Thursday, February 28, 2013

Aptoide

Description:


Aptoide - You open source package installer to Android phone.

Aptoide client is an open source Android application that allows one to install software. The installed software comes from multiple sources called "stores".

If you want to setup your own store, visit:http:www.aptoide.com. 

Wednesday, February 27, 2013

Plex




ImgPlexMenuHome

Buscando alguna aplicación para utilizar en el Media 
Center PC? O simplemente prefieren tener una interfaz más amigable para
 ver vídeos / películas / series? 
Plex es, de lejos, una de las mejores alternativas disponibles no sólo porque 
tiene una interfaz de usuario sumamente amigable y elegante, sino que nos 
permite hacer más, que sólo navegar por nuestros medios.
ImgPlexPhotos2
Plex es similar a XBMC, y por un buen motivo: está basado este otro programa. Sin embargo, Plex resulta mucho más amigable, cuenta con una mayor cantidad de “Apps” (que, de paso, son más simples de instalar), y “canales”, que representan varios canales online de video, como Netflix, Vimeo, YouTube, TED. Si cuentan con un VPN, pueden acceder también a NBC, MTV, Hulu, entre otros.
ImgPlexMusic2

La gran ventaja de Plex, sin embargo es que, como decíamos al inicio, no sólo se trata de un reproductor de medios. Si tienen un android, iPhone o iPad, pueden usar el Media Server y enviar todo el contenido que tengan en Plex, directamente al dispositivo móvil. Basta con estar en la misma red Wifi, y Plex se encargará no sólo de mostrarnos todos los videos disponibles, sino que los convertirá, en tiempo real a un formato compatible. Esto significa que podemos ver nuestros MKVs, AVIs y demás, directamente en el iPhone / Android / iPad, vía streaming. Y todo, se mantiene sincronizado. Si empiezan a ver una serie en la TV, pueden continuarla exactamente donde se quedaron, desde el teléfono.
Screen Shot 2012 02 10 at 3 35 35 PM
Si están buscando una alternativa a Boxee, ahora que ha desparecido, o probaron XBMC y no les agradó, les recomiendo que le den un vistazo a Plex (y sus apps móviles). De todas las opciones, es el que resulta más amigable.
Plex Media Center está disponible para Windows y Macs.

Saturday, February 23, 2013

Thursday, February 21, 2013

Blogger Templates

Aqui puedes encontrar todo tipo de templates para tu blog para que lo presentes de una manera diferente y fácil de configurar sin la necesidad de ser un programador de HTML. Inténtalo y veras lo divertido que es.

Link WebPage 

Also click Here

Tuesday, February 19, 2013

Access 2010: Windows Installer Package Solution Wizard

First you need :

Microsoft Access 2010 Runtime

After creating an application in Access 2010, you may need to bundle the relevant databases into a package. Access 2010 has a intrinsic feature which lets user bundle and deploy Access 2010 database applications. This feature allows you to wraps up Access application into setup package, i.e, MSI installer in which you can associate Macro or VB code with the main database file and add other information such as; registry info, bitmap files, data version, Add or Remove Programs information and EULA info.

To begin with bundling and deploying Access 2010 database, launch Access 2010 main database file and on File menu, click Save & Publish.
save publish
From main window, under Package & Distribute, click Package Solution. It will show up Package Solution button at right side, click it to get started.
2
It will bring up package Solution Wizard dialog, click Browse to select the folder where you want to create a MSI application. Click Open and in wizard window hit Next to continue.
4
In this step, click Browse to select the main database file, i.e, that contains main form, report or switchboard.
7
Now from Root install folder, select a path of folder to install the setup file and from Install subfolder, enter name of folder you want installer to create. Beneath it, you can see the full folder path.
Under Pre-installation requirements, choose an option among three available options; a) installer will be requiring Access 2010 installed on the system, b) in-case of Access 2010 absence, it will require Access 2010 runtime to run the installer, and finally c) if system has neither access 2010 nor Access 2010 runtime, then the runtime will be bundled with the installer (for including Access 2010 runtime, you need to specify the location where it is residing).
Under Shortcut Options, enable Desktop option, to create a shortcut of main database file on desktop and enter the shortcut name.
Once done configuring all the necessary options, click Next to proceed further.
8

