Stephen Sinofsky, Vice President, Windows and Windows Live Engineering Group at Microsoft, has written a blog post to everyone testing the Windows 7 Beta giving out details about skipping the Windows 7 Beta 2, and going directly to the Release Candidate (RC) build, also known as a Beta refresh. The Release Candidate will be the […]
The next upgrade to Apple’s iPhone will have a strong focus on gaming, analysts and developers agree. That’s because the gaming market is an increasingly juicy segment of the mobile multimedia space – and it’s one that Apple’s phenomenally successful iPhone is well-positioned to dominate. “The iPhone and iPod Touch are becoming a major new […]
We’re currently working on a complete website re-design that has been slow in the making, but some related technologies that were required to keep the information up to date have been progressing nicely. We hope to have a new website up and running sometime in 2009. For now, you can obtain the most recent version […]
Looks like Apple’s going to drop the DRM on the music in the iTunes store — but there’s no indication that the DRM that’s too evil to be borne for music will be likewise dropped from audiobooks and video. Right now, Apple will only sell audiobooks from Audible — and Audible will only sell audiobooks […]
VMware has imported another ex-Microsoft veteran to fight Microsoft, its worst enemy. This time it’s Tod Nielsen plucked out of Borland, where he’s been CEO for the last three years, to be VMware’s chief operating officer, a specially created job that reports to fellow Microsoft veteran, VMware CEO Paul Maritz. Back in Microsoft’s golden age, […]
RFC 1631 1. Static NAT – allows public host to communicate with a private host by creating a static one-to-one IP translation entry 2. Dynamic NAT – pool of available addresses are assigned to private hosts for internet access on an ad-hoc basis by creating a dynamic one-to-one IP translation entry 3. NAPT (PAT) – […]
Exhausts a resource limitation on the network (eg TCP, ICMP) or within an OS or app (eg HTTP, FTP ie keeping open all available connections supported by that server) to make the service unavailable for normal use – Among the most difficult to completely eliminate because of the way they use protocol weaknesses and ‘native’ […]
One common port security scenario is to configure a static MAC address on a switchport. If the switch sees a mac address other than the configured address, a violation occurs. By default, the violation action is shutdown.You might use a configuration like this in a college computer lab. Let’s say that you have a printer […]
Introduction – The Design Constraint The customer had decided to build a hosting platform, but could only arrange for a single internet connection to that site due to location. However, all other hardware was duplicated for high availability. After considering the options the following diagram was prepared showing the first pass at the design. This […]