Monday, July 27, 2015

You can download basic needed software from a place. This website has more WINDOWS' and MAC'S soft wares. Click here go there!.


Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. Some software developers offer a shareware version of their program with a built-in expiration date (after 30 days, the user can no longer get access to the program). Other shareware (sometimes called liteware) is offered with certain capabilities disabled as an enticement to buy the complete version of the program.

Tuesday, July 21, 2015

You want to download Bamini font. Here you can download Bamini font free of cost. Click the following link.
Tamil Fonts
Microsoft Windows users:
Way 1: Open the Bamini font and click the install button.
Way 2: Copy the Bamini font and paste into font directory at Control Panel.
Sinhala Fonts
PING - Packet INternet Groper
Packet Internet or Inter-Network Groper (PING)

Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or device.
To ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node.
If a connection is available, the destination node responds with an echo reply.
Ping calculates the round-trip time of the data packet's route from its source to the destination and back, and determines whether any packets were lost during the trip.

The network ping tool was created by Mike Muuss in 1983. It contains almost one thousand lines of code and has become the standard packaged tool for various network applications and operating systems.

The ping utility works by generating an ICMP data unit that is then encapsulated into IP datagrams and transmitted over the network. After receiving the echo request, the destination node copies its payload, destroys the original packet and generates an echo reply with the same payload it received. 

The payload of the echo request packet often consists of American Standard Code for Information Interchange (ASCII) characters with variable adjustable lengths. Round-trip time is calculated by noting the local time of the source node clock when the IP datagram leaves the source node, then subtracting that time from the time at which the echo reply arrives. 

Depending on the operating system, ping utility output varies. However, almost all ping outputs display the following: 
Destination IP address 
ICMP sequence number 
Time to live (TTL) - TTL is used in IP (TCP/UDP are on top of IP) to kill off a packet if it travels too far. 
Round-trip time 
Payload size 
The number of packets lost during transmission

The ping tool displays various error messages if a round trip is not completed successfully. They include the following:

TTL Expired in Transit: Determines the maximum amount of time an IP packet may live over the network before being discarded if it has not reached its destination. To address this error, try to increase TTL value by using the ping -i switch. 

Destination Host Unreachable: Indicates that the destination node is down or is not operating on the network. It may even occur due to the non-existence of a local or remote      route for the destination host. To address this error, modify the local route table or switch the node on.

Request Timed Out: Indicates that the ping command timed out because there was no reply from the host. It indicates that no echo reply messages were received due to network traffic, failure of Address Resolution Protocol (ARP) request packet filtering or a router error. Increasing the wait time using the ping –w switch may address this problem.

Unknown Host: Indicates that the IP address or the host name does not exist in the network or that the destination host name cannot be resolved. To address this issue, verify the name and availability of the domain name system (DNS) servers

The GNU General Public License (GNU GPL or GPL) is the most widely used free software license, which guarantees end users (individuals, organizations, companies) the freedoms to run, study, share (copy), and modify the software.
Proprietary software (non-free software/closed-source software) is software that is owned by an individual or a company (usually the one that developed it). There are almost always major restrictions on its use, and its source code is almost always kept secret.

Wednesday, July 15, 2015

There are many different types of domain extensions you can choose for your domain name. This depends on your business nature. If you are going to register a domain name for educational site purpose then you can go for .edu extension. Below is a reference of the correct usage of certain extensions. But there is no hard and fast rule to go for any extension. Most commonly used is .com

1).com - Stands for company/commercial, but it can be used for any web site.
2).net - Stands for network and is usually used for a network of sites.
3).org - Stands for organization and is supposed to be for non-profit bodies.
4).us, .in - They are based on your country names so that you can go for country specific domain extensions.
5).biz - A newer extension on the Internet and can be used to indicate that this site is purely related to business.
6).info - Stands for information. This domain name extension can be very useful, and as a new comer it's doing well.
7).tv - Stands for Television and are more appropriate for TV channel sites.

Newer domain extensions such as .biz .info and .us etc. have more name choices available as many of the popular domains have yet to be taken and most of them are available at very nominal prices.

Friday, July 10, 2015

CC means carbon copy and BC means blind copy. If you are sending an email out to some one why would you CC them if you can just put there email in the "TO" space along with everyone your sending it to? and blind copy is just dumb. Explain it?

In a business environment To: is used for the main persons you're communicating with on a matter. Cc: would be used for other names who just need to know about the issue, but who are not actually in the conversation. 

Some people use Bcc: to send to many people without each seeing the other's address, but it could also be used to cause mischief by copying an active conversation to someone else secretly.

BCC is a very good thing to use. 
You can send the email to many people, but they cant see the email addresses of the other people, to whom it was sent.

Wednesday, July 8, 2015

What is SLT Broadband (ADSL)?
SLT Broadband provides you consistent, uninterrupted, high speed internet access through ADSL technology. It converts your regular phone line into a high-speed digital link, enabling simultaneous transmission of voice and data, as opposed to dial-up internet. As a result of switching to Broadband ADSL, data can be transferred at greatly increased speeds. and above.

What does the terms "ADSL" and "BROADBAND" refer to?
Broadband refers to a form of telecommunication that allows higher data transfer rates. Broadband transfers data at least 10 times faster than standard dial-up, because it provides wide band of frequencies to transfer data at the same time.

ADSL (Asymmetric Digital Subscriber Line) is a broadband connection technology which utilizes existing copper wired telephone networks. ADSL is ‘asymmetric’ because it facilitates different speeds for downloading and uploading, for optimized performance. This is the reason why ADSL packages always quote higher download speeds compared to upload speeds

Monday, July 6, 2015

Displays, sets, or removes the read-only, archive, system, and hidden attributes assigned to files or directories. Used without parameters, attrib displays attributes of all files in the current directory.

+r Sets the read-only file attribute.
-r Clears the read-only file attribute.
+a Sets the archive file attribute.
-a Clears the archive file attribute.
+s Sets the system file attribute.
-s Clears the system file attribute.
+h Sets the hidden file attribute.
-h Clears the hidden file attribute.
/s Applies attrib and any command-line options to matching files in the current directory and all of its subdirectories.
/d Applies attrib and any command-line options to directories.
/? Displays help at the command prompt.

Ex : attrib -s -h /s /d
  1. In computer networking, a wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.


Popular Posts

Recent Posts

Recent Posts Widget

Instagram

Followers

Video

Widget