In this step, we will be adding all the files to be bundled in MSI installer, click Add and select the application relevant database files.
9
It will instantly add the files, for removing any database file(s), select the file and click Remove. If you need to add registry keys with app to operate according to requirements, click Add, to add registry keys. Once done, click Next.
10
The last step is about adding installer properties and other feature information. Only input panes marked with red asterisk are mandatory. Start filling out General Properties, Feature Information, Add/Remove Programs Information, and File information. Click OK to end the wizard.
11
It will instantly open the folder where the it has created an MSI installer (it contains all the selected database files). To test it out, run the installer.
12
You will see the installer title as specified in wizard. Click Next to proceed with the installer steps.
13
It will start installing bundled database as an app at the specified location (as specified in wizard).
14
Once installed, move to UserApp folder to view the extracted database files.
17

Roblox

What is ROBLOX?

ROBLOX is the largest user-generated content site in videogames. On ROBLOX, players use core building components to create and share elaborate online worlds that anyone can explore and play, generating over one billion page views and 29 million in-game hours each month.
The site is ranked #1 in the US for total engagement time for kids and teens. Our mission: to become the global leader in user-generated gaming and creation for all ages.
ROBLOX is funded by top venture capital firms First Round Capital and Altos Ventures. Meet some of the people behind ROBLOX.
If building something really cool with cutting edge technology and great people appeals to you, check out our Jobs section.
We attract a lot of attention, and not just from our users. Read our press coverage.

Sunday, February 17, 2013

Lenovo Modified BIOS (unlock to install Any hardware)

   Los equipos Lenovo por defecto traen un BIOS bloqueado que no te permite por ejemplo instalar hardware como memorias ram,tarjetas de wireless etc. Solo te permite instalar  piezas originales de Lenovo. Con este Bios modificado podemos instalar piezas de terceros de otras marcas y te permite pasar de la pantalla del Bios. Dale click en  el área de descarga para ver la lista de modelos que soporta este Bios modificado.


Nmap

Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.
Nmap is ...
  • Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
  • Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
  • Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
  • Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
  • Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
  • Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, tutorials, and even a whole book! Find them in multiple languages here.
  • Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackers announcement list. You can also find Nmap on Facebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.
  • Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
  • Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.

Saturday, February 16, 2013

Allow Remote Desktop connections from outside your home network


Ever wanted to access your home computer when you're away from home? If you have a home network, you can use Remote Desktop Connection to access your home PCs from outside the network. This can be handy when you're traveling or at work.

Note

There are six steps you'll need to follow to set this up. Each one is explained in detail below.
  1. Allow remote connections to the computer you want to access.
  2. Make sure Remote Desktop is able to communicate through your firewall.
  3. Find the IP address of the computer on your home network that you want to connect to.
  4. Open your router's configuration screen and forward TCP port 3389 to the destination computer's IP address.
  5. Find your router's public IP address so that Remote Desktop can find it on the Internet.
  6. Open Remote Desktop Connection and connect.

Allow remote connections to the computer you want to access

To access one computer from another computer, you first need to allow remote connections on the computer you want to access, which must be running one of the following versions of Windows:
  • Windows XP Professional edition
  • Windows Vista Business, Ultimate, or Enterprise edition
  • Windows 7 Professional, Ultimate, or Enterprise edition
On the computer you want to access, follow these steps:
  1. Open System by clicking the Start button Picture of the Start button, right-clicking Computer, and then clicking Properties.
  2. In the left pane, click Remote settingsAdministrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. Under Remote Desktop, select one of the options to allow connections. For more information about these options, seeWhat types of Remote Desktop connections should I allow?
  4. Click Select Users.
  5. In the Remote Desktop Users dialog box, click Add.
  6. In the Select Users or Groups dialog box, do one or more of the following:
    • To specify the search location, click Locations.
    • To specify the types of objects (user names) that you want to search for, click Object Types.
    • In the Enter the object names to select box, type the user name that you want to search for, and then click Check Names. If the user name isn't found, click Advanced to run an advanced search.
  7. When you find the correct name, click OK.
    The name will be displayed in the list of users in the Remote Desktop Users dialog box.
  8. Click OK, and then click OK again.

Make sure Remote Desktop is able to communicate through your firewall

If you're using Windows Firewall, follow these steps:
  1. Click the Start button Picture of the Start button, click Control Panel, type "firewall" in the search box, and then click Windows Firewall.
  2. Click Allow a program or feature through Windows Firewall.
  3. Under Allowed programs and features, scroll down to Remote Desktop and make sure its check box is selected.
  4. Under Home/Work (Private), make sure the check box next to Remote Desktop is selected.
If you're using a non-Microsoft firewall, refer to the instructions that came with your firewall.

