Recent Posts

Pages: 1 ... 6 7 [8] 9 10
71
Cisco Routing and Switching / Export Router/Switch Config to PC
« Last post by mark on August 04, 2008, 10:25:11 PM »
Hi Guys

Let me  tell you how i can you export configs on cisco routers and switches to the PC as a .txt file?

Routers: Cisco 2611
Switches: Cisco Catalyst 3550


You will find the answer here : http://www.cisco.com/en/US/products/sw/ios...08020260d.shtml

I hope this will help you.

Marc.
72
Cisco Routing and Switching / cisco 836 & isdn configuration
« Last post by mark on August 04, 2008, 10:21:57 PM »
hi ,

i have a cisco router 836 and i am using only the isdn operation. The router is connected to the desired telephone number.
My problem is although i have set the command dialer idleitimeout 60 the isdn still working ....

can anyone help me ?
73
Cisco Security / Folder Sharing Permissions on XP SP1 Network
« Last post by mark on August 04, 2008, 10:19:57 PM »
We are trying to set up a Peer to peer network between two computers running XP Service pack one. They cannot be updated and new software cannot be added. We have figured out how to add the security tab to the folder properties by changing the options in the tools menu. Essentially what we need to do is set up a file that can be viewed only by one person, but not the other:

There are two of us: Dacoda and Tyller,
The computers have two logins, Dacoda and Tyller
The two computers are networked and currently can share folders without specific permissions.

i would like to stress both computers' user accounts were set up seperately so although the names are the same in both logins, the accounts are NOT shared together, only file folders over a network. If anyone has a step by step tutorial or helpful information, that would be very helpful. Thank you.
74
Ive written a small MRTG compatible script which some might find useful.

It allows you to graph IPv6-only traffic on a Cisco router interface with MRTG.

Simply graphing interface traffic in the standard sense with MRTG combines both IPv4 and IPv6 traffic onto the single graph, making it difficult to determine which protocol is using how much.

Enter my script.

It uses RSH to grab the output of a "show interface x switching" and obtains the IPv6 specific byte values. The output allows the script to be used directly with MRTG to graph IPv6 traffic for a specific interface.

Limitations I have come accross so far are that a Cisco wont provide statistics for ethernet sub-interfaces, so you can only graph the combined IPv6 traffic flowig through the parent interface. However, the Ciscos do appear to maintain separate statistics for SVIs, so if you use Vlan interfaces rather than sub-interfaces you should be in luck.

If anyone is interested in giving it a try, you can find the script here:

http://150.101.183.195/ipv6stats

Usage information and a small amount of documentation is located within the script itself.

Enjoy
75
Home Wireless / olso try this as well
« Last post by Alan on June 22, 2008, 09:26:26 PM »

Could you try the below steps:

0. Go to Start Menu

1.open run

2. type "regedit"

3. go to HKEY_CURRENT_USER\Software\microsoft\MSNMessenger\Policies and
delete the key named "contacts.msn.com"

4. Exit and restart messenger.



Thanks
76
Home Wireless / Error: 80072745
« Last post by Alan on June 22, 2008, 09:10:37 PM »
Error: 80072745
If you are encountering the error code 80072745 when you sign into Messenger try the following:
 
1. If you are connected to the Internet through a router, remove the connection to the router. Then, directly attach the network or modem cable to the computer. This will help determine whether the issue is related to a firewall setting on the router. Try to sign in to Messenger after you connect to the Internet. If you can connect to Messenger after bypassing your router, the issue may be related to router settings. Try resetting your router (Note: This may revert your settings back to factory default settings and may delete all your custom settings.). Please contact your router manufacturer's Help documentation or customer support channels to determine how to reset your router or enable port 1863 through the router firewall.
 
2.  If you are signing in from a corporate environment, contact the network administrator to determine whether port 1863 is being blocked inside the network. 

 
3.  If you have Zone Alarm with IM Security installed on the computer, turn off IM Security for Messenger:
3.a.  Right-click the Zone Alarm icon in the notification area, and then open the Control Center. 
3.b.  Click IM Security or click Security to open the IM Security settings window. 
3.c.  Click the Main tab or the Status tab. 
3.d.  Slide the Protection Level slider to Off to turn off IM Security.
Note: This procedure will change the IM Security settings for any instant messaging programs that are installed on the computer. 
3.e.  Sign in to Messenger again to determine whether the issue is resolved. 
 
