Wednesday, August 31, 2011

Apache Byte-Range update fixes vulnerability

Apache Byte-Range update fixes vulnerability

The Apache Foundation has version 2.2.20 published their HTTP server ,
in which the critical DoS vulnerability has been eliminated. A variety
verschachtelteter byte-range information in GET or HEAD requests leads
to a high memory usage of the Apache Web server. Several such questions
can bring a server to a halt.

A tool for the demonstration of the problem is in circulation for a
week. Reports of attacks on websites is not known, however.

Administrators can install the patch, the workaround to filter or
rewrite byte range to reverse. Under certain circumstances led to the
workarounds that can not resume downloads, or WebDAV does not work
properly.

SCO vs. Linux: It's over

SCO vs. Linux: It's over
This was for SCO's headquarters in Utah responsible Tenth Court of
Appeals in Denver, confirmed the verdict of the lower court in full: A
jury decided in March 2010 that the copyright to Unix, Novell is. The
sentence was three months later explained to an input of SCO by the
competent court to be valid, however, SCO had appealed. Which has now
been discarded.
With the recent ruling must pay back now SCO licensing fees to Novell -
SCO in 2008 a court to make a payment of over 2.5 million U.S. dollars
was sentenced. It also eliminates the loss of the purported copyrights
to Unix, the basis for lawsuits against IBM and Linux users and
distributors.
SCO would now theoretically possible that the Supreme Court (Supreme
Court, is equivalent to the Federal Constitutional Court) to call, the
specialists at Groklaw, however, assume that the Supreme Court would
reject a corresponding entry without a hearing.

SCO vs. Linux: The Neverending Story
Threats to the Linux community to demand royalty payments, a lawsuit
against IBM for alleged stolen code in Linux, and legal battles with
Novell for the copyrights to Unix System V: Such actions catapulted the
SCO Group to the public interest. SCO itself has to offer here an
intricate and interesting history of Ownership. The SCO Group is the
result of a merger between the former Linux distributor Caldera and the
remains of the legendary Santa Cruz Operation Unix Company of
California. Caldera is the largest shareholder with 43 percent of the
Canopy Group also based in Utah. The roots of Caldera back to another
legend, the computer industry: Ray Noorda, longtime head of the network
company Novell.

The NetWare company had tried several times to gain a foothold in the
Unix world, and was in the wake of several acquisitions, it also came
into the possession of the notorious intellectual property rights of AT
& T Unix. Novell's Unix portfolio verscherbelte but later continued to
SCO. The now wants to impose the contract documents, that this is
complete, including the copyright, happened while Novell rights to the
Unix code on claiming. SCO has filed suit against on the basis of such
statements Novell: The company had been unjustified demands rights to
Unix technology to claim a copyright on the SCO. To allow Novell false
and misleading statements have made the ownership of Unix, which SCO
prevented from defending their own copyright.
Had started the legal dispute over allegedly stolen source code in the
Linux kernel in early March 2003: The SCO Group - formerly Caldera - IBM
sued one billion U.S. dollars in damages, because IBM had stolen as part
of its Linux initiative intellectual property of SCO intended. In
addition, SCO argued, even at this time provider of Linux-versions and a
member of United Linux initiative, Linux is no serious competition for
their own commercial Unix platform based on Intel hardware was before
Linux was IBM heavily promoted .


SCO vs. Linux: The process can begin
The SCO Group gets $ 2 million from an investor group led by majority
owner Ralph Yarro. The competent bankruptcy court in Delaware approved
the loan after an oral hearing. So SCO has sufficient funds for the
upcoming trial before a jury trial against Novell. This process, which
is about the ownership of Unix and the legality of a license protection
for Linux users who want to start tomorrow and last for three weeks.
In the hearing before the court was able to convince the SCO competent
judge that the loan from the investor group led by Ralph Yarro the
cheapest offer of twelve representing various interested parties. The
cash injection of 14 investor will bear interest at 6.6 percent, while
the set of a competitor offering an interest rate of 10 percent did.
With this offer would also set up fees for the loans became due, the
renunciation of the group led by Ralph Yarro out.
Together with the details presented to the loan will have a SCO
developed under the bankruptcy trustee Edward Cahn two-part business
plan for the next 13 weeks, separated after the software business
achieved in the revenue, and the lawsuit business, which currently
produces only expenses. Without the loan from the investor group could
not be further continued in business suit, Edward Cahn said in his
remarks. With the end of the process between SCO and Novell in late
March SCO will have sufficient funds to repay the loan back - if SCO win
the case. The further rehabilitation of the ailing company, he had
visited the offices in the UK and Germany, which can be expected to be
concluded soon, Cahn told the court. Bankruptcy judge approved the big deal.

SCO vs. Linux: the Court of Appeal to Supreme Court
In the confrontation between the SCO Group and Novell over the question
of whether there have been sold in the transfer of distribution rights
of the Unix copyrights to Unix, are signs of a further twist. Because
quote at the hearing before the Court of Appeal SCO many witnesses from
memory, Novell has filed a petition before the Supreme Court .. Court to
clarify the principle, whether included in the sale of software
distribution rights, copyright is or it is left to a distribution
contract with the buyer, which copyrights are transferred without
explicit mention.
The filed by Novell in an application, a Certiorari (the superior court
may request files from a running process) question about the copyright
is to be understood against the background that at the hearing, the
appeals court in Salt Lake City by the SCO lawyers many witnesses are
summoned, the report by the contract between SCO and Novell hearsay.
Because there were contracts which could operate the distribution and
development of SCO Unix, Unix is ​​the copyright of these contracts went
over to SCO, then the position of the witnesses.
This position was especially striking on the fourth of the trial in the
videotaped testimony of Doug Michels expression, which was the agreement
with Novell's Vice President of SCO. For him, there were no doubts that
includes the transfer of copyright to purchase a software need to be
mentioned explicitly in a contract. According to Michels copyrights
belong "like oxygen" to software development. "Well, I meant that the
only way that I know of, and anyone on my team knew of to buy a software
business is to buy the copyrights, and there's no way we would have ever
done a deal to buy a software business where we did not get the
copyrights and all the other intellectual property. "The SCO's founding
had to demand to admit, however, never dealt with the contracts in
detail and has no knowledge of additional contractual arrangements have.
In these agreements, the so-called asset purchase agreement, are the
restrictive provisions relied on by Novell.
Michel's statement may seem surprising in the context that this together
with his brother, the original Santa Cruz Operation, founded to develop
the Unix derivative produced by Microsoft Xenix on. While SCO Xenix,
sold the copyright remained with Microsoft.
Against the statement of Michels and others stood above all the versions
of the Novell chief Jack Messman, which were also recorded on video.
This described the transfer of Unix to SCO development against the
backdrop of the then market conditions. SCO gave everything they had, so
the company could bring a unified, competitive Unix to Microsoft Windows
NT on the market. The copyrights were not part of the agreement because
they would not necessarily need to develop a software. For this reason,
Novell wants to make his entry before the Supreme Court the question of
copyright in a matter of principle.
Whether the attempt by Novell to succeed, in the ongoing negotiation of
the Supreme Court can clarify and change to a fundamental question about
software contracts is uncertain. According to U.S. law, the Supreme
Court is not bound to accept the application and may reject it without
further notice. Have harmed another point in Messman denied in his
testimony with a statement to the SCO Group. To get the Linux-protection
program against claims by SCO, Linux installations for license fees, had
been launched by Novell alone, therefore, to reassure their customers.
Before the appeal court is next to the disputed claim copyrights to SCO
Group, Novell has screwed up the company with its Linux Indemnification
Program, the business. SCO will make Novell be liable for lost payments,
because many companies wanted to acquire an antidote license. After
assessing the damage SCO is at least $ 25 million.
The appeal hearing will be held in Salt Lake City before a grand jury
and goes to this weekend at the intermission. In recent days, the judge
repeatedly admonished the jurors not to discuss the case, either in
person or over the Internet via Twitter, Facebook, LinkedIn, in online
chat rooms or via Blackberry email. The news in the media concerning
this case should not be considered by the jury. Judge Stewart told them
to just start the process, it will go to an "open-source Unix program
called" earned, but with this characterization of protest from both parties.

