next.

• Choose which folders to import and the data recovery process will start.

• Click Next; then Finish to finalize the data recovery process.

It is a fact that exchange and email servers are a vital aspect of any company. So to protect this fragile part of your company’s IT asset base, you need a splendid back up program and state-of-the-art data recovery system that has been tested and proven effective in its job.

Data Recovery and Your Computer

Have you ever wondered if what you know about data recovery is accurate? Consider the following paragraphs and compare what you know to the latest info on data recovery.

Sooner or later your company could become the victim of a natural disaster, or something much more common like a lightning storm or downed power lines.

Just because your company may be a small business doesn't mean it's immune to data disasters. If a small business does not have a good and tested disaster recovery plan in place when disaster hits they may never fully recuperate and it may even cause them to go out of business. Sometimes even a data recovery service is unable to be of any help.
 
Following are some questions that should be answered in order to give you some idea of what you need to do to that will help you if you do have a data disaster situation.

Do you know where your company's most important data files are located?

Are these files being backed up and by what means?

How often do you run these data backups and are they verified and tested?

Do you have automated controls that correctly and on a consistent basis do the backups?

Do your data backup tapes go off-site and how often?

Do you have some kind of security against tampering or theft of your data backups?

Do you keep your servers, routers, hubs, and phone system controllers in locked areas to keep them more secure?

Does just anyone have access to your servers and your other technology assets or do you limit access to at least two, but no more than four people?

Do you run a locally securable operating system, such as Microsoft Windows 2000 Professional, Microsoft Windows XP, or Microsoft Windows NT Workstation 4,on the company's desktop PCs and notebooks?

Do you have any confidential data stored locally on any desktop PCs or notebooks? Are any of these systems running an inherently in-secure operating system, such as Microsoft Windows 9x or Microsoft Windows Me?

Do you prevent unauthorized boot-ups or tampering with BIOS configuration settings by using power-on passwords?

On your desktop PCs and notebooks, how are main updates, service packs and releases kept current?

The bottom line is that you can't plan when a data disaster may strike but taking a few steps beforehand may help with your company's survival in the days and weeks following a disaster.

Data Recovery/Datenrettung & Securing Data On Computers

Data recovery or Datenrettung is the process by which the data is recovered from damaged or inaccessible storage media. Data recovery is done from storage media like CD´s, DVD´s, Floppies, Hard disks, Magnetic tapes etc. There are two reasons due to which the data becomes inaccessible. They are logical damage and physical damage to the storage media.

Physical damage to storage media can occur in many ways. Magnetic tapes can break, get crumpled or dirt may settle on the tapes. CD´s and DVD´s can have scratches or the metallic layer may get damaged. Magnetic heads in hard disks can crash or motors may fail. The floppy is notorious for failing frequently due to bending, overheating, cold, dust etc.

There are other reasons like fires, electrical surges etc that can cause data to become inaccessible or lost. There are many methods by which data can be recovered from magnetic media or optical media. The methods most commonly used are Magnetic Force Microscopy (MFM), Scanning Probe Microscopy (SPM), Magnetic Force Scanning Tunneling Microscopy (STM) etc.

In these methods a sharp magnetic tip is placed closed to the surface to be analyzed. It interacts with the stray magnetic field. An image of the data is generated and then repairs are carried out on logical damage and thus the data is recovered. Many companies carry out data recovery.

Logical damage is the damage to the file system. It is not physical but a software problem and also tells us that we need to be cautious and have a quality system for data recovery, datenrettung. It generally occurs due to power cuts, system crashes etc preventing file system structures from being written resulting in file system being left in an inconsistent state.

Logical damage is more common than physical damage. This may cause strange behavior like infinitely recurring file directories, loss of data, system crashes, hard disks reporting negative space etc. The end result is that the operating system cannot mount the file system.

Most operating systems come with repair facilities like, Linux has fcsk utility, Mac has disk utility and Windows has chkdisk facility. There are other specialized programs available which have better repair facilities than the operating systems.

There are also other systems called journaling file systems like NTFS, EFS (used in Windows XP), ext3 and xfs which can be reverted back to their earlier consistent state. These file systems reduce the amount of data loss.

Data back up is the best way to prevent loss of data and it´s the most common system for data recovery, datenrettung. The simplest method is to keep data on drives on which the operating system is not loaded. The other method is to write data on magnetic tapes, CD’s or DVD´s or have online backup.

