Tuesday, December 27, 2011

Computer Collection Of Words For Beginners

!±8± Computer Collection Of Words For Beginners

Application - computer software that is designed for a specific type of activity.

Assistant - Perhaps you are already familiar with this. The assistant appears in the form of a dopey dog or a bouncing ball etc that mostly appears on the right hand side of the screen. Its task is to try to guess what you may need help with. Based on your actions. As you type it will provide relevant help topics. It cannot read your mind and this is where you come in and learn their language of command.

Bookmark - A saved link to a web address, also called a hot list entry or favourite place

Boot - To boot your computer means to start it up. To give the computer more space for memory.

Browser - A piece of software that finds and displays web pages and other documents stored on the Internet. A program used to connect to sites on the World Wide Web.

Byte - Generally a text character is defined by eight bits, which are equal to one byte. A kilobyte is actually 1024 bytes, while a megabyte is equal to 1024 Kilobytes.

CD ROM - A compact disc read only memory, which is a disk similar to and audio cd that stores information data that can only be read.

Channel - A web page set up for continuous updating.

Click - To click the mouse button then releasing it.

Client - A program such as a web browser that connects to a centralized server program and obtains information from it.

Client Server model - A methods of sharing computer and network resources by centralizing some functions with a server and allowing individual clients to connect to the server to perform those functions.

Cookies - They are bits of data that web sites put on computers so they can track what people do on line You can use your browser to delete cookies from kids hard disk.

CPU - Central processing unit. Is the main microprocessor or the electronic brain inside the computer?

Crash - A failure of computer software or hardware, which freezes the computer.

Cursor - The arrow on a monitor that indicates where on the screen you are working.

Customize -

Ø Word 2000 creates a bunch of customized documents. One primary letter for each person in your database (as in the address book).

Ø To send the same letter to more than one person only the names and addresses will change.

Data - A source and piece of information.

Database - An organized store of information.

Data source - A document that contains a list of information

Desktop - The main interface of the operating system that is shown on the screen of your computer after it has started up and before any programs are running

Desktop Publishing - Creates magazines, newspapers or any other printed material using a desktop computer and page layout software.

Detailed Area - The main body of a form and will contain all of the fields required, lines, texts and text boxes.

Dialler - Software that connects your computer to an Internet service provider.

DTP - Desktop Publishing.

Digital - Any device that utilizes binary code. All computers are digital.

Disk Drive - The device that holds, reads and writes on to a disk such as a floppy or zip disks.

Downloading - Means copying files from the Internet to your computer hard disk.

Drag - To click on something and move it to a new place, while holding down the mouse button.

Drop Down List - This list displays a set of choices

DVD - A digital versatile disk, a disk that looks much like a CD-ROM but can hold seven times more information.

Edit - A time saving feature that helps you with text in a document service available such as delete, documents, spelling and grammar.

Email - Electronic mail that allows you to send messages to other people and organisations are on the Internet or linked to your computer on a network.

Fax Modem - A device that allows you to connect your computer to other computers via the phone lines as well as to send and receive faxes.

Field Properties - This area will allow you to set up field rules and formats. The options may change depending upon the data type you selected for a field.

Field Size - This allows us to set the size of a field. It will fill a fixed space on the disk. It is wise to have a minimum size set to each field.

Field Format - This section appears instead of the field size when you have selected a date or numerical data type. The Field format will display the date or number in a specific format.

Field Caption - This controls the field name in a form or report. The actual field is called Name, however the caption may display a label reading Members Name in the forms and report areas

Files - A block of information on a hard disk or a floppy disk. Information like word processing a document stored on the floppy or the hard disk and they are referred as files.

Filter - A special effect that can be applied to a graphics image, such as texture. Usually found in Paint such as Adobe Photoshop.

Floppy Disk - A portable data storage disk. Floppies hold about 1.4MB of data and so are only really useful for storing text files.

Folder - A storage place for computer files. Folders can store anything from applications to your personal work.

Font - Different kind of letters in the alphabet that your can use and change to any size and shape.

Footer - This area will be displayed at the bottom of each form view. It will generally contain specific text, borders or fields.

Format - This makes the appearance of your document and carries a variety of Fonts, Styles, Colour, working with Spacing, margins and creating columns.

FTP - File Transfer Protocol, also used to describe Internet public file archive sites (FTP sites)

Hacking - Is when someone illegally and for the purposes of influencing and controlling another computer system.

Hard Copy - The output of computer information as a copy on paper.

Hard Disk - A computer main storage disk, which holds the operating system and application files.

Hardware - The equipment that makes up a computer disk drives, processor, monitor, keyboard, mouse, printer etc.

Header

Ø (The Form Header) - This is the area to be displayed at the top on the form view. It generally contains a heading of what the form is about

Ø (The Page Header) - This area will be displayed at the top of each printed page.

Home page - The central document or default start-up page of a World Wide Web or individual page.

HTML - The hypertext mark up language. The language consisting mainly of formatting tags, used to describe a document for the World Wide Web, including both structural formatting and hyperlinks.

: -) Smiling : -D laughing : -O shocked or surprised : -(Sad ; -) Winking

; - P poking out your tongue

; - * Kiss

Icons - A small graphic displayed on the computer screen, which represents a command or file.

Image map - An image that connects to different URL's depending on which part of the image is clicked.

Import - To put a file you saved and bring back to continue your task.

Index - This will sort automatically in ascending order by this field. It can slow the data entry process, as it will sort itself whilst you are entering the data.

Integration - The convergence of two technologies into one such as the mythical convergence of TV and computers.

Internet - A collection of networks and computers all over the world all of which share information or at least email, using agreed upon Internet protocols. An international network of millions of university, government, commercial and private Computers

Internet importance - Why is the Internet important to the future of Kids.

a) Research / homework

b) Staying in the touch with anyone, everyone all around the globe.

c) All visual information on bobbies and sports

d) Downloading files playing music TV, games and surfing along the three WWW.

Intranet - Is the small versions of the Internet, usually operating within a corporation. The technology of the Internet on a smaller scale.

IP - Internet Protocol

IRC - Internet Relay cat (this needs a special software)

Java - A computer language designed to extend the capabilities of the Web, and that it can only present information in predefined formats, mostly Text, picture and simple animation.

Justification - To justify means to line up evenly.

Link - A specially designed word or image that when clicked takes a wet browser to a new page or other destination an embedded web address.

Manipulate - users on the Internet can easily manage, influence or change cleverly and unfairly for their own purpose and advantage. So take extra care as well as good people you will also find bad. Special care with images and graphics software packages.

Modem - The box that connects your computer to a normal phone line.

Mouse - The computer tool that you hold you hold and click leading you to actions and commands.

Multimedia - The incorporation of many different media often including text, pictures, sounds, video, animation and so on.

Netscape Navigator - The Web Browser

Net - A loosely defined term meant to suggest the loose association of all or most computers on the planet. This term generally refers to a more inclusive set of linked networks than just the Internet but it also corresponds roughly to the Internet.

Net casting - Publishing Web content on a continuous basis to subscribed viewers also called web casting and push.

Option Button - This marks a black dot that appears in its centre. Only one option button in a group can be marked. They are sometimes referred to as the Radio Buttons

Page - On the World Wide Web, an HTML document.

PC - The personal computer used widely by the computer industry to refer to IBM computers.

Pixel - A single dot on a computer screen.

Port - A connector part to the computer that allows your to connect a device such as a printer, a digital camera microphone etc.

