Thursday, September 13, 2012

Licensing and Copyright Information Dolby Manufactured under license from Dolby Laboratories. Dolby, Pro Logic, MLP Lossless, The "AAC" logo, and the

Licensing and Copyright Information
Dolby
Manufactured under license from Dolby Laboratories. Dolby, Pro Logic, MLP Lossless, The "AAC" logo, and the double-D symbol are trademarks of Dolby Laboratories. Confidential unpublished works. Copyright 1992-2004 Dolby Laboratories. All rights reserved.
DTS
Manufactured under license under U.S. Patent #’s: 5,451,942; 5,956,674; 5,974,380; 5,978,762; 6,226,616; 6,487,535; 7,003,467; 7,212,872 & other U.S. and worldwide patents issued & pending. DTS, DTS Digital Surround, ES, and Neo:6 are registered trademarks and the DTS logos, Symbol and DTS 96/24 are trademarks of DTS, Inc. © 1996-2007 DTS, Inc. All Rights Reserved.
Manufactured under license under U.S. Patent #’s: 5,451,942; 5,956,674; 5,974,380; 5,978,762; 6,226,616; 6,487,535 & other U.S. and worldwide patents issued & pending. DTS is a registered trademark and the DTS logos, Symbol, DTS-HD and DTS-HD Master Audio are trademarks of DTS, Inc. © 1996-2007 DTS, Inc. All Rights Reserved.

Copyright © 2008 CyberLink Corp. All rights reserved. Dolby, Pro Logic, MLP Lossless, Surround EX, and the double-D symbol
are trademarks of Dolby Laboratories.

technical

To use TrueTheater™ - Stretch, it is highly recommended that you use a graphic card with 8MB or more video memory.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are sophisticated video processing technologies that require higher CPU power. If both of these functions are enabled (especially in conjunction with other audio effects), it is recommended that you use at least a 1.0GHz system for optimal performance.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are implemented within a CyberLink proprietary video decoder, thus, they are not available when hardware video acceleration is enabled.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are not available under Blu-ray Disc playback due to the limitation of platform horsepower.

TrueTheater™ - Lighting/Stretch-Related Issues

To use TrueTheater™ - Stretch, it is highly recommended that you use a graphic card with 8MB or more video memory.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are sophisticated video processing technologies that require higher CPU power. If both of these functions are enabled (especially in conjunction with other audio effects), it is recommended that you use at least a 1.0GHz system for optimal performance.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are implemented within a CyberLink proprietary video decoder, thus, they are not available when hardware video acceleration is enabled.
TrueTheater™ - Stretch and TrueTheater™ - Lighting are not available under Blu-ray Disc playback due to the limitation of platform horsepower.

Friday, September 7, 2012

a simple trick to make yahoo messenger multi login

a simple trick to make yahoo messenger multi login
u hv 2 just make a little change in registry nd ur done.

click start button,then run and then type regedit and then look for
HKEY_CURRENT_ USER
Software
yahoo
pager
Test.
then right click and press dword and name it as plural and its value
as 00000001 .

"Somebody That I Used To Know" (feat. Kimbra)

"Somebody That I Used To Know"
(feat. Kimbra)
[Gotye:]
Now and then I think of when we were together
Like when you said you felt so happy you could die
Told myself that you were right for me
But felt so lonely in your company
But that was love and it's an ache I still remember

You can get addicted to a certain kind of sadness
Like resignation to the end, always the end
So when we found that we could not make sense
Well you said that we would still be friends
But I'll admit that I was glad it was over

But you didn't have to cut me off
Make out like it never happened and that we were nothing
And I don't even need your love
But you treat me like a stranger and I feel so rough
No you didn't have to stoop so low
Have your friends collect your records and then change your number
I guess that I don't need that though
Now you're just somebody that I used to know

Now you're just somebody that I used to know
Now you're just somebody that I used to know

[Kimbra:]
Now and then I think of all the times you screwed me over
Part of me believing it was always something that I'd done
But I don't wanna live that way
Reading into every word you say
You said that you could let it go
And I wouldn't catch you hung up on somebody that you used to know

[Gotye:]
But you didn't have to cut me off
Make out like it never happened and that we were nothing
And I don't even need your love
But you treat me like a stranger and I feel so rough
And you didn't have to stoop so low
Have your friends collect your records and then change your number
I guess that I don't need that though
Now you're just somebody that I used to know

[x2]
Somebody
(I used to know)
Somebody
(Now you're just somebody that I used to know)

(I used to know)
(That I used to know)
(I used to know)
Somebody

Mind Maps Creative Images

application examples

Application
• Ms office installation
• Configuration mail account in Microsoft Outlook
• Familiarizing with Microsoft word
• Mail merge
• Familiarizing with Microsoft excel
• Working with Formula, function and charts
• Working with Microsoft PowerPoint
• Preparing presentation
• Project on PowerPoint

types of computers

Computer is an electronic device that reads and processes data to from
an information. Computer helps us to solve our problems. On the basis
of size and computation power, the computer is categorized into 4
types;

Super computer: they are fastest computers. This computer is used in
research and other operations where there is huge numerical
calculation.

Mainframe computers: These computers have many terminals. So they are
used in big business organizations where they are many departments and
people.


Mini computers: these computers are smaller than mainframes but bigger
then personal computer. They are useful for moderate organizations.

Micro computers: These computers are also knows as personal computers
(pc) .They is used for personal and office purposes.




There are four basic functions performed by computers:

1. Input 2.Prossing
3. Output 4.Storage

These functions are diagrammatically represented as:




Data i
information



Input: it is performed by input devices such as keyboard, mouse,
microphone, scanner etc.

Processing: Central Processing Unit (CPU). Processor.

Output: it is done by output devices such as monitor, printer and speaker.


Storage: it is performed by storage devices such as RAM ,hard disk
optical disks etc.
Hardware and software:

Computer system is generally divided into two parts:
Hardware: hardware refers to the physical parts of the computer like
CPU, monitor, printer etc. which can be touched and felt.