SCO vs. Linux: The jury is informed
In the second week of negotiations in process between the SCO Group and
Novell to Unix on the Coypright before a grand jury in Salt Lake City,
the process further surprising details of the endless story has exposed.
Initially charged as a witness confirmed the former SCO CEO Darl
McBride, SCO does not dispute that copyrights of Unix required for the
development of its operating system family, but only for the business
license of companies part SCOScource. Then the unsuspecting to date
jurors were informed that a judge had already spoken in the procedural
law, but his sentence was revised. The process starts in the third week
of negotiations, during the same time in Salt Lake City, Novell's Open
House takes place Brainshare.
The current proceedings before a grand jury had become necessary after
it had been revised in 2009, an appeals court the first instance
decision of Judge Dale Kimball of the single year 2007. The court found
that the issue needed to be renegotiated if the sale has gone over the
Unix distribution rights of the copyright to Unix, Novell and SCO. That
issue is so sensitive that they before an impartial jury and must not be
negotiated with a single judge. Accordingly, in the first week of
negotiations of the appeal hearing were sworn in the jury they must find
without prior knowledge of the long process of history about the
copyright issue.
Due to the survey of a financial expert, the presiding judge decided on
9 The trial, the jury regarding how that SCO was convicted at an earlier
hearing, an appellate court ruling but had been revised. Earlier, a
witness interview on 8 The trial revealed that the issue of copyright is
closely linked to the issue of the antidote licenses, SCO wanted to sell
to companies that use Linux. Former SCO CEO Darl McBride was forced to
admit in court that the property was seen as a prerequisite to the
copyrights, licenses to sell antidote. This deal collapsed after
presentation by McBride, as Novell, said company by its customers to
protect themselves against claims in SCO.
Other surprises in the second trial included the testimony of weeks
bestallten of SCO experts admit Gary Pisano, who had to have taken one
used by him to the Yankee Group market study without looking at the
methodology of this study as a basis for damage calculation.
Furthermore, an internal memorandum from Hewlett-Packard was presented
to the question whether one should be in the interest of the customer to
purchase a license antidote. The authors of HP-memorandum were of the
opinion that the purchase of a license should be assessed similarly to
the support of terrorists through money payments.

SCO vs. Linux: The jury recognizes Novell's Unix copyrights to
In the proceedings before a grand jury in Salt Lake City dispute between
the SCO Group and Novell over the question of who owns the copyrights,
the jury rendered the unanimous verdict, as Groklaw writes: Novell has
resold the copyright, as the Unix business was sold to SCO. The
intellectual property of Unix is ​​still one of Novell. Accordingly,
there is currently no way for SCO, Linux users with a license to
threaten antidote. The procedure is the jury's verdict does not end
because some action points must be decided by the presiding judge. This
includes a request from SCO, but still get the copyrights, because they
had acted in "good faith" to own the copyrights.
In a first reaction to the decision of the jury, Novell shows extremely
happy, and emphasizes the role that the process for Novell's open source
community has taken over: "The decision is good news for Novell, Linux
and the Open source community. We have long advocated the view that this
approach has against Linux has no basis, and we are pleased that the
jury, this just looks unanimous and in a decision. I'm proud of Novell's
role in protecting the interests Linux and the open source community,
"said Novell CEO Ron Hovsepian threw into the chest. Sober is the
verdict for IBM. Compared to the Wall Street Journal said an IBM
spokeswoman, that the ruling meant the failure of the entire strategy of
SCO lawsuit.
This is exactly what SCO does differently, however. Compared to the Salt
Lake City Tribune showed the SCO bankruptcy trustee Edward Cahn very
disappointed by the verdict of the jury. At the same time he announced
that machinery will continue to run the action and now IBM is attacked:
"We still have claims against IBM, regardless of this decision." In
contrast to the controversy over the copyright issue in the proceedings
between SCO Group and IBM to the question of whether IBM had illegally
transmitted code or programming concepts from Unix to Linux, as both
companies worked together at the Monterey Project.
The renewed challenge of bestallten by a bankruptcy court bankruptcy
trustee is important because it has to decide the former Justice Cahn
now about what to do with the cash infusion of $ 2 million, the SCO
short by an investor group led by equity majority owner Ralph Yarro
before the procedure had received. The SCO's stock went even immediately
after the announcement of the verdict on the free-fall.

SCO vs. Linux: The role of Groklaw
Still, the confrontation between the SCO Group and Novell to Unix
copyrights is not over, even if the jury unanimously confirms Novell's
ownership of such rights. Nevertheless, already a winner is clear: They
are the volunteers of Groklaw, who tirelessly every turn in the "Endless
Story" followed and documented. Led by a being named "Pamela Jones"
Groklaw has ensured that any move by SCO was dissected and analyzed.
Today is the most important website Groklaw, the processes of property
claims pursued in the software industry.
Developed as the SCO Group in early 2003 from the Linux distributor
Caldera out a lawsuit machinery, was distinguished from the outlines
that the use of Linux in enterprises is an important IT trend. The first
lawsuit by SCO against IBM in March 2003 it was clear that fundamental
questions addressed in court for intellectual property in the
open-source can be. At the latest after the presentation of evidence and
in highly questionable "Greek" issued lines of code, there is resistance
formed in the scene with the opinions of prominent activists to Linus
Torvalds.
In this phase, Pamela Jones started a blog on Radio Userland. Jones,
claims to have a paralegal, called the blog Groklaw, in allusion to the
verb "grok" that the hacker long as counterpart "zen" of the complete
understanding of code used (it comes from the language of the Martians
in a science fiction novel).
Groklaw watched the events which soon developed on several fronts. SCO
began to demand licenses for Linux installations, companies such as
DaimlerChrysler sued Autozone and Novell, and finally, when the company
objected, pointing to the copyrights. The development was so fast that
the anonymous blogger needed help and they got it. A crowd of volunteers
gathered at Groklaw, which reached no later than the end of 2003 as a
state official, partisan process monitoring platform and defends to this
day with stamina. Even in the last week of judges and lawyers were
negotiating over the issue of whether the jury must be informed of the
existence of Groklaw, with the admonition not to call this side of the
Internet.
Long before the wild theories developed a Web 2.0, Groklaw showed the
possibilities of self-organization on the Internet. Volunteers, the
thousands of digitized documents, the shorthand any court created by
SCO, a message center, which itself was used by the SCO's attorneys. The
importance of Groklaw is so important because it at the beginning of the
actions of SCO with the exception of the slightly different oriented
Free Software Foundation has been little lobbying organizations for open
source. Only much later formed structures such as open source for
America - this also as a reminder to the accusation of SCO that open
source by nature is un-American. It can rely on Groklaw a virtue, the
Alexis de Tocqueville admired even when he referred to the active action
in the community as ur-American nature. Great American also the target
of Groklaw is: if all processes are over, will present themselves Pamela
Jones in a red evening dress.

Copyright Unix: SCO wants a new sentence

SCO wants to try some other process on the question of who owns the Unix
copyrights. In the summer of 2007, a court had awarded the rights to
Unix, Novell. After an objection by SCO Appeals Court ruled that the
issue should be heard by a jury. She had also decided a few weeks ago
that the Unix copyright is owned by Novell.
As Groklaw reports that SCO has now made an entry on the court, asking
the judge to set aside the verdict of the jury award and the copyright
but SCO. As an alternative, SCO before a new trial. The reason: The jury
was the question of whether the copyright was by the contract between
SCO and Novell transferred to SCO, misunderstood.

SCO vs. Linux: The never ending story ends
In the seven years of protracted dispute over copyrights to Unix, to
license fees for Linux installations and the question of whether
programming code or programming concepts from Unix to Linux migrated,
the SCO Group's court sustained a severe and probably final defeat .
Judge Jack Stewart rejected a petition by SCO, which urged the company a
new trial, and declared the jury's decision, according to the lie the
copyright to Unix from Novell, to be convincing and appropriate. In
addition, the judge declared the case closed. Whether the bankrupt SCO
Group is suing the verdict is not yet known.
According to the Groklaw published by decision of federal judge handed
down the verdict Stewart relies on a statement of the former SCO CEO
Darl McBride. This was explained in the procedure before the jury that
it needed the copyrights to SCO Unix does not necessarily. Together with
the persuasive decision of the jury that the Unix copyrights are owned
by Novell, it follows for the Court no position is justified by which a
repositioning of the process.
In an initial statement said Novell spokesman Ian Bruce, Novell is
pleased with the ruling and see it as crucial in the development of
Linux and open source software. A statement from SCO or the SCO
bankruptcy trustee Edward Cahn is still pending. Cahn had recently made
the continuation of the procedure depends on whether the bankruptcy
court approves its reorganization plan, according to the SCO's Worldwide
exclude or sold. The approval of this reorganization is still pending.
From the decision of Federal Judge some procedures are concerned, the
SCO had filed. In addition to leading the fight over the copyrights to
Unix, SCO and Novell with the complaint and counter complaint is a
lawsuit by SCO against Linux distributor Red Hat has become obsolete.
Moreover, the defeat means that the SCO case against IBM lacks the
conditions to continue the lawsuit. Technically, alone remains the
countersuit by IBM from 2004, but it is questionable whether IBM enabled
this action given the situation at all from SCO.
Total distinguished from one end to the never-ending story. Whether the
failed attempts by SCO sufficient to prevent other companies from the
development of Linux to fight legally, only time will tell.