Portal - A major Web site that large numbers of visitors use as a starting point on the web

Punctuation - The practice of inserting marks into your text.

ROM - A read only memory instructions stored for a period of time until such time that the computers is turned off. That is why you must save important documents to floppy disk at the end of the day saving your work on an external disk

Safety/awareness - Personal details are those about your name, address and phone numbers.

Save/ Save As - When saving a file or document it will automatically enter the report title name as the file name. If you use the save function, but want to be more specific about the file name then you must use Save As. You can save web pages as files and store them on your hard drive or /and can be printed

Scroll Bars - This allows you to browse through a document an Are located on the right side of your window.

Search engines - Allows uses to search for files and pages on the Internet entering keyboards that are run against a database.

There are three different types of search engines: -

Ø Standard Search Engines uses a combination off commands established by the user, which searches to find World Wide Web documents from the database.

Ø Search Engines, This growth has led to the development of Meta search tools that are often referred to as, threaded search engines. These allow the user to search multiple databases simultaneously, via a single interface.

SubjectGuides, The subject guides are organized indexes of subjects category that allow the Web searcher to browse through lists of web sites by the subjects. They are compiled and maintained by people and many include a search engine for searching their own database

Server - A piece of software or a machine that acts as a centralized source of information or computing resources such as web sites, gopher menus, FTP archives and so on that are available to clients.

Site -

Ø A location on the Internet, often the host of one or more severs, or a set of related web pages.

Ø Publishing a Web site for computer users to seat the quickest way possible. Choosing the web server from the list and copy, you need to install it first using the Internet tools and choosing the Web Publishing Wizard. A web site is a collection of related documents.

Shareware - Is soft ware that is offered to users on a trial basis on the condition that, if it is regularly used, a payment is then made to own.

Software - A series of instructions that comes on a CD to tell the computer how to do things and how to install new programs

Table - To create a table in your Web page insert the table button you will find this on the Standard Toolbar follow instructions as in a Word Document, existing tables are known as Nested tables.

Tabs - A tab contains a separate set of options to bring a tab to the front just click it.

Task Pane - This gives you an option that you can select to perform ordinary Tasks e.g. opening a document.

TCP / IP - Transmission control Protocol

Text Box - A text box is a box in which you can type text, and can be replaced by dragging over it.

Theme - To add or change a theme as in background colours you might need to move up to the Web tools toolbar then the web Layout view comes handy so have some fun use all of the tools available.

Upload - When you send a copy of a file from another computer.

URL - Universal as in Web Addresses.

Virus - A small program that is designed to spread ( like when someone in the family gets the flu everyone gets the flu)Some viruses are harmless and very annoying but there ore others that can cause serious damage to the contents of a computer.

Viewing - Viewing a Web page is important, you will read it the same way as the person receiving it.

Web - In Word 2000 creating a web page is easy you can use the web page Wizard, or the Web Templates to create pages fast. The web is just one part of the Internet; it displays information on the Internet. You access information using a special program called Web Browser the information on the Web is displayed on pages. The web is the most commonly used. The pages are written HTML protocol a system by which documents are linked.

Web browser - This is software that allows your computer to display Web pages. It is usually used when the computer is connected to the Internet.

Window - A screen within your computer display that displays information from a particular program or function. It enables you to have different programs files or documents on the display at the same time.

Word Processing - The word processing program produces efficiency and processional looking document such as letters, reports, essays and newsletters

WWW - The World Wide Web developed to make the Internet easier to navigate the Web, combines text with graphics, animation and many more.


Computer Collection Of Words For Beginners

Vicks Thermometer Decide Now Promotion L-arginine And L-citrulline

Friday, December 23, 2011

How to Update Your Website

!±8± How to Update Your Website

A couple of years ago you spent quite bit of money on your website and now you desperately need to update it. It's easier than you think. I am here to help you. There are many ways to get your website updated. I will go over them step by step. This information will be especially useful to site owners of static websites. When we speak about static websites we are mainly talking about websites that are not database driven. So, how do you find out if your site is database driven or not? Well, if it's a huge site with over 50 pages there is a big chance that your website is database driven. One sure way to find out is get in touch with your web designer.

The next thing that you need to determine is the programming language that was used to build your website. I hear you saying "Aren't all websites built with HTML?" The answer to that is yes and no, yes they can be fully built with HTML but most contemporary websites are built using a mix of HTML, CSS (which stands for Cascading Style Sheets), JavaScript and sometimes server side scripts such as PHP or ASP. How to determine the language used to build your site? Go to the destination website that needs to be updated and click on a random link notice the file extension in your Browser URL bar. You'll notice for example that your URL either ends on ".HTML", ".PHP" or "ASP". There are a few more extensions. You can find a list of these extensions on w3schools.com By the way a great website that actually offers free online lessons and code samples for many programming languages. Definitely worth a visit.

Back to our main topic. Again focusing on static websites, you'll need some tools to update/expand your website. Here are the 2 tools you'll need: 1. An HTML editor such as Microsoft FrontPage, Adobe Dreamweaver or GoLive. The list is long and there are many HTML editing tools out there. But my suggestion is go with the pro tools and download a 30 day free trial of Adobe's Dreamweaver found on the website of http://www.adobe.com Dreamweaver is the industry leading web development tool. 2. You'll also need a FTP (File Transfer Protocol) program. The FTP tool allows you to connect to a remote server (This is where your website resides on) and modify data. Again there are a lot of FTP tools available, but the most workable ones are from CuteFTP, WSFTP, and FlashFXP. They all have one purpose upload to or download from your web server. My suggestion is go with this one: "Ipswitch WS_FTP Home 2007" you can try it for free.

You can find and download this tool at downloads.com To get your FTP tool to work and connect to your web server you'll need the following information: 1 Your FTP server address (you can obtain that from your hosting provider) 2. FTP Username (if you don't know your username and password combination, contact your hosting provider) 3. Password (if you don't know your username and password combination, contact your hosting provider). With these tools you'll be able to connect to your webserver and make modifications to your website.


How to Update Your Website

Oxo Good Grips Pop Container Quick Saucony Cohesion Decide Now Bistro Sets Target Buy Online

Saturday, December 10, 2011

Heroic German Shepherd Helps Two POWs Escape From the North Vietnamese

!±8± Heroic German Shepherd Helps Two POWs Escape From the North Vietnamese

Just as the North Vietnamese firing squad lined up to execute the POWs, from behind a dried-up banana grove a burst of M16 automatic fire hit the four North Vietnamese soldiers in the squad, cutting them below the waist. With the next short burst the other two soldiers next to them keeled over.

Shirtless, face muddied, with a wide, white-toothed smile, Nino Aquino "the Lurp" --Sabino's best friend-- advanced, a ten-inch gleaming blade in his hand, and Sabino's huge German Shepherd, Vinonegro, right by his side. Without effort, Nino cut the ropes, helping Sabino to his feet. Unable to contain his emotions much longer, Vinonegro stood up placing his front paws on Sabino's chest and licked his face, all the while whimpering, yelping and emitting almost inaudible barks.

"Vinonegro tracked you down, man--he never lost your scent!" said Nino as he helped Major Bates to his feet. But the Major couldn't hold himself up and collapsed to the ground. Both Sabino and Nino kneeled down to examine the Major's severed tendon.

"That looks bad, man," said Nino. "The river isn't far from here, Vinonegro knows the way. But we need to make some headway now--I mean now!"

Only after a splatter of blood hit his face did Sabino realize that the mama-san had snuck up behind them and with incredible speed and viciousness slit Nino's throat.