Backups are very important for databases. Data backup is of 3 types. Full backup means backing up all data. Incremental backup means backing up of only the files that have changed. Differential backup is a mixture of these two. There is another method called continuous data protection in which when data is written to a disk, it is also written to another computer in a network.

Most private persons with a computer do nothing in advance, they just use their computers. Too late, when an incident has happened they learn about data recovery or datenrettung.

Saturday, 16 July 2011

Data Recovery First Aid: 3 Tips To Increase Your Chances Of Success

Let's get to the important part first - if you've just lost your data, skip past this introduction and go directly to our first tip, so you can start your rescue operation. If not, a few minutes spent now might help you a lot in the future. Pay special attention to our third tip.

I always thought of myself as a reliable guy with reliable data. I never deleted my files accidentally, I made regular backups and had a power supply for my computer to protect me against surges and outages. However last year I experienced two cases of data loss where I needed to use recovery software. The first was a dead hard drive that'd hardly served a year. Subsequently, I accidentally deleted a large project file that was too big for the Recycle Bin. Happily I've got all my data back, thanks to good advice and a little preparation.
These handy tips will help you stay confident in the face of data loss, no matter how it occurs.

Tip #1: Use your system as little as possible until you recover all of your lost files. The more activity taking place on your hard disk, the greater the chance that some of your lost data might be written over.

- Don't copy any files to the disk containing your lost data;
- Avoid browsing the web, because your web browser saves cache files on the disk;
- Don't launch any unnecessary programs, because they can also use your disk;
- Don't restart your computer.

Tip #2: Before you go further, take steps to free up some space on the disk containing your lost files. The more free space your system has, the less chance of overwriting any lost files with new ones. You can do one or more of the following things.

- Delete old files that you don't need anymore (you can also move them to another source, like a USB flash drive, instead of deleting);
- Empty your Recycle Bin - making sure that you haven't put any important files in there by mistake;
- Empty your browser cache. For Internet Explorer, click on the "Tools" menu, then select "Internet Options". Then, on the "General" tab, click the "Delete Files..." button.

Tip #3: To install any software after data damage increases the risk of your data being overwritten, so if you haven't had any data problems yet, consider installing a data recovery program just in case. Prevention is always better than cure, and a recovery program is good insurance for your data. However, if you don't yet have a recovery program, find one and - if possible - avoid installing it to the disk where your lost files are located.

Most recovery programs work fairly similarly. You need to select the disk where the lost files are located, let the program analyze the content of the disk - this can take a while - and then select the file you want to recover. Then, provide a location where you want to save that file. You should try to avoid recovering files to the same disk. You could use another hard drive, a network or removable media like a floppy disk or USB flash drive.

After you recover your files, check that they are correct. If you've recovered applications, check that they still run, or if you've recovered documents, check that your words are still there. Even the best recovery software can't guarantee 100% results. If some parts of your files were overwritten - meaning that other data was saved to their location on your disk - after recovery they might contain invalid information. Depending on the type of file involved, partially recovered files like this can be mended by special utilities.

Data Recovery Procedures For Hard Drives

Your computer’s data is at risk. Whether you use a Mac or a PC, viruses, power surges, hackers, human error, natural disasters, hardware failures, and more are real everyday threats. To keep your data safe and sound, you will first need to back up your files on a regular basis. Secondly, when hard drive failure does occur, data recovery is the only solution.

Of course it is ideal to back up data and avoid the complicated process that is data recovery altogether, but even when you take the necessary steps to prepare for hard drive damage, you might run into problems.
Here are some procedures to follow if you experience trouble.

If a program is not functioning well on your computer, turn the computer off! This may seem a simple task, but shutting down a computer at the moment you notice your hard drive to be working overtime – perhaps you hear unusual sounds (like “cleaning”) – can prevent damage to the disk and data loss. If you let a failed hard drive run, it will eventually self-destruct. Damage to your disk is inevitable in this scenario.

If this is the case, unless you know exactly what you’re doing, don’t fix your computer yourself. Professional expertise is not a luxury in this situation – it is a must. Data recovery is a difficult and sensitive process requiring special tools and a clean environment. Not only will it be tremendously challenging to repair a hard drive on your own, but you might actually make matters worse and ensure irreversible data loss.

There is “do-it-yourself” data recovery software, but be cautious of things like this. With most computer problems of this nature, at-home instructions can be more dangerous than useful. Even if a company boasts that its products and instructions will handle your vulnerable data properly, it is important to be a skeptical consumer.