SCO filing an opposition against the end of the endless story
A few days before the hearing in his own bankruptcy, the SCO Group has
filed its appeal against a ruling by a series of processes the rug out
from under this company. As Groklaw reports that SCO wants to negotiate
the decision by Judge Ted Stewart in front of an appeals court. Stewart
had declared the decision of a jury to be legal, who had been following
a hearing that the copyright to Unix, Novell has remained, as Novell
sold the Unix business to SCO Group. Stewart had also rejected a
petition by SCO to repeat the process.
In the filed of Groklaw, SCO wants documented statement that the 10th
U.S. Court of Appeals dealt with the case. It should overrule the
decision of the jury and collect the verdict of Judge Stewart.
Alternatively, in this case, SCO would agree to repeat the process.
Whether SCO has the financial means, this new round, or even to deny a
new trial, however, depends on the negotiation of the bankruptcy court
in which the SCO Group must present a business plan. The company itself
is apparently of the opinion that you are covered thanks to a financial
agreement reached in 2005 with the law firm Boies Schiller & Flexner
LLP, the cost of rolling up the entire process in the first instance.

Flickr enhanced privacy settings for local data

Flickr enhanced privacy settings for local data

The photo service Flickr has introduced a new feature that allows the
privacy settings should be simplified with geotagging. Users can now
leave from orbit locations on the map with so-called geofences and
display the location data of pictures taken there automatically only
selected groups of contacts. The display of geotagged, so the location
information to be uploaded photos to Flickr with long individually
adapted. Vordefininierte a default can be overridden at the request of
individual photos.

Flickr geofences said the introduction of the new feature should help
users to deal with their privacy by automating processes and eliminates
unwanted settings as a result of forgetfulness. Photographers can now
for example the location of their house or their child's school by
default, display only close friends and no longer need this setting for
each photo taken there, choose extra. With the introduction of geofences
Flickr would equally contribute to the popularity of geotagging and the
growing community awareness of Internet privacy bill.

False certificate is a result of a Google Hacks

False certificate is a result of a Google Hacks

After the weekend was an illegally issued certificate in active use for the monitoring of Iranian Gmail users will now register the certificate issuer to word: According to the publisher DigiNotar on 19 July this year found a burglar in his systems, in which the attacker could generate multiple certificates. Even now, the used certificate for *. google.com lay beneath.

DigiNotar has subsequently investigated the extent of the break and the recall of all illegally issued certificates. As it turns out to have been be overlooked, however, certificates, as well as the DigiNotar admit. "We have found that at least one false certificate is not withdrawn after us, the Dutch government organization Govcert it has drawn attention, we have carried out immediately." .

The attackers were aiming at the target for the issuance of SSL and Extended Validation SSL Certificates (EVSSL) competent infrastructure. DigiNotar will not issue any more certificates, not before more security checks were carried out by external service providers. Why is only now happening, however, leaves the company - after the burglary has taken place in mid-July. A solution should be available by the end of the week.

The parent company VASCO tries its shareholders to appease with warm words. "In the first half of the proceeds from the SSL and EVSSL business at less than 100,000 € were VASCO not expected that the incident at DigiNotar significant impact on future revenue or business plans will have. " The living in Iran users of Gmail, which may have been monitored over a period of several weeks by the Iranian government, this is little consolation. They have been weighed by the supposed secure connection to Google's servers into a false security.

It can currently not exclude that other DigiNotar has overlooked in the burglary at lock-issued certificates. Therefore, the browser makers have opted for a radical step: They want to trust the future no longer DigiNotar certificates. Google, Mozilla announced and already on updates, which remove the CA from the list of trusted publishers. Microsoft can leverage the centralized Certificate Trust List, of which versions of Windows Vista will automatically benefit from. For Windows XP and Windows Server 2003, there will be separate security updates.

A study published by Mozilla manual describes how to delete the root certificate manually from Firefox. [Update] Contrary to our original presentation made the Mozilla instructions very well have the desired effect. The root certificate is not deleted, but it will be removed from the trust.

Pakistan is in derogation of anonymous surfing

Pakistan is in derogation of anonymous surfing

Pakistan's Internet providers have been asked to prevent anonymous
traffic over VPN connections. The state telecommunications regulator,
the PTA had access provider in a letter addressed to "security reasons,
the use of mechanisms such as encrypted VPNs prevent, prevent the
interception of traffic." The Indian website Medianama published on
Tuesday a list of all servers to block access.

A spokesman for the authority told the Pakistani daily newspaper Tribune
(Monday edition), the action should terrorists be prevented from
anonymous exchange on the Internet. He admitted however that this only
by a blanket blocking of VPNs for all Internet users is possible. In
Pakistan, in addition to VPN servers, increasingly, websites blocked, so
is possible in Pakistan since July is no access onto U.S. culture
magazine Rolling Stone more. This is due to information from the Tribune
ran a short blog post, in which the high military spending in Pakistan
to be criticized.

Already gone: James Gosling leaves Google

Already gone: James Gosling leaves Google

James Gosling, considered the inventor of the Java programming language, has not even leave after six months, the Internet company Google again. He hires the small California-based Liquid Robotics as Chief Software Architect.

Represents the start-up Liquid Robotics unmanned, moving him into oceans away companion that collect oceanic data with different sensors and load data in near real-time as as a Service (DaaS) in a cloud can. The Wave Glider these devices use when cruising through the waters only the energy of the waves and about by researchers at the National Ocean and Atmospheric Administration's National Data Buoy Center, Pacific Marine Environmental Laboratory and the University of Hawaii used.

Gosling was joined Google in late March, without specifying the time may be exactly what his work with the group. Previously, he had taken a year off after he had in April 2010, Oracle turned its back. He was apparently dissatisfied with the conditions that had given him the database giant, after the company Sun Microsystems in January of that year, could take over for good.

The departure from Google seems conciliatory fail. Sun Gosling writes in his blog that he was surprised by themselves, so soon to leave Google. He met people at the intenet Group, contributed the Exceptional. When he meets Robotics Liquid Bill Vass, a Sun veteran who headed the start-up as Chief Executive Officer (CEO).

Tuesday, August 30, 2011

Citrix XenDesktop 5.5 completed

Citrix XenDesktop 5.5 completed
The acquisition of RingCube early August 2011 was the Citrix technology,
"Human vDisk" integrate into the XenDesktop 5.5. This is the IT
administrator can deploy to the personal-tailored virtual desktops
cheaper and faster than before. In addition, the developer according to
the manufacturer to transfer technology HDX (High Definition User
Experience) for LAN and WAN have improved. Businesses should be with
XenDesktop 5.5 in the situation, virtual workplaces, even in remote
locations or on the road to provide significantly higher performance.

Citrix XenDesktop environments distributed to stations on the network
Image: Citrix Systems Inc.
For the different devices - for netbooks, smartphones and tablets -
offers Citrix XenDesktop to 5.5 in modified form, with each matching
operation, including multi-touch gestures, so users do not have to
change. The integrated XenClient 2 should be available earlier in
contrast to a large number of laptops. In addition, the new, also
included Citrix XenApp gives 6.5 according Apps significantly more
performance. It should be able to deliver the applications in the same
HD quality as provided by XenDesktop environments.
All three products are available through the Citrix Web site via
download. Suggested retail prices start at $ 95 U.S. per user and device
in the VDI version (Virtual Desktop Infrastructure). In the larger
Enterprise and Platinum versions are priced at 225 or 350 U.S. $.
XenClient 2 is available for free download.

Surfing with two DSL lines simultaneously

Surfing with two DSL lines simultaneously
For Whom the speed of its DSL access is not enough, you can resort to
unusual measures. We explain how to use two DSL lines or UMTS sticks
simultaneously.

Not everyone is lucky enough to live in an area where DSL with a full
range of 16,000 kbit / s or even VDSL up to 50,000 kbit / s is
available. A possible alternative would be to the Internet via the cable
connection, which now ranges from 32 Mbit / s offering, in some regions
even 100 Mbit / s. But if your site no cable Internet is available, it
usually looks bleak with fast and affordable alternatives.
Anyone who so much suffering in the slow speed that he is willing to
invest some € per month in addition, for this paper, we present a
solution: the coupling of multiple DSL and / or UMTS access. This may
initially sound strange, but it is a perfectly workable solution to surf
faster.

If you at the speed of your DSL connection is not satisfactory, one is
faster at your site but not technically feasible, there is the option to
combine two DSL connections, or to couple.

