Sunday, December 23, 2007

Windows Vista Administration and Support
19+ hours of Step-by-Step Video Training
70-620 Configuring Windows Vista Exam Coverage

Package Contents - Here is what you get....
More Info

CODE
http://www.trainsignal.com/index.asp?PageAction=VIEWPROD&ProdID=73

1) 19+ Hours of Windows Vista Training Videos on CD[/u]

You get 19+ Hours of Training covering Microsoft Windows Vista. "Get your Hands Dirty" with this Real World Training that is 100% Instructor Led! In this course Scott Skinger will lead you through Scenarios and Examples that will have you ready to tackle anything Windows Vista will throw at you.

2) 50+ Pages of the Instructor's Notes (PDF File on CD)

These professionally organized notes work great as quick reference and give you the opportunity to add notes and information as you follow along with the Windows Vista Videos.

Course Outline
CODE
Here are just SOME of the Topics we Cover in our
Windows Vista Training Videos:

    * Know Your Installation Options and How to Install Windows Vista(The Right Way!)
    * Master Windows Vista's New User Interface and Navigation
    * Users & Groups Are the First Step to Securing Your Systems While Maximizing Performance - We'll Teach You the Ropes
    * Learn How Vista Can Be Utilized in a Networked Environment
    * Now More Than Ever Users Are Mobile - Understand Vista's New Mobile PC and Wireless Features
    * Keep Your Systems Fast and Clean With Vista's Disk Management Tools
    * Customize Windows Vista's Security to Your Needs as You Are Walked Through NTFS Permissions, Share Permissions, Security Programs and more
    * Internet Explorer 7 and Its New Security Features in Vista For a Safer Web Experience
    * Running Software in Vista Is Different Now Than Ever Before. Know What Your Systems Are Doing and How They're Doing It.
    * Need to Make Administering Your Systems Easier? We Cover All the Tools You Need to Speed Up Your Tasks: Performance Monitor, Event Viewer, Management Console, etc...
    * Learn the Intricacies of Installing New Hardware and Printers Within Vista
    * Backups are Important! Know How To Do Them Right in Vista
    * Master Windows Vista's New Group Policy Features
    * ...This is Just the Beginning!!!

Download

CD 1
CODE
http://rapidshare.com/files/68260447/tsvista_d1.part1.rar
http://rapidshare.com/files/68255484/tsvista_d1.part2.rar
http://rapidshare.com/files/68443572/tsvista_d1.part3.rar
http://rapidshare.com/files/68466927/tsvista_d1.part4.rar
http://rapidshare.com/files/68484456/tsvista_d1.part5.rar


CD 2
CODE
http://rapidshare.com/files/68468275/tsvista_d2.part1.rar
http://rapidshare.com/files/68472455/tsvista_d2.part2.rar
http://rapidshare.com/files/68480760/tsvista_d2.part3.rar
http://rapidshare.com/files/68467897/tsvista_d2.part4.rar
http://rapidshare.com/files/68477910/tsvista_d2.part5.rar

backtrack

dragon


BackTrack is the most Top rated linux live distribution focused on
penetration testing.
With no installation whatsoever, the analysis platform is started
directly from the CD-Rom and is fully accessible within minutes.



It's evolved from the merge of the two wide spread distributions -
Whax and Auditor Security Collection. By joining forces
and replacing these distributions, BackTrack has gained massive
popularity and was voted in 2006 as the #1 Security Live Distribution
by insecure.org.
Security professionals as well as new comers are using BackTrack as
their favorite toolset all over the globe.




BackTrack has a long history and was based on many different linux
distributions until it is now based on a Slackware linux distribution
and the corresponding live-CD scripts by Tomas M. (www.slax.org) .
Every package, kernel configuration and script is optimized to be used by
security penetration testers
. Patches and automation have been added, applied
or developed to provide a neat and ready-to-go environment.



After coming into a stable development procedure during the last
releases and consolidating feedbacks and addition, the team was focused to
support more and newer hardware as well as provide more flexibility and
modularity
by restructuring the build and maintenance processes. With the current
version, most applications are built as individual modules which help
to speed up the maintenance releases and fixes.



Because Metasploit is one of the key tools for most analysts it is tightly
integrated into BackTrack and both projects collaborate together to
always provide an on-the-edge implementation of Metasploit within the
BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and
maintained virtualization images (like VMWare images appliances).



Being superior while staying easy to use is key to a good security
live cd. We took things a step further and aligned BackTrack to penetration
testing methodologies and assessment frameworks
(ISSAF and OSSTMM). This will
help our professional users during their daily reporting nightmares.




Currently BackTrack consists of more than 300 different up-to-date
tools
which are logically structured according to the work flow of security
professionals. This structure allows even newcomers to find the
related tools to a certain task to be accomplished. New technologies and
testing techniques are merged into BackTrack as soon as possible to keep it
up-to-date.



No other commercial or freely available analysis platform offers an
equivalent level of usability with automatic configuration and focus
on penetration testing



DOWNLOAD IT FROM HERE
http://www.remote-exploit.org/backtrack_download.html

backtrack



dragon


BackTrack is the most Top rated linux live distribution focused on
penetration testing.
With no installation whatsoever, the analysis platform is started
directly from the CD-Rom and is fully accessible within minutes.



It's evolved from the merge of the two wide spread distributions -
Whax and Auditor Security Collection. By joining forces
and replacing these distributions, BackTrack has gained massive
popularity and was voted in 2006 as the #1 Security Live Distribution
by insecure.org.
Security professionals as well as new comers are using BackTrack as
their favorite toolset all over the globe.




BackTrack has a long history and was based on many different linux
distributions until it is now based on a Slackware linux distribution
and the corresponding live-CD scripts by Tomas M. (www.slax.org) .
Every package, kernel configuration and script is optimized to be used by
security penetration testers
. Patches and automation have been added, applied
or developed to provide a neat and ready-to-go environment.



After coming into a stable development procedure during the last
releases and consolidating feedbacks and addition, the team was focused to
support more and newer hardware as well as provide more flexibility and
modularity
by restructuring the build and maintenance processes. With the current
version, most applications are built as individual modules which help
to speed up the maintenance releases and fixes.



Because Metasploit is one of the key tools for most analysts it is tightly
integrated into BackTrack and both projects collaborate together to
always provide an on-the-edge implementation of Metasploit within the
BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and
maintained virtualization images (like VMWare images appliances).



Being superior while staying easy to use is key to a good security
live cd. We took things a step further and aligned BackTrack to penetration
testing methodologies and assessment frameworks
(ISSAF and OSSTMM). This will
help our professional users during their daily reporting nightmares.




