Home | Sitemap |

IT Archives


Showing posts with label Actual News. Show all posts
Showing posts with label Actual News. Show all posts

UPS For Business continuance

Monday, April 6, 2009

get the software below

APC MGE Galaxy 7000

Along with the launch of MGE Galaxy 7000, APC offers this product as a new phase power protection for IT devices and other critical equipment. Have a digital design with a variety of options allows the UPS is used in various applications ranging from data center operations to large industrial and manufacturing. For data center applications, MGE Galaxy 7000 will meet the needs of the availability of power and run time, high level with the size of UPS is sufficient for a small room.

In normal circumstances, the UPS can support this latest load of 250 kVA up to 500KVA and provides additional power up to 2 hours when the electricity happened extinction. With a compact size, allows the installation of back-to-back between UPS and rested the to the wall so that create more space for other devices when compared with traditional UPS systems.

Furthermore, this UPS can be upgraded so that it can meet the needs of power infrastructure in a safe, good for at this time and in the future. A number of them were offered a standard feature includes new UPS topology without the use of a unique transformer, static switch, and maintenance by-pass which included a built-in, plus more with an IGBT rectifier, which is power factor correction for Harmonic distortion input currents are low.

To ensure that the UPS battery age still in a state of maximum, MGE Galaxy 7000 Lifecycle. Integrate monitoring monitors the battery Digibat to do the battery is automatically tested in the interval-specific intervals. This feature will automatically perform a test of the battery level for the time period that has been previously determined, without the need menghabiskannya first.

Ability to achieve the highest management, MGE Galaxy 7000 is compatible with the management of remote devices from APC and can easily be controlled and monitored from anywhere as long as connected to the network. Besides via ethernet, this product is also fully compatible with other communication protocols such as J-Bus / Mod-Bus and relay contacts. Source: www.apc.com

Read more...

Place the pieces Casing PC

get the software below

ASUS VENTO TA-F11 dan TA-F21

ASUS give interesting ideas for the PC vendors cut costs in transportation and storage of desktop PC cases. Main distinction from the case series vento TA-M (TA-F11, and TAF21) has dimensional 190x426x469 mm and it is design can be folded up to only 434x87x434 mm. So, not only tansportasi cost and space penyimpannya are economical, but the PC users who love themselves up with a desktop PC can freely take them from / to the store, home or office without the need risih casing with dimensions that are usually relatively large.

ASUS TA-series vento F which also has a tool-free design for convenience and speed of assembly is equipped with two 12 cm fan installed on the front and back of the casing to maximize air circulation. Casing the use SGGC (0.6 mm) was 5:25 to provide an external bay 4x, 1x external 3.5 bay, 4x internal 3.5 HDD bay, and 7 Expansion Slots. Info: www.asus.com

Read more...

Messenger Multi-language

Friday, April 3, 2009

get the software below

World Internet is a world without borders. Thus, each person where and when it can communicate with each other without any distance limitations, places, and the state, through the facility of instant messenger, VoIP, and others. Unfortunately there is still one obstacle in the communication, the language difference.

Therefore, MeGlobe try to offer a solution, a web instant messenger service that provides real time translation system inter-language. Thus, users of different languages can talk directly with MeGlobe rely as translators. This free service supports Spanish, Italian, Portuguese, German, Japanese, Russian, Dutch, Greek, Korean, Arabic, Swedish, Chinese, French, and of course English.

Unfortunately our beloved language, ie Bahasa Indonesia is not yet known in this service. Want to try please click on this link www.meglobe.com

Read more...

Welcome Google Android

get the software below

Welcome the presence in the market Android phone, Google released this package Software Development Kit (SDK) for Android mobile operating system recently. SDK is intended for software developers this allows them not only develop applications for the system but also improved the Android mobile platform.

According to Google, the presence of this SDK will support the Google Android in the refining system in various aspects, such as given many new functions, and find the bug, and many other innovations. Licenses are applied on the Google Android SDK also provides space for the developers to modify Android operating system for use on the device non-Android smartphone, such as Palm TX or even netbook which is now popular. Info: www.google.com

Read more...

Quicken is Free Now!

get the software below

After applying the service before paying, Intuit, the creator of the Quicken financial management services Online are finally opened for free. Thus, increased again similar free service, which is already quite a lot available on the Internet, just like a SpendView (www.spendview.com), Mint (www.mint.com), Buxfer (www. buxfer.com), Wesabe (www . wesabe. com), and many others.