You may be wondering now, should work like this, after all, you only
have one phone line that leads to you in the apartment. Although this is
right so far, but in the line are usually four wires. Per port are
required but only two. That is, a pair of wires unconnected ends of the
cover behind the phone jack. Unless the other two cores are consistently
led to the cellar distributor of telecom (transfer point), you can
switch to a second terminal. The commissioning of your provider then
mounted a second phone jack beside the first.
To proceed to couple two DSL connections:

DSL tariff comparison pcwelt.de
1st Order a second DSL line. On the rate calculator to see pcwelt.de the
lowest bidder. Tap in your code there, so that regional deals are
considered. If you have decided on a vendor that you specify in the
order that you want a new connection. With some providers, you need to
do in online form - strictly speaking, false - statement to make "No
phone line available." They never mention the number of your current
connection, otherwise you may get no additional connection, but the old
is replaced by the new one. Do you prefer on your mobile phone number as
a callback number.
2nd Obtain the following components:

Draytek Vigor 2910G
- Offers a special router that connect two DSL modems (WAN connections)
and multipath routing or load balancing support. Such routers are
relatively rare, so we have picked out three possible candidates for you:

1st Draytek Vigor 2910th It is available in several versions - for
example, without the WLAN (Vigor 2910), with Wi-Fi (Vigor 2910G), with
VoIP PBX (Vigor 2910V) as well as wireless and VoIP telephone system
(Vigor 2910VG). The prices between 150 and 230 euros.
2nd Allnet ALL1295VPN. This router has no wireless and costs around 190 €.
3rd Allnet ALL1297FW. Also this router has no wireless. It costs around
150 €.

D-Link DSL modem DSL-380T/DE
- Two DSL modems. If you own your existing DSL line a router with
integrated DSL modem, check the manual, if the modem function can also
be used separately. When the AVM Fritz boxes of the problem as possible.
The router that you get to your new DSL connection must support this
feature. If not, buy one or two simple DSL modems, for example, the
D-Link for DSL-380T/DE and 34 €.
3rd Close to everything: After the second DSL line was connected,
connect to a telephone box to a DSL modem, or DSL to configure the
router so that they can be used as a pure DSL modem. At the Fritz boxes
must "use Fritz! Box as a DSL modem" is only to "Settings, Advanced
Settings, Internet access" option. The network port of the first DSL
modem or DSL router, you connect to the WAN socket of the first special
router, the network connection of the second DSL modem or DSL router
with the second WAN port.

Configuration menu of the Draytek Vigor 2910
4th Configure the special router: In the settings menu of the
load-balancing router with two WAN ports that they should build their
connection via PPPOE. Enter the first WAN port to access the first DSL
line, the second to access the second one DSL connection. The router
should automatically decide, from which it transmits network usage data
via the second DSL connection. If necessary, you can change this
threshold. At the request can also specify that only data packets of
certain Internet services via the second port are sent. For example, you
can have all the data from a swap meet run on a port and all other data
on the other.

Download Manager DownThemAll!
5th Use a download manager: Since the call to be built webpages multiple
simultaneous server connections, one for each component of the page
(images, banners, videos, ...), you'll notice an immediate speed
increase here. When downloading a file, however, because the default
runs only on a single server connection. For technical reasons, a single
server connection can be described with the bundling is not split into
two DSL lines. Therefore, you should install a download manager that
creates multiple concurrent server connections and downloads on any one
part of the file. For Firefox, we recommend the free extension DownThemAll.
Note: There are two reasons, which could again fail the second order for
the DSL connection: 1 There are already occupied all the lines leading
from the basement to the street cabinet to the distributor road. 2nd In
exchange, all DSL ports are already occupied. Both can learn but only if
you have already instructed the circuit. However, they are no risk: If
the connection can not be realized, the order is canceled for free. Then
you still have the option, your DSL connection with a UMTS access to
pool, so to combine the steps shown up with those on the next page.

After we have described to you how you pair two DSL connections, to
achieve a higher rate, you will learn how to accomplish the same thing
with two UMTS access. In particular, T-Mobile and Vodafone have
well-developed UMTS networks, characterized by the acceleration
technology with HSDPA up to 3.6 Mbit / s, even at individual locations
of up to 7.2 Mbit / s can use.
Where no UMTS is available you surf nationwide (T-Mobile) and almost
nationwide (Vodafone and O2) on the EDGE technology with 220 kbit / s.
This is not particularly exciting, but at least more than an analog
modem (56 kbit / s) or ISDN (64 Kbps). And with the bundling of two
approaches to get EDGE on at least 440 kbit / s. The speeds mentioned
are of course ideal values, which vary depending on network utilization.
To proceed to couple two UMTS access:
1st Order two UMTS data flat rates: We offer you an overview of each
affordable flat rates with UMTS UMTS contract and prepaid flatrate. The
only catch with UMTS flat rates is that they cut back after a certain
volume of usage per month (usually 5 MB) for the rest of the month on
analog modem or ISDN standard (56 kbits / s or 64 kbit / s). Since you
are using, yes, but two UMTS rates, doubling the volume, which stands
for fast data transfer. Since the router transmits data packets not
entirely evenly distributed on both connections will reach one of the
two rates, throttling somewhat more likely than the others.
2nd Obtain the following components:
- Offers a special router that connect two internet connections (WAN
connections) and multipath routing or load balancing support. As
described on the previous pages, these routers are relatively rare.
Three possible candidates are: 1 Draytek Vigor 2910th It is available in
several versions - for example, without the WLAN (Vigor 2910), with
Wi-Fi (Vigor 2910G), with VoIP PBX (Vigor 2910V) as well as wireless and
VoIP telephone system (Vigor 2910VG). The prices between 150 and 230 euros.
2nd Allnet ALL1295VPN. He has no WiFi and costs around 190 €.
3rd Allnet ALL1297FW. Also this router has no wireless. It costs around
150 €.

UMTS Stick Vodafone Surf
- Two UMTS USB sticks surf: You can obtain a rule for UMTS flat rate or
no cost to do so. Make sure that the drives compatible with UMTS router
(next item) are.

3G UMTS Router Edimax 6210n
- Two routers at the UMTS can connect flash drives and (at least)
provide a LAN connection. Particularly compact and convenient is the
Linksys 3G 6210n, the price is around 65 €. Edimax has compiled a list
of the compatible UMTS sticks.
If you have opted for load-balancing router (first point) for the Vigor
2910, by the way you need only one UMTS router. Because of the Vigor
2910 offers the possibility to connect yourself to a UMTS-Stick. A list
of compatible drives is available here.
3rd Close to everything: you insert the UMTS stick into the USB sockets
on the UMTS router and configure it according to instructions. Enable
the address assignment via DHCP. The wireless function of the UMTS
router off switch. If you use the Linksys 3G 6210n, set the function
switch to the integrated network port on the "LAN".
The network port of the first UMTS router, connect the WAN port of the
first load-balancing router, the network connection of the second UMTS
router with the second WAN port. If you use the Vigor 2910, so you need
not have a second UMTS router and instead put the second UMTS Stick
directly into the USB port of the load-balancing router.

UMTS configuration of the Draytek Vigor 2910
4th Configure the special router: In the settings menu of the
load-balancing router with two WAN ports that connect to that run on a
dynamic IP address (DHCP). If you use the Vigor 2910, turn on "WAN2" in
the "Basic Configuration" on "3G USB modem" and select the "Internet
Dial-Up" at entry "3G USB modem," select "PPP". Then click on "details"
to set up a UMTS connection.
The load-balancing router decides normally automatically, from which it
transmits network usage data via the second UMTS access. If necessary,
you can change this threshold. At the request can also specify that only
data packets of certain Internet services via the second port are sent.
For example, you can have all the data from a swap meet run on a port
and all other data on the other.
5th Use a download manager: Since the call to be built webpages multiple
simultaneous server connections, namely for each component of the page
(images, banners, videos, ...) one, you will notice an immediate speed
increase here. When downloading a file, however, because the default
runs only on a single server connection. For technical reasons, a single
server connection can be described by the coupling does not split in two
UMTS connections. Therefore, you should install a download manager that
creates multiple concurrent server connections and downloads on any one
part of the file. For Firefox, we recommend the free extension DownThemAll.
Of course we can because of the variety of possible configurations can
not guarantee that the UMTS-pooling is working properly for you too.
From a technical point of view, but nothing to the contrary. We are
keen to hear your experiences as comments to this article.

Windows 7 DVD easily build your own

Windows 7 DVD easily build your own
Who needs to re-install Windows 7, should take the original DVD. Which
is in many PCs and laptops but not enclosed. All around computer shows
you how to create a Windows-7-DVD.

Many PC manufacturers ship their devices nowadays are no longer made
with full Windows-DVDs, but only with a recovery DVD or partition. Thus,
the PC can only be reset frequently to the factory setting. They have in
Windows 7 after the restoration of the original version without updates,
but with the old programs that were preinstalled on the PC.
A true Windows-DVD has over the advantages: You can install Windows so
clean, and also embed new advance if needed updates, service packs and
new device drivers.
Because of the home made a Windows-7-DVD is a bit of work, you should
first check that you still do not already have a full-fledged Windows
DVD. All around computer shows you how to recognize genuine Windows 7
DVDs, prepare for your needs and create on demand from the existing
installation is complete.