Currently BackTrack consists of more than 300 different up-to-date
tools
which are logically structured according to the work flow of security
professionals. This structure allows even newcomers to find the
related tools to a certain task to be accomplished. New technologies and
testing techniques are merged into BackTrack as soon as possible to keep it
up-to-date.



No other commercial or freely available analysis platform offers an
equivalent level of usability with automatic configuration and focus
on penetration testing

Wednesday, December 12, 2007

coolest keyboards

The 25 Coolest (and Most Unconventional) Keyboards




Keyboards come in all shapes and sizes, from the standard ten dollar gray board to something straight out of a science fiction movie. Here’s a list of some of the coolest and strangest keyboards out there.



  1. The WristPC Keyboard: This keyboard is designed for “portable and wearable” computer applications, whatever that means.

  2. The Comfort Keyboard: This one can be split into three separate section, supposedly for added comfort. It also features key reprogramming and a programmable “rest period indicator.”


    comfortkeyboard.jpg

  3. Orbitouch keyless keyboard: This one is a little hard to explain. It was designed for people with “repetitive stress injuries” like carpal tunnel. As you can see, there are no keys.


  4. The Roll-Up Keyboard: This standard 104 key keyboard takes portability to a new level while providing surprisingly good tactile feedback.


  5. The Optimus Maximus keyboard: Little OLED displays on each key let you customize the layout. Probably the most talked about keyboard ever.

    Optimus Maximus


  6. DataHand Professional II: Another Keyboard focused on ergonomics. Is the normal keyboard really that uncomfortable?

  7. The Apple Adjustable Keyboard: A pretty creative keyboard considering the 1992 release date. It was designed to minimize carpal tunnel syndrome.


  8. The Frogpad: A keyboard meant to be used with one hand. Supposedly you could reach 40 words per minute with a days practice.

  9. The Twiddler 2: This is a one handed, hand held, keyboard. It wins the prize for most uncomfortable keyboard to use.

  10. The Tablecloth Keyboard: Designed by German designer Tonia Welter. Ideal for those who take every meal in front of the computer.


  11. The Combimouse Keyboard: This Australian company decided to do the impossible: Combine the keyboard and the mouse!

  12. The Apple Keyboard: Quite possibly the most beautiful keyboard ever crafted. Comes in wired and wireless varieties.

  13. The Virtual Laser Keyboard: You’ll definitely turns a few heads with this one. This “keyboard” allows the user to type on almost any flat surface.


  14. The Washable Waterproof Keyboard: Do you ever get the sudden urge to type underwater? If so, this keyboard is for you!

  15. The Kinesis Freestyle Solo Keyboard: Basically, the fine people at Kinesis decided to split a keyboard in half and sell if for twice as much. Well Done!



  16. The SafeType Keyboard: This one is supposedly more comfortable to use than a regular keyboard. However, it’ll probably take a long time getting used to.


  17. Maltron’s Ergonomic Keyboard: This keyboard fits the shape of the hands to reduce tension. This may take some getting used to.

  18. The Maltron Executive Keyboard: Are you rediculously rich and want a heavy stainless steel keyboard? Well then this is the keyboard for you!


  19. Logitech diNovo Edge: This one’s up there with the Apple Keyboard. Sleek, Stylish, and with a touch of practicality..


  20. Fingerworks Keyboard: Strange Keyboard that originally retailed at $340. The keys are in fact a flat surface, making them awkward to type on.


  21. The Stealth Computer Keyboard: Made of strong component, this keyboard will function in even the most hazardous areas, or so they say.

  22. Happy Hacking Keyboard: This one is also a little hard to explain. It is supposedly coated using a special brush made from the hair of virgins and sprinkled with gold dust. And it’ll cost you 525,000 yen.


  23. ElekTex Fabric Keyboard: Similar to the Roll-Up Keyboard above, but a little more flexible and made of a different material. Good for people always on the go.


  24. The EZ Reach Keyboard: Another variation of the keyboard. Why do people feel they must repeatedly reinvent the wheel?EZ Reach


  25. Saitek Eclipse Illuminated Keyboard: This one should turn a few heads at the LAN Parties.Saitek


Update: A lot of our readers suggested the following keyboards and we responded. Enjoy.



  1. The Das Keyboard: This keyboard features highly responsive tactile feedback, and the keys are completely blank.

    Das Keyboard

  2. The AlphaGrip: A controller style hand held USB ‘keyboard’ and trackball. Supposedly the “worlds most comfortable computing experience”


    The Alphagrip Keyboard Trackball


Recently Dugg:

The Next Social Network: WordPress

WordPress logoCould open-source blogging platform WordPress serve as your next social networking profile? Chris Messina, co-founder of Citizen Agency, thinks so. He’s started a project called DiSo, for distributed social networking, that aims to “build a social network with its skin inside out.” DiSo will first look to WordPress as its foundation.



This could be the next step towards the unified social graph that some technologists wish for. WordPress suits the purpose because it provides a person-centric way of coming online, offers an extensible architecture, and already has some features — such as an OpenID and a blogroll plugin — that can be pressed into social networking service. And its users represent exactly the sort of audience that might appreciate the permanent, relatively public identity that DiSo aims to offer.



Why blogs and not Facebook or MySpace



In contrast to social networking, blogging offers a person-centric way for individuals to come online. A social network like Facebook gives you your own place online, but it’s not really your own place. As Copyblogger Brian Clark recently said in a blog post, “For me, there’s really no appeal in spending a lot of time creating ‘user-generated’ content via a social networking application. That’s like remodeling the kitchen in a house you rent.”



Clark was responding to an ongoing conversation launched by blogger and cartoonist Hugh MacLeod, who proposed that blogging is far more important to him than social networking. Bloggers including Stowe Boyd and Darren Rowse seconded the idea. This growing disenchantment with social networking and return to blogging suggests that in the future we could see a migration, at least among tech bloggers, towards more distributed social networking — along the lines of what Messina envisions.



WordPress, why and how



WordPress is ideal for experimenting with a distributed social network. It has a plug-in architecture that makes it easy to extend. And people who use it are already comfortable to some extent with coming publicly online as individuals. Though there are, of course, WordPress installations that don’t represent just one person, in many cases they do.



Messina, along with Steve Ivy and Will Norris, is exploring how WordPress can serve as a social networking profile. To that end, a blog needs a way to identify itself to other blogs and share its contact lists, ideally in a privacy-protected manner. The OpenID identity standard can serve as a distributed identifier for both a person’s blog and the blogs of people to which that person is related. Messina and his partners plan to develop a WordPress plugin that exposes the contact list. An OpenID plugin for WordPress already exists; it was developed by Will Norris.