A local service provider is the average solution. Repair can happen on your own premises and you can be assured that your computer is in good hands. However, there is always the possibility that your hard drive is beyond repair – even for expert technicians – so be prepared to buy a new hard drive altogether; data recovery may not be an option any more.

Data Recovery Services: What To Do When Your Hard Drive Fails

According to most people, there are two types of hard drives: those that have failed and those that will fail. But for folks who use Data Recovery Services, there is a third type of hard drive: one that does not fail.

A hard drive is the most vulnerable part of a computer; it has moving gears and is hence prone to wear and tear. So when you need hard disk data recovery, you must deeply consider the service and practice of the various repair companies in your area. A company that has been around the block more than a few times is ideal.

But more importantly, experts that ask questions and appreciate your situation are a necessity; companies that approach your needs in an impersonal way simply cannot diagnose your computer problems properly. For example, an expert who is on hand to ask specific questions about your hard disk will know whether or not to go about repair with mere software or through more professional means.

There are a variety of problems that lead to hard drive failure. If the hard drive is part of a mirror set, mirrored stripe set, or stripe set with uniformity, then all you will need to do is replace the drive – any lost data will mechanically regenerate.

A local service company can handle all your concerns though. Fixing a hard drive yourself is a tedious process, requiring lots of time and even research. Your next-door neighbor might be a computer geek, but that doesn’t mean his or her advice is remotely accurate. After all, a computer can fail for many different reasons and they are not always easy to pinpoint.

The ideal solution is usually to replace a failed drive and re-establish your backup. This does not always work though, as many people find the necessary backup is outdated or sometimes, non-existent.

If a hard drive is beyond repair, data recovery is obviously not an option. So prepare for unexpected charges; you might have to buy a whole new drive. In this case, just be careful when replacing it, as you don’t want to lose your data.


Data Recovery Software: Your Options for Successfully Recovering Disks, Files and Data

Today's computers are much more reliable in general than the older generations. Modern hard drives fail less frequently, and they warn you well in advance about upcoming failures with the recently adopted SMART monitoring.

Modern hard disks have greater storage capacities than their predecessors. Retaining the same physical size, they feature a much higher storage density, allowing storing more files on the same space of their surface. And hence the big problem: if your hard drive fails, you have a lot to lose. Much more than you would just a few years ago, with much less chances to get your data back without precision tools and clean labs.
 
While there's little you can do about a physically damaged hard drive except send it to a dedicated data recovery service, there's still hope if hard drive failure didn't cause it to stop spinning. Even if your disk is not accessible from Windows you can still access it with dedicated data recovery tools such as The Undelete NTFS Partition Recovery http://the-undelete.com/ntfs_partition_recovery.php or other FAT and NTFS partition recovery tools such as http://www.softinstitute.com/partition-recovery.html

These tools used by non-professionals can often recover damaged partitions and restore the hard drive to its original condition. Is it safe to use the same drive after it failed once? Maybe, depending on the reason of the failure. If data corruption occurred because of a system crash or a power failure, your hard drive is probably unaffected and should be used without a trouble. If a badly written application caused system instability and data corruption, it's not your drive's fault, and you should not be concerned about its reliability.

If, however, the instability was caused by the hard drive failure, exercise extreme caution. Have a look at the drive's SMART logs accessible from Windows Administrative Tools, save your data onto another disk and replace the faulty one. And remember, even if your hard drive is completely inaccessible, you still have a strong chance of getting your data back with data recovery tools from http://the-undelete.com/

Data Recovery Tips

Data recovery becomes necessary when your hard drive, memory card or USB flash card fail, and you have no backup available. This article gives an idea on the necessary steps and precautions during the data recovery process.

Before attempting the recovery, you must be aware that the data cannot always be retrieved. In case of a physical failure of a hard disk such as the infamous "click of death" situation, you won't be able to do much good to the hard drive except bring it to the recovery experts. Modern hard drives, however, are complex yet reliable pieces of electronics. They rarely fail for no reason, at least on a physical level.
Logical corruption prevails with the complex operating systems, buggy software, malicious or careless acts of the end-users, malware and viruses. Power failures and computer hardware malfunctions also account for many cases of corrupted hard drives and lost data.

The logical corruption can be dealt with at home. Provided that you have the right data recovery tools, you'll be able to do it yourself without any special skills.

Be aware that the data recovery process is a lengthy one. You'll need plenty of time and enough space on a working, non-corrupted hard disk to facilitate the recovery. Before you begin, make sure that you restrict any write operations onto the damaged disk. If you don't have data recovery already installed on your computer, don't save or install the data recovery product onto the corrupted drive. Instead, use a different drive letter, a flash memory card or a USB drive. Even a flash card from your digital camera can be able to store the data recovery tool!