Find the IP address of the computer on your home network

Next, determine the IP address of the destination computer—the one you want to connect to.
  1. Click the Start button Picture of the Start button, click Control Panel, type "network" in the search box, and then click Network and Sharing Center.
  2. Next to Connections, click the link for your current network connection (either Wireless Network Connection or Local Area Connection).
  3. Click Details.
  4. Write down the IP address listed next to IPv4 Address. You'll need this address when you turn on port forwarding.

Forward TCP port 3389 to the destination computer's IP address

To allow remote connections from outside of your home network, you need to set up your router to forward remote access requests to the computer that you want to connect to.
  1. On any home network computer that's connected to the Internet, open a web browser and type the internal IP address of your router. This address will usually be 192.168.1.1, 192.168.0.1, or 192.168.2.1. Refer to the instructions that came with your router if you need more information about accessing the router's configuration screen.
  2. Type the router administrator user name and password.
  3. In the router's configuration screen, look for a place to turn on port forwarding (also called port mapping).
  4. Forward TCP port 3389, the default port for Remote Desktop Connection, to the IP address of the home computer you want to access from outside the network.
To access more than one of your home computers from outside the network, you can forward an additional TCP port to each additional computer. For example, you can forward TCP port 3390 to a second computer, TCP port 3391 to a third computer, and so on. Then change the listening port, the port that Remote Desktop listens to for incoming network traffic that matches that port, on each computer to match the number you assigned. When you use Remote Desktop Connection to connect to these computers, type the IP address of the router, followed by a colon and the port number (for example, 208.147.66.254:3390).
Changing the listening port is also helpful as a security measure, since a malicious user might first try port 3389, the default for Remote Desktop Connection. By changing the listening port, the malicious user has to guess which port you've chosen. For information about changing the listening port, see How to change the listening port for Remote Desktop on the Microsoft website.

Find your router's public IP address

While you're still at home and connected to your home network, open a web browser and search for "find IP address" to find a service that will report your router's public IP address. Unfortunately, some computers are given a different IP address each time they connect to the Internet. An Internet service provider (ISP) can use a few IP addresses to serve many customers that way, but it means that your computer's address on the Internet is always changing.
To get around the problem of a frequently changing IP address, try a DNS dynamic update service, which allows you to assign a URL to your router that you can use instead of an IP address. The URL stays the same no matter how often the IP address changes. To find a service, search for "DNS dynamic update" on the Internet.

Open Remote Desktop Connection and connect

Now you're ready to actually make the connection. Follow these steps on a computer outside of your network:
  1. Click the Start button Picture of the Start button, type "remote" in the search box, and then click Remote Desktop Connection.
  2. Type the router's public IP address in the Computer field (followed by a colon and the new port number, if you've changed the listening port; for example, 208.147.66.254:3390).
  3. Log on to the remote computer as you normally do.

Connect Nortel Switch to a Cisco Switch


802.1Q VLAN Tagging on a Cisco Catalyst 3750-E

In the two previous posts I covered how to create multiple VLANs, trunk those VLANs between multiple stackable Avaya Ethernet Routing Switches utilizing Multi-Link Trunking and how to create Layer 3 IP interfaces to be used for routing IP packets between those VLANs.
In this post I thought I would expand the network topology of my previous two posts to include a Cisco Catalyst 3750-E. I’ll specifically cover how to trunk (bridge) multiple VLANs between a stackable Avaya Ethernet Routing Switch and the Cisco Catalyst 3750-E and how to configure multiple interfaces in a Link Aggregation Group (LAG) utilizing LACP similar to Avaya’s proprietary MLT feature.