Not everyone wants unified social networking



WordPress-as-social-network, like the unified social graph meme, will most likely appeal to those who want to create one strong identity online. But not everyone does. Blogger danah boyd has written about how some people use social network identities in an ephemeral manner. Those who prefer a more multilayered and multifaceted depiction of themselves online might prefer to create multiple social networking profiles on different sites, representing themselves in different ways as the situation demands.



But those who already use WordPress probably want to build a strong and persistent online presence and identity. Plus they’re the geeky sort, with whom with the idea of a unified, distributed social network might resonate. And at least some of them are refocusing on blogging. The next hot social network might just be built out of blogs.





Full disclosure: Automattic, the company behind Wordpress.com is funded by True Ventures, which is also an investor in GigaOM.

Core of "Windows 7" taking shape: meet the "MinWin" kernel

Eric Traut, one of Microsoft's chief operating system design engineers, gave a fascinating demo (WMV) recently at the University of Illinois, where he talked about where the Windows core is going and ended with a sneak peek at the kernel of the next version of Windows, known by the exciting codename of "Windows 7." The demo showed what Windows would look like if it was literally stripped down to the core, showing the kind of work that is going on to optimize the aging NT kernel.



Traut runs a team of about 200 software engineers at Microsoft that is responsible for the core kernel scheduling, memory management, boot sequence, and virtualization technology such as Virtual PC and Virtual Server. The latter technologies are becoming more and more important as servers get more powerful and gain more and more CPU cores, and it was clear from the demonstration that Microsoft is placing significant effort into integrating virtual machine technology into everything that they do. The release of Virtual PC as a free download last year was just the beginning: Windows Server 2008 will ship with significant VM enhancements, and Windows 7 will only carry on from there.


Windows 7




Why "Windows 7"? The number is based on Microsoft's internal operating system numbers: the first version of Windows NT, 3.1, was given the same number as the "Classic" Windows when it was released in 1992. Since then there has been NT 4, Windows 2000 (NT 5), Windows XP (NT 5.1), and Windows Vista (NT 6). You can check these numbers by typing "ver" at a command prompt on any of these operating systems.





Windows 7 core running in a VM. Note the snazzy ASCII startup screen.


Traut ran a stripped-down version of Windows 7 called "MinWin" that included only the core kernel: for the first time Windows NT has been seen running naked, without even a GUI to dress itself. It ran only a miniature web server that would display simple HTML pages, including some dynamically-generated pages that showed the task list and other properties of MinWin itself. Thirteen tasks were running, most of which would be familiar to anyone who has opened Task Manager: smss.exe, csrss.exe, and svchost.exe were all there, plus the mini web server httpsrv.exe. The OS ran under Virtual PC, and this allowed Traut to show the audience exactly how many resources it was consuming: about 25MB on disk (compare with 14GB for a full Vista install) and 40MB of RAM. The OS booted up in about 20 seconds inside Virtual PC. Still not quite as lightweight as, say, AmigaOS or QNX, but remarkably small for Windows. Traut admitted that he would "still like to see it get smaller."


A virtual future



Traut, like most good engineers, is honest about the pros and cons of code that he works on. "I fully admit that there are some major problems in the Windows OS that are driving some of these [improvements in the core and virtual machine technology]" he said, in full self-deprecating mode. He reviewed some of the reasons one might want to run older operating systems in a VM, such as backwards compatibility and resource management. The idea, of course, has been around for a long time—Windows NT 3.1 ran older 16-bit programs in a VM called "Windows on Windows" or "WOW" for short. The technology has improved since then, however. Windows Server Virtualization, like VMWare ESX and Xen on Linux, will run in what is called "Hypervisor" mode, where a host OS is not needed. This greatly improves performance and can take full advantage of new on-chip VM hardware from companies like Intel. Parts of this technology will appear as "Viridian" as an add-on for Windows Server 2008.



Traut doesn't believe virtual machines are a panacea, however; he said that sometimes they could be used as a "crutch" to solve a problem that could be better addressed by improving the core of the operating system itself. However, in server applications, VMs are clearly an idea whose time has come. Powerful servers that can run multiple OSes at once can blur the line between traditional PC hardware and big-iron mainframes and increase the power of an existing datacenter.



Compatibility is another big advantage of VMs. Traut showed, just for fun, Windows versions 1.03, 2.11, "Classic" 3.1, and NT 4.0, running under Virtual PC. Few people need to run applications that are designed for these ancient operating environments, but the point was to demonstrate how VMs can solve even the trickiest of compatibility problems by simply running the entire OS that the application was written for.



If you don't want to sit through the entire one-hour presentation, istartedsomething.com has a handy nine-minute excerpt with the MinWin demo. 

Saturday, November 24, 2007

An Introduction To SQL Injection Attacks For Oracle Developers

Most application developers underestimate the risk of SQL injection attacks against web applications that use Oracle as the back-end database.

This paper is intended for application developers, database administrators, and application auditors to highlight the risk of SQL injection attacks and demonstrate why web applications may be vulnerable.



Download the paper in PDF format here

Thursday, November 15, 2007

MICRO BOT PROGRAMMING

Learn to program and use the
powerful PIC
microcontroller for
artificial intelligence & robotics applications. Build & apply
simple circuits for autonomous robot navigation with object
detection & avoidance, light sensing, sonar
range finding, wireless communications,
remote control, and more with the Micro-Bot PIC

robotics development system.
Start Here

TOOLS FOR A NETWORK ADMINISTRATOR

MY IP Suite

MY IP Suite combines domain to IP converters, Tracert, WHOIS, website scanner, batch ping and IP to country converter. With MY IP Suite you can lookup an IP address for single and group of domain names perform batch and pings on the multiple servers at the same time. You can also track IP addresses to their destination to find out the problems in the connections. You can also determine the last modified data, name, IP address and the operating system of the remote web server.

Desktop Authority

Desktop Authority utility manages the Windows Desktop lifecycle and reduces the total cost of the ownership by enabling the network and system administrators to manger, control inventory and secure the desktop computers from the central location. With the Desktop Authority you manage printer deployments, registry values, software deployments, drive mappings and perform diagnostic methods from the centralized location.

Hyena

Hyena is designed to simply and manages the day to day network management and administrative tasks. Hyena uses Windows explore type interface to perform all the operations. The most common features of the Hyena are the management of the users, groups, shares, messages, sessions, open files, devices, events, domains, disk space, job scheduling and processes. Hyena is compatible with almost all the Windows based operating systems and it can manage a lot of administrative tasks in the Windows 2000 and Windows 2003 Servers.