Software: software is a group of programs which make computers work.
The software tells the computer what to do and how to do.
The software is further divided into three major groups:

a. Application software: it is a group programs designed to solve
particular problem example word processing, spreadsheet, multimedia
and presentation, database etc.

b. System software: it is setup of programs which helps user to
communicate with hardware example operating system, assembler,
complier, interpreter etc.

c. Utility software: it provides service for developing and debugging
computer programs example Norton utilities, pc tools etc.



Computer Memory

The memory is the storage space in the computer system. It is the
capacity of computer to store data and information. There are two
types of memory: primary and secondary.

Primary memory
It is also called internal or main memory.RAM and ROM are the types of
primary memory.

RAM: RAM stands for random access memory. it most commonly used
memory. But, it is volatile memory. so it need regular supply of power
to hold its content.

ROM: ROM stand for read only memory. It is only for reading. It is the
permanent memory. So it holds the data even after the computer is
switched off.
Secondary memory
The secondary memory is used to store data and information for later
use. They are also called Mass storage or Auxiliary Memory because
they can store huge data and information for longer duration of time.
Secondary memory is installed in the computer from magnetic disks
such as Hard disk, Floppy disk etc. optical Disks such as CD _ROM
DVDs, etc or electronic storage like pen drive.
Hard disk and floppy disk
Hard disk and floppy disk are the most popular
magnetic disks. They are used to store huge volume of data. Hard disk
s store data and programs permanently. Floppy disks are commonly used
for copying files between computers, loading small programs into
computer etc.
Comparatively, floppy disks have lower storage capacity
than hard disks but they are cheap and easy to handle. Due to the
robust features and easy of use, the Pen-drive has higher capacity
storage device than floppy.

Magnetic Tapes
Magnetic tape is similar to commonly used audio tape recorder. It is
used for backing up the information as it is cheap and has high
storage capacity.

CD-ROM
CD-ROM stands for Compact Disk Read Only Memory. It is an optical
disk. It can store 500 to 800MB of data. Once the data is stored in
the CD-ROM, it cannot be changed.

DVD
Digital versatile disks are similar to CD-ROM in
its look. But it is featured with high data capacity. They can store
twice and something thrice the data than CD-ROM can store. The data
Preservance and quality of data stored are higher in DVDs than CD-ROM.

Computer language
Computer language are the language that con be understood by the
computers. It consists of strict rules and patterns. Basically,
computer languages are categorized into two types:

Low-level languages:-
Low level languages are machine oriented languages. They are easily
understood by computers but it is difficult for people to understand
them. Machine language and Assembly language are low level languages.
High-Level languages:-
High level languages are easy to use. These
languages are close to human language. They use English words and
English like statements which make them easier to learn and program
written in high level language must be converted to machine level
language, before it is used by computers. Some of the popular high
level languages are BASIC, FOTRAN, PASCAL, LISP, C, C++, java etc.
Advantages of computer
Computers have several advantages. Some of them are listed as follows:
a. Computer can perform complex operation in a short time
b. Computer can process large volumes of data.
c. Computers can reliable i.e they can work continuously for long time.
d. Computers are accurate i.e computer do not make mistakes.
e. Computers are versatile i.e a single computer can do a variety of
jobs such plating music, displaying movies, internet connection etc.
Application of computer
Nowadays, computers are used in every area. All the technological
advancement that we see today are due to the computer. The common
application areas of computers are:
a. Education
b. Business
c. Medicine and Healthcare
d. Communication
e. Space technology etc.