Avaya Ethernet Routing Switch 4548

enable
config t
Let’s start by making ports 45 and 46 trunk ports which will utilize 802.1Q tagging;
vlan ports 45,46 tagging tagAll
Let’s add the VLANs we wish to bridge across the trunk ports;
vlan members add 1 45,46
vlan members add 100 45,46
vlan members add 200 45,46
Now we’ll enable LACP on ports 45 and 46 using the same LACP key which will automatically create the LAG;
interface fastEthernet 45
lacp key 10
lacp mode active
lacp timeout-time short
lacp aggregation enable
exit

interface fastEthernet 46
lacp key 10
lacp mode active
lacp timeout-time short
lacp aggregation enable
exit

Avaya Ethernet Routing Switch 4548 – Show Commands

4548GT-PWR#show lacp port 45,46
Admin Oper         Trunk Partner
Port Priority Lacp    A/I Timeout Key   Key   AggrId Id    Port    Status
---- -------- ------- --- ------- ----- ----- ------ ----- ------- ------
45   32768    Active  A   Short   10    12298 8224   32    302     Active
46   32768    Active  A   Short   10    12298 8224   32    303     Active

4548GT-PWR#show mac-address-table
Mac Address Table Aging Time: 300
Number of addresses: 26

   MAC Address    Vid  Source         MAC Address    Vid  Source
----------------- ---- -------     ----------------- ---- -------
00-02-B3-CB-77-A2    1 Port:19     00-04-61-9E-46-7E    1 Port:21
00-0C-29-64-33-F9    1 Port:19     00-0C-29-A5-CB-54    1 Port:19
00-0F-20-95-38-D5    1 Port:11     00-18-01-EA-F4-45    1 Port: 1
00-1C-11-6B-DC-6B    1 Port: 1     00-1C-11-6D-15-27    1 Port: 1
00-1C-11-6D-15-DC    1 Port: 1     00-1E-7E-7C-2C-00    1
00-1E-7E-7C-2C-40    1             00-1F-0A-CE-BC-01    1 Trunk:1
00-1F-0A-CE-BC-40    1 Trunk:1     00-1F-D0-D0-BE-2D    1 Port:17
00-23-EE-96-AA-21    1 Port: 1     00-24-B5-F6-94-02    1 Trunk:1
00-64-40-CF-4D-AD    1 Trunk:32    00-64-40-CF-4D-AE    1 Trunk:32
00-64-40-CF-4D-C0    1 Trunk:32    00-0A-E4-76-9C-C8    2 Port:44
00-24-DC-DF-0D-08    2 Port:43     00-A0-F8-5E-CE-BC    2 Port:39
00-1F-0A-CE-BC-41  100 Trunk:1     00-24-7F-99-84-70  100 Port:25
00-64-40-CF-4D-AD  100 Trunk:32    00-1E-CA-F3-1D-B4  200 Port:26
00-1F-0A-CE-BC-43  200 Trunk:1     00-64-40-CF-4D-AD  200 Trunk:32

4548GT-PWR#show mlt
Id Name             Members                Bpdu   Mode           Status  Type
-- ---------------- ---------------------- ------ -------------- ------- ------
1  MLT_to_ERS5520   47-48                  All    Basic          Enabled Trunk
2  Trunk #2         NONE                   All    Basic          Disabled
3  Trunk #3         NONE                   All    Basic          Disabled
4  Trunk #4         NONE                   All    Basic          Disabled
5  Trunk #5         NONE                   All    Basic          Disabled
6  Trunk #6         NONE                   All    Basic          Disabled
7  Trunk #7         NONE                   All    Basic          Disabled
8  Trunk #8         NONE                   All    Basic          Disabled
9  Trunk #9         NONE                   All    Basic          Disabled
10 Trunk #10        NONE                   All    Basic          Disabled
11 Trunk #11        NONE                   All    Basic          Disabled
12 Trunk #12        NONE                   All    Basic          Disabled
13 Trunk #13        NONE                   All    Basic          Disabled
14 Trunk #14        NONE                   All    Basic          Disabled
15 Trunk #15        NONE                   All    Basic          Disabled
16 Trunk #16        NONE                   All    Basic          Disabled
17 Trunk #17        NONE                   All    Basic          Disabled
18 Trunk #18        NONE                   All    Basic          Disabled
19 Trunk #19        NONE                   All    Basic          Disabled
20 Trunk #20        NONE                   All    Basic          Disabled
21 Trunk #21        NONE                   All    Basic          Disabled
22 Trunk #22        NONE                   All    Basic          Disabled
23 Trunk #23        NONE                   All    Basic          Disabled
24 Trunk #24        NONE                   All    Basic          Disabled
25 Trunk #25        NONE                   All    Basic          Disabled
26 Trunk #26        NONE                   All    Basic          Disabled
27 Trunk #27        NONE                   All    Basic          Disabled
28 Trunk #28        NONE                   All    Basic          Disabled
29 Trunk #29        NONE                   All    Basic          Disabled
30 Trunk #30        NONE                   All    Basic          Disabled
31 Trunk #31        NONE                   All    Basic          Disabled
32 Trunk #32        45-46                  Single DynLag/Basic   Enabled Trunk
You might be looking at the output above and asking yourself what’s “Trunk 32″? Let me provide some quick background. You can have a total of 32 MLT/LAG trunks on a stackable Avaya Ethernet Routing Switch. When you create LACP trunks the switch automatically creates a LAG in the MLT table dynamically from the bottom up. While in the previous post I created “Trunk 1″ by trunking ports 47 and 48 together (see above), in this post I’ve created an LACP trunk on ports 45 and 46 which will be reported it the switch as “Trunk 32″. You can also see it in the MAC/FDB table above.

