Blog

Selasa, 19 Oktober 2010

Wireless Network Monitor - The Promiscuous Mode

The Promiscuous mode is a specific receive mode for network-technology devices such as wireless network cards. It is normally used for packet sniffing and bridged network for hardware virtualization. The frames include the MAC (Media Access Control) address of the hardware.
In this mode the device submits all incoming traffic to the network interface and transmits the data for processing to the operating system. Devices that use this mode can be combinations of switches and routers, network tester or even a normal computer with a connection to a network.
For Wireless LANs in promiscuous mode it will only forward the packets of the network (access points) to which the client is currently connected. The Promiscuous Mode is unsuitable to receive packages from a network which you do not own because you need to authenticate yourself with the network.
The opposite of this mode is the non-promiscuous mode. In this mode the unit handles only the packets addressed to it and this happens for example in Ethernet networks, the evaluation of the MAC address plus broadcast packets.
Another method of usage is to detect network connectivity issues. Some programs use this feature to show everything that is transferred by the network and some of them can transfer passwords and data in clear text. So a normal user should stay away of this mode to prevent that someone else could steal this data while the transferring process.
As you can see the Promiscuous Mode should only be used by advanced users to avoid any damage to your system or to open the door for hackers. But when you know what you are doing this mode is quite powerful and you can repair your network without any problem.
Of course not every wireless card drivers support this mode because of it's not a secure mode. If you need this mode you should watch out for another driver that supports the Promiscuous Mode. You can contact your device's manufacturer and ask for a new driver.

Five Basic Methods of Speeding Up A Slow Computer

As computers are used they will need certain maintenance and protection. Here are 5 things that technicians use to speed up slow computers.
1. Protect your computer from Spyware.
Spyware causes a lot of computer problems. These are programs that are installed onto your pc without your permission. They collect data about your browsing history, your personal passwords, email addresses, etc. and then sends it to outside sources. Not only does this create a security hazard but will slow your computer's performance by constantly running programs in the background of your computer. There are many good software programs available to help with spyware cleaning as well as future protection. This is an essential part of computer maintenance.
2. Use Windows disk cleanup tool to free up storage space.
You will find the disk cleanup tool in the Accessories under Tools. The majority will be internet files your pc has stored for faster browsing but need to be removed periodically to reduce the storage space being used.
3. Run the disk defragmenter utility to organize data.
By running the windows disk defragmenter you will streamline the route your processor has to go to find each bit of data needed to run your programs. Again you find this tool in Accessories under Tools. Run the analysis first to see how long it will take. You may want to do this during the night or when your computer is not needed.
4. Repair disk errors on your computer's hard drive.
Errors are simply the result of use. They happen at various times such as with online download failures, uninstalling programs, incorrect computer and program shutdowns, etc. This utility is found under My Computer. Right click on the C drive, then Properties, and then Tools tab.
5. Run a registry optimization software program.
Many technicians will recommend using a registry "cleaner" as a full-time optimization tool rather than doing the above 4 procedures. Computer users are just not going to stop and do the other steps as often as they should be done.

10 Basics of the IT Professional

Knowing just how to assign Internet protocol (IP) addresses to computers, detect wireless networks, format hard drives, or install printers to a network isn't really serious IT business. Fact is, it will be bizarre if you are unable to accomplish them, you may not be an IT Pro after all. I have identified certain areas that are rarely mentioned but may bring your career down if you are unable to them get done. Arguably, you were not taught in your school, but these are tasks that you need to know to save the situation and your profession.
1. MAP NETWORK DRIVE
This is one of the easiest tasks with one of the biggest benefits (at least in the eyes of the end-user). Mapping drives makes finding data on remote locations such as the server or a PC on the network so much easier for the user. And successfully mapping drives means you won't be called out again because the user can't seem to locate the data on the server any longer. The drive(s) when mapped successfully will be displayed in your computer.
2. MSCONFIG
(Microsoft Systems Configuration Tool) MSCONFIG is one powerful tool in the windows environment. It's a simple interface, which can change the behaviour of the computer. It has options that control the computer systems. i will discuss two options we will find in MSCONFIG.
i. Start-Up
Some software when installed on your computer, are enabled to run on start-up; meaning that, whenever the computer boots up, they will be launched in the start-up tray, ready before you call, and if you know the number of software that behave this way, then you can tell why your computer takes a very long time to boot. Now, this is one thing you have the option to change in MSCONFIG
ii. Boot Management
If you want to change the boot sequence, which drive boots first, i.e the CD Drive, USB Drive then the Hard drive, that can be changed in set-up. But probably your hard disk is partitioned with two operating systems, normally, during booting; it takes about 30 seconds displaying both options for you to choose. That's one of the things you can change here, the waiting time, even deleting the other Operating systems if you don't need it
3. CREATE WORKGROUP AND SHARING
This comes up very frequently. Even the accountant can ask you why you can't do something so that the computers in my officer can all print to one printer. Sharing resources How can that be done? Create a workgroup!
4. ADD A WORKSTATION TO A DOMAIN
Domain is the advanced level of workgroup. With the domain, not only can you see other computers that reside on the network, login credentials are contained on a single machine so users can log in from any machine on the domain. The process of joining a domain is similar to that of joining a workgroup. The only difference is there should be a domain controller on the network.
5. UNINSTALL ANTI-VIRUS
Installing anti-virus is not a yo-man's job, most of them are very complicated uninstalling them, considering the fact that they have quarantine folders separated, certain processes may be running in the background which may have to be stopped. Live update as well may be uninstalled separately.
6. REPLACE HARDWARE COMPONENTS
There are some people who, when faced with replacing a CPU, will toss up their hands and tell their boss they have to purchase a new machine. These days, even purchasing a hard disk comes with some trouble, gone were the days when we only had the IDE to use, now there's the SATA and it comes in several speed from 1.5Gb/s to 6 Gb/s. Faster USB 3.0's are now replacing the 2.0's and so on.....
7. ESTABLISH A REMOTE CONNECTION
Have you ever sat in your office to administer a problem on a client's computer remotely? Try it. Right click My Computer and click Properties, on the Remote Assistance option, check "Allow Remote Assistance Connection to this Computer" (this must be done on the client computer). Remote connections are the reason some servers don't come with monitors. What are you going to do in the server room when you can actually have access to it from you local computer?
8. BACK-UP & SYSTEM RESTORE
i. These days, back-ups are part of the daily routine of the IT Professional. Creating an effective back-up schedule of files and retrieving them when needed
. ii. One other thing is that you may one day have to restore your computer to an earlier point to over-come some persistent software misshapen. Creating a restore point in system restore is the remedy
9. Run CHKDSK CHKDSK
you may think is defunct, but you can prove a point with some old computer with bad drive sectors on the hard disk. Mind you it's still an effective windows command and I still run it.
10. RESTORE "TASK MANAGER DISABLED BY YOUR ADMINISTRATOR" ERROR
I usually come across this situation on Computers where the users have a bad attitude on the internet clicking every pop-up and adverts just because they are free! They end up infecting spams and Spywares to the workstation which slows down the systems and disable certain vital commands that can be used to eliminate them. The task manager is a victim to such attacks and when you right-click the task bar to open task manager, the system tells you, Task Manager has been disabled by your Administrator.