c program

Why Employee's leave Organization

Review these typical interview questions and think about how you would
answer them. Read the questions listed; you will also find some
strategy suggestions with it.
(Excerpted from the book The Accelerated Job Search by Wayne D. Ford,
Ph.D, published by The Management Advantage, Inc.)
1. Tell me about yourself:
The most often asked question in interviews. You need to have a short
statement prepared in your mind. Be careful that it does not sound
rehearsed. Limit it to work-related items unless instructed otherwise.
Talk about things you have done and jobs you have held that relate to
the position you are interviewing for. Start with the item farthest
back and work up to the present.
2. Why did you leave your last job?
Stay positive regardless of the circumstances. Never refer to a major
problem with management and never speak ill of supervisors, co-workers
or the organization. If you do, you will be the one looking bad. Keep
smiling and talk about leaving for a positive reason such as an
opportunity, a chance to do something special or other forward-looking
reasons.
3. What experience do you have in this field?
Speak about specifics that relate to the position you are applying for.
If you do not have specific experience, get as close as you can.
4. Do you consider yourself successful?
You should always answer yes and briefly explain why. A good
explanation is that you have set goals, and you have met some and are
on track to achieve the others.
5. What do co-workers say about you?
Be prepared with a quote or two from co-workers. Either a specific
statement or a paraphrase will work. Jill Clark, a co-worker at Smith
Company, always said I was the hardest workers she had ever known. It
is as powerful as Jill having said it at the interview herself.
6. What do you know about this organization?
This question is one reason to do some research on the organization
before the interview. Find out where they have been and where they are
going. What are the current issues and who are the major players?
7. What have you done to improve your knowledge in the last year?
Try to include improvement activities that relate to the job. A wide
variety of activities can be mentioned as positive self-improvement.
Have some good ones handy to mention.
8. Are you applying for other jobs?
Be honest but do not spend a lot of time in this area. Keep the focus
on this job and what you can do for this organization. Anything else is
a distraction.
9. Why do you want to work for this organization?
This may take some thought and certainly, should be based on the
research you have done on the organization. Sincerity is extremely
important here and will easily be sensed. Relate it to your long-term
career goals.
10. Do you know anyone who works for us?
Be aware of the policy on relatives working for the organization. This
can affect your answer even though they asked about friends not
relatives. Be careful to mention a friend only if they are well thought
of.
11. What kind of salary do you need?
A loaded question. A nasty little game that you will probably lose if
you answer first. So, do not answer it. Instead, say something like,
That's a tough question. Can you tell me the range for this position?
In most cases, the interviewer, taken off guard, will tell you. If not,
say that it can depend on the details of the job. Then give a wide
range.
12. Are you a team player?
You are, of course, a team player. Be sure to have examples ready.
Specifics that show you often perform for the good of the team rather
than for yourself are good evidence of your team attitude. Do not brag,
just say it in a matter-of-fact tone. This is a key point.
13. How long would you expect to work for us if hired?
Specifics here are not good. Something like this should work: I'd like
it to be a long time. Or As long as we both feel I'm doing a good job.
14. Have you ever had to fire anyone? How did you feel about that?
This is serious. Do not make light of it or in any way seem like you
like to fire people. At the same time, you will do it when it is the
right thing to do. When it comes to the organization versus the
individual who has created a harmful situation, you will protect the
organization. Remember firing is not the same as layoff or reduction in
force.
15. What is your philosophy towards work?
The interviewer is not looking for a long or flowery dissertation here.
Do you have strong feelings that the job gets done? Yes. That's the
type of answer that works best here. Short and positive, showing a
benefit to the organization.
16. If you had enough money to retire right now, would you?
Answer yes if you would. But since you need to work, this is the type
of work you prefer. Do not say yes if you do not mean it.
17. Have you ever been asked to leave a position?
If you have not, say no. If you have, be honest, brief and avoid saying
negative things about the people or organization involved.
18. Explain how you would be an asset to this organization
You should be anxious for this question. It gives you a chance to
highlight your best points as they relate to the position being
discussed. Give a little advance thought to this relationship.
19. Why should we hire you?
Point out how your assets meet what the organization needs. Do not
mention any other candidates to make a comparison.
20. Tell me about a suggestion you have made
Have a good one ready. Be sure and use a suggestion that was accepted
and was then considered successful. One related to the type of work
applied for is a real plus.
21. What irritates you about co-workers?
This is a trap question. Think real hard but fail to come up with
anything that irritates you. A short statement that you seem to get
along with folks is great.
22. What is your greatest strength?
Numerous answers are good, just stay positive. A few good examples:
Your ability to prioritize, Your problem-solving skills, Your ability
to work under pressure, Your ability to focus on projects, Your
professional expertise, Your leadership skills, Your positive attitude
23. Tell me about your dream job.
Stay away from a specific job. You cannot win. If you say the job you
are contending for is it, you strain credibility. If you say another
job is it, you plant the suspicion that you will be dissatisfied with
this position if hired. The best is to stay genetic and say something
like: A job where I love the work, like the people, can contribute and
can't wait to get to work.
24. Why do you think you would do well at this job?
Give several reasons and include skills, experience and interest.
25. What are you looking for in a job?
See answer # 23
26. What kind of person would you refuse to work with?
Do not be trivial. It would take disloyalty to the organization,
violence or lawbreaking to get you to object. Minor objections will
label you as a whiner.
27. What is more important to you: the money or the work?
Money is always important, but the work is the most important. There is
no better answer.
28. What would your previous supervisor say your strongest point is?
There are numerous good possibilities:
Loyalty, Energy, Positive attitude, Leadership, Team player, Expertise,
Initiative, Patience, Hard work, Creativity, Problem solver
29. Tell me about a problem you had with a supervisor
Biggest trap of all. This is a test to see if you will speak ill of
your boss. If you fall for it and tell about a problem with a former
boss, you may well below the interview right there. Stay positive and
develop a poor memory about any trouble with a supervisor.
30. What has disappointed you about a job?
Don't get trivial or negative. Safe areas are few but can include:
Not enough of a challenge. You were laid off in a reduction Company did
not win a contract, which would have given you more responsibility.
31. Tell me about your ability to work under pressure.
You may say that you thrive under certain types of pressure. Give an
example that relates to the type of position applied for.
32. Do your skills match this job or another job more closely?
Probably this one. Do not give fuel to the suspicion that you may want
another job more than this one.
33. What motivates you to do your best on the job?
This is a personal trait that only you can say, but good examples are:
Challenge, Achievement, Recognition
34. Are you willing to work overtime? Nights? Weekends?
This is up to you. Be totally honest.
35. How would you know you were successful on this job?
Several ways are good measures:
You set high standards for yourself and meet them. Your outcomes are a
success.Your boss tell you that you are successful
36. Would you be willing to relocate if required?
You should be clear on this with your family prior to the interview if
you think there is a chance it may come up. Do not say yes just to get
the job if the real answer is no. This can create a lot of problems
later on in your career. Be honest at this point and save yourself
future grief.
37. Are you willing to put the interests of the organization ahead ofyour own?
This is a straight loyalty and dedication question. Do not worry about
the deep ethical and philosophical implications. Just say yes.
38. Describe your management style.
Try to avoid labels. Some of the more common labels, like progressive,
salesman or consensus, can have several meanings or descriptions
depending on which management expert you listen to. The situational
style is safe, because it says you will manage according to the
situation, instead of one size fits all.
39. What have you learned from mistakes on the job?
Here you have to come up with something or you strain credibility. Make
it small, well intentioned mistake with a positive lesson learned. An
example would be working too far ahead of colleagues on a project and
thus throwing coordination off.
40. Do you have any blind spots?
Trick question. If you know about blind spots, they are no longer blind
spots. Do not reveal any personal areas of concern here. Let them do
their own discovery on your bad points. Do not hand it to them.
41. If you were hiring a person for this job, what would you look for?
Be careful to mention traits that are needed and that you have.
42. Do you think you are overqualified for this position?
Regardless of your qualifications, state that you are very well
qualified for the position.
43. How do you propose to compensate for your lack of experience?
First, if you have experience that the interviewer does not know about,
bring that up: Then, point out (if true) that you are a hard working
quick learner.
44. What qualities do you look for in a boss?
Be generic and positive. Safe qualities are knowledgeable, a sense of
humor, fair, loyal to subordinates and holder of high standards. All
bosses think they have these traits.
45. Tell me about a time when you helped resolve a dispute betweenothers.
Pick a specific incident. Concentrate on your problem solving technique
and not the dispute you settled.
46. What position do you prefer on a team working on a project?
Be honest. If you are comfortable in different roles, point that out.
47. Describe your work ethic.
Emphasize benefits to the organization. Things like, determination to
get the job done and work hard but enjoy your work are good.
48. What has been your biggest professional disappointment?
Be sure that you refer to something that was beyond your control. Show
acceptance and no negative feelings.
49. Tell me about the most fun you have had on the job.
Talk about having fun by accomplishing something for the organization.
50. Do you have any questions for me?
Always have some questions prepared. Questions prepared where you will
be an asset to the organization are good. How soon will I be able to
be productive? and What type of projects will I be able to assist on?
are
examples.