Cisco Catalyst 3750-E

enable
config t
Let’s give the switch an IP address in VLAN 1 for management;
vlan 1
ip address 192.168.1.25 255.255.255.0
no shut
exit
Let’s create VLAN 100 and VLAN 200 on the switch;
vlan 100
name "192-168-100-0/24"
exit
vlan 200
name "192-168-200-0/24"
exit
Let’s add the appropriate edge ports to each VLAN;
interface range gigabitEthernet 1/0/1-12
switchport access vlan 1
exit
interface range gigabitEthernet 1/0/13-24
switchport access vlan 100
exit
interface range gigabitEthernet 1/0/24-36
switchport access vlan 200
exit
Let’s configure ports 45 and 46 as trunk ports and bond them together in channel-group utilizing LACP;
interface gigabitEthernet 1/0/45
switchport trunk encapsulation dot1q
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active

interface gigabitEthernet 1/0/46
switchport trunk encapsulation dot1q
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active

Cisco Catalyst 3750-E – Show Commands

SW-3750-E#show lacp neighbor
Flags:  S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode       P - Device is in Passive mode

Channel group 1 neighbors

Partner's information:

LACP port                        Admin  Oper   Port    Port
Port      Flags   Priority  Dev ID          Age    key    Key    Number  State
Gi1/0/45  FA      32768     001e.7e7c.2c00  16s    0x0    0x300A 0x2D    0x3F
Gi1/0/46  FA      32768     001e.7e7c.2c00  27s    0x0    0x300A 0x2E    0x3F

Switch#show mac address-table
          Mac Address Table
-------------------------------------------

Vlan    Mac Address       Type        Ports
----    -----------       --------    -----
 All    0100.0ccc.cccc    STATIC      CPU
 All    0100.0ccc.cccd    STATIC      CPU
 All    0180.c200.0000    STATIC      CPU
 All    0180.c200.0001    STATIC      CPU
 All    0180.c200.0002    STATIC      CPU
 All    0180.c200.0003    STATIC      CPU
 All    0180.c200.0004    STATIC      CPU
 All    0180.c200.0005    STATIC      CPU
 All    0180.c200.0006    STATIC      CPU
 All    0180.c200.0007    STATIC      CPU
 All    0180.c200.0008    STATIC      CPU
 All    0180.c200.0009    STATIC      CPU
 All    0180.c200.000a    STATIC      CPU
 All    0180.c200.000b    STATIC      CPU
 All    0180.c200.000c    STATIC      CPU
 All    0180.c200.000d    STATIC      CPU
 All    0180.c200.000e    STATIC      CPU
 All    0180.c200.000f    STATIC      CPU
 All    0180.c200.0010    STATIC      CPU
 All    ffff.ffff.ffff    STATIC      CPU
   1    0004.619e.467e    DYNAMIC     Po1
   1    000c.2964.33f9    DYNAMIC     Po1
   1    000c.29a5.cb54    DYNAMIC     Po1
   1    000f.2095.38d5    DYNAMIC     Po1
   1    0018.01ea.f445    DYNAMIC     Po1
   1    001c.116b.dc6b    DYNAMIC     Po1
   1    001c.116d.1527    DYNAMIC     Po1
   1    001c.116d.15dc    DYNAMIC     Po1
   1    001e.7e7c.2c01    DYNAMIC     Po1
   1    001e.7e7c.2c2d    DYNAMIC     Po1
   1    001e.7e7c.2c2e    DYNAMIC     Po1
   1    001f.d0d0.be2d    DYNAMIC     Po1
   1    0023.ee96.aa21    DYNAMIC     Po1
   1    00a0.f85e.cebd    DYNAMIC     Po1
 100    0024.7f99.84e9    DYNAMIC     Po1
 200    0008.02e4.890a    DYNAMIC     Gi1/0/25
 200    001e.caf3.1db4    DYNAMIC     Po1
Total Mac Addresses for this criterion: 37
You might be asking why didn’t I assign the VLANs to the trunk ports on the Cisco Catalyst 3750-E… well with Cisco switches a trunk port is by default a member of all the VLANs that exist on the switch. So you don’t need to specifically add a VLAN to a trunk port, however, you can override the default behavior by telling the switch to only carry specific VLANs on a specific trunk port – this is called VLAN pruning.
Please feel free to point out any inconsistencies or errors I might have made.
Cheers!