The choice of a proper data recovery tool is a very important one. If you have no previous experience in recovering data, choose one that offers maximum level of automation for an inexperienced uses. It's a good idea to make sure that the tool you pick allows saving a copy of the damaged disk onto a healthy one in order to work on a backup copy instead of operating the live disk. Mareew Data Recovery by http://mareew.com is a good choice for the inexperienced user.

Further data recovery steps depend on the data recovery software that you choose for the job. If you settle with Mareew Data Recovery, there's not much to talk about. Mareew Data Recovery can optionally create a backup copy of the damaged disk (I highly recommend that you do so), and performs all recovery operations on the copy instead of the original. If something goes wrong, you still have the source hard disk in its original condition; just make another copy and try again.

The data recovery process is pretty straightforward with Mareew Data Recovery. You get a step-by-step wizard that guides you through the recovery process. Even if you don't read the prompts except the choice of the damaged disk if you have more than one in your system, and simply click the 'Next' button several times, you will be able to recover the damaged disk!

Mareew Data Recovery is able to fix the most complex issues with modern hard disks. Corrupted file systems, bad partition tables, FAT or NTFS failures are not a problem. Most importantly, Mareew Data Recovery values your data more than the integrity of the system structures. You'll have a chance to save your documents, digital pictures and archives from the damaged drive before attempting the recovery. All in all, a highly recommended tool.

Try it free at http://mareew.com/data_recovery/data_recovery.php

Thursday, 14 July 2011

Budidaya Kepiting Bakau

Kepiting bakau (Scylla serrata) merupakan salah satu jenis komoditas perikanan yang potensial untuk dibudidayakan. Kepiting bakau banyak dijumpai di perairan payau yang banyak ditumbuhi tanaman mangrove. Kepiting bakau sangat disenangi oleh masyarakat mengingat rasanya yang lezat dengan kandungan nutrisi sejajar dengan crustacea yang lain seperti udang yang banyak diminati baik dipasaran dalam negeri maupun luar negeri.

Potensi pasar yang cukup besar memberi peluang bagi pengembangan budidaya kepiting bakau secara lebih serius dan komersial. Disisi lain produksi kepiting selama ini secara keseluruhan masih mengandalkan tangkapan dari alam, sehingga kesinambungan produksinya tidak dapat dipertahankan.

Kepiting bakau dapat dipelihara secara terus menerus sepanjang tahun, karena ketersediaan benih di alam saat ini cukup banyak juga lahan tambak pembesaran dapat disiapkan dengan mudah dan cepat.
Diversifikasi usaha budidaya kepiting bakau di tambak akan menambah lapangan usaha dan mengoptimalkan potensi lahan tambak yang idle serta dapat menyerap tenaga kerja, sehingga mampu meningkatkan pendapatan masyarakat pembudidaya.


KONSTRUKSI TAMBAK
Tambak kepiting harus mempunyai konstruksi yang berorientasi pada faktor lingkungan yang mendukung kehidupan dan pertumbuhan secara normal, sehingga efisiensi pemanfaatan lahan dan waktu saat pemeliharaan. Secara prinsip, bangunan tambak harus kuat & kedap air.


A. Pematang B. Pintu Air C. Pari/Caren D. Mangrove E. Saluran Pasang- surut bebas Mangrove
Gambar 1. Tata Letak Tambak
Untuk mencegah agar kepiting tidak melarikan diri dari petak pemeliharaan dan mencegah masuknya hama dari luar dibuat karamba bambu atau kurungan. Setiap unit kurungan dibangun dengan ukuran 2 m x 1 m x 0,2 m hingga membentuk kare yang ditancapkan. Karamba dipasang pada saluran tambak dengan kedalaman air kurang-lebih 30 cm.