Beauty View

Hardware networking Crouse contents

Hardware networking Crouse contents
• Fundamentals of pc
• Microprocessor (Intel and AMD) installing & troubleshooting
• Memory(DDRAM,RDRAM,SDRAM) and its troubleshooting
• Motherboard (Intel. Asus, gigabyte, Asus and MSI)and its troubleshooting
• Power Supply and its troubleshooting
• Hard disk drives (IDE and SATA)
• CD ROM/CD Writer and its troubleshooting
• DVD Drives installation
• I/O ports and device
• Keyboard and mouse
• Installation and troubleshooting of modems
• Installation and troubleshooting of scanners
• Introduction of SCSI Drives
• Introduction of monitor (CRT, LCD and LED)
• Printer (DMP, DeskJet, and LaserJet)
• Laptop viewing
• Configuration and troubleshooting BIOS/CMOS setting
• PC Maintenance and troubleshooting
Operating systems contents
• operating system basic
• introduction and configuration of MS-DOS
• installation of windows XP professional
• installation of windows Vista
• installation of windows7 ultimate
• configuration windows7 desktop and display setting
• managing the multiple monitor setting
• configuration of power option
• working with user account and password
• parental control, User Privileges and local security
• hardware device drive installation and troubleshooting
• setting of network connection
• Troubleshooting TCO/IP problems
• Configuration windows firewall with Advanced security
• Working with antivirus and windows Defender
• Configuring Pop-blocker, IE security and privacy options
• Managing cookies and internet security Zones
• Working on Remote Assistance and Remote Desktop
• Configuring windows mail, calendar and contact
• Managing files and folders
• Managing offline file and encrypted files
• Working on NTFS permission shared permission
• Installing and managing Local and Network printer
• Backup and Restore
• Disk and storage management
• Check disk, Defragmentation and Disk Cleanup
• Optimizing system performance
• Configuration Ready boost and startup program
• Using advanced boot option
• Restoring stability with system restore
• Managing services antivirus software installation and configuration
• Disk manager
• System Utilities &partition magic

dos

The operating system is the first soft ware to be loaded when computer boot up.
The os acts as an interface between the usre, application programs,
hardware and system peripherals.



Operating system can be of two types:-network operating
system and simple client operating system.

Network OS client OS

1. windows2008server windows-7
3.windows2003server windows vista
3.windows2000server xp
professional
4.unix
2000 professional
5.linux
windows95/98
6.netware ms dos

Command prompt interface
Dos provides a text based inter face called the command prompt. From
the command prompt , commands can be issued to perform file and disk
management and execute programs.

Utility programs
Dos provides a number of utility programs (files with .exe and .com
extension in the C:\dos\directory) to perform various file and system
management tasks.

There are two configuration files in Dos:-
*CONFIG.SYS is a executed when the system boots up. These commands
(also known as parameters) can be edited to have varying effects on
the hardware components of the computer system.
*AUTOEXE.BAT file contain a list of Dos commands that be executed
immediately after boot up.

The cls command is used to clear the screen but it shows the
command and cursor.

The root directory normally contains the following files .
*MSDOS.SYS (hidden file)
*IO.SYS (hidden file)
*AUTOEXE.BAT
*CONFIG.SYS
Each drive has a unique drive letter.
The default drive of the hard disk, from windows is loaded, is usually C drive.

Getting system information
 C:\>dir =>list out the file and folders
 C:\>dir/p=>list out in the page by page format.
 C:\>dir d:\ enter the d drive
 C:\>dir a*.*list out the files sub-directories whose name begin with a.

Dos file management
Md$ folder name (to make new directory)
Copy$ con $ file name (to make anew file)
…………………………..f6/ctrl+z(to save the file)
1 file copied
Dir (to show contents of a directory)
cd.. (back once directory)
cd (back to root directory)
rd$ directory name (delete directory)
rd/s$ directory name(to delete all contents)
Are you sure? (y/n)
Del$ file name (delete a file)
Ren$ file name (rename a file)
Cd $folder name (to enter directory)
Tree/f$directory name (to show the tree of directory)
Attrib$ +R $file name (to make a file read only)
Attrib$ +H$ file /folder (to make hidden)
Dir/A/R (to show al the read only file)
Dir/AH to show all the Hidden contents)

Drive Format
=>format/fs:filsystem $ drive letter
=>format/ q/fs:filesystem $ drive letter


=>ver (shows the version of Dos (windows)

major english

alienation / exile
nicholasa mohr "a very special pet" if they would listen her name was
Joncrofo, Bronx six years ago were always in bloom.

family
"I am a cat" natsume soseki but as yet I have no name accomplish my
object virtue and they are much worse

identity
Catherine lim "paper" OHTE a Chinese medicine heap of ashes on the grave.

class conflict
Josef skvorecky "an insoluble problem of genetics Frederick positive
Wassermann brown green dwarf, Mendel says noting at all.

power "The elephant" slawomir nrozek zoo supreme tree tops, botanical
gardens believe in elephants director

wet satureday jhoh collier it was july. Smollett, I just knocked it.
Can you send someone at once?