IP Sniffer & Web Tracer

IP Sniffer & Web Tracer is a domain and IP tool that combines, domain IP convert, tracert, PING, website scanner and connection monitor. The common features of IP Sniffer & Web Tracer are conversion of domain to IP address, IP to domain name, trace IP address and domain, find the country from IP address and you can obtain all the required information based on the IP address such as domain owner, email, postal address, city, state, country and contact phone.

Remote Control PRO

Remote Control PRO is a handy tool for the network administrators that allow them to view and manage the remote computers without leaving their seats. With the Remote Control PRO a network administrator can launch programs, troubleshoot software applications and devices, install drivers, manage users, domains and change computer settings by using his/her keyword and mouse.

HOW DOES GOOGLE WORK

check this cool link which explains the working of the Biggest search engine today...

http://infolab.stanford.edu/~backrub/google.html

Monday, November 12, 2007

JAVA BOOKS

Cohen_book java design and testing

http://www.bobshare.com/file.php?fil...5558f1378803d4


EJB-book ED Roman
http://www.bobshare.com/file.php?fil...1ba946b8fc5448


Falkner jsp and servlets
http://www.bobshare.com/file.php?fil...68e44f301b37ad

Thinking+in+Java
http://www.bobshare.com/file.php?fil...eb4536ac5925bc

wap_material
http://www.bobshare.com/file.php?fil...74e2b2cf014af0

JakartaStrutsLive
http://www.bobshare.com/file.php?fil...582904d50764b2

j2ee_tutorial
http://www.bobshare.com/file.php?fil...6969583c582194


Database
http://www.bobshare.com/file.php?fil...0b72751393ebe1


struts
http://www.bobshare.com/file.php?fil...e7c8e267767534


J2EEArchitectsHandbookV1.0.0
http://www.bobshare.com/file.php?fil...90b0bf863a7d77

JavaDataObjects-RobinRoos-1.0
http://www.bobshare.com/file.php?fil...1d1b26945e4c49

Mastering+Jakarta+Struts
http://www.bobshare.com/file.php?fil...fcb7cbc0fef2ca

RMI_IIOP_JavaOne
http://www.bobshare.com/file.php?fil...4f2500a2c35951

developing EJBs
http://www.bobshare.com/file.php?fil...f5728eba6cba94

CodeNotes_for_J2EE
http://www.bobshare.com/file.php?fil...718b9ef2209b1d

ejbdesignpatterns
http://www.bobshare.com/file.php?fil...7a5cde57cf3555

EagleArchSpec
http://www.bobshare.com/file.php?fil...81c60a0894ae5d

devguide1_2_1
http://www.bobshare.com/file.php?fil...f24ff0be80eebb

J2EE
http://www.bobshare.com/file.php?fil...52820776866451

Code Conventions
http://www.bobshare.com/file.php?fil...469523d25f6aaa


Java FAQ
http://www.bobshare.com/file.php?fil...63bbf14b5237ae


java interview questions
http://www.bobshare.com/file.php?fil...41a50c94a670c6


Java Threads, Third Edition
http://www.bobshare.com/file.php?fil...ee12bf02b27c4a


Professional Eclipse 3 for Java Developers
http://www.bobshare.com/file.php?fil...b1d862ac92378a

Beginning Programming with Java™ For Dummies®, 2nd Edition
http://www.bobshare.com/file.php?fil...530af493fd17f6

Professional Java™, JDK™ 5 Edition
http://www.bobshare.com/file.php?fil...b0b4652e690966


Professional Java Development with the Spring Framework
http://www.bobshare.com/file.php?fil...0f3523d94bc771


Mastering Enterprise JavaBeans™, Third Edition
http://www.bobshare.com/file.php?fil...3a5f24725a1f60


Java In A Nutshell 5th Edition
http://www.bobshare.com/file.php?fil...2b5c6e13354eee


Java Cookbook, 2nd Edition
http://www.bobshare.com/file.php?fil...573f104c8253da


Java Enterprise in a Nutshell 3rd Edition
http://www.bobshare.com/file.php?fil...be7b4f25c9b5f6


Enterprise JavaBeans, 3.0
http://www.bobshare.com/file.php?fil...14d37367b35a4f


Java™ IO, 2nd Edition
http://www.bobshare.com/file.php?fil...9232ee4fba063a


Teach Yourself Programming with Java in 24 Hours, FOURTH EDITION
http://www.bobshare.com/file.php?fil...052302dc7996c2


Better, Faster, Lighter Java
http://www.bobshare.com/file.php?fil...c2bfa4b98bed19


QuickTime for Java A Developers Notebook
http://www.bobshare.com/file.php?fil...5ba0d2b3eb2612


Java 1.5 Tiger A Developer's Notebook
http://www.bobshare.com/file.php?fil...8b80c0e7c31934


Beyond Java
http://www.bobshare.com/file.php?fil...ce4a5ea2a3e113


Java Network Programming, 3rd Edition
http://www.bobshare.com/file.php?fil...4445fb3c5be3d3


Java Beans 1
http://www.bobshare.com/file.php?fil...c1ba03951a69f6


Java Beans 2
http://www.bobshare.com/file.php?fil...9a220e284e3c0a


Java Beans 3
http://www.bobshare.com/file.php?fil...e4f29bddd79952


Java Beans 4
http://www.bobshare.com/file.php?fil...610762c9f211bc


Java Beans.zip
http://www.bobshare.com/file.php?fil...19965714489abe

eBook - EJB Design Patterns (Marinescu, 2002)
http://www.bobshare.com/file.php?fil...10f68998d60288

http://gigapedia.org/

Welcome to gigapedia.org!

We review ebooks, journals, whitepapers and other electronic publications.
Our encyclopedia of links and reviews covers all topics such as medicine, engineering, science and literature fully integrated with Amazon.
Continue by browsing or searching our catalogue

Saturday, November 10, 2007

GOOGLE LUANCHES OPERATION SYSTEM FOR MOBILES

Google has launched an open operating system for mobile phones, called Android. It has also formed an Open Handset Alliance with 33 partners, promising "better, cheaper" mobile phones.

What is Android?

Android is a series of software tools built by Google designed to power a next generation of mobile phone handsets.

The tools are based on Linux - and so are open source and free to use. It means any one can develop software for the platform and that Android itself can be tailored for individual phones, networks and potentially users.

What is the Open Handset Alliance?

Thirty four companies, including Google, have formed an alliance to promote Android and to develop features and handsets to take advantage of the platform.

Companies include handset manufacturers such as LG, HTC, Motorola and Samsung, chip firms such as Qualcomm and mobile networks like T-Mobile and China Mobile.