Shrieking and hooting, the wiry woman lunged off toward the banana grove, but before she even reached the edge, Vinonegro brought her down with one arching leap. In the next second he had locked his jaws around the woman's scrawny neck, and with incredible force he whipped the woman side to side like a rag doll. By the time Sabino reacted and whistled his cease and release code, the woman was already dead.

"Never trust a woman with bad teeth in black pajamas - Mama-san Death," Nino rasped weakly. "Take the blade... I want you to have it." As he grabbed the 10-inch blade, he felt Nino take his last breath and die in his arms. That's what life is --a sigh, a puff or breath-- God's spirit.

After collecting the dog tags from Lieutenant Burch and Nino Aquino, Sabino looked around, grabbed a pistol and a Zippo lighter, immediately heading west in search of the river. It was a painful journey. With Vinonegro, the magnificent hound, walking point, Sabino and Major Bates simply followed him. Once in a while Vinonegro would disappear as he trotted ahead, returning soon, his tail switching as if telling Sabino "this is the right way." As daylight waned, they decided to hide in thick, knee-high elephant grass and wait the night out. It wasn't long before they fell asleep, lulled by the distant shelling, the faint outburst of Russian AK-47 rifle fire and the drone of B52s in the stratosphere. So fatigued were they that even the trumpeting of mosquitoes or the scurrying of rodents, frogs, scorpions and other creatures and crawlers of the night could not stir them from their deep slumber.

At sunup, a soft snarl in his ear alerted Sabino to danger. When he sat up he saw Vinonegro point towards the edge of the grass patch; he then heard the stamping of feet. A squad of Victor Charlies-VCs, or Viet Cong fighters-was on the move in their opposite direction less than twenty yards away from them. A search party looking for us, he thought. As the noise from the footfalls faded in the distance, Sabino scratched Vinonegro ears, caressed his dew-damp coat, and whispered to him, "Good, boy, Vino! You can really sniff Charlie sweating out that nuoc mam." Soon thereafter they got started, but made very little progress because Major Bates could no longer hop, his good leg now cramping and knotting. They halted for a while. Although the Air Force owned the skies --for during the day they heard the continuous drone of B-52s and saw fighter bombers and assault helicopters swoop overhead-- they couldn't signal at all because the fields and woods were teeming with Viet Cong squads. Only once, when a C-123 cargo plane swooped down in a low glide to unload defoliants did Sabino dare signal, but to no avail for a white dust-gathering into puffy clouds of Agent Orange-soon covered the sky.

"You go, Sabino...I can't make it...this is as far as I can go." Sabino saw that the Major's foot had swollen to the size of a football.

"You are a noble man, Major Bates. You took that bullet because of me and I won't leave you; I owe you my life and I will help you to the last gasp. We both go or I'll stay with you and we'll both die. Hang on. I will make a litter and drag you to the river...it is just a short ways, then we'll be safe."

With as much energy as he could muster, Sabino cut some branches and tied them together with strips of cloth he tore from both of their shirts. The rest of the cloth he used to improvise a harness, and when the harness broke, he fashioned stronger strips from his pants. Sabino was a sight to behold: blood was caked on his six-day unshaven face, one eyebrow hung loose over his eye, his legs were bleeding from hundreds of tiny grass-blade cuts, and his hair was thickly matted. And were it not for his boots and the torn skivvies --by now a scant, muddied apron that partially covered his rump and private parts-- he would be totally naked. This, too, shall pass, he'd repeat to himself, and he'd drift into long-ago-lived scenes: His freshman year at Columbia College. He'd see himself walking along Broadway and stopping by the West End Bar to have a beer, or having a cup of coffee at the Chock Full O'Nuts at the corner of 116th Street, or hurrying to class, circling around the Sun Dial on his way to Hamilton Hall. Or he'd conjured up visions of his sophomore and junior years in which he roamed through the Lions' Den, Canon Bar, the Abbey Pub, and other waterholes frequented by Columbia undergrads.

With the will of a possessed Olympian god determined to win against all odds, he dragged the litter one step at a time, all the while hearing his father's voice: God and honor, Sabino; or what's a man for? And at times he'd also hear the melancholy peals of his mother's organ, or Melodium, as she was fond of calling her much beloved instrument, or her sweet voice: You'll grow up to be a man of right, Sabino; a man who loves God and defends his friends and his women.

Wearied beyond human endurance, he trudged on with quaking, weak-ever weaker-steps, while his burden seemed to get heavier with each pull and tug. Yet, glancing over his shoulder, he'd prop up the Major's sagging spirit: "I hear the water, and now I smell it - hang in there, Major!" When Vinonegro trotted ahead and didn't return within his usual scout time, Sabino knew something was up. Major Bates asked Sabino to go see and to take the gun, to which Sabino signaled no: a gunshot would bring a swarm of Victor Charlies in a minute. He whispered, "I'll take Nino's knife." Then he heard Vinonegro' growl-- for the kennel geneticists had hardwired his breed not to bark when out in the field searching for Charlie-- growing more menacing.

In one second, Sabino assessed the situation. Vinonegro had cornered a Monocled cobra against a rocky wall. Hissing, baring its fangs, the huge snake wasn't about to yield an inch of its territory. Vinonegro would retreat only enough to get out of the cobra's striking range, for when the primeval reptile stood on its end, it rose at least seven or eight feet tall. During a pregnant interval, both stared at each other as if locked in a blinking game. At times Vinonegro would also stand on his hind legs, his black-reddish coat fluffed up, the black and copper bristles on his face and neck straight out like knitting needles. The instant the cobra saw Sabino it stood again, challenging him, its tongue darting and flicking, its head frozen as if suspended in the air by an invisible rope, gently swaying and biding its time to strike. After the initial sighting, Sabino backtracked less from fear than from awe of the magnificent beast. Angel and Fiend, he thought as he turned back to the spot where he had left Major Bates. But in a minute he returned to find Vinonegro and the cobra locked in a staring down duel. Time, noise, change, motion, and succession had stopped for both. Stillness reigned. Taking advantage of the frozen moment, Sabino got closer --feeling his heart stop between beats-- and with a swift thrust, he trapped the cobra's coiled end with the V shaped pole from the stretcher. In the next second Sabino heard not a hiss but a cavernous grunt from the depths of the monster-cobra while its ribs fanned outward forming a sinister hood. Slowly the fearless man moved the V end of the pole towards the head while holding its tail with his heavy boot, but just then a grating sound distracted Sabino, causing the snake to break out of the hold.

It took him but a fraction of a second to realize that the accursed brute had distracted him by grating its scales against each other. But just as the fiend attempted to flee, Sabino seized its neck with his two bared hands, both --man and fiend-- wrestling and rolling on the ground away from the rocky wall. Within seconds the giant serpent wrapped its body around Sabino's torso and legs, entwining and crushing the man's flesh and sinews. Meanwhile, Vinonegro, as if guided by human sense rather than canine instinct, kept sinking his teeth into the snake's soft underbelly. Though the animal didn't have the power of a Boa Constrictor to crush his ribs, Sabino knew that he could only keep his grip for so long, and that the snake would outlast him despite Vinonegro relentless attack.