Find out whether one of the DVDs that came with your computer, a
full-fledged Windows DVD. Then you can in fact save the complicated
self-made. This also applies if you contact your PC burn the recovery
DVD only themselves. Please follow the instructions, which is usually
found on a separate page attached to the computer.
Check included DVD: Insert the DVD into the drive, click the Windows
icon and select "Computer". Double-click in the window that appears on
the DVD drive to view its contents. Located underneath the folder
"Sources", then open it by double clicking.
Find the heading of the file "install.wim". If you find it, click it
with the right mouse button and select in the drop down menu
"Properties". If the file contains more than 2 GB in size, it is most
likely a complete Windows-7-DVD.
Windows-7-DVD use a different computer: If your household is in another
Windows 7 computers on which you have a Windows-7-DVD, then you can
usually save a homemade also. For the original DVD contains all the
Windows 7 versions (Starter, Home Premium, Professional, and Ultimate),
but only as a 32-bit or 64-bit versions. Which version is installed
depends on your Windows product key.
If you want to install Windows 7 on the computer without the original
disk that you can use for this and your other Windows-7-DVD. However, it
must be adjusted so that you can use your Windows product key in the rule.

Caution: The procedure described below is from the Windows maker
Microsoft is not actually intended, but usually works anyway. It is
probably the only way a Windows-7-DVD without the original disks to
create that promises success in any installation. Due to the large
number of different computer-equipped computer All around, however, can
not guarantee that the homemade DVD is in any case be fully functional.
To compile from your current Windows 7 is a installation DVD, you need a
whole series of programs. But first you have to check what Windows 7
version is installed on your PC. To hold the [Win] key and then press
[Pause]. Which then appears in the window shows the "Windows edition"
version of the name (like "Windows 7 Home Premium") and further down in
the "System", the system architecture ("32 bit" or "64 bit"). Write down
the information.
Windows 7 Enterprise: Now load the DVD image of the test version of
Windows 7 Enterprise from the internet from the Microsoft download page.
Be sure to catch the version with your system architecture. This image
is later used as a framework for your new Windows 7 DVD.
Virtual Clone Drive: Now install Virtual Clone Drive. Confirm that the
driver software can be installed, although the signature is not verifiable.
Windows Automated Installation Kit: Then download the latest dump of the
Windows Automated Installation Kit from the Internet. Click on the
downloaded ISO file with the right mouse button and select the menu
"Load Image File". Then click the Windows icon, select the "Computer"
and open the new virtual disk with the inserted "KB3AIK_DE".
Double-click on the program entry StartCD.exe there. In the Start
window, select the menu item "Windows AIK Setup" and follow the
instructions of the wizard.
Virtual Box: Do not install the Virtual Box program. So you will start
later you created copy of Windows.
Winimage: Do not install the trial version of the English program
Winimage. So unpack later the Windows installation archive from the
virtual copy of Windows. Ensure proper version.
Windows PE: Finally, you must still create the CD image to a
"mini-Windows 7". The later you need to pack up the installation image.
Unzip the archive to All around computer MakeWinPE to any folder on your
hard disk. Then click in it to the same file with the right mouse button
and select "Run as administrator". A few minutes later you find in the
directory "C: \ winpe" about the large 140 MB CD image "Winpe.iso".

In order not to damage your running Windows, you must create a virtual
copy of it. Start the English-language Disk2vhd from the Sysinternals
suite. Remove the check mark next to the program in all drives except
the system and boot partition. Then click on "..." and select the folder
where the virtual drive (VHD) to be created. Make sure that the drive to
free enough space for the contents of the system and boot partition.
Then click on "Create". The copy process may take several hours.
Creating a virtual machine: Start Virtual box and select "New" and then
"Next". Then type the name of your Windows version, as Windows 7 Home
Premium 64 bit. In addition to "version" choose "Windows 7" or "Windows
7 (64 bit)" and then click "Continue". In the next window you reserve
1024 MB of RAM for the virtual machine and click again on "Continue". In
the new window select "disk use" and click the little folder icon. Then
click "Add" button, locate the previously created VHD file, click "Open"
and "Select", then "Next" and "Finish". Finally, click on "Start" to use
the virtual system.
By the way: Since your main and the virtual machine to work with
different hardware, and possible error messages are repeated restarts of
the virtual Windows. Once this system is stable, you can proceed.
De-install software: To get a clean installation DVD as possible, the
underlying Windows installation should be as free of extraneous
software. Click your virtual Windows so the Windows icon and select
"Control Panel, Programs and Features". There you will remove the
"Uninstall" in succession each program.
Remove user files: Now delete all pictures, video, music and other files
that do not belong to the Windows system. The more you delete more, the
lower the amount of data to your new Windows 7 DVD.
Delete User Accounts: You click on the Windows icon and select "Control
Panel, User Accounts, Manage another account". Remove the so-called
window in turn each account by clicking the "Delete Account" button.
Only the account with which you are currently logged in, you can not
delete. In a new installation with the new Windows-7-DVD will be
included automatically.
Cleaning the system: After you have removed all the software, click
again on the Windows icon, type in the search box, type cleanmgr and
press [Enter]. On the first window click "OK". After the releasable
space was calculated, select "Clean System Files" and click again on "OK".
Then open the tab "More Options" and click in the "System Restore and
Shadow Copies" to "Clean ..." and "Delete". Then open the tab "Disk
Cleanup" and put check in front of all available options. Finally click
"OK".

Now prepare your virtual Windows 7 so that all the system settings are
set as neutral as possible before you pack it into a setup file. Just
click on the virtual Windows 7 on the Windows icon and type cmd in the
search box. Click the right mouse button on the top search hit, and "Run
as Administrator", select the new menu. Enter into the command window
this command line:
cd / d% windir% \ system32 \ SYSPRE ep
Press [Enter]. Then type this command:
sysprep / generalize / oobe / sh utdown
According to [Enter] will begin the neutralization process that takes
several minutes. Then shuts down the virtual Windows.
Windows PE: Now select the entry in Virtual Box on the left for your
virtual Windows 7 and then right click on "Storage". Select below "IDE
Controller" and select "Empty" next to the DVD icon. Click on the far
right-clicking the folder icon, then click "Add". Now select "C: \ winpe
\ winpe.iso". The click "Open", "Select" and "OK". Then click "Start"
and press any key when prompted on the screen to do so. Thus, the
virtual PC will boot from your previously created Windows PE image.
Image pack: Windows PE will automatically open a Kommandozeilenfens
funnel. First enter the command diskpart, and press [Enter]. Then tap a
select disk 0 and press [Enter]. With list volume, and [Enter] all
partitions of your system temlaufwerks listed. In the column "lit" to
find the drive letter. Remember the letter of your system temlaufwerks.
Exit diskpart with the command and then exit [Enter].
In order to tackle the installation image, you go with the long command line
imagex / capture c: e:. \ install wim "Windows 7 Professional," "Home
Premium Windows 7" / comp ress maximum / flags "HomePrem ium" / verify /
scroll / check
further. Instead of e:, type in both places the one previously
determined drive letter, followed by a colon. With name and description
of your Windows version, in this example twice, "Windows 7 HOME
PREMIUM", enter your corresponding Windows version (make sure the caps).
The same goes for "home premium". Look for the mixed case, here as
"starters", "professional" or "Ultimate". Then press [Enter].
The following packing process can take up to an hour. When he is
finished, shut down the computer with the shutdown command wpeutil and
[Enter].
Now you have created on your virtual PC, the installation archive
"install.wim" in the root directory of the system drive. Now you need to
get this file on your main system.
File containers are: the virtual Windows system on your home is included
in the previously created VHD file. The last change in your virtual
Windows virtual box but has not written directly in the container file.
It has rather a more VHD file created that contains the differences from
the original, called a difference image.
To see how this file is called in your particular case and where it is
located, click on Virtual Box "file manager for virtual media" and fold
the tab "Disks" on. Here you see an entry with the name of the VHD file
created previously. To the left is a small arrow. Click on it to list
the corresponding difference images. These are usually quite illegible
names from seemingly arbitrary strings enclosed in curly brackets. The
left is seen next to one of these entries to another small arrow, then
you also work on this. Repeat the process until you arrive at the lowest
level. Highlight the entry in the lowest level. Then you look further
down in the box next to "place" the path to this difference image on
your main system.
"Install.wim" Extract: Now start the previously installed program
Winimage. Continue with "File, Open." Then select the File Type
drop-down next to the entry "Virtual Hard Disks (*. vhd, *. vud)".
Navigate to the path of the previously determined difference-image now,
and open it.
If the calculated path of the folder "Users" occurs and you do not find
him, instead you open the folder "Users". The folder name will be shown
at German Windows 7 versions usually in German.
You will then prompts Winimage to select the virtual partition whose
contents are to be displayed. Select the virtual system partition from
the list, and click "OK". Click the right mouse button on the file
"install.wim" and select "Extract". Finally, select on "Browse" to
"Desktop" folder on your main system as the extraction destination and
click "OK".
Prepare Windows 7: Click the right mouse button on an empty part of the
Windows desktop ("Desktop" folder) and select "New Folder". Give the new
folder name Win7DVD. Then click on the downloaded ISO file of the first
test version of Windows 7 Enterprise with the right mouse button and
select the menu "Load Image File".
Then click on the Windows icon, select "Computer" and open the virtual
drive. On we go, by holding [Ctrl] and press [A]. Thus, the contents of
the drive is highlighted. With [Ctrl] and [C] to copy the selected
items. Open the previously created folder "Win7DVD", and add everything
using [Ctrl] and [V]. After the copy is complete, open the folder
"Sources" and delete the three files "Ei.cfg", "7 install_Windows
Enterprise.clg" and "Product.inf".
"Install.wim" replace: Now select the first on the Windows work surface
extracted file "install.wim" with [Ctrl] and [C]. Then open the
directory "Win7DVD \ Sources" and add the file with [Ctrl] and [V]
there. Please confirm that you want to overwrite the existing file.
Creating a DVD image: Now you need to make the folder "Win7DVD" a
bootable installation DVD. Click on the Windows icon and select "All
Programs, Microsoft Windows AIK, prompt deployment tools." Enter into
the command line window command
cd x86 \ boot
, and then confirm it with [Enter]. Then you type in this long command line:
oscdimg-h-u2-betfsboot.com-o "% userprofile% \ Desktop \ Win 7DVD" "%
UserProfile% \ Desktop \ Win7DVD \ Win7DVD.iso"
Complete with [Enter], and then wait until the image was created.