TEKNIK BUDIDAYA
Persiapan Tambak : Pengolahan tanah dasar ditujukan memperbaiki mutu/kualitas tanah untuk mengingkatkan daya dukung lahan. Kegiatan yang dilakukan meliputi pembalikan, penjemuran, pencucian dan pengapuran. Pembalikan tanah bertujuan untuk mempercepat proses penguraian bahan organik dan gas-gas beracun, yang dilakukan dengan mencangkul/membajak dengan kedalaman ± 20 – 30 cm. Penjemuran bertujuan untuk mereduksi bahan organik dan gas-gas beracun yang dilakukan dengan sinar matahari hingga warna tanah coklat alami. Lama penjemuran selama 5 – 7 hari. Pengapuran bertujuan memperbaikii dan menstabilkan pH tanah hingga kisaran normal (pH 7 – 8). Jenis kapur yang digunakan harus sesuai dengan jenis tanah dasar setempat


PEMELIHARAAN
Pemilihan dan Penebaran Benih : Benih yang digunakan berukuran berat 30 – 50 gr/ekor atau lebar cangkang (karapas) 3 -4 cm. Ciri –ciri benih yang baik adalah :
* Anggota tubuh yang lengkap
* Menunjukkan tingkah laku untuk menghindar atau melawan bila akan dipegang
* Warna cerah hijau kecoklatan atau coklat kemerahan.
Penebaran benih sebaiknya dilakukan pada pagi atau sore hari dengan padat tebar rasio perbandingan jantan dan betina 1 : 1 berkisar antara 1 -2 ek/m2. Untuk menjamin benih bebas dari parasit sebaiknya direndam dengan desinfektan ( formalin 200 ppm selama 30 menit). Kemudian benih disebar merata dengan cara melepas ikatan satu per satu.


Pemberian Pakan : Kegiatan pemberian pakan meliputi : (1) memilih jenis pakan yang sesuai dengan kebutuhan, (2) cara pemberian pakan, (3) dosis pakan, (4) teknik sampling. Jenis pakan untuk budidaya kepiting adalah pakan alami seperti bentos dan cacing, untuk pakan buatan dapat diberikan ikan rucah atau pellet.

Gambar 3. Pakan Ikan Rucah
Khususnya untuk pakan ikan rucah, daging kerang dan hancuran daging siput dilakukan dengan cara memberikan ikan setengah kering dengan kadar air berkisar 30 – 40 %. Jumlah pakan diberikan disesuaikan dengan kebutuhan, dapat dilihat dari sisa pakan yang tidak termakan. Jika pakan dimakan seluruhnya, maka pemberian pakan selanjutnya sebaiknya ditambah.


Pengendalian hama dan penyakit : Tindakan pengendalian dapat dilakukan dengan cara pergantian air yang cukup, pengapuran secara rutin dan penyaringan air pasok dan pemberian feed aditive (vit. C 2-4 gr/kg pakan, bawang putih 15 – 20 gr/kg pakan secara periodik. Penggunaan obat-obatan kimia (pabrik) merupakan alternatif paling akhir jika dengan cara pencegahan tidak berhasil.

PANEN DAN PASCA PANEN
Panen kepiting biasanya dilakukan setelah masa pemeliharaan mencapai 4-5 bulan, dengan ukuran 3-4 ekor/kg. Cara panen kepiting dari kurungan bambu dengan menggunakan seser atau rakkang. Pasca panen dengan mengikat kaki dan capit kepiting dengan tali secara individu. Produk hasil panen ditempatkan di wadah yang berlobang-lobang dengan dialasi pelepah pisang yang dibasahi iar laut guna mempertahankan tingkat kelembaban, selanjutnya kepiting dapat dipasarkan langsung ke pengumpul dalam keadaan hidup



Gambar 4. Kepiting yang siap dipasarkan


ANALISA USAHA
Perhitungan biaya dan pendapatan usaha budidaya kepiting dihitung berdasarkan :
1. Luas lahan 5000 m2 ( ½ Ha )
2. Produksi 1 ton/musim tanam
3. frc 1 : 1,5
4. Pemeliharaan 2 musim tanam
5. harga jual Rp 25.000/kg
6. sr 50 %
7. berat rata-rata 200 gr/ekor Biaya tetap ( 1 Musim Tanam )
8.

Biaya Tetap ( 1 musim tanam )
 



Biaya Operasional 1 musim tanam
  • BIAYA TOTAL 1 MT = Rp 1.250.000 + Rp 69.650.000 = Rp 70.900.000,-
  • HASIL PENJUALAN = Rp 4.000 KG X Rp 25.000 = Rp 100.000.000,-
  • PENDAPATAN 1 MT = Rp 100.000.000 – Rp 70.900.000 = Rp 29.100.000,-

Sunday, 10 July 2011

What Is An Intranet? Definition and Uses...

An intranet is basically a private web based network. It uses all of the technology of the internet but is safe and protected behind a firewall that keeps unauthorized personnel out. Companies have been using them for years as a method of streamlining their internal communications.