Basic System Recovery

Chapter 26. Basic System Recovery

26.1. Common Problems

26.2. Booting into Rescue Mode

26.3. Booting into Single-User Mode

26.4. Booting into Emergency Mode

When things go wrong, there are ways to fix problems. However, these methods require that you understand the system well. This chapter describes how to boot into rescue mode, single-user mode, and emergency mode, where you can use your own knowledge to repair the system.

26.1. Common Problems

You might need to boot into one of these recovery modes for any of the following reasons:

You are unable to boot normally into Red Hat Enterprise Linux (runlevel 3 or 5).

You are having hardware or software problems, and you want to get a few important files off of your system's hard drive.

You forgot the root password.

26.1.1. Unable to Boot into Red Hat Enterprise Linux

This problem is often caused by the installation of another operating system after you have installed Red Hat Enterprise Linux. Some other operating systems assume that you have no other operating system(s) on your computer. They overwrite the Master Boot Record (MBR) that originally contained the GRUB boot loader. If the boot loader is overwritten in this manner, you cannot boot Red Hat Enterprise Linux unless you can get into rescue mode and reconfigure the boot loader.

Another common problem occurs when using a partitioning tool to resize a partition or create a new partition from free space after installation, and it changes the order of your partitions. If the partition number of your / partition changes, the boot loader might not be able to find it to mount the partition. To fix this problem, boot in rescue mode and modify the /boot/grub/grub.conf file.

For instructions on how to reinstall the GRUB boot loader from a rescue environment, refer to Section 26.2.1, “Reinstalling the Boot Loader”.

26.1.2. Hardware/Software Problems

This category includes a wide variety of different situations. Two examples include failing hard drives and specifying an invalid root device or kernel in the boot loader configuration file. If either of these occur, you might not be able to reboot into Red Hat Enterprise Linux. However, if you boot into one of the system recovery modes, you might be able to resolve the problem or at least get copies of your most important files.

26.1.3. Root Password

What can you do if you forget your root password? To reset it to a different password, boot into rescue mode or single-user mode, and use the passwd command to reset the root password.

26.2. Booting into Rescue Mode

Rescue mode provides the ability to boot a small Red Hat Enterprise Linux environment entirely from CD-ROM, or some other boot method, instead of the system's hard drive.

As the name implies, rescue mode is provided to rescue you from something. During normal operation, your Red Hat Enterprise Linux system uses files located on your system's hard drive to do everything — run programs, store your files, and more.

However, there may be times when you are unable to get Red Hat Enterprise Linux running completely enough to access files on your system's hard drive. Using rescue mode, you can access the files stored on your system's hard drive, even if you cannot actually run Red Hat Enterprise Linux from that hard drive.

To boot into rescue mode, you must be able to boot the system using one of the following methods[12]:

By booting the system from an installation boot CD-ROM.

By booting the system from other installation boot media, such as USB flash devices.

By booting the system from the Red Hat Enterprise Linux CD-ROM #1.

Once you have booted using one of the described methods, add the keyword rescue as a kernel parameter. For example, for an x86 system, type the following command at the installation boot prompt:

linux rescue

You are prompted to answer a few basic questions, including which language to use. It also prompts you to select where a valid rescue image is located. Select from Local CD-ROM, Hard Drive, NFS image, FTP, or HTTP. The location selected must contain a valid installation tree, and the installation tree must be for the same version of Red Hat Enterprise Linux as the Red Hat Enterprise Linux disk from which you booted. If you used a boot CD-ROM or other media to start rescue mode, the installation tree must be from the same tree from which the media was created. For more information about how to setup an installation tree on a hard drive, NFS server, FTP server, or HTTP server, refer to the earlier section of this guide.

If you select a rescue image that does not require a network connection, you are asked whether or not you want to establish a network connection. A network connection is useful if you need to backup files to a different computer or install some RPM packages from a shared network location, for example.

The following message is displayed:

The rescue environment will now attempt to find your Linux installation and mount it under the directory /mnt/sysimage. You can then make any changes required to your system. If you want to proceed with this step choose 'Continue'. You can also choose to mount your file systems read-only instead of read-write by choosing 'Read-only'. If for some reason this process fails you can choose 'Skip' and this step will be skipped and you will go directly to a command shell.

If you select Continue, it attempts to mount your file system under the directory /mnt/sysimage/. If it fails to mount a partition, it notifies you. If you select Read-Only, it attempts to mount your file system under the directory /mnt/sysimage/, but in read-only mode. If you select Skip, your file system is not mounted. Choose Skip if you think your file system is corrupted.

Once you have your system in rescue mode, a prompt appears on VC (virtual console) 1 and VC 2 (use the Ctrl-Alt-F1 key combination to access VC 1 and Ctrl-Alt-F2 to access VC 2):

sh-3.00b#

If you selected Continue to mount your partitions automatically and they were mounted successfully, you are in single-user mode.

Even if your file system is mounted, the default root partition while in rescue mode is a temporary root partition, not the root partition of the file system used during normal user mode (runlevel 3 or 5). If you selected to mount your file system and it mounted successfully, you can change the root partition of the rescue mode environment to the root partition of your file system by executing the following command:

chroot /mnt/sysimage

This is useful if you need to run commands such as rpm that require your root partition to be mounted as /. To exit the chroot environment, type exit to return to the prompt.

If you selected Skip, you can still try to mount a partition or LVM2 logical volume manually inside rescue mode by creating a directory such as /foo, and typing the following command:

mount -t ext3 /dev/mapper/VolGroup00-LogVol02/foo

In the above command, /foo is a directory that you have created and /dev/mapper/VolGroup00-LogVol02 is the LVM2 logical volume you want to mount. If the partition is of type ext2, replace ext3 with ext2.