4.  If you are connecting to the Internet using a Wireless Data card through a mobile phone network, please contact your mobile internet provider to verify if you need to additional data plans that enable you to connect to the Messenger service.
 
77
Marketing & Advertising / HOW TO FORWARD EMAIL APPROPRIATELY
« Last post by Alan on January 22, 2008, 04:01:51 PM »
IMPORTANT!! HOW TO FORWARD EMAIL APPROPRIATELY
 
 
  A friend who is a computer expert received the following directly from a
  system administrator for a corporate system. It is an excellent message
  that ABSOLUTELY applies to ALL of us who send e-mails. Please read the
  short letter below, even if you're sure you already follow proper
  procedures.
 
  Do you really know how to forward e-mails? 50% do; 50% DO NOT.
 
  Do you wonder why you get viruses or junk mail? Do you hate it?
 
  Every time you forward an e-mail there is information left over from the
  people who got the message before you, namely their e-mail addresses &
  names. As the messages get forwarded along, the list of addresses builds,
  and builds, and builds, and all it takes is for some poor sap to get a
  virus, and his or her computer can send that virus to every e-mail address
  that has come across his computer. Or, someone can take all of those
  addresses and sell them or send junk mail to them in the hopes that you
  will go to the site and he will make five cents for each hit. That's
  right, all of that inconvenience over a nickel!
 
  How do you stop it? Well, there are several easy steps:
 
  (1) When you forward an e-mail, DELETE all of the other addresses that
  appear in the body of the message (at the top). That's right, DELETE them.
  Highlight them and delete them, backspace them, cut them, whatever it is
  you know how to do. It only takes a second. You MUST click the
  'Forward' button first and then you will have full editing capabilities
  against the body and headers of the message. If you don't click on
  'Forward' first, you won't be able to edit the message at all.
 
  (2) Whenever you send an e-mail to more than one person, do NOT use the
  To: or cc: fields for adding e-mail addresses. Always use the BCC: (blind
  carbon copy) field for listing the e-mail addresses. This is the way the
  people you send to will only see their own e- mail address. If you don't
  see your BCC: option click on where it says To: and your address list will
  appear. Highlight the address and choose BCC: and that's it, it's that
  easy. When you send to BCC: your message will automatically say
  'Undisclosed Recipients' in the 'TO:' field of the people who receive it.
 
  (3) *****Remove any 'FW :' in the subject line. You can re-name the
  subject if you wish or even fix spelling.
 
  (4) ALWAYS hit your FORWARD button from the actual e-mail you are
  reading. Ever get those e-mails that you have to open 10 pages to read
  the one page with the information on it? By Forwarding from the actual
  page you wish someone to view, you stop them from having to open many
  e-mails just to see what you sent.
 
  (5) Have you ever gotten an email that is a petition? It states a
  position and asks you to add your name and address and to forward it to 10
  or 15 people or your entire address book. The email can be forwarded on
  and on and can collect thousands of names and email addresses. A FACT:
  The completed petition is actually worth a couple of bucks to a
  professional spammer because of the wealth of valid names and email
  addresses contained therein. If you want to support the petition, send it
  as your own personal letter to the intended recipient. Your position may
  carry more weight as a personal letter than a laundry list of names and
  email address on a petition. (Actually, if you think about it, who's
  supposed to send the petition in to whatever cause it supports? And don't
  believe the ones that say that the email is being traced, it just ain't
  so!)
 
  (6) One of the main ones I hate is the ones that say that something
  like, 'Send this email to 10 people and you'll see something great run
  across your screen.' Or, sometimes they'll just tease you by saying
  something really cute will happen. IT AINT GONNA HAPPEN!!!!! (Trust me,
  I'm still seeing some of the same ones that I waited on 10 years ago!) I
  don't let the bad luck ones scare me either, they get trashed. (Could be
  why I haven't won the lottery??)
 
  (7) Before you forward an Amber Alert, or a Virus Alert, or some of the
  other ones floating around nowadays, check them out before you forward
  them. Most of them are junk mail that's been circling the net for YEARS!
  J ust about everything you receive in an email that is in question can be
  checked out at Snopes. Just go to http://www.snopes.com/
 
  Its really easy to find out if it's real or not. If it's not, please
  don't pass it on.
 
  So please, in the future, let's stop the junk mail and the viruses.
 