Intuit still sell software packages desktop version of Quicken has long been known and popular. Given the large number of competitors in providing similar services, Intuit also are developing client applications for the Apple iPhone platform. They hope, with this client application, users of Apple iPhone will be more interested in access to services than other services and will automatically increase the popularity of online Quicken. Info: www.intuit.com

Read more...

WLAN Cleft can be closed with Firmware Update

get the software below

With a simple packet data, hackers can change the wireless router to be restrained and not crippling the wireless network in the eye immediately. Sohail Ahmad only takes five seconds to disable a WLAN. Attacks are almost similar, such as Auto Immune defense of the man. In this situation, auto defense system even Immune cells attack the healthy and drub it. In the WLAN, conditions not much different. Enough with a package of data that has been manipulated to change the router to be an engine killer who can not distinguish where the good and bad.

Current technology security, encryption methods such as AES and WPA2 with a password of 20 digits or a MAC Address filtering, which only allow the end user is authorized to access the WLAN, many do not do anything. Until now, there is no defense against attacks like this. However, there is still a little excitement. Ahmad can not read the actual data. He can only decide the connection between the client and the server and prevent them are not connected automatically.

Types of DoS attacks (Denial of Service) is a new threat, especially for the commercial WLAN network can only be run with the Hardware Reset. In the private network, this attack seems only fraudulent, but it can happen. Meanwhile, the network usually has hundreds of commercial Access Point. Attacker does not need to own a lot of work. WLAN devices on a standard set of control available to a network device to instruct re-authorization.

During this time, hackers easy to smuggle the package like this to control in the network to know if the MAC address of the router. However, now all the Access Point is protected from attacks such as this. Ahmad Method step further. It was a package to manipulate the data and gave an Originator MAC Address that is not defined in the standard IEEE-802.11 (6xFF). With this package hacker, he requested a client authentication to the routers. Query this simple but very slippy due to the router in general responded by giving the command to the client to logoff. Unfortunately, the client does not automatically log on the router.

Scutum router: protect your network from the dangers of

Manufacturers have set up a Firmware Update. So, make sure you have installed the latest software on the router. To check which version is installed on most routers, open Configuration Page through Web Browser. Typically, the address is "192.168.1.1". Here, you will find a serial number, usually in the "Firmware". When the update is still not available, you should disable SSID Broadcast mode. Developer: http://airtightnetworks.com

Read more...

Cisco Digital Cribs: Heaven or Hell

get the software below

Cisco announced the contest, providing "Digital Cribs: Heaven or Hell", where participants can submit a video that shows whether the house they called the "Paradise" digital technology or "hell" the use of digital devices. Actual mission of this contest is to find the personal technology, home networking and the most sophisticated, as well as for the use of technology disruption. This contest is part of the Web series "Digital Cribs" Cisco, which indicates the home network and invite discussion about how consumer technology and networks contributing to the digital lifestyle.

To enter the video be three minutes, the main requirement is a minimum age of 18 years, which explains why their home network can be referred to as "paradise" or "Fire" technology. Offered a prize money of U.S. $ 10,000. Participants who live in "heaven" can indicate the use of digital technology and the home network of interesting and unique. They were living in "hell" can show you the digital experience of home-use technology that does not levying each other connected, hard to communicate easily, cable clutter, and various other clutter. Taken from: www.digitalcribs.com

Read more...

Google Mail in the Mailbox Can be Hacked

get the software below

Use a hole in the mail service from Google, the attacker can gain access to user mailboxes. In the event Defcon Security Conference, this security hole discoverer, Mike Perry, explaining how it works. In a public network, such as a WLAN Hotspot, the victim to log in to Google Mail via an HTTPS connection is encrypted. Next, he opened the website address of the other.

Hackers who are in the same network, know the address of the website opened by the victims and send the packet data to the PC of the victim. This time, the victim signed in to Google Mail, but not protected. As a result, the hacker can read the data and retrieve login username and password. Until now, Google is not offering a solution to overcome this attack. Source: www.googlemail.com

Read more...

Recent Post:

Natural Teak Gallery

Recent Comment:

IT Database- Indonesia

  © Free Blogger Templates Columnus by Ourblogtemplates.com 2008

Back to TOP