Friday, February 15, 2013

Fix I Tunes error trying to connect

 Problem:
I was trying to sync my iphone with my iTunes today. But the following error message came out of the blue which never happened before:

"This iPhone cannot be used because the required software is not installed. Run iTunes Installer to remove iTunes, then install 64-bit version of iTunes."

Hence, I uninstalled iTunes in my Windows Control Panel and then reinstall again the software which I downloaded from iTunes website. iTunes was installed successfully but I still have the same error message when I tried to connect my iPhone to my laptop to sync with iTunes.

Solution:
'
Let's try a standalone Apple Mobile Device Support install. It still might not install, but fingers crossed any error messages will give us a better idea of the underlying cause of why it's not installing under normal conditions.

Download and save a copy of the iTunesSetup.exe (or iTunes64setup.exe) installer file to your hard drive:

http://www.apple.com/itunes/download/

Download and install the free trial version of WinRAR:

http://www.rarlab.com/

Right-click the iTunesSetup.exe (or iTunes64setup.exe), and select "Extract to iTunesSetup" (or "Extract to iTunes64Setup"). WinRAR will expand the contents of the file into a folder called "iTunesSetup" (or "iTunes64Setup").

Go into the folder and doubleclick the AppleMobileDeviceSupport.msi (or AppleMobileDeviceSupport64.msi) to do a standalone AMDS install.

(If it offers you the choice to remove or repair, choose "Remove", and if the uninstall goes through successfully, see if you can reinstall by doubleclicking the AppleMobileDeviceSupport.msi again.)

Does it install (or uninstall and then reinstall) properly for you?

If instead you get an error message during the install (or uninstall), let us know what it says. (Precise text, please.)

MAC OS X 10.6.2

MAC OS X 10.6.2 (SNOW LEOPARD) DISPONIBLE GRATIS PARA DESCARGAR
Mac Mac OS X Snow Leopard ha sido hoy lanzado gratuitamente a Internet para aquel que desee descargarse el sistema operativo de Mac completo. En concreto se trata de la versión 10.6.2 de Mac OS X Snow Leopard incremental queha sido liberado y que ya esta disponible como descarga gratuita a través la sección Descargas de Apple y desde aqui mismo en los enlaces que yo os dejo abajo. La nueva versión es una actualización del 99% por ciento completamente corregida de errores, incluido los aspecto de la seguridad. Ambas versiones cliente y servidor están disponibles para su descarga. Según la empresa Apple, "la versión 10.6.2 [cliente] Update se recomienda para todos los usuarios que ejecutan Mac OS X Snow Leopard e incluye correcciones generales del sistema operativo que mejoran la estabilidad, la compatibilidad, la seguridad Mac [...]". La compañía ha terminado con todos los detalles a primera vista. Sin embargo, aquellos que buscan ver la lista completa de los cambios pueden verlos a través de un enlace a HT3874 un articulo de Soporte, que incluye no sólo la versión 10.6.2 completa con todos los cambios, sino también instrucciones sobre cómo aplicar correctamente la actualización de software.
Uno de las cosas a destacar de esta nueva versión de Snow Leopard es sin duda todo el conjunto de cambios entregados dentro de Mac OS X 10.6.2. Por ahora, se ha hecho una lista de revisiones generales (disponibles abajo). Apple afirma haber incluido en su sistema operativo general correciones mucho más estables, para las siguientes cuestiones presentes en Mac OS X 10.6.1.- Un problema los datos se eliminan cuando utiliza una cuenta de invitado- Un problema que podría provocar que el sistema de cierre de sesión de forma inesperada- No se muestran los resultados de búsqueda de Spotlight y los contactos de Exchange- La fiabilidad de los elementos adicionales del menú- Un problema en el diccionario cuando se utiliza el hebreo como el idioma principal- Efecto de sonido del obturador, haga clic en la hora de tomar una captura de pantalla- Un problema con el gestor anterior de cuatro dedos- Un problema añadiendo imágenes a los contactos de la libreta de direcciones- Un problema en el Front Row que podrían causar frecuencias de cuadro débil o lento, mientras se visionan vídeos- Creación de cuentas móviles para los usuarios de Active Directory- La fiabilidad y la duración de las conexiones VPN- Mejora general de la fiabilidad de iWork, iLife, Aperture, Final Cut Studio, MobileMe y el iDisk- Mejora el rendimiento general de VoiceOver- Esta actualización soluciona la reproducción de vídeo y los problemas de rendimiento para el iMac (21.5 pulgadas, finales de 2009) e iMac (27 pulgadas, finales de 2009) los equipos que se puede producir en algunas situaciones, mientras que el puerto está activado En cuanto a la versión de servidor del sistema operativo de Apple, "la actualización 10.6.2 se recomienda para todos los servidores que están ejecutando actualmente Snow Leopard Server versión 10.6, e incluye correcciones generales del sistema operativo que mejoran la estabilidad, compatibilidad y seguridad de su servidor", dice la compañía . Mac ha realizado correcciones muy específicas para una serie de áreas, que también se divulgan en el sitio Web del fabricante de Mac's. En paralelo con Mac OS X 10.6.2, Apple también redujo los errores en la Actualización de seguridad 2009-006 para usuarios de Mac. En la forma habitual de Apple, corrigio más de 40 agujeros de seguridad, y en la actualización también se incluyen la version Mac OS X 10.6.2.
Download Mac OS X 10.6.2 Client (Free)Download Mac OS X 10.6.2 Server (Free)Download Security Update 2009-006 (Free)