Now check the size of the folder "Win7DVD" created file "Win7DVD.iso".
Just click on it with the right mouse button and select in the menu that
opens "Properties". If the file is larger than 4.7 GB, you need a double
layer recordable DVD or a USB memory stick with an appropriate use. If
the image is larger than 8.5 GB, you can not burn it. Then you can
continue only with a USB stick.
Burn DVD-image: Click on the newly created ISO image with the right
mouse button and select the menu "Open with Windows-burner for disk
images." Click the "CD / DVD burner" in the appropriate drive. Put
another check mark next to "Verify disc after burning" before you
finally click on "Burn". Once the burning process, your new
Windows-7-DVD is ready.
USB stick refill, if the generated ISO file is too large for a DVD, you
can create a bootable USB instead stick. Plug in to a sufficiently large
stick to the PC. Then click the Windows icon and select the "Computer".
To format the drive, click the following win-ter with the right mouse
button on its icon and choose "Format" and "start".
After formatting, open the folder "Win7DVD" and check its contents with
[Ctrl] and [A]. Then, hold [Ctrl] and click on the file "Win7DVD.iso" to
remove the marker with her. Then copy the remaining elements marked with
[Ctrl] and [C]. Then open Windows Explorer, the stick, and insert the
copied elements with [Ctrl] and [V].
Make bootable USB flash drive: Click the Windows icon, and type cmd into
the "Search" field. Click the right mouse button on the first entry, and
select "Run as administrator" from the menu. Then appearing in the
command line, type diskpart and press [Enter].
After the list disk command and [Enter] to see all the volumes in
diskpart which are connected to the PC. Determine the basis of the size
(disk) number of your USB stick. Continue with the commands select disk
[disk number] [Enter] and active [Enter]. Then you exit with exit
diskpart [Enter]. Now you have to do with
cd / d "% userprofile% \ Desktop \ Win7DVD \ boot"
confirmed by [Enter], and
bootsect / nt60 [drive letter of the stick]: / mbr
and [Enter] to boot sector write to the stick. Afterwards, your bootable
Windows-7-Stick is ready.

Data security and speed with RAID

Data security and speed with RAID
RAID 0, 1, 5 and RAID 1 +0 - what the various RAID levels and what is
the right RAID level for you? We show you which system best protects
your data.

What is RAID? Why is this technique useful? And what do all the numbers
that are constantly linked with the name RAID? We answer these questions
and tell you why it pays to protect your privacy when you deal with RAID.

RAID stands for Redundant Array of Independent Disks (arrangement of
multiple independent hard disk drives). This technique is well suited
for applications with high demands for data storage.
The biggest advantage of RAID is to protect against disk failure. This
should be done according to Google and several privacy experts far more
frequently than it would like to pass on the hard disk manufacturers.

Rapid and large single hard drives are disproportionately expensive.
RAID made it possible to combine many cheap hard drives into a single
large and fast hard disk. In addition, techniques have been incorporated
to compensate for a degree of fault tolerance, and even offer one-loss
protection. For example, the loss of a drive is not that the whole array
and the recorded data can not be used.

A RAID disk is divided into several levels that describe the way how the
hard drives are combined into a single disk. The data are distributed
according to each different RAID levels on the drives. The
RAID-Ebenen/Level are typically referred to by numbers. The three most
common level in the private sector and for small offices are RAID 0,
RAID 1 and RAID 5 We are also alternatives and additions, as imagined
JBOD (Just a Bunch of Disks [Just a bunch of disks]), Microsoft's Drive
Extender RAID like RAID and virtualization technologies like Drobo,
NetGear, Synology and Seagate.
Most RAID modes do not need hard disk drives of equal size, but they are
used only for the capacity of the smallest hard disk drive in the
composite. For example, set a 500 GB and 1 TB hard drive in a RAID
system, both as 500 GB of hard disk drives are treated.
You should be aware also that the RAID technology for data redundancy
only protects against data loss if a drive fails and the disk can be
initially operated on a different drive. RAID provides no protection
against data loss from malware, theft or natural disasters, and is
therefore certainly no substitute for a good backup strategy.

Imagine the number 0 rather than before, but as high-speed racetrack.
Because the goal of this mode is speed. RAID 0 distributes data across
multiple drives, for example, block A goes on drive 1 and drive to
second block B Thus, the read and write speed is increased. This
procedure is also commonly called striping. However, there are other
RAID modes to make the tempo.
However, be warned that RAID 0 offers no protection against drive
failures, because the files are not written multiple times on multiple
drives. If one drive fails, you have to live with the missing puzzle
piece. In such cases, your data is lost, unless you are willing to
invest much money in data recovery.

RAID 1 mirrors your data across two drives by read and write commands
are issued simultaneously in both drives. The drives are egalitarian
partners - should one fail, you can continue working with the drive
intact. Of course you should replace the faulty drive as soon as
possible. RAID 1 is the easiest method to your data from drive failure
to protect. However, this protection will cost you half the total memory
capacity, since for example two 1 TB drives now to be combined and thus
takes only 2 TB 1 TB storage capacity is available.
You may select as many pairs of mirrors, such as allowing your RAID
controller. If your system also supports duplex Reading can use RAID 1
to the reading speed will increase by blocks of data are read
alternately from one disk drive and second

This RAID mode, which offers both speed and mirroring for easy and
semi-professional purposes. This mode is just for home office and small
and medium enterprises suitable. RAID 5 stripes data on different drives
and creates parity data across the network drive. Parity data are small
data units that are mathematically subtracted from the large data
bundles. These range from but, conversely, to reconstruct the large
bursts of data.
RAID 5 requires about one-third of the total disk space for parity
information, and requires at least three hard disk drives. Since RAID 5
reads simultaneously from different drives, it is compared to other
systems very quickly. However, this mode will slow down very quickly
when multiple data queries should take place simultaneously, such as in
a server. Their data are well protected with RAID 5 drive failure, since
the parity data is stored on different drives so each drive can be
restored in case of failure.

JBOD
JBOD (Just a Bunch of Disks) can indeed be counted as a disk array, but
offers no speed advantages or data mirroring. JBOD only brings together
several drives into one disk. First, the first drive completely
described, then the second and so on. While many network drives run on
this process, but we recommend using only if you have no alternative.
This means that you really only need a combined disk, and RAID 0 also
have available. In addition, it must be summarized in modern times with
2 TB of disk capacity per drive, hardly useful in the private sector
more disks into one.
Drive Extender
This RAID option is available on NAS systems with Microsoft Windows Home
Server. RAID can be implemented via hardware controller or software and
operates on the bit, byte and block level. Drive Extender, however, uses
the data level of the operating system.

This is needed for this approach, the CPU and can be particularly at
busy servers lead to noticeable performance degradation. On a NAS system
with no major load on the other hand, the impact is minimal. Actually
demonstrate Windows Home Server NAS systems usually perform well and can
take advantage of the Drive Extender use them very well. They can, PATA
and SATA drives, external USB and FireWire storage systems without
problems combined. You have to adapt or disk drive sizes and can fit
more disks to rebuild the entire array without having to. You can also
expand drives easily, provided that the total capacity does not fall
below the required space.
Drive Extender also provides some privacy, since data is stored on
multiple hard drives. This feature is disabled by default. You can also
choose which data should be reproduced by selecting the appropriate
folder. So you can leave critical data safely stored easily, while
important data will be distributed across multiple drives.