Because a web browser can run on any type of computer, the need to maintain multiple paper copies of documents that are constantly changing can be eliminated. Documents like training manuals, internal phone books, procedure manuals, benefits information, employee handbooks, requisition forms, etc. can be maintained as electronic documents and updated at almost no cost. The savings in paper and other material costs can be significant
But the most powerful aspect of an intranet is its ability to display information in the same format to every computer being used. That allows all of the different software and databases a company uses to be available to all employees without any special equipment or software being installed on their systems.

This universal availability of information is sparking an era of collaboration unlike anything ever seen before. The departmental barriers that exist in many companies are slowing breaking down because now colleagues can share information readily using the company intranet.

Options for implementing an intranet

There are a variety of options for setting up an intranet. They include building your own intranet technology, purchasing and installing third-party software, or purchasing access through an extranet ASP. Here is a quick summary of the advantages and disadvantages of each approach:

1. Building it yourself
Advantages: Complete control of user interface design; ability to customize level of functionality; integration into internal systems, and direct access to user activity.

Disadvantages: High up-front development cost; requires staff expertise in the development of extranets, commitment of internal staff for 6 months to a year for planning, execution, review and implementation; and an ongoing commitment of internal staff for internal and client support, hosting, maintenance and upgrades.

2. Purchasing/installing third-party software
Advantages: Proven track-record of packaged solution; ability to choose functions and to
customize user interface, more rapid implementation compared to building it yourself.

Disadvantages: High up-front purchase cost; commitment of internal staff for customization and implementation; on-going commitment of internal staff for internal and client support, hosting, maintenance and upgrades; and extensive internal and client training

3. Using a Service Provider (ASP)
Advantages: Proven track-record of the application; low cost of entry and predictable cost over time; virtually immediate implementation; no commitment of internal staff for internal support, hosting, or maintenance; and upgrades at no cost by extranet experts, and savings on internal server use.

Disadvantages: Less freedom in user interface design, and fixed functionality.

In the final analysis…
The approach you choose depends on how you work, the technical and financial resources at your disposal, and how rapidly you need to move forward.

What is search engine gateway?

Navino launched its search engine gateway service recently. For most of the Internet surfers, search engine gateway is a pretty new concept compared with meta search engine or multi search engine. Put it in simple, it is a web service, which can let you search the best information from the best content providers in one website.

When we try to find information everyday, most of us might go to Google.com. Yes, it's true. Most of the time, Google works well. But does Google return the best information? I guess you would agree that the search engine's ranking algorithm could only give a good answer, but not the best. Well, you may ask, where can I get the BEST? The best weather information? The best book information? The best price for your favorite mp3 player? The short answer is from the brain, from the hand picked information. Therefore, Navino's editors and their users give out that the best weather website is weather.com, the best book website is amazon.com and the best price information is froogle.

Besides best hand picked information resources, Navino also provide the search engine gateway technology. Using this technology, you can search all the best website at Navino. All you need to do is to add a unique search name before your searching keywords.

For example, if you want to search New York's weather, you can search with ‘weather New York' and you will be forwarded to weather.com with the keyword ‘New York'. If you want to search finance books, you can search with ‘book finance' and you will be forwarded to amazon.com with the keyword ‘finance'. If you want to search the best price for your favorite mp3 player, you can search with ‘price mp3 player' and you will be forwarded to froogle with the keyword ‘mp3 player'.

Navino search engine gateway is very convenient for your everyday web surfing. Besides that, Navino also provides its users to customize their own search engine gateway and allows its users to recommend search names for public use.

Why use URL shorteners?

You must have seen them. Web addresses like http://tinyurl.com/2gj2z3 which, when you click on them, take you to another web page. Why use them? Are there any risks in using them?

URL stands for Uniform Resource Locator. It's the posh technical term for a web address. Web addresses normally take the form http://www.somesite.com/somepage.html, which is not too much of a problem. But some site names can get very long, and so can page names. The increased use of database-driven sites mean that URLs can get very long indeed, and most of them is computer gobbledygook. They are impossible to type in, if you are reading them in a print article, and often get corrupted by word-wrapping when they appear in an email or blog posting.
An URL shortener is a web service that takes a long address that's hard to type, and turns it into a short one. You should use them in articles for print publication, classified ads, emails, blog and forum postings, anywhere there is a danger that the full address may be corrupted, or that someone may need to type the address into a browser manually.