Router Alley Cisco Guides

Hi there! If you're looking at this 'About' page, you are either bored, or lost, or perhaps confusing me with someone interesting and important. Those looking for blackmail material are only a Google search away from finding pieces of me spread across the Internet. (The facebook page with my name on it is a fake - a practical joke by some of my more mischievous students. Last time I checked, it states that I'm a 4-foot-10 bodybuilding scientologist, who likes Yanni and cries while watching Sixteen Candles. I am greatly offended by this - I would never listen to Yanni).




So here's the professional rundown. I go by the name of Aaron Balchunas in real life. A couple of people tried to call me "sir" or "Mr. Balchunas," but sadly were never heard from again. Check out my Resume if you wish (warning, may cause blindness).



I'm currently co-owner of Simpli-Tech, Inc., a network consulting company. Why the name Simpli-Tech? Because we're Simplifying Technology for the masses! The world is our oyster! We've managed to stay busy and afloat despite the crumbling economy, which proves that God does have a sense of humor. We finally have a website as well: Simpli-Tech website.



For seven years, I was a part-time instructor for Baker College, teaching Cisco CCNA, CCNP, and CCSP courses. I also designed the curriculum. Which meant that anything and everything wrong with the program was (and still is) my fault. I always assumed that someone would catch on to this (they didn't), and come after me with torches and pitchforks (they haven't). For now, I have taken a hiatus from teaching, after graduating my last group of students.



I will miss the teaching, the labs, and especially the students. I was blessed with fantastic students over the years. And, despite all my shortcomings, they stuck with me - through grueling labs and marathon lectures and crazy stunts that provoked the wrath of campus security (okay, the students loved that part). I will teach again, once I've determined which part of the country to spend the next several years of my life (may Michigan rest in peace).



Though my teaching hobby is on hold, this site will stay up. And I'll do my best to keep it updated as much as possible. This site started as a place to post my lecture notes, study guides, and labs - and I see no reason for that not to continue.



Why provide this material free of charge? Why not?



Fair warning, I make no claims of being an expert - in many ways I'm still a student just like all of you. Anyone worth their salt (and not a pathological liar) will admit that IT professionals/geeks are permanent students. Thus, please use the material on this site with caution. It is quite possible I have made mistakes. I would like to hear from you if you find any errors. Please berate me. I don't bite back. Usually.