If you do not know the names of all physical partitions, use the following command to list them:

fdisk -l

If you do not know the names of all LVM2 physical volumes, volume groups, or logical volumes, use the following commands to list them:

pvdisplay

vgdisplay

lvdisplay

From the prompt, you can run many useful commands, such as:

ssh, scp, and ping if the network is started

dump and restore for users with tape drives

parted and fdisk for managing partitions

rpm for installing or upgrading software

joe for editing configuration files

Note

If you try to start other popular editors such as emacs, pico, or vi, the joe editor is started.

26.2.1. Reinstalling the Boot Loader

In many cases, the GRUB boot loader can mistakenly be deleted, corrupted, or replaced by other operating systems.

The following steps detail the process on how GRUB is reinstalled on the master boot record:

Boot the system from an installation boot medium.

Type linux rescue at the installation boot prompt to enter the rescue environment.

Type chroot /mnt/sysimage to mount the root partition.

Type /sbin/grub-install /dev/hda to reinstall the GRUB boot loader, where /dev/hda is the boot partition.

Review the /boot/grub/grub.conf file, as additional entries may be needed for GRUB to control additional operating systems.

Reboot the system.

26.3. Booting into Single-User Mode

One of the advantages of single-user mode is that you do not need a boot CD-ROM; however, it does not give you the option to mount the file systems as read-only or not mount them at all.

If your system boots, but does not allow you to log in when it has completed booting, try single-user mode.

In single-user mode, your computer boots to runlevel 1. Your local file systems are mounted, but your network is not activated. You have a usable system maintenance shell. Unlike rescue mode, single-user mode automatically tries to mount your file system. Do not use single-user mode if your file system cannot be mounted successfully. You cannot use single-user mode if the runlevel 1 configuration on your system is corrupted.

On an x86 system using GRUB, use the following steps to boot into single-user mode:

At the GRUB splash screen at boot time, press any key to enter the GRUB interactive menu.

Select Red Hat Enterprise Linux with the version of the kernel that you wish to boot and type a to append the line.

Go to the end of the line and type single as a separate word (press the Spacebar and then type single). Press Enter to exit edit mode.

26.4. Booting into Emergency Mode

In emergency mode, you are booted into the most minimal environment possible. The root file system is mounted read-only and almost nothing is set up. The main advantage of emergency mode over single-user mode is that the init files are not loaded. If init is corrupted or not working, you can still mount file systems to recover data that could be lost during a re-installation.

To boot into emergency mode, use the same method as described for single-user mode in Section 26.3, “Booting into Single-User Mode” with one exception, replace the keyword single with the keyword

Chapter 27. Rescue Mode on POWER Systems

27.1. Special Considerations for Accessing the SCSI Utilities from Rescue Mode

You can use the installation disks in rescue mode, in case your system does not boot. Rescue mode gives you access to the disk partitions on your system so you can make any changes necessary to rescue your installation.

To boot in rescue mode on IBM System i with power control NWSD , follow the instructions for booting the installation program, with this change: In the NWSD, set the IPL parameters field to 'rescue' (including the quotes), or to 'dd rescue' if you need to load the SCSI driver. On other systems, specify the rescue or dd rescue (without quotes) after the default kernel name at the YABOOT prompt.

After the Language Selection screen (Section 12.13, “Language Selection”), the installation program attempts to mount the disk partitions on your system. It then presents you with a shell prompt where you can make the changes you need. These changes may include storing the kernel and command line into the IPL source, as described in the Installation Complete section (Section 12.26, “Installation Complete”).

When your changes are complete, you can exit the shell using exit 0. This causes a reboot from the C side. To reboot from the A or B side or from *NWSSTG, you should vary off the system instead of exiting the shell.

27.1. Special Considerations for Accessing the SCSI Utilities from Rescue Mode

If your system uses Native DASD disks, you may need access to the SCSI utilities from rescue mode. These utilities are located on the driver disc CD. The driver disc CD cannot be mounted from rescue mode unless special steps are taken. These steps are described below.

If you have a second CD-ROM drive assigned to your Linux system, you can mount the driver disc CD in the second drive.

If you have only one CD-ROM drive, you must set up an NFS boot, using the following steps:

Boot from the CD-ROM with the linux rescue askmethod command. This allows you to manually select NFS as the source of your rescue media instead of defaulting to the CD-ROM drive.

Copy the first installation disc onto a file system of another Linux system.

Make this copy of the installation disc available through NFS or FTP.

Vary off or power down the system you need to rescue. Set its IPL parameters as instructed for booting the Installation discs in rescue mode, except that the IPL source should point to the copy of boot.img on your IFS (from step 1, above).

Make sure the installation disc is not in your CD-ROM drive.

IPL the Linux system.

Follow the prompts as decribed in Chapter 27, Rescue Mode on POWER Systems. An additonal prompt for the installation source appears. Select NFS or FTP (as appropriate) and complete the following network configuration screen.

When the Linux system has booted into rescue mode, the CD-ROM drive is available for use and you can mount the driver media to access the SCSI utilities.