But there is a danger in using short URLs that may make people afraid to use them. The short address disguises the real destination. This makes it easy for somebody to post an innocent looking message encouraging people to click on a link that takes them to a site which infects their computer with spyware, or something equally undesirable.

Some URL shortening services have tried to address this problem. The most well-known service, TinyURL.com, has an optional preview page that shows you the target address before you go there. But you have to know to type "preview" in front of the address, or visit the site and set it as a permanent option. Those who don't know about this are still vulnerable to deception.

A safe URL shortener would not allow the creation of links to undesirable sites. It would also always display a preview page, so the user always sees where the link is taking them before they go there. xaddr.com uses Internet blacklists to prevent its use to disguise sites that are advertised by spam. Its preview page offers a link to McAfee's Site Advisor, which can be used to check the safety of the destination.

Next time you need to write a long web address, use an URL shortener. But to encourage confidence that no harm will come from clicking the link, pick a safe one.

Windows Server 2003 Active Directory and Network Infrastructure

It is a hierarchical representation of all the objects and their attributes available on the network. It enables administrators to manage the network resources, i.e., computers, users, printers, shared folders, etc., in an easy way. The logical structure represented by Active Directory consists of forests, trees, domains, organizational units, and individual objects. This structure is completely independent from the physical structure of the network, and allows administrators to manage domains according to the organizational needs without bothering about the physical network structure.

Following is the description of all logical components of the Active Directory structure:


Forest: A forest is the outermost boundary of an Active Directory structure. It is a group of multiple domain trees that share a common schema but do not form a contiguous namespace. It is created when the first Active Directory-based computer is installed on a network. There is at least one forest on a network. The first domain in a forest is called a root domain. It controls the schema and domain naming for the entire forest. It can be separately removed from the forest. Administrators can create multiple forests and then create trust relationships between specific domains in those forests, depending upon the organizational needs.


Trees: A hierarchical structure of multiple domains organized in the Active Directory forest is referred to as a tree. It consists of a root domain and several child domains. The first domain created in a tree becomes the root domain. Any domain added to the root domain becomes its child, and the root domain becomes its parent. The parent-child hierarchy continues until the terminal node is reached. All domains in a tree share a common schema, which is defined at the forest level. Depending upon the organizational needs, multiple domain trees can be included in a forest.


Domains: A domain is the basic organizational structure of a Windows Server 2003 networking model. It logically organizes the resources on a network and defines a security boundary in Active Directory. The directory may contain more than one domain, and each domain follows its own security policy and trust relationships with other domains. Almost all the organizations having a large network use domain type of networking model to enhance network security and enable administrators to efficiently manage the entire network.


Objects: Active Directory stores all network resources in the form of objects in a hierarchical structure of containers and subcontainers, thereby making them easily accessible and manageable. Each object class consists of several attributes. Whenever a new object is created for a particular class, it automatically inherits all attributes from its member class. Although the Windows Server 2003 Active Directory defines its default set of objects, administrators can modify it according to the organizational needs.


Organizational Unit (OU): It is the least abstract component of the Windows Server 2003 Active Directory. It works as a container into which resources of a domain can be placed. Its logical structure is similar to an organization's functional structure. It allows creating administrative boundaries in a domain by delegating separate administrative tasks to the administrators on the domain. Administrators can create multiple Organizational Units in the network. They can also create nesting of OUs, which means that other OUs can be created within an OU.
In a large complex network, the Active Directory service provides a single point of management for the administrators by placing all the network resources at a single place. It allows administrators to effectively delegate administrative tasks as well as facilitate fast searching of network resources. It is easily scalable, i.e., administrators can add a large number of resources to it without having additional administrative burden. It is accomplished by partitioning the directory database, distributing it across other domains, and establishing trust relationships, thereby providing users with benefits of decentralization, and at the same time, maintaining the centralized administration.

The physical network infrastructure of Active Directory is far too simple as compared to its logical structure. The physical components are domain controllers and sites.


Domain Controller: A Windows 2003 server on which Active Directory services are installed and run is called a domain controller. A domain controller locally resolves queries for information about objects in its domain. A domain can have multiple domain controllers. Each domain controller in a domain follows the multimaster model by having a complete replica of the domain's directory partition. In this model, every domain controller holds a master copy of its directory partition. Administrators can use any of the domain controllers to modify the Active Directory database. The changes performed by the administrators are automatically replicated to other domain controllers in the domain.

However, there are some operations that do not follow the multimaster model. Active Directory handles these operations and assigns them to a single domain controller to be accomplished. Such a domain controller is referred to as operations master. The operations master performs several roles, which can be forest-wide as well as domain-wide.


