Authorized Pearson Vue Test Center

TESDA

Author Login

 




  

CNCTC - Excellence in IT TRAINING

Archive for January 2011

Media Server At Home-5: All About unRAID-2

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This is the concluding part of the 5 article series for Media Server At Home. Now, lets continue our discussion about unRAID.)

You may use any computer on your network when you’re done with the configuration and activation of the un-Redundant Arrays of Inexpensive Disks. Just like any other servers, if you use Avahi in configuring your un-Redundant Arrays of Inexpensive Disks, it will simply be visible in your sidebars for Finder. For you to access the server, you may enter... continue |
_________________


Media Server At Home-4: All About unRAID-1

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This fourth part of the article will be focusing on information all about unRAID.)

There are lots of great features which un-Redundant Arrays of Inexpensive Disks offer to its patrons. This combines several drives into one volume just like the Redundant Arrays of Inexpensive/Independent Disks. These un-Redundant Arrays of Inexpensive Disks have redundancy which is built-in like the formats of its opposite counterpart. If for a reason a drive fails, any duplication you made to the un-Redundant Arrays of Inexpensive Disks... continue |
_________________


Media Server At Home-3: Software Installation And unRAID

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This the third part of our article Media Server At Home which will tackle about software installation and un-Redundant Arrays of Inexpensive Disks.)

If you also want to run the software you need to boot un-Redundant Arrays of Inexpensive Disks system off of a flash drive. A supplemental bay for storage can be freed through flash drive booting off. Both un-Redundant Arrays of Inexpensive Disks and the Operating System which is Linux’ stripped-down version can be accommodated on a 128 MB... continue |
_________________


Media Server At Home-2: un-RAID Building And Hard Drives

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

This is the second part of our discussion about creating media server at home.

You need to have lots of hard drives, a motherboard, a case, and a power supply to start your un-Redundant Arrays of Inexpensive Disks-based network. You may choose something from the recommended components list to improve your chances of acquiring a system that works while you may try using a processor or any motherboard available because a specific hardware is being recommended by *file-sharing software and new... continue |
_________________


Media Server At Home: 1

By: Cresencio Daffon Jr. Posted: 17 Jan, 2011

To share your files after storing it, you may need to create an array of disk which is network-attached.

Instead of storing your data the old fashioned way, you may store your videos, television programs, motion pictures, and your audio playlists on hard drives which is digital media distribution that has goodwill.

As you go along and try to balance quality with growth, searching the perfect storage solution can be deceiving as you may require for it. Things will arrive with complexities... continue |
_________________


Safety Measures For Your Mobile Phone To Make It Secured: 5

By: Cresencio Daffon Jr. Posted: 14 Jan, 2011

At this point, we are going to conclude our discussion about the safety measures for your mobile phone to make it secured with the second combat technique.

·         second combat technique 

The level of security at your establishment is the very thing to consider when you are to protect your mobile phone and from it you can formulate steps to apply for the realization of your goals. The least requirement that Information Technology departments seek in general is for you to remote... continue |
_________________


Safety Measures For Your Mobile Phone To Make It Secured: 4

By: Cresencio Daffon Jr. Posted: 13 Jan, 2011

Here on this part, we will tackle about the value of your mobile phone security and the first combating technique to fight phone attackers. 

  • the value of your mobile phone security

Your mobile phone security is absolutely valuable just like your priceless jewelry, you have to make sure that each time your eyes and all of your other senses are involved to safeguard your precious gadget. It is also based on the individual company, or the individual users the extent on... continue |
_________________


Safety Measures For Your Mobile Phone To Make It Secured: 3

By: Cresencio Daffon Jr. Posted: 13 Jan, 2011


This is the third part of our discussion. At this point, we will give focus on the following: 

·          Computer viruses, malicious software and trojan horses  

For attackers who are roaming everywhere, especially, within the whole cyberspace, your mobile devices are the biggest target. For the security that no malicious software has penetrated the system even a single minute, a manufacturer did create the software which enables the big Information Technology department to scan all gadgets in one single inspection. Google... continue |
_________________


Safety Measures For Your Mobile Phone To Make It Secured: 2

By: Cresencio Daffon Jr. Posted: 12 Jan, 2011

Now, we will continue our discussion in our second part of our article.

·          The most secured operating system

The most complicated thing to answer would be this. Last year, all of the major Operating Systems of smartphone have made remarkable steps. Blackberry is still the gold standard based from a security standpoint and enterprise control. On the other hand, the mobile phones of RIM have gadget-wide, futuristic encryption which includes a Secure Digital Card. However, Google Android, Apple iPhone, and other... continue |
_________________


Safety Measures For Your Mobile Phone To Make It Secured: 1

By: Cresencio Daffon Jr. Posted: 12 Jan, 2011

In the history of telecommunications, one thing we may never forget is that once there was a phone simply built for the sake of calling and being called. Years way-way back, the only thing you need to worry about when you have a telephone was the other line or the partly line who shares your phone connection, especially, during those times you need to make your phone call private and the only thing you want is the conversation between you... continue |
_________________


The Tool To Improve Your Wireless Connection

By: Cresencio Daffon Jr. Posted: 02 Jan, 2011

If until this time you are finding ways and means to improve connectivity by using wireless gadgets, well, your search is over because you can now avoid experiencing slow data loading, choppy and dropped calls with the new Micro Cell 3G. This would be an almost reliable service experience that you could ever have and it lessens the hassles you have had when you were using a traditional old service. Now, with the help of Micro Cell 3G, the nightmare... continue |
_________________


  

Search

Subscribe