Friday, November 16, 2012

thumbnail

Portronics iLume projector launched for Rs 39,900



Portronics iLume projector launched for Rs 39,900


Portronics has launched the iLume multimedia pocket projector. As per an official statement by the company, this LED-illuminated projector comes with built-in speakers, and requires no additional sound magnification device for home entertainment use. It is based on DLP technology by Texas Instruments.

iLume gives you ease of convenience and freedom from calling for technical help to install the projector every time that you wish to use it. If you can dream it, iLume can probably do it.


Portronics iLume projector launched for Rs 39,900

iLume weighs around 650 grams. It comes with a brightness of 400 Lumens. It can project an image more than 120 inches long on the wall with the projection distance ranging from 0.5m to 5m. It has a Resolution is 1280 X 800 pixels, and can support 1080p and 720p formats.

iLume provides a connectivity port to connect to devices: VGA/ HDMI port to connect to laptops and desktops; AV port to connect to set top boxes to view television; HDMI connector to connect tablets and smartphones; and USB connectivity to connect to USB drives and directly play multimedia content without the use of laptops. Additionally, it has a microSD card slot to help project content directly from a microSD card, or a camcorder, or a camera using an AV cable. As per the official statement by Portronics, the life of iLume LED Engine is more than 20,000 hrs.

Portronics’ new iLume projector has been priced at Rs 39,900. The Portronics iLume Projector is available across the country. The projector has no maintenance cost.

In February this year, Portronics announced the launch of the battery-powered POR 315 Pico projector. The palm-sized POR 315 Pico projector enables one to view content with an additional HDMI input, with a resolution supporting 1024 X 600 pixels.

Priced at Rs 23,000, the Portronics POR 315 Pico projector is available ex-stock across the country. It seems to have quite a few features packed under its miniscule body.


Read morehttp://www.unp.me/f140/portronics-ilume-projector-launched-for-rs-39-900-a-99857/#ixzz2CMXPoDBU

Monday, November 12, 2012

Friday, November 9, 2012

thumbnail

Firewall (History)

History of Firewall:

There was no one particular biological father for firewall, lot of people are involved in developing firewall technology, William Cheswick and Steven Bellovin wrote a book on firewall at AT&T Bell Labs and they built packet filtering technology and circuit-level gateway. David Pensak named first for building successful commercial firewall and Nir Zuk says that he has developed the firewall technology which is used in all firewalls today.

The first firewalls were developed by the Digital Equipment Corporation (DEC) back in the late 1980s.
These early firewalls operated mainly on the first four layers of the Open System Inteconnection (OSI) model, intercepting traffic on the wire and inspecting the properties of every indivdual packet to determine if they matched a confirured set of rules (source and destination address and port numbers for example). These packets would then either be dropped or forwarded as appropriate.

This method of traffic inspection, while repid, was soon found to be unnecessarily resource intensive and led directly to the introduction of cirucuit-level firewalls, later known as "stateful" firewalls, pioneerd by Check Point Software Technologies.

Generations of Firewall:

First Generation of Firewall:-

The first paper published on Firewall Technology was in 1988, developed by DEC as filter system named Packet Filters.
In beginning firewalls are based on router which examines the destination address of received packets, when a packet is received the header of the packet is copied to the routers CPU and compare with the router rules based on filtering rules, if packet satisfies all the rules then the packet is forwarded or else it will be dropped and a message will be sent back to the system so that no more packets will be sent.
Second Generation of Firewall:-

Second Generation of firewall Technology was in 1989-1990. Janardhan Sharma, Dave Presetto, and Kshitij Nigam at AT&T Bell Laboratories from 1989-1990 had developed second generation firewall which is known as “Satefull Firewall”. This firewall will prevent from denial-of-service attacks.
 Third Generation of Firewall:-


Third Generation of Firewall Technology was in 1991 which is Application Layer Firewall. Marcus Ranum and Bill Cheswick explained third generation firewall which is known as application firewall, it is also known as proxy based firewall, which operates at application level and inspects the inflow and outflow traffic and blocks inappropriate contents like virus and so forth.

Subsquent Development:-


Bob Braden and Annette DeSchon in 1992 were found a product named “visas”.An Israeli company named “Check Point Software Technologies” in 1994 found a ready to use software knows as “FireWall-1”.Present “Internet Engineering Task Force” (IETF) which is working for managing firewalls.