I've been in worse situations, he thought, and always come out alive-this shall pass, too. Slowly he regained his balance and attempted to maneuver himself onto his knees, but the cobra as if guessing his intentions constricted even tighter. He recalled the time in his childhood when a farm worker had caught a rattle snake by its tail and swung its head against a rock. He could still see the man then drawing his machete and slicing the animal in two, and his fascination in seeing that out of the belly of the mother snake four or five diminutive neonates slithered out; the farmhand explaining to him that the mother protected her hatchlings by keeping them warm in her belly, that it was a myth that the rattlers ate their babies. Crush her head against the rocks, he heard himself say. But how if I can't get near the boulder?

Try as hard as he might, he just couldn't maneuver his legs. The muscles in his forearms were now beginning to feel tired, and he could feel his grip begin to slack. In panic and desperation he drove the head into the ground, but the damned animal tensed up, twisted, and resisted. Just when he was about to let go, for he could no longer keep the hold, he heard a familiar voice: "Hold her still," he heard Major Bates yell.

Sabino saw the Major hopping in one leg, Nino's gleaming blade in hand. With one sharp stroke of the well-balanced blade, Major Bates decapitated the huge fiend. The Major patted Sabino on the shoulder, "You're some tough hombre, Sabino." They both looked at each other in silence and in that finite instant in that remote, godforsaken place of the universe they bonded; though little did they know that they had bonded for a lifetime. While the snake's body twitched and uncoiled, Vinonegro --belly down on the ground-- his ears drawn back, watched it, fascinated by the leeches springing out from between the scales. Soon after Sabino eviscerated and skinned the magnificent but lethal creature and raw snake filet was their appetizer and main dish. And for dessert Sabino skewered tidbits of the juiciest and softest meat, which he charred with the Zippo lighter he had wisely carried away.

Without hunger pangs and refreshed, Sabino hitched up the harness again. After a long stretch of super-human effort, they reached a patch of rocky terrain. He stopped talking to Major Bates because the man was --exhausted and wasted by the hobbling and pressure he had put on the tumescent foot-- feverish and delirious, his bad foot glistening like an unripe, oversized, dark-green eggplant.

So tired...The straps were now cutting deep into his chest and shoulders, his hands blistered.

When Vinonegro pointed at the dark squadron of bats flying overhead towards the line of white-dusted poplars and weeping willows, Sabino knew the river was near. And in a short while he saw a forlorn, napalm-burnt Buddhist pagoda and the boulders, both a football-field distant. And just as he collapsed from exhaustion, his mind a blank slate, Vinonegro took off at full speed.

In an eerie subliminal zone of his feverish mind, Sabino dreamt or imagined that the cobra's pining mate had slithered to his side and wrapped herself around him immobilizing his legs and arms, and that her fiery breath was not only scorching his mouth but also muting his voice. Loud as he might scream no one could hear him; his scream was utterly voiceless. Then the fire subsided and a refreshing coolness soothed his smoldering face. Sabino came to his senses when he felt Vinonegro's thoroughly wet snout refreshing his face, and standing next to him three Buddhist monks with shaven heads, looking down at him.

With a feeble gesture Sabino groped for his blade like a punch-drunk boxer looks for his lost mouth protector on the canvas. "Take it easy, brother," he heard a voice resonate and echo in the chambers of his mind: "easy... easy.... brother... brother. Relax, homeboy, boy... boy... boyyyy-you're in good hands now," the voice continued in perfect American English. Sabino's eyelids fluttered and when he focused, his eyes seemed to say, "Who'n the hell are you?" Reading the quizzical look, the senior monk said, "CIA--your hound brought us to you."


Heroic German Shepherd Helps Two POWs Escape From the North Vietnamese

Steel Boots Best Quality Wholesale Aquaphor Printable Coupons

Tuesday, December 6, 2011

Top 10 Meeting Ice Breakers

!±8± Top 10 Meeting Ice Breakers

Getting people comfortable in a group setting before a team meeting can be the best investment of ten to 15 minutes of time that you can make. Ice breakers get creative juices flowing, can increase the exchange of ideas, establish team identity, and create a sense of community. All of these items are important in forging top productive teams. But how do you get people to participate and not feel uncomfortable with an ice breaker?

For meetings in a business setting in which participants are professionals, ice breakers that require actions not normally associated with day-to-day behaviors in the office generally make people uncomfortable. Successful ice breakers for these type of groups generally consist of having attendees share memorable information with each other, create innovative ways to get people to introduce themselves to each other, or have group members collectively work on a problem where everyone has to contribute.

We've selected our top ten team meeting ice breakers that are sure to get your meeting participants relaxed and ready to focus on your agenda as well as to connect with others in the group.

1. Brainstorm!:Break the meeting into teams of four or five. Give each team a topic. Pick topics that are fun and simple like, "What would you take on a trip to the desert?" or "List things that are purple". Give your teams two minutes, no more, and tell them "This is a contest and the team with the most items on their list wins." Encourage the teams to write down as many things as they can and not to discuss anything, just list things as quickly as possible. At the end of two minutes, the team with the most items on their list wins! This helps people to share ideas without fearing what other people will think.

2. Same or Different:

Divide the meeting into teams of three or four and give each team a large sheet of paper and then give each person a different colored marker. Have each person draw a large oval such that each oval overlaps with the other ovals in the center of the piece of paper. Give the group or groups, a theme that pertains to your meeting objectives. Ask the participants to write down at least five or more entries in the non-overlapping and mutually overlapping areas of their ovals. Give them five minutes, no more than that, to talk about their similarities and differences and write them in their own ovals on the paper. If there is more than one group, compare results and identify common themes in both parts of the diagrams and what light these similarities and differences shed on the purpose of the meeting. This helps team members develop an understanding of shared objectives and in a non-confrontational way learn how their views differ from others in the group.

3. Fact or Fiction:

Have everyone write down three surprising things about themselves, two of which are true, and one of which is made up. Each person, in turn, reads their list and then the rest of the group votes on which "fact" they feel is the "false" one. If the group does not correctly pick a person's made up "fact", then that person wins. A group can have more than one winner. At the end, the whole group votes on which of the "winners" of the final round, had the most deceiving "fact". This helps people get to know and remember their colleagues.

4. Free Association:

The object of this ice breaker is to have small groups generate as many words or phrases as they can that are related to a particular topic that focuses on the objective of your meeting. Give the group or groups a key word you want them to associate with and then give them two minutes to list, as quickly as possible, as many words or thoughts that pop into their heads. For example, if your company is trying to decide on whether to reduce travel and increase the use of teleconferencing, you might use the word "teleconferencing" and have people list as many words or phrases they can that they associate with the key word. For example they might say: "saves money", "saves time", "impersonal", "need to see other people", "get distracted", "sound quality".... This reveals what people are thinking, similarities in viewpoints, and possibly even problem areas or topics that need addressing or further discussion.

5. Nametags:

Prepare nametags for each person and put them in a box. As people walk into the room, each person picks a nametag (not their own). When everyone is present, participants are told to find the person whose nametag they drew and introduce and say a few interesting things about themselves. When everyone has their own nametag, each person in the group will introduce the person whose nametag they were initially given and mention something of interest about that person. This helps participants get to know and remember each other.

6. Desert Island:

Group people in teams of five or six and tell them they will be marooned on a desert island. Give them 30 seconds to list all the things they think they should take and each person has to contribute at least three items. At the end of 30 seconds, tell the teams they can only take three things. Have the person who suggested each item on the list tell why they suggested it and defend why their item should be one of the chosen three. This helps the team learn about how each of them thinks, get to know each other's values, and how they solve problems.