CONFIGUREING EIGRP BETWEEN TWO ROUTERS

CONFIGUREING EIGRP BETWEEN TWO ROUTERS
R1
R2
11.1.1.1
11.1.1.2
192.168.1.1
192.168.2.1



192.168.1.2
192.168.2.2

Configuring EIGRP on router 1
Router >enable
Router# configure $ terminal
Router(config)#hostname $ R1
R1(config)#interface $ Ethernet 0
R1(config-if)# ip $ address $ 192.168.1.1 $ 255.255.255.0
R1(config –if)#shotdown
R1(config-if)#exit
R1(config)#interface $ serial 0
R1(config-if)#ip $ address 11.1.1.1 $ 255.0.0.0
R1(config-if )#no $ shut down
R1(config –if)# clock $ rate $ 64000
R1(config-if)#ctrl+z
R1# show $ ip $ interface $ brief
R1# configure $ terminal
R1(config)# router $ eigrp $ 10
R1(config-router)#network $ 192.168.1.0
R1(config-router) #network $ 11.0.0.0
R1(config-router)ctrl+z
R1# show $ ip $ route
Configuring EIGRP on router 2
Router>enable
Router # configure $ terminal
Router(config)#hostname $ R2
R2(config) #interface $ Ethernet 0
R2(config-if)# ip $ address $ 192.168.2.1$ 255.255.255.0
R2(config-if)# no shutdown
R2(config-if) #exit
R2 (config) interface $ serial 0
R2(config-if) ip $ address 11.1.1.2 $ 255.0.0.0
R2(config-if )#no$ shutdown
R2(config –if)#ctrl+z
R2#show $ ip $ interface $ brief
R2# configure $ terminal
R2(config)#router $ eigrp $ 10
R2(config –router)#network $ 192.168.2.0 $ 255.255.255.0
R2 config-router)#network $ 11.0.0.0
R2(config-router)#ctrl+z
R2# show $ ip $ route

PC1
Ip address= 192.168.1.2
Default-gateway=192.168.1.1(router LAN port)
PC2
Ip address =192.168.2.2
Default-gateway=192.168.2.1 (router Lan port address)

ip addressing

1. Introduction.................................................2
2. IPv6 Addressing..............................................2
2.1 Addressing Model.........................................3
2.2 Text Representation of Addresses.........................3
2.3 Text Representation of Address Prefixes..................5
2.4 Address Type Representation..............................6
2.5 Unicast Addresses........................................7
2.5.1 Interface Identifiers................................8
2.5.2 The Unspecified Address..............................9
2.5.3 The Loopback Address.................................9
2.5.4 IPv6 Addresses with Embedded IPv4 Addresses.........10
2.5.5 NSAP Addresses......................................10
2.5.6 IPX Addresses.......................................10
2.5.7 Aggregatable Global Unicast Addresses...............11
2.5.8 Local-use IPv6 Unicast Addresses....................11
2.6 Anycast Addresses.......................................12
2.6.1 Required Anycast Address............................13
2.7 Multicast Addresses.....................................14



Hinden & Deering Standards Track [Page 1]

RFC 2373 IPv6 Addressing Architecture July 1998


2.7.1 Pre-Defined Multicast Addresses.....................15
2.7.2 Assignment of New IPv6 Multicast Addresses..........17
2.8 A Node's Required Addresses.............................17
3. Security Considerations.....................................18
APPENDIX A: Creating EUI-64 based Interface Identifiers........19
APPENDIX B: ABNF Description of Text Representations...........22
APPENDIX C: CHANGES FROM RFC-1884..............................23
REFERENCES.....................................................24
AUTHORS' ADDRESSES.............................................25
FULL COPYRIGHT STATEMENT.......................................26


1.0 INTRODUCTION

This specification defines the addressing architecture of the IP
Version 6 protocol. It includes a detailed description of the
currently defined address formats for IPv6 [IPV6].

The authors would like to acknowledge the contributions of Paul
Francis, Scott Bradner, Jim Bound, Brian Carpenter, Matt Crawford,
Deborah Estrin, Roger Fajman, Bob Fink, Peter Ford, Bob Gilligan,
Dimitry Haskin, Tom Harsch, Christian Huitema, Tony Li, Greg
Minshall, Thomas Narten, Erik Nordmark, Yakov Rekhter, Bill Simpson,
and Sue Thomson.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC 2119].

2.0 IPv6 ADDRESSING

IPv6 addresses are 128-bit identifiers for interfaces and sets of
interfaces. There are three types of addresses:

Unicast: An identifier for a single interface. A packet sent to
a unicast address is delivered to the interface
identified by that address.

Anycast: An identifier for a set of interfaces (typically
belonging to different nodes). A packet sent to an
anycast address is delivered to one of the interfaces
identified by that address (the "nearest" one, according
to the routing protocols' measure of distance).

Multicast: An identifier for a set of interfaces (typically
belonging to different nodes). A packet sent to a
multicast address is delivered to all interfaces
identified by that address.



Hinden & Deering Standards Track [Page 2]

RFC 2373 IPv6 Addressing Architecture July 1998


There are no broadcast addresses in IPv6, their function being
superseded by multicast addresses.

In this document, fields in addresses are given a specific name, for
example "subscriber". When this name is used with the term "ID" for
identifier after the name (e.g., "subscriber ID"), it refers to the
contents of the named field. When it is used with the term "prefix"
(e.g. "subscriber prefix") it refers to all of the address up to and
including this field.

In IPv6, all zeros and all ones are legal values for any field,
unless specifically excluded. Specifically, prefixes may contain
zero-valued fields or end in zeros.

2.1 Addressing Model

IPv6 addresses of all types are assigned to interfaces, not nodes.
An IPv6 unicast address refers to a single interface. Since each
interface belongs to a single node, any of that node's interfaces'
unicast addresses may be used as an identifier for the node.

All interfaces are required to have at least one link-local unicast
address (see section 2.8 for additional required addresses). A
single interface may also be assigned multiple IPv6 addresses of any
type (unicast, anycast, and multicast) or scope. Unicast addresses
with scope greater than link-scope are not needed for interfaces that
are not used as the origin or destination of any IPv6 packets to or
from non-neighbors. This is sometimes convenient for point-to-point
interfaces. There is one exception to this addressing model:

An unicast address or a set of unicast addresses may be assigned to
multiple physical interfaces if the implementation treats the
multiple physical interfaces as one interface when presenting it to
the internet layer. This is useful for load-sharing over multiple
physical interfaces.

Currently IPv6 continues the IPv4 model that a subnet prefix is
associated with one link. Multiple subnet prefixes may be assigned
to the same link.