  Finally, here's an idea!!! Let's send this to everyone we know (but strip
  my address off first, please) And send them using the Blind Carbon Copy.
  This is something that SHOULD be forwarded
78
Monetizing Your Website / Monetizing Your Website
« Last post by soni on January 02, 2008, 12:54:58 AM »
Lately, I have been updating a lot of my website with new blog templates and new structures to take advantage of newly learned ways to monetize my website. I have to say I have been very impressed with the results so far. Even though it has been only a week or two I have seen an increase in the amount of money earned with two of my sites. So, I thought it would be fair to reveal some of the things that I have been doing to accomplish this task.

1. Google Adsense - Google adsense has always been the bread and butter of my monetary business with all my website. I guess because it is so easy to implement it in anything that I publish. Rather it be a article or a website. If you don't know with google adsense is it a means to add ads to websites that pay YOU money if the ad or text link is clicked. Google adsense is connected with google adwords were publishers will pay per click to advertise in the Google network which is very expansive and includes search engines as well as websites, radio and classifieds. For me google has paid very well and as I increase in volume/content so has google adsense income.

2. My second means of income comes from affiliate marketing. Right now I market a lot of merchandise from eBay, amazon.com, amazon.co.uk, overstock, netflix, tickmaster.co.uk and the list goes on. Most of the income comes from my websites but I also write a lot of articles that I publish on article sites that also link to affiliates. If you don't know about article marketing you need to read this article "Article Marketing And Promotion". In this article I give a detailed explanation of how to make money with article marketing.

3. Text Links Ads - I started selling ad space on my website to see if it was possible to even make some money doing this. I have to say that it is possible. I have not been doing this very long but so far I like the result and text links ads.com makes it easy as pie to implement this on any website. The only prerequisite to this is that you will have to be accepted into there program. But once in they will promote your site and get you the best price that they can. If you don't get accepted into their program there are other programs that you can implement that will do the same.

4. Kontera - This little program has been a little God sent for me and I see a lot of potential in it. Especially for my pocket. The website is Kontera.com. Definitely get involved with this program.

5. Bidvertiser - is in direct competition with google adsense and the great thing about them is that there payout is a minimum of $10 dollars. If you are not convinced with google adsense I would recommend using them. They have a lot of advertisers and this is a great opportunity for make money.

These are just a few of the new resources that I am trying out.
79
Search Engine Optimization / In Google Results, Comments Are The Description
« Last post by soni on January 02, 2008, 12:46:58 AM »
I still have number one spot on Google for my main keyword, which rocks. The only SEO I've really done on this site was to clear out the keyword stuffing from a few years ago (ack) and start paying more attention to my titles and trying to make them better.

So the number one spot lists my index page as number one, then indented is another page, not at all what I would choose (and this keyword is all over a lot of other pages because it's the topic of the entire site), but whatever. Google does what it wants.

What annoys me about this one is that on the indented, secondary page, the description comes from the second out of SIXTY NINE comments. How weird is that? I *thought* I had some kind of code in there to tell Google not to bother with comments. I'm in the midst of redesign, so I'll add that to my to-do list and make sure it's there. Maybe that's why my spam count is over 200,000 in just over a year. (Fortunately I have good spam catchers)

The site itself is over a decade old, although a year ago I moved the entire thing to WordPress to make it easier to manage. (It's large) It's not a blog, but WP works well.

This page is really just a trivia page: famous people who do this thing. Hardly a good page, IMO, for a second page at Google. There are so many pages that would be better, although now I understand why so many read that page. Geesh. (I'd been wondering why so many cared about celebs)

So it's just a list. I don't even have a header, just a list of about 50 names. And then this huge amount of comments that are on topic for the general topic but nothing to do with famous people on the list. It's becoming crystal clear now why I have all these comments on that obscure page. And maybe I just answered my own first question, which was WHY. Why does Google have the second comment as the description?

But why not the first comment? It has about five lines of text (all caps, mind you), and the keyword twice. The second comment, which is in Google results, has the word twice plus an extra in plural form. But the next comment has the keyword four times.

Does this make sense to anyone?

And more importantly, should I

1. try and optimize a different page for the term?
2. add a short paragraph at the top with the keyword, hoping Google will use that instead next time it updates?
3. or...ignore it and accept that this is life with Google?
80
Web Design & Programming / Re: Better Web Designing Tips
« Last post by soni on January 02, 2008, 12:43:19 AM »
That's a lie ... It all depends who the target market is ... it doesn't help I give a METAL website green and blue ... they'll love red and black together ...

9.Decide who you're targeting first ...
Pages: 1 ... 6 7 [8] 9 10