I have become serious about making another run at the CCIE. My last attempt was over three years ago, and it's time to get masochistic again. I loved taking the CCIE the first two times, even as it left me bloodied and splattered on the floor. Passing it on the third attempt has a nice symmetry to it. And I will be humbler and better prepared to be a routing demigod, than if I had passed the first time. =^)



I hope you find the information on this site helpful. All I ask is that you don't steal, sell, or alter my work. I'm not entirely without ego - I will hunt you down.



Thanks for stopping by. Please pop in and say hello on our Forum. The old forum got obliterated by my former (awful) hosting company, so this new forum is a bit bare. Feel free to post something anyway. Watch out for the grue.

Virtual Drumming



Online games for kids - Lars Ulrich drums - Lars Ulrich is the drummer and co-founder (with guitarist James Hatfield) of American heavy metal band Metallica. Born in Denmark, Lars Ulrich became a professional drummer when he moved to the U.S.A. at the end of the Seventies. The style of Lars Ulrich was influenced by the great rock drummers like Ian Paice and by the music of Motorhead, Thin Lizzy, Iron Maiden and Def Leppard. The feature of Lars Ulrich's drum set, as it often happen with Hard Rock, Heavy, Speed and Trash Metal drummers is the the double bass drum, used mostly in Metallica's early albums.





You can play the Lars Ulrich drums by clicking on the keys corresponding to the drumset elements (cymbals, snare, toms and pedals). Press "key settings" to see and modify the correspondence between the keys and the virtual drum set elements.

Depending on the drums you choose, drum games sounds and virtual drumset elements -and the related keys- are different - Menu



Latest online games for kids:

Avenged Sevenfold's Jimmy The Rev Sullivan - Slipknot's Joey Jordison drums - On stage Live drums

The sound of the Sixties Vintage drums - Extreme drumming Double bass drum pedal - Hip hop music Hip hop drum kit




Thursday, February 14, 2013

Webs

The Most Popular Solution to Create a Free Website


New Easy Website Building Tools

Start using Webs' free Site Builder with our easy-to-use drag and drop interface and get your small business website running in minutes. No technical skills required! It's never been simpler to create a website for free.

Professional Website Templates

Browse our vast gallery of design templates to find your perfect style. Impress visitors with a custom logo, color scheme and tagline. At Webs, take the opportunity to start free and upgrade with premium features as you go.

Powerful Business Applications

Add impressive applications to engage with customers-perfect for displaying videos, photos or products on your site. Blog about your company right on your site, see what customers are writing about you and more.

.Learn about the features Webs has to offer your business! View Features Make a Free Website! Premium

Web Packages Premium Website Packages

We have a wide variety of website features to match your needs. With a Premium Package, get a domain name, use premium website templates, build an online store and utilize our award-winning, 24/7 support team.

Insightful Web Analytics

Drive more traffic to your site with tools that analyze and optimize your pages. See where visitors are coming from, where they're spending their time on site, which pages are popular and which links are clicked.

Attract New Business

How do you make a website popular? With our SEO Tools! Optimize your site so you'll rank well in search engines like Google and Bing. Get found by smartphone users with a mobile version of your website

Wednesday, February 13, 2013

Hombrew channel Nintendo Wii 4.3u

if you have a 2gb sd card put that safe somewhere and now
1.) On your Wii, go to 'Wii Options' → 'Wii Settings' and check what Wii System Menu Version you have.
2.) Go to the 2nd page, and go to 'Internet' → 'Console Information' and copy down your Wii's Mac Address. Click Here
3.) Using your Wii's information that you have just obtained, visit the LetterBomb website from the 'Links' section above, and fill out the fields.
4.) Once that's done, make sure 'Bundle the Hackmii Installer' is checked.
5.) Fill out the Captcha.
6.) Click either 'Cut the red wire' or 'Cut the blue wire' in order for your download to appear. Save the zip file somewhere on you computer, preferably your desktop.
7.) Extract the files from the zip file you downloaded to the root of your SD Card (you will need WinRAR in order to do this step).
8.) Insert your SD Card into your Wii, and go to your 'Wii Message Board' and go to yesterday's history.
9.) You should see an envolope that looks like a bomb, thus the exploit being called 'LetterBomb', and it should immediately load the exploit, which will load the Hackmii Installer.
10.) From there, install the Homebrew Channel.
11.) Then install Bootmii (Optional, but highly recommended).
12.) Exit the Hackmii Installer and you should now have the Homebrew Channel installed on your Wii!

Source(s):

there you go the link for letter bomb is http://please.hackmii.com/ and install apps and stuff to get apps go to homebrew wiki