Virtualized RAID
Drobo has gained a reputation by it has facilitated the RAID
configuration process significantly and now allows the user to use the
entire capacity of the drive, if hard drives with different memory sizes
to be used. With Drobo, you can add to your system each drive you want
without having to reconfigure the system itself. It is in fact a self.
RAID is still stuck behind the system, but is more transparent to the
user. Virtualization takes care of the mirroring process and may even
appeal to different RAID levels simultaneously.
Other programs that combine several disks into a single drive, from
manufacturers such as Netgear, Seagate, and meanwhile also like Synology
offer virtualization capabilities for data mirroring. Each of them has a
different name. If this trend continues, it will soon no longer be
necessary to understand the various RAID modes, because all of
virtualized modes are available.

The RAID-level specifications include a few more that are now being used
but little more. For example, RAID 2

RAID 2 stripes data written to the bit level, the smallest unit of
information in the computer, on multiple drives, rather than the block
level. This system also writes Hamming ECC (Error Correcting Code)
information in a recovery disk parity at the byte level. This process
consumes a lot of computing power.
RAID 3 has been displaced for a similar reason of other modes such as 0,
1 and 5. RAID 3 also uses no data blocks, but distributed data
information on the different drives on the byte level (8 bits) and also
stores parity information on an additional drive. RAID 4, but
distributes the data at the block level, but stores all parity
information on an additional drive. If the additional drive failure is
unprotected the whole storage system. That is why the auxiliary drive
should be replaced as quickly as possible and the parity information can
be reconstructed, so that a possible loss of data can still be prevented.

Three other RAID modes are actually very useful, but are rarely used.
RAID 6 and RAID 5 is almost like using distributed parity information
across all drives. RAID 6 is only more of it. RAID 6 does have a second
package and distributes the parity information across all drives. This
of course requires more disk space than RAID 5 However, RAID should be
taken into consideration 6, when a high degree of system fault tolerance
will be achieved.
RAID 10, also commonly referred to as RAID 1 +0, stript the data (RAID
0) across mirrored disk pairs (RAID 1). With this setup you get back
some of the write speed that you have lost through RAID 1. However, you
need at least four drives for RAID 10 because of two drives
simultaneously read and written, and these two are then mirrored yet.
For data security is being sacrificed so as with RAID 1 50% of disk
capacity.
However, there are also RAID 0 +1. As with RAID 10 will increase the
writing speed. And again, you need 4 drives and must spend 50% of
capacity for data mirroring.

Now we would like to conclude by giving some hints on how to find the
right one for your needs RAID.
Hardware RAID: This mode in the BIOS or from one RAID controller to be
activated. Software RAID solutions reduce contrast, the performance of
your system.

RAID 0: If you are a fast hard drive, especially when processing large
data wish.

RAID 1: If you have only two drives, but want your data to effectively
protect against drive failure.

RAID 5: If you have more than two drives and build a complete network
protection and brisk want.

Windows Drive Extender: Does its job very well, but is almost only found
on NAS systems. It affects the performance of the system.

Free-Joli OS operating system running in the browser

Free-Joli OS operating system running in the browser


Why wait for a Book Chrome? By Joli OS there is already a PC operating
system, which moved all the office work on the Internet. We show you how
easy it is.
Never before has there been such demand for mobile work, like today. The
more important it is to keep in sync on all computers programs, services
and files. Books with the brand new Chrome, it generates even own
computer category, the Google Chrome OS uses. Here, however, put on the
free English-language web-app Jolicloud Joli and the operating system
OS. The trick is that your programs and settings used in the cloud are
being saved on the Internet.
The advantages of this Windows Internet are obvious. They come on any
computer with lightning speed to the Internet and access to everywhere
on the same programs and functions. This works even simply using an
Internet browser. How you do this, check out this guide.
Jolicloud use directly or try Joli OS
You have anywhere access to your Internet-Windows, there are several
possibilities:
Jolicloud in the browser
The simplest way is directly through the website jolicloud.com. He is
also open if you work on other PCs, for example in an internet cafe. To
Jolicloud in Browser (Chrome, Iron, Firefox, Safari 4 and 5) to use, you
need to install anything, but only need to create a free account with
the service. Open to the above website and click on "Sign up for free".
In the following window you can either click on "Sign Up" button, fill
out and submit the form and then published, or click on "Sign Up With
Facebook" and log in using your Facebook data. You will get the
Jolicloud surface. The Jolicloud account, you also need to install all
other forms of Joli OS. By the way: On my.jolicloud.com there is a
preliminary version of Jolicloud iPad, an Android version is planned.

Joli OS boot locally
Alternatively, you can also install the complete Joli OS operating
system on your hard disk and use this instead of Windows to work on the
cloud. This is especially useful for older computers, since much of the
stress system is derived from the cloud, and so also hopelessly outdated
hardware can be used more effectively. You must first download it from
the OS Joli manufacturers website. Here you can choose whether you want
to install Windows alongside OS Joli or instead of Windows on your PC or
notebook. The latter is particularly handy if you want to use alongside
your regular windows one particularly fast-booting operating system that
lets you email, surf, and much more can do.
After downloading you can install OS Joli either directly or try without
installing it. You can grab the Betriebssysstem on a USB stick instead
of actually boot Windows. You may also need to change only the boot
sequence in the PC BIOS so that the USB flash drive is loaded before the
hard disk. In the first window of the installation, you select "Try
without installing OS Joli" and press Enter. Joli OS then starts, and
you can log in to your account Jolicloud. Special settings can be of use
in this course, not save. If you find that either Joli OS does not start
or configure the Internet access does not, it is not compatible with
your hardware. This is however very rare.

Network to solve problems systematically

Network to solve problems systematically

Troubleshooting the network itself provides for professionals are
sometimes a challenge, many components involved in the connection and
must be checked. Our guide helps you step by step analysis of problems
in the network connection.

Your internet browser says only "server not found"? Or access to the
release of another PC does not work? Then probably the network
connection is disrupted, interrupted, or misconfigured. Find out the
cause of network problems is not always easy. The fault may lie with the
DSL router in the wiring or the wireless router configuration. It can
also defective network adapter in the PC or not configured properly or
the network is not set up correctly in Windows. And also a security
software can prevent successful network connection. With this set of
possible causes for network problems only helps a systematic
troubleshooting. Our step-by-step guide will help you.

The basic networking and Internet orders
To connect a PC directly via network cable to the router and enter the
web browser the IP address of the router. For example, a Fritzbox
http://192.168.178.1 is the default. In other router models used often
http://192.168.0.1. The correct address can be found in the manual of
the DSL router.

The Fritzbox is a widely used DSL router.
If this link does not work, so the web page of the DSL router does not
appear in the browser, either the router is misconfigured or faulty. Or
the network cable or network adapter of the PC are not in order. Repeat
the test at the best with another PC or notebook. Also check with the
ping command, if you can reach the DSL router.

To properly wire your LAN
You should also try to disconnect the DSL router from the mains and it
will take about a minute back in operation. Sometimes helps to reset the
configuration to factory setting. Some models have a reset button.
Absent in the Fritzbox this, but there is a recovery program. How you
use this, you can read for AVM Run the recovery program. Even if no
connection is possible, let the DSL router from your Internet provider
or check exchange.

EU data protection exacerbate dispute over cookies

EU data protection exacerbate dispute over cookies

The "Article 29" group of European Data Protection Supervisor rejects the recommendations from industry associations for behavior-driven advertising and the associated use of cookies. The proposal of the Internet Advertising Bureau (IAB ) and the European Advertising Standards Alliance (EASA ) allow it only to insert via an opt-out of opposition to the recording of user behavior, wrote the chairman of the Association, Jacob Kohnstamm, in a recently published letter (PDF file) of the two organizations. The new EU privacy regulations however, demanded an "informed consent" in a prosecution of online activities with cookies.

That every surfer who the "tracking" does not contradict explicitly endorse this already, Kohnstamm holds for illusory. A real choice for an intelligible description of the existing facilities will be using the opt-out notice at the border is not given by banner ads. The explanation of the economy that a website operator to work normally with different marketing networks, and would have to obtain consent for all, not considered valid by the head of the group. The legislation clearly relate to each ad network. An agreement to set each Webkrümels on the hard drive is certainly not necessary. A single opt-in applies to the entire marketing partners. In addition, a central activation site for behavioral advertising is conceivable.

The 2008 adopted EU Directive on Privacy and Electronic Communications regulates, among other things, access to information stored about the user on hard disks or USB sticks, by third parties. Manipulation of files stored on the equipment of a subscriber or user, are permitted in May, according to the in force regulation only if the person has "on the basis of clear and comprehensive information" given his consent. Procedures are still excluded, whose "sole purpose of carrying out the transmission of a communication over an electronic communications network" in order for a specifically desired service can be provided.

