Showing posts with label similar. Show all posts
Showing posts with label similar. Show all posts

Saturday, 20 February 2016

Slow Transfer Speeds with TeamViewerIn Feburary 2016 20,

In Feburary 2016 20,
Both your Internet speed and the recipient's Internet speed determine how quickly a file transfers between computers. On your end, as the sender, the speed is determined by your upload speed. Unfortunately, U.S. service providers have plans with high download speeds but only offer a small fraction of that speed for uploads. The speed is also hindered by the recipient's download speed. If you have an upload speed of 4Mbps but the recipient only has a download speed of 3Mbps, you won't be able to take full advantage of your speed.
Available Bandwidth
Similar to the network speeds, you can only use so much bandwidth at once. If you're also hosting a video conference in TeamViewer, downloading files in your browser, streaming video or playing an online game, the speed of all your online applications suffers. Turning off any other bandwidth-heavy applications increases the bandwidth dedicated to your TeamViewer file transfer.
Opening a Port
For transfer speeds that fall significantly short of your maximum, you can try opening a port on your router to allow TeamViewer traffic to pass through unimpeded. For the most part, TeamViewer uses HTTP ports -- ports 80 and 443. You can also set TCP port 5938 open for outgoing traffic. If you're using a firewall, allow TeamViewer to communicate through your firewall. Windows comes with a built-in firewall; you can manage the settings by opening Windows Firewall in the Control Panel.
Connection Types
If either computer involved in the transfer is connected via a wireless connection, the transfer speed isn't going to be at its peak. Wireless connections lose speed, with significant loss the farther you get from the signal source. Some routers also see a loss in speed due to power settings that reduce power usage and thus output. For the best possible connection and transfer speeds, connect both computers to the Internet via Ethernet cable.
In Feburary 2016 20,

Thursday, 18 February 2016

Advantages Disadvantages of Normalizing a DatabaseIn Feburary 2016 18,

In Feburary 2016 18,
Databases can hold a significant amount of information, perhaps millions or billions of pieces of data. Normalizing a database reduces its size and prevents data duplication. It ensures that each piece of data is stored only once.
Groups Data Logically
Application developers who create applications to 'talk' to a database find it easier to deal with a normalized database. The data they access is organized more logically in a normalized database, often similar to the way in which the real-world objects that the data represent are organized. That makes the developers' applications easier to design, write and change.
Enforces Referential Integrity on Data
Referential integrity is the enforcement of relationships between data in joined tables. Without referential integrity, data in a table can lose its link to other tables where related data is held. This leads to orphaned and inconsistent data in tables. A normalized database, with joins between tables, can prevent this from happening.
Slows Database Performance
A highly normalized database with many tables and joins between the tables is slower than a database without those attributes. Many people using a normalized database at the same time also can slow down database speed. In some cases, a certain amount of denormalization of the database may be required to improve database speed.
Requires Detailed Analysis and Design
Normalizing a database is a complex and difficult task. Large databases with considerable amounts of information, such as ones run by banks, require careful analysis and design before they are normalized. Knowing the intended use of a database, such as whether it should it be optimized for reading data, writing data or both, also affects how it is normalized. A poorly normalized database may perform badly and store data inefficiently.
In Feburary 2016 18,