7. Commonality Plus:

Group your meeting participants at tables. At each table ask the group to list ten ways that everyone in that group is similar. Let them know that they cannot list body parts or clothing and that what they select cannot have anything to do with work. One person at the table should be tasked to make their list. At the end of your time limit have the group share their list with all meeting members. This is a great opportunity for your meeting attendees to learn about each other's hobbies, families, and common interests.

8. Line Up:

As people enter your meeting hand each one a piece of paper with a different number written on it. Ask the group to arrange themselves in numeric order without using their voices, hands, or showing their number. This helps the team to think of other ways to communicate with each other and to work together to achieve a common goal.

9. Meet and Greet Shoe Pile:

This works great in large groups and is a variation of the name tag ice breaker. Have everyone take off one of their shoes and throw it into a pile. Have each group member pick up a shoe and walk around the meeting room greeting other people as they try to match their selected shoe to the one another team member is wearing. This is a great way for new people to meet several members in a group.

10. First or Worst:

Have each member tell the group their first or worst job in turn. This easy to use ice breaker works great with teleconferences too and allows team members to spark conversation with each other and to have some fun commenting on the jobs that they have each done. Many of our top ten ice breakers can be used for on-site meetings and teleconferences alike. The nature of ice breakers is to get the group to talk, to share, and to get to know each other in a casual exchange. The best and most successful teams start with a little bit of fun; learning how to value what each member brings into the group. Ice breakers can help facilitate this exchange of information and comfort in doing so at the very start of the team forging process.


Top 10 Meeting Ice Breakers

New Coby 4gb Mp3 Video Player Lowest Price Egyptian Theater Boise Bargain Sale Hoover C3820

Saturday, December 3, 2011

Antique Radio

!±8± Antique Radio

The initial broadcast receivers used a coherer as well as sound board, and also were merely capable of grabbing Morse code, and thump it out on the board. This specific sort of transmission is actually known as CW (Continuous wave) or even wireless telegraphy. When wireless telephony (ie transmission & receipt of speech) became achievable, talk radio stations greatly improved upon the actual usability regarding radio transmission. Despite this, the particular antiquated technology of morse code transmission continued to enjoy an important function in radio communications until the 1990's.

The idea involving radio as enjoyment became popular in 1920, and also radio ownership progressively obtained in reputation as the years passed. Radio models coming from before 1920 are rarities.

Pre-war models were typically created on solid wood breadboards, in tiny cupboard type pantry shelves, or occasionally on an open piece metal chassis. Homemade models continued to be a powerful sector of radio creation until after the world war. Right up until then there have been more homemade sets in use compared to professional models.

These kind of simple receivers employed no battery, got no boosting as well as could only utilize headsets. They would certainly only receive very strong signals from the nearby station. They were common between the less prosperous because of to their particular minimal build cost and no run charges. Crystal units experienced minimal capability to separate programs, and where more than a single greater power station was existing, failure to get one without having the other seemed to be a basic problem.

Some crystal set end users applied a carbon amplifier or a mechanical turntable amplifier to offer adequate result to operate a speaker. Some actually utilized a flame amp.

Tuned Radio Frequency sets (TRF sets) were the most common style of early radio. These kind of used one or more valves (tubes) to offer boosting. First TRF sets only controlled earphones, but by the 1930s this was more popular to use more boosting to be able to strength a loudspeaker, regardless of the particular cost.

The types of loudspeakers in utilization at the time period have been elementary by today's specifications, as well as the sound quality produced from the loudspeakers used on these kinds of units is sometimes described as torturous.

These speaker system were definitely not entirely clear distinct categories, along with considerable overlap, nor a comprehensive list, however represent the technologies in popular employ.

The original antique radio models utilized no regeneration, as well as had really poor RF sensitivity and low selectivity. As a result only local programs and powerful remote stations would be received, and separating diverse stations was not usually attainable.

Most radio models were reaction sets, as well identified as regenerative receivers. These types of depend on beneficial suggestions to accomplish enough gain. This method worked well enough, yet is actually naturally unstable, and has been susceptible to diverse difficulties. For this reason there was a major amount of hostility over maladjusted receivers sending squealing noises and blocking reception on regional properties.

Radio sets had usually two tuning knobs and an impulse realignment, all of which got to be set up correctly to receive a channel. Earlier reaction models additionally got filament realignment rheostats for each valve, and again adjustments had to be right to obtain reception.

In the time of original radio, mainly the prosperous could purchase to construct a superheterodyne radio (superhet). These kinds of models requested many valves and numerous parts, and constructing one was a substantial process.

Pre-war superhets were often utilized with the relatively pricy shifting coil speakers, which offer a quality of sound unavailable from moving metal audio speakers.

Most post-war professional receivers have been superhets, and this particular technique is still in popular use in consumer radios these days, even if implemented with transistors and integrated circuits.

The advantages of superhets are usually:

Outstanding sensitivity, permitting reception of international broadcasts
Comprehensive stability
Well operated bandwidth
Effectively formed radio wave passband prevents the uncontrolled tone modifications of radio units, and presents excellent selectivity

The negative aspects for pre-war superhets seemed to be:

Pretty huge build fee
Higher operate price due to many valves and the need for substantial higher strength batteries
Design has been a large project

World War 2 produced widespread important demand for radio stations transmission, and foxhole sets were created by people without accessibility to classic radio elements. A foxhole radio is an illegally constructed set from whatever parts one could make, which were very few indeed. Such a set generally used lighting flex for an aerial, a razor blade for a detector, and a tin can, magnet and some wire for an ear piece. I.e. they were crude crystal models.

The console radio has been the main item of every single property back in the era of radio, they were large and high-priced running up to 0 back in the late 1930s. Generally for the rich, these radios were put in hallways and living rooms. Nearly all console radios were waist high and not very wide, as the years went on they got shorter and wider. Most consumer console radios were made by RCA, Philco, General Electric, Montgomery Ward (under the Airline brand name), Sears (under the Silvertone brand name), Westinghouse, radio-bar and many more. Companies such as Zenith, Scott, Atwater-Kent, were usually for the prosperous as their prices ran into the 0-0 range in the 1930s and 1940s.

The supply of the initial bulk made plastic Bakelite allowed designers much more innovation in cabinet styling, and significantly reduced costs. However, Bakelite is a brittle plastic, and dropping a radio could easily break the case. Bakelite is a brown-black mouldable thermosetting plastic, and is still used in some items today.

In the 1930s some radios were created using Catalin, a colourable version of bakelite, but practically all historic bakelite radios are the standard black-brown bakelite colour.

The value of more innovative light coloured thermoplastics in the 1950s made richer models practical. Some of these thermoplastics are slightly translucent.

The creation of the transistor made it possible to develop smaller portable radios that did not need a warm-up period, and ran on much more compact batteries. They were convenient and chic, though the prices were high and the sound quality not so good.

Transistor radios were available in many sizes from console to table-top to matchbox. Transistors are still employed in today's radios, though the integrated circuit containing a large number of transistors has exceeded the use of singly packed transistors for the majority of radio circuitry.

Transistor radios shown up on the market in 1949, but at a high cost. By the 1960s, decreased prices and the desire for transportability made them very well-known.

There was something of a marketing war over the number of transistors sets contained, with many models called after this number. Some sets even had non-functional reject transistors soldered to the circuit board, doing absolutely nothing, so the sales pitch could advertise a higher number of transistors.

Vacuum tube radios and early transistor radios were hand assembled. Today radios are designed with the benefit of computers and constructed with much greater use of equipment.

Today's radios are often uneconomic to fix because mass producing and technological improvements in numerous areas have made them so cheap to buy, while the cost of human labour and workshop overheads have not fallen in real terms.