Forest-wide roles: There are two types of forest-wide roles:

Schema Master and Domain Naming Master. The Schema Master is responsible for maintaining the schema and distributing it to the entire forest. The Domain Naming Master is responsible for maintaining the integrity of the forest by recording additions of domains to and deletions of domains from the forest. When new domains are to be added to a forest, the Domain Naming Master role is queried. In the absence of this role, new domains cannot be added.


Domain-wide roles: There are three types of domain-wide roles: RID Master, PDC Emulator, and Infrastructure Master.

RID Master: The RID Master is one of the operations master roles that exist in each domain in a forest. It controls the sequence number for the domain controllers within a domain. It provides a unique sequence of RIDs to each domain controller in a domain. When a domain controller creates a new object, the object is assigned a unique security ID consisting of a combination of a domain SID and a RID. The domain SID is a constant ID, whereas the RID is assigned to each object by the domain controller. The domain controller receives the RIDs from the RID Master. When the domain controller has used all the RIDs provided by the RID Master, it requests the RID Master to issue more RIDs for creating additional objects within the domain. When a domain controller exhausts its pool of RIDs, and the RID Master is unavailable, any new object in the domain cannot be created.

PDC Emulator: The PDC emulator is one of the five operations master roles in Active Directory. It is used in a domain containing non-Active Directory computers. It processes the password changes from both users and computers, replicates those updates to backup domain controllers, and runs the Domain Master browser. When a domain user requests a domain controller for authentication, and the domain controller is unable to authenticate the user due to bad password, the request is forwarded to the PDC emulator. The PDC emulator then verifies the password, and if it finds the updated entry for the requested password, it authenticates the request.

Infrastructure Master: The Infrastructure Master role is one of the Operations Master roles in Active Directory. It functions at the domain level and exists in each domain in the forest. It maintains all inter-domain object references by updating references from the objects in its domain to the objects in other domains. It performs a very important role in a multiple domain environment. It compares its data with that of a Global Catalog, which always has up-to-date information about the objects of all domains. When the Infrastructure Master finds data that is obsolete, it requests the global catalog for its updated version. If the updated data is available in the global catalog, the Infrastructure Master extracts and replicates the updated data to all the other domain controllers in the domain.

Domain controllers can also be assigned the role of a Global Catalog server. A Global Catalog is a special Active Directory database that stores a full replica of the directory for its host domain and the partial replica of the directories of other domains in a forest. It is created by default on the initial domain controller in the forest. It performs the following primary functions regarding logon capabilities and queries within Active Directory:


It enables network logon by providing universal group membership information to a domain controller when a logon request is initiated.

It enables finding directory information about all the domains in an Active Directory forest.

A Global Catalog is required to log on to a network within a multidomain environment. By providing universal group membership information, it greatly improves the response time for queries. In its absence, a user will be allowed to log on only to his local domain if his user account is external to the local domain.


Site: A site is a group of domain controllers that exist on different IP subnets and are connected via a fast and reliable network connection. A network may contain multiple sites connected by a WAN link. Sites are used to control replication traffic, which may occur within a site or between sites. Replication within a site is referred to as intrasite replication, and that between sites is referred to as intersite replication. Since all domain controllers within a site are generally connected by a fast LAN connection, the intrasite replication is always in uncompressed form. Any changes made in the domain are quickly replicated to the other domain controllers. Since sites are connected to each other via a WAN connection, the intersite replication always occurs in compressed form. Therefore, it is slower than the intrasite replication.

Thursday, 7 July 2011

Improve Your Sales with Auto Responder Improvements

Improve your marketing and sales with some auto responder Improvements. Try some of these:

1. Publish free reports to send via your auto responder. The reports should be related to your business or web site & contain info, ads and links to your sites. People love getting freebies.

2. Collect vital customer satisfaction information by publishing a survey to send via auto responder to those who sign up on your site in exchange for a free eBook, software or trial period at your membership site.  This type of information will help you understand their needs, likes & dislikes better.

3. Instead of answering each customer question that is e-mailed to you, publish "Frequently Ask Questions" and make them available via auto responder to those who sign up. To save time and support headaches.

4. Instead of publishing all of your customer testimonials or endorsements on your website, publish only a few there. And set up an auto responder form that invites visitors to receive a complete list via your. Give them a power-packed list; it's more effective to include all of them.

Mix and match. Change your auto responder strategy to change your auto responder results!