| |
|
How to add printers with no user interaction in Windows |
|
|
Topic: Technology |
9:18 pm EST, Oct 30, 2005 |
How to add printers with no user interaction in WindowsView products that this article applies to.Article ID:189105Last Review:January 27, 2005Revision:5.1This article was previously published under Q189105SUMMARY Windows 2000 and Windows Server 2003 provide the ability to install a printer using a command line. This is particularly useful when you add or remove a printer from a group of users using a login script or a scheduled event. Although Microsoft Windows NT 4.0 Zero Administration Kit (ZAK) contains tools such as Con2prt.exe, the Con2prt.exe tool provides the ability to add or delete only network printers. You can also modify and delete local printers using Windows 2000. The result is that an administrator can control all aspects of a user's ability to print by having users run a batch file or logon script. NOTE: Using this command in a login script or a client-launched batch file requires the client computer to be running Windows 2000 or Windows Server 2003. Because the login script runs on the client computer, a Windows NT 4.0 client is unable to process the command. In addition, these commands can be run from an administrator's workstation or from a server so that the printers are push-installed to the client computers without having to go to the actual computer.
How to add printers with no user interaction in Windows |
|
Java Parallel Processing Framework |
|
|
Topic: Technology |
3:10 pm EST, Oct 30, 2005 |
ava Parallel Processing Framework is a set of tools and APIs to facilitate the parallelization of CPU intensive applications, and distribute their execution over a network of heterogenous nodes. It is intended to run in clusters and grids. Features * an API to delegate the processing of parallelized tasks to local and remote execution services * a set of APIs and user interface tools to administrate and monitor execution services * real-time adaptive load balancing capabilities * scalability up to an arbitrary number of processing nodes * support for failover and recovery * limited intrusiveness for existing or legacy code * fully documented APIs, administration guide and developer guide * runs on any platform supporting Java 2 Platform Standard Edition 5.0 (J2SE 1.5)
Java Parallel Processing Framework |
|
NSA Operating System Security Guides |
|
|
Topic: Technology |
3:06 pm EST, Oct 30, 2005 |
NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline their systems.
NSA Operating System Security Guides |
|
Linux.com - The Software-RAID HOWTO: Detecting, querying and testing |
|
|
Topic: Technology |
7:21 pm EDT, Oct 29, 2005 |
6.5 Monitoring RAID arrays You can run mdadm as a daemon by using the follow-monitor mode. If needed, that will make mdadm send email alerts to the system administrator when arrays encounter errors or fail. Also, follow mode can be used to trigger contingency commands if a disk fails, like giving a second chance to a failed disk by removing and reinserting it, so a non-fatal failure could be automatically solved. Let's see a basic example. Running mdadm --monitor --mail=root@localhost --delay=1800 /dev/md2 should release a mdadm daemon to monitor /dev/md2. The delay parameter means that polling will be done in intervals of 1800 seconds. Finally, critical events and fatal errors should be e-mailed to the system manager. That's RAID monitoring made easy. Finally, the --program or --alert parameters specify the program to be run whenever an event is detected. Note that the mdadm daemon will never exit once it decides that there are arrays to monitor, so it should normally be run in the background. Remember that your are running a daemon, not a shell command. Using mdadm to monitor a RAID array is simple and effective. However, there are fundamental problems with that kind of monitoring - what happens, for example, if the mdadm daemon stops? In order to overcome this problem, one should look towards "real" monitoring solutions. There is a number of free software, open source, and commercial solutions available which can be used for Software RAID monitoring on Linux. A search on FreshMeat should return a good number of matches.
Linux.com - The Software-RAID HOWTO: Detecting, querying and testing |
|
How to use offline files in Windows XP |
|
|
Topic: Technology |
5:17 pm EDT, Oct 29, 2005 |
Configuring your computer to use Offline Files To configure your computer to use the Offline Files feature: 1.Click Start, and then click My Computer.2.On the Tools menu, click Folder Options.3.Click the Offline Files tab.4.Select the Enable Offline Files check box, and then click OK.Back to the topMaking files or folders available offline To make shared network files or folders available when you are offline: 1.Click Start, and then click My Computer.2.Click My Network Places.3.Double-click the network place that contains the folder or file that you want to make available offline. 4.Right-click the file or folder that you want, and then click Make Available Offline. The Offline Files Wizard starts. Click Next to continue.5.Select the Automatically synchronize the Offline Files when I log on and log off my computer check box, and then click Next.6.Select the Create a shortcut to the Offline Files folder on my desktop check box, and then click Finish. The files are copied to your computer, and a "Shortcut to Offline Files" folder is displayed on the desktop.