Thursday, 11 February 2016

What Are the Benefits of FTP?In Feburary 2016 11,

In Feburary 2016 11,
Files are uploaded to an FTP server. The server has a large memory capacity to host the files available for transfer. Files can be accessed through any Internet browser or any FTP software, referred to as a 'client.' Sometimes files are available permanently, but oftentimes, especially through a company, they may be available only temporarily. Check with the administrator to find out whether there is an automatic delete time frame.
Access
One way to access these files directly is to use the FTP address through an Internet browser. The address will be similar to a website address, except instead of 'http://,' it will begin with 'ftp://.' You may need a login ID and password to access some FTP sites, which will typically automatically pop up in a dialogue box.
Inside an FTP Site
Once you're logged in, there will usually be a file structure, with main folders and subfolders, similar to what you may have in 'My Documents' on your computer. This structure is set up by an administrator. Folders and files may be public or private, and access may include adding, moving, editing and/or deleting; so, if it seems like you can't do something, check with the administrator about the limits to your access.
'Hidden' FTP
However, when downloading from the internet, the FTP site is probably using an anonymous login, which is why you may have never known it was happening. The FTP address itself is usually hidden from the end user, though the file transfer process is the same.
Easier Access
If you start using an FTP site regularly, find yourself with multiple IDs or just want an easier access point, then an FTP client is something to consider. There are many free options available. It makes uploading much easier and protects downloads---simply drag and drop. It will store all of your frequented FTP sites, along with their respective logins and passwords, in one convenient place. Check out the resources below for a start, find one that suits your needs and preferences, and let the file transfers begin.
In Feburary 2016 11,

Thursday, 4 February 2016

What Is a Port Scan Attack on a Computer?In Feburary 2016 04,

In Feburary 2016 04,
A linear port scan involves scanning every port on a system. Internet Protocol ports use a 16-bit numbering system, which means a total of 65,536 ports can exist on a single IP address. A liner port scan will scan all of these ports to see which ones are open, closed or hidden.
Random Port Scan
A random port scan is similar in concept to a linear port scan. However, with a random port scan, only a specified number of random ports are scanned instead of all of the available port numbers. The reason for doing this is to speed up the scan, particularly when the attacker is scanning multiple computers in attempt to find vulnerabilities. With a random port scan, if any of the scanned ports are found to be open, the attacker will investigate that computer further.
Well-Known Service Port Scan
Many services run on established 'Well-Known' ports, such as ports 25 and 110 for e-mail, 21 for FTP and 80 for the Internet. A port scan that only targets well-known ports is similar in concept to a random port scan, except the port numbers are predefined instead of random. Like a random port scan, if any of the tested ports are found to be open, the attacker will investigate the computer further.
Reconnaisance
After the specified method of port scanning has completed, the attacker views the results and further investigates those computers containing open ports. When a port is found to be open, it means that some type of service is running on that port, and there's a chance that the attacker can exploit it for the purposes of gaining remote access to the computer system. With a proper access exploit in place, an attacker could potentially gain control of the computer system.
In Feburary 2016 04,

How to Backup Windows to FTPIn Feburary 2016 04,

In Feburary 2016 04,
Click the 'Start' button. These instructions refer to Windows 7. You can perform this task following a similar method for all versions of Windows.
Click 'Control Panel.' Go to 'System and maintenance.' Open 'Backup and Restore.'
Click 'Set up Backup.' Enter an administrator password once prompted. Choose which files you wish to back up. You can back up all the files on the computer, an individual user's files or a manual selection. Next, choose 'FTP' as your method of backup. Hit 'Back up now' to begin the backup operation. Do not interrupt the process.
In Feburary 2016 04,

Monday, 1 February 2016

How to Tell if MySQL Is 32In Feburary 2016 01,

In Feburary 2016 01,
Open a terminal or access the command line on the server your MySQL database is installed on.
Type 'which mysqld' to locate where the database is installed. The command line will return a path similar to '/bin/mysql.'
Type 'file ' into the command line and press 'Enter.' Replace '' with the installation path found in the previous step.
Examine the data returned by the system. If you have a 32-bit version of MySQL installed, the line will begin 'ELF 32-bit LSB executable.' If you have a 64-bit version of MySQL, the line will read 'ELF 64-bit LSB executable.'
Query the Database Version from Within MySQL
Run MySQL and use the MySQL query command line to determine the installation version.
Type 'SHOW GLOBAL VARIABLES LIKE 'version_compile_machine';' into the prompt and press 'Enter' to execute the query.
Examine the query results to determine the version of MySQL you are running. A 32-bit version will display 'i686' in the results next to 'version_compile_machine.' A 64-bit version will display 'x86_64' in the results next to 'version_compile_machine.'
In Feburary 2016 01,