What is different about Android?

Google is stressing the open nature of the platform. Operating systems on current phones - such as Windows Mobile, RIM, Symbian and Palm - are proprietorial and have to be licensed for use. Google believes it will be easier and quicker to develop new applications for Android than the other systems.

What kinds of features and phones will we see?

That is the big question. Google and its partners believe that the new phones will make the internet experience on a mobile "better than on a PC".

But they have given little details about how this will be achieved, except to say Android includes an advanced web browser.

Most mobile web experiences are hampered by the limitations of the browser and screen resolution of the handset.

But devices such as the Apple iPhone and Nokia N800 - which are not powered by Android - are already showing the potential for a PC-like experience on a mobile device.

Google and partners have said the new phones will be able to make web experiences, such as video, sharing content and social networking, much easier on a handset.

The first phones are not due until the second half of 2008 but developers will be able to get a look at the Android tools from next week.

Will my current phone work with Android?

No. You will have to buy a new phone that is running the Android platform.

Does that mean current phones are obsolete?

Not at all. Rival platform systems, such as Symbian, Palm, Windows Mobile and Blackberry, will continue to exist on an ever expanding array of devices. The companies behind all these platforms say they are also working on more accessible web experiences on future devices.

What has the reaction been to Google's big jump into mobiles?

Mixed. Analysts are emphasising the impressive partners Google has secured. But it is clear that none of the handset partners in the alliance are ditching deals with existing platforms in favour of Android. Google's system will be part of the mix.

Forrester analyst Charlie Golvin wrote: "Paradoxically, Android will increase complexity for developers initially since it represents yet another platform to support."

Technology writer Om Malik has described the move as a "massive PR move, with nothing to show for it right now".

He added: "The partners - with the exception of HTC and T-Mobile - are companies who are, in cricketing parlance, on the backfoot. Motorola, for instance is not exactly a bastion of handset excellence."

What are the business implications of the Google deal?

It is clear that Linux - the open source operating system - is going to be a big player in the mobile space. Android is based on Linux and there are other Linux-based mobile OSes in existence, such as OpenMoko, LiMo and Qtopia.

ABI Research predicts that Mobile Linux will be the fastest growing smartphone operating system over the next five years.

Linux-based smartphones will account for about 31% of such devices by 2012, the analysts have reported.

Why is Google doing this?

There are more people with mobile phones with access to the net right now than there are PCs with online connections.

This is a massive potential market for Google - and every other online firm - that is yet to be tapped and developed.

Improving the mobile web for all is a rising tide that will float all boats, including the Google battleship.

More people online means more people using Google's services, which means more advertising revenue for the firm

250 HTML DESIGNS


Click here!

THERE YOU GO
TAKE CARE

CCNA VIDEO TUTORIAL

Cisco CCNA Certification Suite


More Info
CODE
http://www.testout.com/ccna/

Description
CODE
Become a Cisco Certified Network Associate and master the knowledge and skills to proficiently install, configure, and operate LAN, WAN, and dial access for small networks through the TestOut CCNA certification course. To become CCNA certified the following courses are required:

Download Course Outline
CODE
http://www.testout.com/docs/ccna.htm

Course Outline
CODE
Videos: 50
Demonstrations: 33
Animations: 16
Simulations: 161
Fact Sheets: 112
Exam Questions: 550
Exams: 61


Contents:

0.0 Introduction

0.1 Introduction

0.1.1 CCNA Certification
0.1.2 Using the Router Simulator
0.1.3 Available Commands

1.0 Networking Concepts (44 questions)

1.1 OSI Model Layers

1.1.1 OSI Model Introduction
1.1.2 Uses of the OSI Model
1.1.3 The Lower OSI Layers
1.1.4 The Upper OSI Layers
1.1.5 OSI Model Layers
1.1.6 Connection-oriented vs. Connectionless
1.1.7 ExamSim Questions - Section 1.1

1.2 TCP/IP

1.2.1 The TCP/IP Protocol Suite
1.2.2 TCP/IP Protocols
1.2.3 IP Addresses
1.2.4 IP Address Classes
1.2.5 Special Addresses
1.2.6 ExamSim Questions - Section 1.2

1.3 Device Communication

1.3.1 Data Encapsulation
1.3.2 Data Encapsulation Process
1.3.3 Service Data Units and Encapsulation
1.3.4 Internetwork Message Routing
1.3.5 Message Routing Facts
1.3.6 ExamSim Questions - Section 1.3

2.0 LAN Design (49 questions)

2.1 Ethernet

2.1.1 Ethernet Architecture
2.1.2 Collision Detection and Recovery
2.1.3 Ethernet Architecture Facts
2.1.4 Ethernet Standards
2.1.5 Half- and Full-Duplex
2.1.6 Upgrading to FastEthernet
2.1.7 ExamSim Questions - Section 2.1

2.2 Bridging and Switching

2.2.1 Bridges and Switches
2.2.2 How a Bridge Works
2.2.3 How a Bridge Learns
2.2.4 Bridge Facts
2.2.5 How a Switch Works
2.2.6 Switch Facts
2.2.7 ExamSim Questions - Section 2.2

2.3 Routing

2.3.1 Routers and Routing Tables
2.3.2 Routing Facts
2.3.3 ExamSim Questions - Section 2.3

2.4 LAN Segmentation

2.4.1 LAN Segmentation
2.4.2 Segmentation Facts
2.4.3 ExamSim Questions - Section 2.4

3.0 Cisco Devices (51 questions)

3.1 Connecting Devices

3.1.1 Connecting Devices
3.1.2 Making a Console Connection
3.1.3 Making a Virtual Terminal Connection
3.1.4 Connection Facts
3.1.5 ExamSim Questions - Section 3.1

3.2 Command Line Interface

3.2.1 Cisco IOS
3.2.2 Router Command Modes
3.2.3 Command Mode Prompts and Commands
3.2.4 Command Help
3.2.5 Command Help Facts
3.2.6 Use Command Help
3.2.7 Advanced Editing Features
3.2.8 Editing Features Facts
3.2.9 Command History
3.2.10 Command History Command List
3.2.11 Turn Off the Command History
3.2.12 Turn On the Command History
3.2.13 Change the Command History Size
3.2.14 View the Command History
3.2.15 ExamSim Questions - Section 3.2