The method is to "be as user friendly as possible," according to the e-privacy directive. If it is technically feasible and effective, it said, could the consent of the user "can be expressed by using the appropriate settings of a browser or other application." Even to this paragraph, the EU data protection have taken a position. Their interpretation by the request is done only satisfied if the default refuse to accept cookies and users would be informed in general about the browser files. The manufacturer of the navigation tools have improved, although the administrative options in the past year. By default, however, would still accept cookies.

The EU privacy advocates continue to criticize that, under the industry standard just a small graphic notes in a banner on the opt-out opportunity. This solution will not bring the average user to click on the icon and additional information on a website linked to is not currently available in German translation website to obtain . The success of Enlightenment there was also confusing, since they are not serious notes on the implications for the privacy of users and the profile building with unique cookie identification numbers. At a meeting in September, both sides now want to talk about how to proceed.

The error is, if it goes wrong

The error is, if it goes wrong
Computer not be wrong. As long as the world does exactly what it should.
And that makes them so often. If not, does this have to do with a yellow
rabbit.

Let's call it simply the yellow rabbit effect. As you walk in the
morning from the house or sits at home on the desk, and then instead of
the usual downloads happen suddenly and unexpectedly large, flashy
things. Things that we all really expect more, but then the surprise
when they happen.
No, not that God can not. We wish him all the best. Rather the things
that nobody would come. The things that sound more like a joke, just as
the American fondness for fizzy drinks from Bin Laden. - If anyone
should remember him, the guy that the Pakistani cricket balls their
children were never returned. That's him.
Back to the Internet. Suppose that a shark would bite through an
Internet cable, or someone steals the warehouse with Google servers,
where all search results are stored for German websites. Or cosmic rays
are suddenly the evil of defenseless small extinguisher in front of him
spinning disks.
It all sounds stupid, OK upgrade, but for precisely such cases, Google
eats itself and fully aware that one studies the luxury of a very
unlikely but possible event and the preparations for it. And in fact
everything that has nothing to do with data and servers, but it has an
undeniable effect on her. Sure would be a little weird before. But what
if, and then give no more? Exactly. Google.
Also very unlikely it may be that my wife bought a Windows machine as
their next computer. But it is not really care what operating system you
are using their laptop or smart phone in hand, after a short time one
could keep the unit well for a medium sized yellow rabbit. By the time
he makes it now because once again muttering to himself and lands on the
keyboard, I leave out of sheer will to survive the room.
I think the more courageous message that you want to have in Windows 8
now developed a foolproof copy a file to a folder. Just wait, guys, your
phone number I give to my wife. And then we just look even know if they
are not yet a turning place, even such simple and seemingly driven by
twenty-five years to really break-resistant routines such as copying
files into madness.
The yellow bunny is everywhere. Watch out, soon he'll come to you.

Hazardous ActiveX component from F-Secure

Hazardous ActiveX component from F-Secure

A vulnerability in F-Secure Anti-Virus and Internet Security System can
be infected by visiting a specially crafted Web page with malicious
code, the manufacturer warns. Vulnerable versions are respectively the
2010 and the current 2011th Also, version 9 of the F-Secure Protection
Service (Consumer and Business) is vulnerable.

The vulnerability is located in the ActiveX module fsresh.dll and is
thus only users of Internet Explorer and browsers based on it. Through
the gap may allow an attacker to overwrite the error handling routine
and so own shellcode. Has discovered the vulnerability, security expert
Anil Aphal who has already released an exploit.

Remedy creates a patch, the F-Secure for several days on the automatic
update function of the distributed programs. Users of affected programs
should therefore ensure that their system is supplied with the latest
updates.

"The Internet makes anyone a terrorist"

"The Internet makes anyone a terrorist"
The Internet facilitates access to the most extreme views of all kinds -
and these can be estimated by the criminologist, Rudolf Egg then seem
normal. "So exotic is a hobby and so extreme political views should be
not, as she tells no one in the Internet", the criminal psychologist
said in an interview with Reuters. "There is nothing that is so bizarre
that it is not there."
The Internet enables access to opinions and attitudes that would get in
other ways just very difficult, said the head of Criminology in
Wiesbaden, a research and documentation establishing the federal and
state governments. "This greater availability creates the appearance of
normality."
For example, the so-called Cannibal of Rotenburg on the Internet have
found dozens of people that had similar preferences, while people with
cannibalistic tendencies were previously left alone. The man had
castrated a man in 2001, killed and eaten parts of the body - five years
later he was sentenced to life imprisonment.
"You feel the Internet in emotions, attitudes and political views are no
longer so alone," said Egg. "The Internet makes anyone but just for
criminals or terrorists," said Egg. "What really are the causes, why
does someone in such a way must be explained differently."
The process was supposed to be against Islamic terrorists from the
Frankfurt airport, which radicalized the Internet, begins on Wednesday
in Frankfurt. The 21-year-old is charged with about half a year ago
killed two U.S. soldiers and two others seriously injured, who were on
their way to a deployment to Afghanistan. The individual offender should
have seen the night before a propaganda video for the jihad, rape in the
alleged American soldiers Muslim women.

Airplay competition: Mobostick of HSTI

Airplay competition: Mobostick of HSTI
Even though it looks like this: The "Mobostick" the Canadian
manufacturer HSTI is neither USB memory stick or USB wireless adapter,
but basically a wireless-enabled mini-computer. On a player he is,
however, presents itself as a USB mass storage, the contents of an
associated app from your smartphone Adroid be shared and streamed.
According to the manufacturer of the virtual Mobostick content can, for
example via the USB port of TVs, PS3 and XBox consoles, DVD / Blu-ray
players, Google TV Boxeb, conventional stereo systems and car radios,
and digital picture frames, and docking stations are playing. Mobostick
to support Android devices in version 1.6 of all major vendors such as
Motorola, Asus, HTC, Samsung, Sony and Acer.
Unlike Apple's airplay, the entire contents of the shared folder - ie
not only movies, photos, music and all other files - for wireless
transmission via WiFi (up to 130 Mbps) are available. The device is
offered in Germany by Flashtex for nearly 90 €. An expanded version
called "wireless media streaming Stick" (around 100 €) should also iMacs
and NAS devices can operate.

Linux: New Kernel with long-term support

Linux: New Kernel with long-term support

After lengthy discussions on the mailing list of Linux kernel developer
Greg Kroah-Hartman will continue each year elect one kernel version to
the Long Term kernel. He should then be provided over two years with
updates. All the other kernels are as usual only to shortly after the
release of the successor will be maintained. When Long Term kernel wants
Kroah-Hartman select kernel versions, which have proven particularly
well or that are used for example in major Linux distributions.

Currently, five versions of the kernel as a Long Term kernel maintained
by different maintainers: 2.6.27 and 06/02/32 to 06/02/35. Greg
Kroah-Hartman is responsible for 2.6.32, but will adjust their care in
half a year.

Worm spreads via Remote Desktop feature of Windows

Worm spreads via Remote Desktop feature of Windows
The AV vendor F-Secure warns of Morto the pest, which spreads through
the remote desktop server (RDP server) of Windows. The worm takes
advantage of any security holes in Windows. It scans IP address ranges
to the RDP port 3389 and tried the answering machines at a login as
Administrator with a list of frequently used passwords.
The worm primarily affects Windows servers, since the purpose of active
RDP often remote and is accessible via the Internet. For the home user
versions of Windows, the RDP server will be included only in the
higher-priced versions (starting at 7 Professional) and have also
activated by hand. In addition, the port is accessible only from the
outside in this case, if the router port forwarding has been explicitly
set. If this is not the case, the requests can only be made from other
infected computers in the home network.
To insinuate themselves permanently in the system, the worm then sets a
drive A: to \, which can RDP as a network share to be addressed. On
release he finally placed the file a.dll who cares about the further
infection. In the further course of infection, among other places Morto
cache.txt the \ windows \ system32 \ sens32.dll and \ Windows \ Offline
Web Pages \.
On the infected computer, the worm takes care of its distribution, which
could be observed among other things, the Internet Storm Center, a
massive increase in traffic on the RDP port. In addition brings the pest
with typical bot functions. He contacted a number of domains to be there
to pick up new commands and components. A detailed analysis of Morto
Microsoft has released.
The worm is first noticed the middle of last week. Microsoft TechNet
forums, reports accumulated by fully patched systems, which explains the
unusually high traffic on port 3389. Morto at this time was still not
recognized by any virus scanner.
Meanwhile Morto is detected by the scanners from Micosoft and F-Secure,
the other major AV vendors are likely to be pulled along. To prevent the
bot in the first on to the system, one should protect passwords hard to
guess with computers accessible via RDP.