Antique Radio

Brand New Stamina Magnetic Resistance Recumbent Exercise Bike Comparison K-cups Cheapest Non Electric Chandeliers Discounted

Wednesday, November 30, 2011

iLive IHT3817DT Studio Series Speaker Dock with 2.1 Channel Sound System and Remote Control for iPod (Black)

!±8±iLive IHT3817DT Studio Series Speaker Dock with 2.1 Channel Sound System and Remote Control for iPod (Black)

Brand : GPX
Rate :
Price : $216.99
Post Date : Nov 30, 2011 05:16:49
Usually ships in 1-2 business days



Your music will really get attention with this unique iPod ® speaker and docking system. It's an awesome 32 inches long, incorporating a 2.1 channel system with true 3D sound and SRS TruBass, plus magnetically shielded full-range speakers and dual subwoofers. Use your iPod Mini/Nano/Shuffle or Video/Photo Players in the docking system with recharge circuit. Certified Apple ® iPod connectors installed, with motorized iPod docking drawer and automatic detect. Control your iPod using the function buttons and included remote control. Mount this unit on the wall (wall mount bracket included) for great sound all around your home. Features include digital tune AM/FM stereo radio with station memory presets, backlit LCD segment display with clock, timer and sleep timer. There's even a mini-USB jack for PC communication, and included USB cord. In Black

Retractable Clothesline Indoor Best Quality Kirby Sentria Prices Decide Now

Sunday, November 27, 2011

VIZIO VSB210WS Universal HD Sound Bar with Wireless Subwoofer

!±8± VIZIO VSB210WS Universal HD Sound Bar with Wireless Subwoofer


Rate : | Price : $218.75 | Post Date : Nov 27, 2011 05:27:55
Usually ships in 1-2 business days

Continuing to raise the bar in home electronics, VIZIO brings you the VSB210WS Sound Bar with Wireless Subwoofer. Designed for home theater enthusiasts, this sound bar is the complete audio solution giving you a wireless subwoofer that can be placed anywhere and cutting edge sound technologies such as SRS TruSurroundHD SRS TruVolume delivering the high-definition experience you’ve always desired. With a compact sound bar that integrates front and center channels and a wireless subwoofer, this premium surround sound system supports Dolby Digital, DTS, SRS TruSurround HD and SRS TruVolume for a truly immersive audio experience.

Buyers Karcher 3000 Psi Pressure Washer Ml830 Laser Top Quality

Thursday, November 24, 2011

Futuristic Web Design: What Does The Future Hold

!±8± Futuristic Web Design: What Does The Future Hold

It's taken a decade of baby steps, but the Web is finally starting to grow up. We've banished the bleak days of brochureware back when companies thought that scanning their annual reports page by page into half megabyte GIFs was the way to build an online presence. We've woken up from the nightmare of building sites from nested tables that wouldn't make the IKEA reject bin, thanks to browsers that (mostly) handle style sheets without leaving coders compromised. And, thankfully, most people have got over their infatuation with Flash for its own sake, realising that two minutes of whirling geometrics is the closest thing to turning your entire front page into a Back button.

Call it a Renaissance if you like but the only way is up, no matter what you want to bring to the Web. Design mavens can now stretch CSS, JavaScript and even Flash to their limits, while maintaining clean, lightweight, elegant sites that embrace different platforms and even shrink to suit the mobile Web. At the same time, those more interested in content don't have to sacrifice good looks for textual brilliance, and can draw upon publishing tools that make it easy for others to comment, contribute and collaborate online. Today's bleeding edge sites are driven by the wishes and wills of both their creators and their visitors: they're flexible, accessible and open to customisation. Most of all, they're user driven: while it's always been true that as much ego goes into building sites as HTML, we're starting to see grassroots projects that offer distinctive personal visions, while embracing what their audiences expect from the Web and what they bring to the Web. The portal builders' vision of the 'Daily Me' is evolving into the Webloggers' 'Daily Us' and there's plenty to like about it.

From interactive to inclusive

One of the earliest goals of site builders, back in what you might call the Web's Stone Age, was to put a bit of life into static, read only sites. The arcane world of CGI was (and still is) beyond the reach of most HTML jockeys, meaning that any browser based techniques to add interactivity tended to be pretty lame. Reading back a visitor's IP address or building a scripted form to pop up 'Hello Dave!' when you enter your name isn't really the height of technology.

Even until recently, there's been a digital divide between the bargain basement interactivity available to most site builders, and the customisation of higher end sites backed by dynamic servers and databases. Now, though, with the advent of smart site publishing tools, that sort of dead end 'interactivity' can be tossed in the bit-bucket. Ironically, though, much of the personalisation offered by big portal sites has also proved to be a false dawn. While being able to pick and choose news stories or multimedia streams seemed a big thing in the Nineties, in hindsight it seems shackled by 'old media' expectations too much like buying a newspaper for the sports section or wielding the TV remote control. What's emerged in the last few years, then, is a redefinition of what interactivity should mean for the Web, which draws upon the various forms of online interaction that already thrive, i.e. email, newsgroups, chat rooms and instant messaging. So it's time to put aside notions of dumb push button Interactivity' that cast the Web as some giant videogame, and instead embrace a new era of 'inclusivity', in which sites are built to enable complex interactions but on a very human scale.

Navigating into the future

Just over a century ago, designers created innovative 'navigation' schemes that proved potentially deadly for users; that's because they were designing the controls for the first generation of cars. it took years of competition, countless accidents and plenty of bruised egos before a standardised layout emerged. Trying to visit Web sites with funky navigation isn't as dangerous as driving with the pedals back to front, but the same principle applies: people come to expect stability from technologies as they mature, even if the right way isn't always the best way. So while there's still tremendous freedom to come up with radical approaches to Web based navigation, forward thinking site builders tend to focus more on refining the well worn models of operating Systems and popular sites sidebar menus, horizontal tabs and clickable 'breadcrumb' trails so they work better, cleaner and more efficiently.

If you've kept away from the more arcane aspects of CSS, you'll be amazed at the power and flexibility now available to create stylish navigation elements, complete with tabs, rollovers and submenus, without recourse to image files, complex scripting, Java or Flash. That's not to say that Flash should be entirely off limits just be careful that you don't sacrifice basic usability, such as the ability to bookmark deep links of use the browser's back and forward buttons to cycle between pages. And remember that users with disabilities or behind proxies may be denied access. In short, it's best to avoid using Flash for primary navigation, and save it for special occasions.

While the look and feel of Web navigation may be stabilising, it's certainly not stagnating. That's thanks to the growth of user centred architecture, which tries to avoid the old habit of dividing sites into layer upon layer of sub directories. Whether mimicking a corporate hierarchy or the folders on a typical coder's hard drive, the multi layered approach too often leaves visitors not knowing where to look for information, of frustrated at having to dig so deep. Instead, user centred site building tries to anticipate the needs and questions of visitors, whether new to the site or familiar with its workings.

Plug-in participation

There are plenty of dynamic components freely available for personal and small scale sites, which can add some all-important stickiness that mysterious quality that encourages visitors to return for future visits. A simple way to get started is to add an opinion poll to your site. Another popular way to attract visitors is to include Flash or Shockwave games, puzzles and quizzes on your pages.