3.3 System Startup

3.3.1 Startup Sequence
3.3.2 Startup Facts
3.3.3 Using Setup Mode
3.3.4 ExamSim Questions - Section 3.3

3.4 Managing System Files

3.4.1 Managing Startup Files and IOS Images
3.4.2 Router Memory
3.4.3 Manipulating Configuration Files
3.4.4 Copy Command List
3.4.5 Specifying Alternate Boot Locations
3.4.6 Backing Up and Upgrading IOS Images
3.4.7 IOS Boot and Upgrade Location Command List
3.4.8 ExamSim Questions - Section 3.4

3.5 Using Show Commands

3.5.1 Viewing Router Configuration
3.5.2 Show Command List (Basic)
3.5.3 View Router Information
3.5.4 ExamSim Questions - Section 3.5

4.0 Initial Router Configuration (31 questions)

4.1 Hostname and Interface Descriptions

4.1.1 Setting Router and Interface Identification
4.1.2 Router and Interface Identification Command List
4.1.3 Modify the Router Name
4.1.4 Set an Interface Description
4.1.5 Set Interface Descriptions
4.1.6 Configure Router and Interface Identification
4.1.7 ExamSim Questions - Section 4.1

4.2 System Passwords

4.2.1 Setting Router Passwords
4.2.2 Setting Line Passwords
4.2.3 Password Command List
4.2.4 Set Privileged Mode Passwords
4.2.5 Set Enable Passwords
4.2.6 Exploring Enable Passwords
4.2.7 Set the Console Password
4.2.8 Set a Virtual Terminal Password
4.2.9 Set Router Passwords
4.2.10 Set Console and Line Passwords
4.2.11 Prevent VTY Access
4.2.12 Control Router Access
4.2.13 ExamSim Questions - Section 4.2

4.3 Banners

4.3.1 Setting Router Banners
4.3.2 Banner Command List
4.3.3 Modify Router Banners 1
4.3.4 Modify Router Banners 2
4.3.5 Modify Router Banners 3
4.3.6 Modify Router Banners 4
4.3.7 ExamSim Questions - Section 4.3

4.4 Interfaces

4.4.1 Router Interfaces
4.4.2 Setting the IP Address
4.4.3 Interface Command List
4.4.4 Set an IP Address
4.4.5 Assign IP Addresses
4.4.6 Examining Interface Status
4.4.7 Examining Serial Interface Status
4.4.8 Interface Statuses
4.4.9 Using ping and traceroute
4.4.10 Exploring Ping
4.4.11 ExamSim Questions - Section 4.4

4.5 Back-to-Back Routers

4.5.1 Back-to-Back Router Configuration
4.5.2 Back-to-Back Configuration Facts
4.5.3 Exploring the Clock Rate
4.5.4 Configure Back-to-Back Routers 1
4.5.5 Configure Back-to-Back Routers 2
4.5.6 Troubleshoot Serial Connections 1
4.5.7 Troubleshoot Serial Connections 2
4.5.8 Troubleshoot Serial Connections 3
4.5.9 ExamSim Questions - Section 4.5

4.6 Cisco Discovery Protocol (CDP)

4.6.1 Cisco Discovery Protocol (CDP)
4.6.2 Configuring CDP
4.6.3 CDP Command List
4.6.4 View CDP Information
4.6.5 Exploring CDP
4.6.6 Disable CDP on an Interface
4.6.7 Disable CDP on the Router
4.6.8 Configure CDP
4.6.9 Configure CDP Advertisements
4.6.10 Reset CDP Timers
4.6.11 ExamSim Questions - Section 4.6

5.0 Switch Configuration (33 questions)

5.1 Switch Basics

5.1.1 Managing Switches
5.1.2 Switch Components
5.1.3 Switch Configuration Modes
5.1.4 Switch Configuration Command List
5.1.5 Configure the Enable Password
5.1.6 Configure the Hostname and Password
5.1.7 Configure Port Descriptions
5.1.8 Configure a Switch
5.1.9 Configure CDP Parameters
5.1.10 Disable CDP for a Port
5.1.11 Setting the Switch IP Address
5.1.12 Switch IP Address Facts
5.1.13 Configure the Switch IP Address
5.1.14 Exploring Ping from a Switch
5.1.15 Exploring the Default Gateway
5.1.16 Exploring Switch Port Status
5.1.17 ExamSim Questions - Section 5.1

5.2 Virtual LANs (VLANs)

5.2.1 Virtual LANs (VLANs)
5.2.2 VLAN Frame Tagging
5.2.3 Frame Tagging Facts
5.2.4 VLAN Facts
5.2.5 Configuring VLANs
5.2.6 VLAN Command List
5.2.7 Create a VLAN
5.2.8 Create a VLAN with a Name
5.2.9 Modify VLAN Membership
5.2.10 Exploring VLAN Communication
5.2.11 ExamSim Questions - Section 5.2

5.3 Trunking

5.3.1 Trunking
5.3.2 Trunking Command List
5.3.3 Configuring Trunking
5.3.4 Configure Trunking
5.3.5 VLAN Trunking Protocol (VTP)
5.3.6 VTP Facts
5.3.7 Exploring VTP Modes
5.3.8 Configure the Access Mode
5.3.9 ExamSim Questions - Section 5.3

5.4 Spanning Tree

5.4.1 Spanning Tree
5.4.2 Spanning Tree Facts
5.4.3 Spanning Tree Command List
5.4.4 Enable and Disable STP
5.4.5 EtherChannel
5.4.6 EtherChannel Facts
5.4.7 ExamSim Questions - Section 5.4

5.5 Advanced Switching

5.5.1 Switch Port Security
5.5.2 Port Security Facts
5.5.3 Default Switch Configuration
5.5.4 Inter-VLAN Routing
5.5.5 Layer 3 Switching

6.0 Managing TCP/IP (54 questions)

6.1 Subnetting

6.1.1 Classless Interdomain Routing (CIDR)
6.1.2 Subnetting Tasks
6.1.3 Subnetting Scenarios
6.1.4 Binary Calculations
6.1.5 Identifying Subnets and Hosts
6.1.6 Identify the Number of Subnets and Hosts
6.1.7 Selecting a Subnet Mask
6.1.8 Select a Subnet Mask
6.1.9 Identifying Valid Subnets
6.1.10 Identify Valid Subnets
6.1.11 Identifying the Host Range
6.1.12 Identify Addresses
6.1.13 Subnetting Operations

6.2 Configuring IP

6.2.1 IP Configuration
6.2.2 Configure an IP Address 1
6.2.3 Configure an IP Address 2
6.2.4 Configure IP Addresses
6.2.5 ExamSim Questions - Section 6.2

6.3 Address Resolution

6.3.1 Address Resolution
6.3.2 The DHCP Process
6.3.3 Address Resolution Protocols
6.3.4 Network Address Translation (NAT)
6.3.5 NAT Facts
6.3.6 NAT Command List
6.3.7 ExamSim Questions - Section 6.3