MS even mentions on their page that this works fine with Samba. How to use offline files in Windows XP |
|
Windows NT Server Tools for Windows NT Workstation 4.0 Available |
|
|
Topic: Technology |
5:07 pm EDT, Oct 29, 2005 |
Windows NT Server Tools for Windows NT Workstation 4.0 AvailableView products that this article applies to.Article ID:173673Last Review:August 9, 2004Revision:2.2This article was previously published under Q173673SUMMARY This article describes the Windows NT Server Tools for Windows NT Workstation 4.0. These tools are available in the self-extracting Srvtools.exe file, and in the following folder on the Windows NT 4.0 Server CD-ROM: Clients\Srvtools\Winnt
Manage teh Samba from teh windows. Windows NT Server Tools for Windows NT Workstation 4.0 Available |
|
Topic: Health and Wellness |
11:29 am EDT, Oct 29, 2005 |
The connection between this "off" feeling and possible neural and musculoskeletal injuries may not be immediately apparent to the employee or employer, since actual pain is rare at this early stage of injury. Over months, however, as inflammation worsens, chronic pain will eventually lead workers to seek clinical help. While some employers might see the cytokine connection as a simple opportunity to slack off work, Barbe disagrees. "Cytokines are self-protective," she says. "This undefined feeling of malaise may be telling the body to take some time off to heal, before things get worse."
Slacker or sick? |
|
Secrets of the Dead . Mystery of the Black Death | PBS |
|
|
Topic: Technology |
10:27 am EDT, Oct 29, 2005 |
Meanwhile, recent work with another disease strikingly similar to the plague, AIDS, suggests O'Brien was on the right track. HIV, the virus that causes AIDS, tricks the immune system in a similar manner as the plague bacterium, targeting and taking over white blood cells. Virologist Dr. Bill Paxton at the Aaron Diamond AIDS Research Center in New York City noticed, "the center had no study of people who were exposed to HIV but who had remained negative." He began testing the blood of high-risk, HIV-negative individuals like Steve Crohn, exposing their blood to three thousand times the amount of HIV normally needed to infect a cell. Steve's blood never became infected. "We thought maybe we had infected the culture with bacteria or whatever," says Paxton. "So we went back to Steve. But it was the same result. We went back again and again. Same result." Paxton began studying Crohn's DNA, and concluded there was some sort of blocking mechanism preventing the virus from binding to his cells. Further research showed that that mechanism was delta 32. Scientists studying HIV first learned about the gateway-blocking capacity of the CCR5 mutation in 1996. Several drug companies, then, quickly began exploring the possibility of developing pharmaceuticals that would mimic delta 32 by binding to CCR5 and blocking the attachment of HIV. Previous methods of treatment interfered with HIV's ability to replicate after the virus has already entered a cell. This new class of HIV treatment, called early-inhibitor -- or fusion-inhibitor -- drugs seek to prevent the virus from ever attaching at all. These pharmaceuticals are still in relatively early stages of development, but certainly stand as a hopeful new method of approaching HIV treatment
Secrets of the Dead . Mystery of the Black Death | PBS |
|
Poptop - Open Source PPTP Server |
|
|
Topic: Technology |
12:53 am EDT, Oct 29, 2005 |
What is Poptop? Before Poptop, no solution existed if you wish to connect PPTP clients to Linux servers. Using Poptop, Linux servers can now function seamlessly in a PPTP VPN environment. This enables administrators to leverage the considerable benefits of both Microsoft and Linux operating systems. The current release version supports Windows 95/98/Me/NT/2000/XP PPTP clients and Linux PPTP clients. Poptop is free software, licensed under the terms of the GNU GPL.
Poptop - Open Source PPTP Server |
|