Care in the community

While you can take advantage of other people's generosity to add some sparkle to your own site, that should only be a starting point. After all, the stickiest thing of all is the promise of regularly updated original content. If visitors can't go anywhere else to get their daily fix of your wit, wisdom and creative sparkle, you can guarantee they'll come back for more! The ability to update sites on a regular basis, without elite design or programming skills, has transformed the Web in recent years. Allowing visitors to comment and contribute takes things a step further, creating a truly inclusive online environment. We're talking weblogs of course.

Many coders complain that the profusion of blogs has lowered the standards of Web design, creating a divide between those who care about the look of their sites, and those simply interested in knocking out a dozen posts a day and it's true that most blogs follow familiar multi-column layouts built on standard templates.

What's undeniable is that blogs are tuned to the way most people browse the Web these days: by putting the latest content up front and being simple to navigate, they're especially easy to track and bookmark. They also work especially well with Google by being rich in text based content one reason why Google bought Blogger. And there are enough examples of beautifully designed blogs, such as Loobylu to prove that you don't have to sacrifice graphical and coding skills to create a site with rich, original content that people want to visit again and again. If it's stickiness you're after, the world of blogging is like a giant vat of honey.

The biggest advantage of building sites around the blogging model is that they come with a vibrant Community waiting in the wings. This is most obvious with sites that make it easy for users to add pictures, mood icons and the all important commenting facility to their entries, and allow users to join 'communities' based upon common interests. Admittedly, many sites look a bit like your eccentric uncle's DIY projects, but there's plenty of room to tart up your design, and the site's publishing tools make it incredibly easy to become part of a community, or for other users to keep track of your individual posts and add their own comments.

The most vibrant community orientated sites right now tend to combine original content, collaborative authorship, user comments and plenty of external links, all wrapped up in clean, up front designs. While many community driven sites are backed by Weblogging tools, the old style bulletin board is still worth a look.

Building for broadband

Getting more adventurous, building for users with higher bandwidth allows you to offer background music and Flashheavy interfaces that capture the distinctive identity and purpose of your site. Right now, the best examples of this are on sites where 'old media' producers radio, TV and the music industry have adapted their work for the Web.

The blue-sky future

So, where does the future lie for the Web, as broadband becomes the norm and community driven sites become increasingly prominent? Is it to be found in the text rich world of blog based sites, or in sites that bring ever more layers of rich media to the Web? Well, it's safe to say that both will have their place. While Google remains the primary tool for most users in digging out the information that matters to them, the pre eminence it gives to blogs and similar content heavy sites will keep them popular. At least it will until Flash designers have the technology at hand to build sites that are as easily incorporated into Google's rankings as those working with simple HTML, or until Google or another search engine becomes sophisticated enough to classify and index the growing amount of Web content that's in audio and video format. That day may not be too far away. As the tools to create rich media content cease to be the privileged domain of top end professionals, thanks to the growing consumer market for sound and video editing tools, there's likely to be sufficient demand (and smart enough programmers) to start remapping the Web as something more than a world of text heavy pages. Instead, look for the capacity and influence of CSS to increase, as it provides both Google friendly simplicity and the potential for graphically rich user interfaces.

Looking back at the predictions made at the end of the Nineties, it's fair to say that the Web has developed less radically in the past five years than most designers expected. Many hyped technologies, such as XML and scalable vector graphics, have yet to catch on in a big way. This is due in part to the stuttering development of browser technology to adopt new standards, and in part because consolidation replaced innovation in the years following the dotcom crash. Now, however, with new attitudes developing towards site design and the technologies in place to implement them, we're likely to see a new creative spirit embrace the Web in which both the inclusive spirit of blogging and the convergence of rich media have a part to play, together with other interactive tools such as instant messaging.

Is this likely to mean that site builders in five years' time will need to be smarter and more creative than today? Perhaps. But the tools at their disposal and the space they'll have to work in will also have been transformed to make it easier to get their creative visions online. It's already possible to update and contribute to sites through your mobile phone. We are now looking at uploading and accessing high resolution streaming video, or dictating and receiving site updates while on the move. Site interfaces will evolve to reflect that the Web is bursting out from being 'something that's on our computers', and becoming part of our everyday lives. Designing for that sort of online experience is going to be light years away from knocking together a menu bar for your personal Web site. Just don't be worried about being left behind. It's the ambition, skill and imagination of site builders that has got us to where we are today, and it's those qualities that will transform the Web in the years to come.


Futuristic Web Design: What Does The Future Hold

Purchase Olay Coupons To Print Lowest Price Silpada Jewelry

Monday, November 21, 2011

Finding and Living on Mountain Land

!±8± Finding and Living on Mountain Land

Much Mountain Land Can be Great Farm Land and Found Using A Property Finder

Although it would sound much cooler if I was to try to bill myself as an expert here, the truth is we are learning this together. I come from a computer programming background. Everything in programming is about solving some kind of problem. But right now, our current problem is that we want and need to acquire some mountain land. So, we will suppose we would like to find a particular kind of mountain land. I will assume that we are not looking for the mansions of Dynasty here, so lets just go with trying to find some land in the mountains that would be good farm land, a secluded place that would lend itself to my hermit ways, some place that would have good acreage (at least five acres), and it would be good for solar power or wind turbine power. Off-grid acreage is generally cheaper, and we remember that we did not want to spend a fortune, right?

I will start off with the most basic methods we can use to find land. Understand that if you go to a major search engine like Google and just type in "Mountain Land," you are going to get everything but the kitchen sink. We want to qualify that a little bit, so instead lets type in this phrase: mountain acreage off-grid

Using this search, we will find about 143,000 results, but even this may not be all we want, but we can start with this search. Some of these properties will come up with cabins and sheds and the whole bit for a hefty chunk of change because they are all of the above. They are off-grid. They are on acreage. They are on a mountain. Our problem is that some of these listings qualify for all these search terms, but because they are fully developed, they are more expensive.

I am not saying this is bad. If you want to save yourself a lot of work and you have the money to pay for most everything already being done, be my guest. There are a million ways to do this, and that is one of them. Yet, most of us will want to save that money and spend it in sweat equity instead. Many of us will use the land for camping just starting off. Maybe we will also try to get the ground ready to use for farm land, or we may find that we have to bring in river bed soil in order to grow crops. This is to say that not all of us will be wanting to build a dwelling right away. Many of us will also want this land to be unrestricted. This also saves in fees and taxes.

Off-grid land is almost perfect for this because they are usually so remote that nobody has gotten around to restricting the property.

There are many great Guides To Buying Land, and before I spent thousands of my dollars on something I will have to put up with forever, I would certainly invest the money in a book or two to read about those pitfalls of land buying that I may not know about. There is plenty I do not know, and it will save you and me plenty of money to admit this fact up front and always be willing to learn about things that we were not educated enough to ask the right questions about.

The first site I see listed on Google, I visit. I see off grid land there, however, it is listing 1.25 acres. It is somewhat cheap. ,995 for 1.25 acres that is in the middle of nowhere is not bad. It probably does not fill the bill though. We want enough land that we may be able to keep poultry, some animals, and do some agriculture on our farm land. There are several items this property does fit the bill for, like the seclusion to be a hermit if I want, mountains, or even a great place for camping.

The next phrase I use in Google is: raw mountain acreage off-grid

Now we are getting somewhere. The very first web site result is a property finder that lists 10 acres in the high desert in Nevada at the top of the page.

They want ,900 for it. This is a remarkable price at ,490 an acre! Ten acres is enough to get great wind for a wind turbine or sun for solar panels to live off grid. You can grow great crops on this parcel because the land looks like good farm land and does not look like it has a lot of water runoff. We cannot know everything we need to know about this parcel until we contact them. But this result would be a great place to start our inquiries if we have cash in hand and are ready to buy.