6.4 Troubleshooting IP

6.4.1 Troubleshooting IP
6.4.2 Traceroute and TTL
6.4.3 IP Troubleshooting
6.4.4 ICMP Messages
6.4.5 ExamSim Questions - Section 6.4

7.0 Access Lists (25 questions)

7.1 Access List Concepts

7.1.1 Access Lists
7.1.2 Access List Facts
7.1.3 ExamSim Questions - Section 7.1

7.2 Configuring Access Lists

7.2.1 Configuring Standard IP Access Lists
7.2.2 Configuring Extended IP Access Lists
7.2.3 IP Access List Command List
7.2.4 Deny Traffic from Specific Hosts
7.2.5 Deny Traffic from Specific Networks
7.2.6 Permit Traffic
7.2.7 Permit Traffic from Specific Hosts
7.2.8 Permit Traffic from Specific Networks
7.2.9 Apply a List to an Interface
7.2.10 Remove a List from an Interface
7.2.11 Apply Access Lists to Interfaces
7.2.12 ExamSim Questions - Section 7.2

7.3 Working with Wildcard Masks

7.3.1 Wildcard Masks
7.3.2 Calculating Wildcard Masks
7.3.3 Use Wildcard Masks 1
7.3.4 Use Wildcard Masks 2
7.3.5 Use Wildcard Masks 3
7.3.6 Use Wildcard Masks 4

7.4 Designing and Monitoring Access Lists

7.4.1 Designing Access Lists
7.4.2 Access List Design Practice 1
7.4.3 Access List Design Practice 2
7.4.4 Access List Design Practice 3
7.4.5 Access List Design Practice 4
7.4.6 Monitoring Access Lists
7.4.7 ExamSim Questions - Section 7.4

8.0 IP Routing (71 questions)

8.1 Routing Concepts

8.1.1 Routing
8.1.2 Routing Protocols
8.1.3 Distance Vector Routing
8.1.4 Routing Loops
8.1.5 Distance Vector Routing Facts
8.1.6 Link State Routing
8.1.7 Link State Route Discovery
8.1.8 Link State Routing Facts
8.1.9 ExamSim Questions - Section 8.1

8.2 Static Routes

8.2.1 Default and Static Routes
8.2.2 Adding Manual Routes
8.2.3 Static Route Command List
8.2.4 Configure Static Routes 1
8.2.5 Configure Static Routes 2
8.2.6 Configure Static Routes 3
8.2.7 ExamSim Questions - Section 8.2

8.3 Configuring RIP

8.3.1 RIP Facts
8.3.2 Configuring RIP
8.3.3 RIP Command List
8.3.4 View the Routing Table
8.3.5 Examining the Routing Table
8.3.6 Configure RIP Networks 1
8.3.7 Configure RIP Networks 2
8.3.8 Disable IP Routing
8.3.9 Configure RIP Routing 1
8.3.10 Configure RIP Routing 2
8.3.11 Configure RIP Routing (3 routers)
8.3.12 Exploring Network Addressing
8.3.13 ExamSim Questions - Section 8.3

8.4 Troubleshooting RIP

8.4.1 RIP Troubleshooting Introduction
8.4.2 Troubleshoot RIP 1
8.4.3 Troubleshoot RIP 2
8.4.4 Troubleshoot RIP 3
8.4.5 Troubleshoot RIP 4
8.4.6 Troubleshoot RIP 5
8.4.7 Troubleshoot RIP 6
8.4.8 Debugging RIP
8.4.9 RIP Debugging
8.4.10 ExamSim Questions - Section 8.4

8.5 Additional Configuration Practice

8.5.1 RIP Practice Network Diagram
8.5.2 Configure the LAX Router
8.5.3 Configure the SFO Router
8.5.4 Configure the SEA Router
8.5.5 Configure the BOI Router
8.5.6 Configure the DEN Router

8.6 Configuring IGRP

8.6.1 IGRP Facts
8.6.2 Configuring IGRP
8.6.3 IGRP Command List
8.6.4 Configure IGRP Networks
8.6.5 Configure IGRP Routing 1
8.6.6 Configure IGRP Communication
8.6.7 Configure IGRP Routing 2
8.6.8 Exploring the AS Number
8.6.9 Exploring RIP and IGRP Interaction
8.6.10 ExamSim Questions - Section 8.6

8.7 Troubleshooting IGRP

8.7.1 IGRP Troubleshooting Introduction
8.7.2 Troubleshoot IGRP 1
8.7.3 Troubleshoot IGRP 2
8.7.4 Troubleshoot IGRP 3
8.7.5 ExamSim Questions - Section 8.7

8.8 OSPF

8.8.1 OSPF Design
8.8.2 OSPF Facts
8.8.3 Configuring OSPF
8.8.4 OSPF Command List
8.8.5 Configure OSPF Networks
8.8.6 Exploring OSPF
8.8.7 Configure OSPF Routing
8.8.8 Managing OSPF
8.8.9 Troubleshoot OSPF 1
8.8.10 Troubleshoot OSPF 2
8.8.11 Troubleshoot OSPF 3
8.8.12 ExamSim Questions - Section 8.8

8.9 EIGRP

8.9.1 EIGRP Facts
8.9.2 EIGRP Command List
8.9.3 Configure EIGRP Networks
8.9.4 Configure EIGRP Routing
8.9.5 Troubleshoot EIGRP 1
8.9.6 Troubleshoot EIGRP 2
8.9.7 Troubleshoot EIGRP 3
8.9.8 ExamSim Questions - Section 8.9

8.10 Routing Protocol Comparison

8.10.1 Routing Protocol Comparison
8.10.2 Routing Administrative Distances
8.10.3 ExamSim Questions - Section 8.10

9.0 Wide Area Networking (12 questions)

9.1 WAN Concepts

9.1.1 WAN Communication
9.1.2 WAN Structure
9.1.3 WAN Services
9.1.4 WAN Services Facts
9.1.5 WAN Encapsulation
9.1.6 WAN Encapsulation Facts
9.1.7 ExamSim Questions - Section 9.1

10.0 Point-to-Point Protocol (PPP) (15 questions)

10.1 PPP

10.1.1 PPP Concepts
10.1.2 Establishing a PPP Session
10.1.3 PPP Facts
10.1.4 Setting PPP Encapsulation
10.1.5 PPP Command List
10.1.6 Exploring Serial Encapsulation
10.1.7 Configure PPP
10.1.8 ExamSim Questions - Section 10.1