2.2 Text Representation of Addresses

There are three conventional forms for representing IPv6 addresses as
text strings:

1. The preferred form is x:x:x:x:x:x:x:x, where the 'x's are the
hexadecimal values of the eight 16-bit pieces of the address.
Examples:



Hinden & Deering Standards Track [Page 3]

RFC 2373 IPv6 Addressing Architecture July 1998


FEDC:BA98:7654:3210:FEDC:BA98:7654:3210

1080:0:0:0:8:800:200C:417A

Note that it is not necessary to write the leading zeros in an
individual field, but there must be at least one numeral in every
field (except for the case described in 2.).

2. Due to some methods of allocating certain styles of IPv6
addresses, it will be common for addresses to contain long strings
of zero bits. In order to make writing addresses containing zero
bits easier a special syntax is available to compress the zeros.
The use of "::" indicates multiple groups of 16-bits of zeros.
The "::" can only appear once in an address. The "::" can also be
used to compress the leading and/or trailing zeros in an address.

For example the following addresses:

1080:0:0:0:8:800:200C:417A a unicast address
FF01:0:0:0:0:0:0:101 a multicast address
0:0:0:0:0:0:0:1 the loopback address
0:0:0:0:0:0:0:0 the unspecified addresses

may be represented as:

1080::8:800:200C:417A a unicast address
FF01::101 a multicast address
::1 the loopback address
:: the unspecified addresses

3. An alternative form that is sometimes more convenient when dealing
with a mixed environment of IPv4 and IPv6 nodes is
x:x:x:x:x:x:d.d.d.d, where the 'x's are the hexadecimal values of
the six high-order 16-bit pieces of the address, and the 'd's are
the decimal values of the four low-order 8-bit pieces of the
address (standard IPv4 representation). Examples:

0:0:0:0:0:0:13.1.68.3

0:0:0:0:0:FFFF:129.144.52.38

or in compressed form:

::13.1.68.3

::FFFF:129.144.52.38





Hinden & Deering Standards Track [Page 4]

RFC 2373 IPv6 Addressing Architecture July 1998


2.3 Text Representation of Address Prefixes

The text representation of IPv6 address prefixes is similar to the
way IPv4 addresses prefixes are written in CIDR notation. An IPv6
address prefix is represented by the notation:

ipv6-address/prefix-length

where

ipv6-address is an IPv6 address in any of the notations listed
in section 2.2.

prefix-length is a decimal value specifying how many of the
leftmost contiguous bits of the address comprise
the prefix.

For example, the following are legal representations of the 60-bit
prefix 12AB00000000CD3 (hexadecimal):

12AB:0000:0000:CD30:0000:0000:0000:0000/60
12AB::CD30:0:0:0:0/60
12AB:0:0:CD30::/60

The following are NOT legal representations of the above prefix:

I/o Device

I/o Device stands for Input and output. They are also called
peripheral device because they are surround CPU.
a. Input Device
These Devices are used to input data and program to the computer.
These are the parts of computer thorough which data or instructions
are given to computer for processing purpose. Some of popular input
device are listed below;
A. keyboard B. mouse C. joystick D. scanner E. light pen
F.Touchscreen
G. Digital camera H. touch pad I. Track ball J.
Digitizing Tablet
b. Output Devices
The output devices are the hardware's which accept result from
the primary memory and supply it to the users or store it to secondary
storage device for future use. They are mainly used for the output of
the processed information.
There are two types of output devices:
1. Soft copy output Device
2. Hard copy output Device
1. Soft copy output Device: The commonly used soft copy output
Device are monitor and panel display. The types of monitor are CRT
monitor and LCD monitor.
2. hard copy output Device :The commonly use hard copy output
Device are printer and plotters.
input dives The types of printer are
IMPACK Printer
NON Impact printer
Other classification of printer
Basally, there are 3 type of printer:
A. character printer
b. Line printer
c. page printer
A. character Printer
Character printers print only one character at a time. Daisy Wheel
Printer, Dot-matrix, and Ink-Jet Printer are the most commonly used
character printers.
B. line printers
Line printer is impact printers. They are used in computer systems
For producing high volume of paper output. Line printer can print from 300
To 2500 lines per minute. But, the limitation of printers is that they
cannot print graphics and can print only one font. Drum printer and
chain printers
Are the two most commonly used line printers.
c. Page printers
Page printer is very high speed non impact printers. They can
print at the speed of 20,000 lines per minutes. Laser printer is the
type of printer.
Plotters
The plotter is an output device that can create drawings, charts and
graphics. Some printers can also produce such graphics but plotters
are used when we requid a high quality drawing and graphics. some
common types of plotters are Drum plotters, flat bed plotters, Electro
static plotters etc.

Introduction about control panel

Introduction about paint

The paint workshop lets you to create your own illustration or alter
pictures included with the program. You can print your masterpieces or
include them in your writing work shop document.


Introduction about control panel

Control panel a major center for window sevens settings. It can be
used to specify the screen color, mouse configuration, printer
configuration, fonts, date and time formats and so on.

Introduction about mouse

Mouse is a pointing device. It is one of the primary input devices for
MS-windows. There are two types of mouse: IBM (three buttoned mouse)
and Microsoft (two buttoned mouse).

Introduction about Recycle bin

Recycle bin is a place where the file is kept which we have deleted
from our computer.

Networking Essentials

Networking Essentials

· Overview of networking

· Overview of Networking Components

· Network hardware

· Transmission media

· LAN Topologies

· Installing structures cabling

· Networking technologies

· 802 standards

· Media Access

· Ethernet

· Other network Architectures

· Network protocols

· Switches and Bridges

· Internetwork Connectivity Devices

· TCP/IP services and Application

· IP Addresses

· DHCP and Automatic IP Configuration

· Host names and FQDNs

· Server (NETBIOS)Names Resolution TCP/IP services

· Client-server communication layers

· Network server

· Client/server systems

· WANs and Remote connectivity

· NOS and working on internet

· Introduction to WAN technologies

· Advanced WAN technologies

· Remote connectivity

· Network security

· Testing and troubleshooting networks

· Wireless Networking

· Network performance and monitoring

· Make bootable pen drive

· Administrator password breaker