The next place I found was, get this, 40 acres for ,900! Wow! I can get 40 acres of land in Arizona, with vegetation and nice trees cheaper than I can buy most vehicles. Remember, this is only the second search in. We have not even started digging yet. You may not need 40 acres. But when I think about sitting in a cabin with a 20 acre margin on all sides, that sounds incredibly sweet to me.

Just using the search terms above, I am finding land situated in the mountains like crazy. This can be for camping, residential land, an agriculture property, and while it is not free, it almost is. This was just a simple search using the first property finder that came up in Google.

Mountains can be a wonderful place for the modern hermit.

As I used an online mortgage calculator for the parcel we listed above. I found that with 6 percent interest for 20 years, I could expect to have payments of 4 a month. If I added another 0 to that monthly payment, increasing the payment to 4 a month, I could expect to pay the land off in just 10 years. Of course, you could, if you have it, just pay cash. The total yearly taxes are 8. I would almost say you cannot beat that, but I would be incorrect, because you probably could.

This land would be fantastic for camping and becoming a hermit full time. All I would need would be a small stipend that could easily be done with part time work, or a nice little web business. If you are a hunter and you find a good spot in the mountains, you may find yourself with an appetite for big game, which can stock a freezer for a couple of winters.

What we are trying to escape here is the daily grind of a city bound job where you go into cubicle nation which is really just a prison with cheaper bars around you. Mountains lend themselves to the seclusion that a hermit needs and wants.

Do not let society sell you on the bad connotations that the word hermit brings. Some of the greatest people I have ever known were hermits. They were full of wisdom and really had a life rhythm that was relaxing to simply be around.

Although television likes to seed your mind with imagery of the hermit who sits outside on the porch with his shotgun to get after them revenuers, most just want to mind their own business. They do not want to mind anyone else's business, and they do not want anyone to mind theirs.

They are hard workers who have farm land to develop. They live everywhere. They live in the mountains. They live in the hill country. They like camping. And, a hermit who has not found his land yet, may live next door to you. If you and I are neighbors, then yes, you live next door to a hermit.

If you have ever had enough of the noise, if the kid's screaming ever got on your last nerve, and if you have ever gotten claustrophobic in a public place like a concert or a shopping mall at Christmas, then you, too, are a hermit at times. I am constantly amazed by the city dwellers I meet who intrinsically believe that they are somehow better than the hermit. To them, the reasons are so obvious as to why they are superior beings, that when pressed closely for the explanation to this superiority complex they have, they stare at you blankly, and are unable to answer. To them, you must have come from another planet if you do not understand why being a recluse is such a horrible thing.

But that's ok, because you understand what a horrible thing it is to have to live like a bee in a beehive, always having to listen to someone else's buzzing in close proximity.

Nope. There isn't a thing wrong with being a hermit. Currently, I am a hermit without a place to be isolated. But it will happen. This will strike a resonant chord with most of you. Some of you will never feel that way. That is really OK, because I do believe it is an attribute which you either have or do not have. I do not think becoming a hermit is an acquired taste. I could be wrong. Maybe it comes with age. But for me, the feeling of being miles from the nearest human being is a feeling of sublime freedom.

Your Property in the Mountains, whether for Residential Property or Camping, can be Cheaper.

As I said before, when you are looking for land that is off the beaten path, miles away from the nearest on-grid power source, you can find land on the cheap. Again, at first you may only use this land for camping while you still live in the city. Everything does not have to happen at once. It rarely does, anyway.

Of course, that is not to say you will not use it as residential property to start with. However, you may find that you do not quite have to be right up to code with your dwelling because in many cases, depending upon your square footage, you will not have to comply with many of the building restrictions that accompany larger houses with on-grid property. It is here, in the wilderness of these mountains that you will need to be well versed in The Self-Sufficient Life and How to Live It. No worries there though. All you need is a little grit, a little study, a little determination, a little practice, a few financial resources, and a lot of time.

You have seen how much cheaper the land can get. It really all depends on how nice you need the property to be as well. There is land in West Texas and other desert property where the prices plummet even further. You may have a hard time with acidic soil (not good for growing food), or you may find water at a very deep depth (if at all). But if you can get these items in some other way, there are literally thousands of acres for sale in places that are priced in the mid-range hundreds of dollars per acre.

While there are tons of parcels of land out there available as cheap property, we should be aware that whatever it is we buy, we will be with it for a very long time, for the rest of our lives in most cases. That is why it is so important to have a list of criteria that you have in mind for your land in the mountains. Your prospective land must meet at least most of these criteria, or you will never be happy with your purchase. And the one horrible thing about that is that if you are not happy with it, nobody else will probably want to buy it either. So do not get stuck with a property you do not want.

I wrote a land calculator in a spreadsheet that had a list of criteria I liked about my ideal land, and then I grade other properties I am looking at. I compare the two scores and see where the deficiencies are. We have mentioned the land calculator in another article, but the main idea here is that we have to have a list of these criteria. Otherwise, we will let our emotions make the purchase for us, and most of the time, that will not be good, or logical.

Looks like I need to find a way to make more and save more money. It helps if you are not rooted to any particular geographical area, because then you can move to where the great prices are, and not have to wait for some bargain to pop up locally. Thing is, if you are in an area where land prices are somewhat inflated, you can just about forget finding a property at a bargain basement price. So my advice is to be flexible enough to move to where the good prices are.

Mountain Land can be your Farm Land, a Hermit Getaway, Good for Camping, Cheap, and Full of Solitude.

Whether you want your land in the mountains to go camping, for agriculture and farm land, to become a hermit, or just to say you own some property in the mountains, we must always remember that this is something of a spiritual quest.

Your land in the mountains is a place that you will always think about when you need respite, a refuge from the storms of life, a place to get away from it all, and yes, a place, if you want, to become a hermit. Certainly you do not have to give an arm and a leg for it. Really, your price of land depends largely on how accessible to civilization you want it to be. Most of those who read my articles are those who are trying to get as far away from civilization as they possibly can.

Whole treatises and books have been written on the merits of Peace and Solitude, so I will not attempt to adequately cover them here. But, it would seem to me that if you have gotten this far, then we are kindred spirits. We are ready for this adventure. We must have a bit of wisdom and not just a wispy dream.

It stands to reason that we should know as much as we can about our subject and what we are getting ready to spend our hard-earned, and often unreplaceable money on. So be careful. There are always as many people willing to unscrupulously receive your money as there are places to spend it. It behooves us to know what we are doing for this reason, if for no other.

I know some of my most peaceful times in life have been after I hiked up the back side of Lookout Mountain in Chattanooga, Tennessee for a 4 day camping trip. It would take me about an hour and a half to summit on the back side, and I would be standing on an old Civil War railroad trestle. I could see 7 states from where I stood. The vistas were amazing. I wanted to stay there forever. Then I would hike on back to the 130 foot LuLu waterfalls where I would camp out and fish. It was truly beautiful.

And isn't that what we are really looking for? Are we looking for the beautiful life?


Finding and Living on Mountain Land

Discounted Trademarking A Slogan Disney Vacation Club Resale Quickly

Sunday, November 6, 2011

Intranet

!±8± Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.


Intranet

Saucony Cohesion Decide Now


Twitter Facebook Flickr RSS



Fran�ais Deutsch Italiano Portugu�s
Espa�ol ??? ??? ?????







Sponsor Links