11.0 Frame Relay (25 questions)

11.1 Frame Relay Concepts

11.1.1 Frame Relay
11.1.2 Frame Relay Communication
11.1.3 Frame Relay Facts
11.1.4 Frame Relay Protocols
11.1.5 ExamSim Questions - Section 11.1

11.2 Enabling Frame Relay

11.2.1 Configuring Frame Relay
11.2.2 Frame Relay Command List
11.2.3 Exploring Inverse ARP
11.2.4 Configure Frame Relay Encapsulation
11.2.5 Configure Frame Relay Communication
11.2.6 Disable Inverse ARP
11.2.7 ExamSim Questions - Section 11.2

11.3 Static Mappings

11.3.1 Exploring Static Mappings
11.3.2 Add a Static Map
11.3.3 Configure Static Mappings
11.3.4 Configure Frame Relay Links

11.4 Subinterfaces

11.4.1 Subinterfaces
11.4.2 Subinterfaces Facts
11.4.3 Configuring Serial Subinterfaces: Multipoint
11.4.4 Configuring Serial Subinterfaces: Point-to-Point
11.4.5 Frame Relay Subinterface Command List
11.4.6 Configure Point-to-Point Frame Relay
11.4.7 Configure Multipoint Frame Relay
11.4.8 Configure a Subinterface 1
11.4.9 Configure a Subinterface 2
11.4.10 ExamSim Questions - Section 11.4

11.5 Troubleshooting Frame Relay

11.5.1 Frame Relay Troubleshooting Introduction
11.5.2 Troubleshoot Frame Relay 1
11.5.3 Troubleshoot Frame Relay 2
11.5.4 Troubleshoot Frame Relay 3
11.5.5 Troubleshoot Frame Relay 4
11.5.6 Troubleshoot Frame Relay 5
11.5.7 Monitoring Frame Relay
11.5.8 ExamSim Questions - Section 11.5

12.0 ISDN (38 questions)

12.1 ISDN Concepts

12.1.1 ISDN
12.1.2 ISDN Facts
12.1.3 ISDN Protocol Standards
12.1.4 ISDN Components and Reference Points
12.1.5 ISDN Addressing
12.1.6 ISDN Communication
12.1.7 ISDN Communication Facts
12.1.8 ExamSim Questions - Section 12.1

12.2 Configuring BRI Interfaces

12.2.1 Configuring ISDN BRI
12.2.2 ISDN Command List
12.2.3 About ISDN Simulations
12.2.4 Configure the Switch Type
12.2.5 Configure SPIDs
12.2.6 Exploring BRI Status
12.2.7 Exploring ISDN Status
12.2.8 Configure BRI Connections
12.2.9 Configure BRI Communications
12.2.10 ExamSim Questions - Section 12.2

12.3 Dial-on-Demand Routing (DDR)

12.3.1 Dial-on-Demand Routing
12.3.2 The DDR Process
12.3.3 DDR Facts
12.3.4 Configuring Dial-on-Demand Routing (DDR)
12.3.5 DDR Command List
12.3.6 Configure a Dialer Group
12.3.7 Exploring Dialer Strings and Maps
12.3.8 Configure Dialer Strings
12.3.9 Configure Dialer Maps
12.3.10 Configure a DDR Connection
12.3.11 Configure DDR Communications 1
12.3.12 Configure Static DDR Routes
12.3.13 Configure DDR Communications 2
12.3.14 ExamSim Questions - Section 12.3

12.4 DDR Timers

12.4.1 DDR Timers
12.4.2 Set the Idle Timer
12.4.3 Set the Fast Idle Timer
12.4.4 Configure DDR Timers
12.4.5 Reset the DDR Timers
12.4.6 ExamSim Questions - Section 12.4

12.5 Complete ISDN Configuration

12.5.1 ISDN Configuration Process
12.5.2 Configure ISDN/DDR Communications
12.5.3 Configure ISDN/DDR Routing

12.6 Troubleshooting ISDN BRI

12.6.1 DDR Show Commands
12.6.2 ISDN Troubleshooting Introduction
12.6.3 Troubleshoot BRI Connections 1
12.6.4 Troubleshoot BRI Connections 2
12.6.5 Troubleshoot BRI Connections 3
12.6.6 Troubleshoot BRI Connections 4
12.6.7 Troubleshoot BRI Connections 5
12.6.8 ExamSim Questions - Section 12.6

ExamSim (550 questions)

Preparing for Certification

Exam Objectives
Exam FAQs
How to Register for an Exam
Exam-taking Hints and Tips

Objective 100, All Questions (68 questions)
Objective 200, All Questions (176 questions)
Objective 300, All Questions (90 questions)
Objective 400, All Questions (216 questions)
Typical Exam


Brief Description
CODE
Through the powerful multimedia and simulation tools, TestOut provides a unique and powerful training program to fully and adequately prepare students to become CCNA certified. Gain hands-on experience with protocols such as IP RIP, RIP, Ethernet, Access Lists, and so much more before taking certification exams. TestOut’s break-through technology and training courses are guaranteed to help students achieve passing exam scores to become CCNA certified.

Product Features:

CourseSim

CODE
CourseSim is a comprehensive learning tool that is aligned with vendor-developed certification objectives. The CourseSim materials integrate multimedia technologies, applied simulation technologies, instructional animations, and technical graphic images into a sophisticated learning environment.

LabSim

CODE
LabSim is the world's highest fidelity simulation product that aligns with the leading IT certifications. LabSim allows you to simulate hardware, operating systems and network configurations on your computer without the need of additional hardware or software. It is like having an interactive learning lab, without the expensive setup costs.

ExamSim

ExamSim software is designed to give students practical experience for taking certification exams. The tests look and feel just like the actual exams. This tool is critical to assess practical knowledge of training objectives and concepts. Each exam title comes with hundreds of randomized practice questions that cover all official exam objectives.
Download
CODE
http://rapidshare.com/files/61162586/640-801.ace
http://rapidshare.com/files/61176939/640-801.c00
http://rapidshare.com/files/61189530/640-801.c01
http://rapidshare.com/files/61206493/640-801.c02
http://rapidshare.com/files/61213830/640-801.c03
http://rapidshare.com/files/61221344/640-801.c04
http://rapidshare.com/files/61229910/640-801.c05
http://rapidshare.com/files/61235925/640-801.c06
http://rapidshare.com/files/61242820/640-801.c07
http://rapidshare.com/files/61365622/640-801.c08
http://rapidshare.com/files/61384001/640-801.c09
http://rapidshare.com/files/61392963/640-801.c10
http://rapidshare.com/files/61404692/640-801.c11

Password

CODE
pakistan or Pakistan

Thursday, May 03, 2007