Minggu, 17 Oktober 2010

Service Driven Innovation in Healthcare

This month's edition of Harvard Business Review features an article on service driven innovation at Kaiser Permanente. Kaiser is well known in the healthcare industry as a leader in applying IT to improve quality of care and producing better business results. The organization routinely outspends its peers on IT as a percent of revenue and has always rejected the fee for service model that is often blamed for excessive healthcare costs across the industry.
What struck me as interesting about this article is that innovation initiatives are typically associated with expensive, top down endeavors aimed at producing new product categories. The approach at Kaiser is different in that the focus on service driven processes means that innovation can be done rapidly and economically. One example that is cited examines the process that nurses follow to exchange information between shifts. The status quo process took 45 minutes or more and delayed the arriving nurses first contact with their patients. This not only wasted time, but also often resulted in inaccurate information exchange, as well as unhappy patients. After analyzing the process and engaging the nursing teams, a simple breakthrough was identified that called for information exchange to take place with the patient's at bedside rather than at the nurse's station. This new process, coupled with supporting software to compile information in standard format throughout the nursing shift, led to much improved quality, staff satisfaction and increased quality of care.
To ensure that the service innovation process takes hold throughout the KP organization every project includes a "change package". The package consists of a concise set of guidebooks describing the innovation, the process by which it was developed, the benefits for staff and patients and the metrics used to evaluate performance over time. Several versions of the package are targeted at line of business leaders, project managers and frontline staff.
I think this process of service driven innovation can be applied successfully in the information security domain. Incident response is one area that comes to mind. The process calls for coordination with many groups within the organization and the quality of results are driven as much by the thoroughness of the process preparation as the technical methods employed. Another area calling for process innovation is application security. The risk to the organization is acute, but often IT and information security teams get bogged down in reacting to the latest vulnerabilities rather than following a process to reduce risk and liability to the business.

Professional Android Application Development

Professional Android application development is a multifaceted science. Not only must the programmer understand the nuances of the Android programming specifications, but he or she must also consider how to creatively prepare the app to be widely adapted by users worldwide. So much more than simply writing code, professional Android app development involves a myriad of other factors. These include, but are not limited to:
• Conceptualization - The programmer must first decide whether the concept will be embraced by Android users. Does the app meet a current need? Are there any similar apps out on the market currently that feature the exact same attributes? What will this app's competitive advantage be? Once the talented developer answers the above questions, he or she can then begin to envision how the app will truly work. Though some people believe developing apps is purely analytical work, that assessment could not be further from the truth. This process must begin with concept and end with successful application.
• Ease of use - The most aesthetically pleasing app lasts mere minutes in the Android marketplace if it is not simple to use. Today's consumers simply do not have the patience for an app that involves too much setup time. Apps that are intuitively designed are embraced, and apps that are difficult to figure out are quickly erased.
• Actual development - A talented professional Android application development master designs apps that are developed well. They are pleasing to the eye, serve an actual purpose and meet consumer needs in some way. What's more, the actual code is written flawlessly.
With all of these factors in mind, it should now be clear that Android app development is not a simple science. Those who strive to master the process are creative, technologically minded, and think ahead.
Find the perfect Android app developer for your Android app project. All recommended Android app developers are reputable & have proven experience in their niche.