Thursday, November 8, 2012

thumbnail

Firewall (Basic Introduction)

What is Firewall?
Firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewall are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
The job of a firewall is use filtering to prevent unauthorized data from entering the network and restricting the data that can be sent out.
Firewalls can be hardware devices, which are dedicated single-purpose computers that run proprietary software, or they can be software-only packages that are installed on a regular PC running on top of on operating system like Windows or UNIX. Hardware firewalls tend to be more expensive (since you’re buying both hardware and software) but also usually offer better performance. Firewalls use NAT or router software to get data to the appropriate internal computer after checking it to ensure that the filtering rules allow it to go through

Firewall Filtering

Firewalls can filter data at different levels (different layers of the OSI networking model). The most common filtering methods are:
  • Packet filtering, which works primarily at the network layer
  • Circuit filtering, which works at the transport layer
  • Application filtering, which works at the application layer
Packet filters examine the information in the IP packet headers of messages and make the decision as to whether the data is allowed in (or out) based on that information. Thus packet filtering allows you to designate specific IP addresses (or host or domain names) that will be specifically blocked or specifically allowed. Filters can also process information at the transport layer (TCP and UDP port numbers). Specific ports can be blocked or left open. Because particular services use specific ports (for example, POP 3 incoming email uses port 110), this allows you to prevent specific types of data from entering the network (in this case, incoming POP3 email). There are two types of filtering, static and dynamic. With dynamic filtering, the necessary ports are opened up only when a communication is actually taking place, rather than staying open all the time. As soon as the communication ends, the port is closed.

Friday, October 19, 2012

thumbnail

Disable user access to IE proxy settings

Hello friends, Today we will going to learn how to disable user access to IE proxy settings. Proxy settings  are provide a interface between public to private network internet access. We will set security to access particular website or webpage.
Now we are going to disable the proxy setting to access by user. For this we are going to use group policy.
So are you ready for learn to disable user access to IE proxy settings follow the step given bellow..

Step 1:- Open the run command and type gpedit.msc and click ok


Step 2:- A wizard will open as show below click on User Configuration


 Step 3:-  Click on Administrative Templates





 Step 4:- Now click on Windows Components come under Administrative Templates



Step 5:- Now click on Internet Explorer



 Step 6:- Now in Internet Explorer click on Disable Changing proxy settings


 
Step 6:- Double click on Disable Changing proxy settings  a wizard will open as show below, click on Enabled





Step 7:- Click ok and close the group policy wizard and log off the system and again log in.

Now user can't change proxy on IE. Try it and do you have another method to block it then let me know. I'm waiting your comments.

Wednesday, October 17, 2012

thumbnail

What is Steaming Media



Steaming Media:-
Streaming media is video or audio or both transmitted over a computer network for immediate play. You don’t to first download the file and then it play. The Example of streaming video and audio include Internet radio and television broadcasts, and corporate webcasts.
Streaming Video came about mainly due to the limitations of dialup Internet connections being too slow to show video. Back in the days before cable or broadband access, if you wanted to watch a video, you had to download the entire video before you could watch it  and on a 56k modem that would take forever!
So the technical bods created a technology called "streaming."
Here's Wikipedia's definition:
" ... multimedia that is continuously received by, and normally displayed to, the end-user while it is being delivered by the provider."


How to use Steaming Media:-
High bandwidth network connections are generally needed to work with streaming media. Specific bandwidth requirements depend on the type of content. For example, watching high resolution streaming video requires much more bandwidth than watching low resolution video or listening to music streams.

To access media streams, users open their audio / video players on their computer and initiate a connection to a server system. On the Internet, these media servers can be Web servers or special-purpose devices set up specifically for high-performance streaming.

The bandwidth (throughput) of a media stream is its bit rate. If the bit rate being maintained on the network for a given stream drops below the rate needed to support immediate playback, dropped video frames and/or loss of sound results. Streaming media systems normally use real-time data compression technology to lower the amount of bandwidth used on each connection. Some media streaming systems can also be set up to support Quality of Service (QoS) to help maintain the necessary performance.

Setting Up computer Networks for streaming Media

Certain network protocols have been specially developed for streaming media, including Real Time Streaming Protocol (RTSP). HTTP can also be used if the content to be streamed consists of files stored on a Web server. Media player applications contain built-in support for the necessary protocols so that users typically do not need to change any settings on their computer to receive audio / video streams. Examples of media players include:
·         QuickTime
·         RealPlayer
·         Windows Media Player
·         Content providers wanting to deliver streams can set up a server environment in several different ways:
·         Subscribe to one of the online live streaming video Web services such as justin.tv or ustream.
·         Build a private Internet media server by installing specialized commercial software onto a Web server. Examples of media server software include Real Networks Helix Server and Adobe Flash Media.
·         Buy a commercial hardware/software system for media streaming. These systems typically interface with broadcast television as well as the Internet, and they also support higher performance streaming in many cases.

Steaming Video using Windows Media
In order to use Windows Media for streaming or downloading video and audio, you need to do three things (unless you already have a Win Media file ready to go, in which case you only need to do the last thing):
  1. Choose a format
    Windows Media has several different file formats (see the links at the bottom of the page). If you're not sure which format to use, WMV is the easiest for video. You may also be limited to the options in your editor, which brings us to...
  2. Create a video/audio file
    The easiest way to create a Windows Media file is to export a file from your favorite editing application. Open the original video clip, then look under File > Export to see what options you have.
    For an example of how this works, see Exporting WinMedia from Adobe Premiere.
  3. Place the files on a web page
    This involves entering some HTML code, shown below.
The rest of this page assumes you have a file in your chosen format and you are ready to place it on a web page. There are two ways to do this: Hyperlinking and embedding.