Friday, December 21, 2012

Social Networking, The Pros and Cons of Social Networks

Social Networking has become increasingly popular nowadays as there are a lot of sites that offer this service. MySpace and Friendster are two of the most popular sites that aim to build communities of people who share common interests and activities, or who are interested in exploring the interests and activities of others.

THE PROS

A social networking site is like a virtual meeting place where people can hang out and discuss different topics. Anything under the sun, in fact. Some use these networking sites to promote their blogs, to post bulletins and updates or to use them as a bridge to a future love interest.

Social Networking, The Pros and Cons of Social Networks

These are just a few of the reasons why social networking is getting a lot of attention lately -- it makes life more exciting for many people.

THE CONS

However, it would be best to make sure that safety and security are the topmost concerns of the social networking site that you currently use. This is because social networking sites require or give you the option to provide personal information such as your name, location, and email address. Unfortunately some people can take this as an opportunity for identity theft. They can copy your information and pretend to be "you" when engaging in illegal activities. Bad news! So be cautious with what you enter into an online networking site.

You could fall into the trap of someone who pretends to be somebody else. For example, they might offer you a job or want to meet up with you just to get your money. This can lead to cyberstalking, where the stalker uses electronic media such as the Internet to pursue or harass you.

THE CONCLUSION

So take your time and be careful in choosing who to trust so you can hopefully avoid this sort of unpleasant thing happening to you. Apart from that, social networking is great thing.

Social Networking, The Pros and Cons of Social Networks
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you found this article helpful, you might appreciate my FREE report called "GET TO THE MONEY FASTER". Get it now at http://eprofitnews.org

Article by Gary Harvey of http://FindHotMarkets.com the Internet's BIGGEST LIST of ways to find hot niches, best selling products and hot markets.

cell phone watches Low Low Price Oakley Jupiter Lx Sunglasses Sale Jackson 3018159 Pack And Pop 28 Safety

Monday, December 17, 2012

Top 10 Healthy Lifestyle Tips

Living a healthy lifestyle doesn't have to be hard. It just takes the motivation to change our bad habits into good, healthy ones. Below is a list of 10 healthy lifestyle tips to get you started. Once you start, you can come up with more healthy choices that work for you.

o The first thing is to eat a balanced diet. Eat more fruits and vegetables and get rid of the high sugar, processed foods. Along with eating better is getting the right nutrients in the system.
o So the second thing is to take vitamins and minerals to help your body work properly.
o The third tip is to quit all those nasty unhealthy habits. Smoking, drinking, drugs, chewing tobacco, whatever your vice may be quit now. You are in charge of your health and living a healthier lifestyle means getting rid of the things that may kill you.
o The fourth thing to do is exercise. Exercise makes you feel good and can motivate you to get other things done as well.
o Along with exercise, number five is making sure you see a doctor each year for an annual physical. This is more important in women, but men should be seeing a doctor every 2-3 years to make sure there are no big health concerns.
o The sixth is to surround yourself with a strong support network, or a group of people who will be there for you and participate in a healthy lifestyle as well.
o Your family and friends can help you with the seventh tip, have fun and enjoy life.
o Eighth tip is to create a good balance between work and play.
o The final two tips are to accept yourself for the unique individual you are and love what you do. If you can accept yourself, the good and the bad, it will show in all you do. Your job is something you will be doing for at least the next 20 years, so you should love it. If you don't keep looking until you find something you do love.

Start with those healthy lifestyle choices and see how you feel in the next few weeks. You should feel more energized, motivated, and positive.

Top 10 Healthy Lifestyle Tips
Top 10 Healthy Lifestyle Tips
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Ursula writes for healthylifestyle-wellbeing.com. She has a big interest in healthy lifestyle since she decided to change her life and improve her wellbeing. If you like to change your life and discover more about healthy lifestyle for your wellbeing [http://www.healthylifestyle-wellbeing.com/], start applying small changes today.

watches mobile phone Cheap Tiffany Office Furniture Tif1010Pcantflk Presentation Stand Low Low Price Oakley Jupiter Lx Sunglasses Best Buy Hon Products Hon Simplicity Ii Systems

Friday, December 14, 2012

Social Networking and Social Skills

We are living in the Technological Era today, so websites such as Facebook and MySpace are highly successful and popular sites to visit and join. Since the launch of MySpace in the past decade, a number of other social networking sites have sprung up and millions of people across the world have flocked to their computers to get in on the excitement. These social networking sites have linked the world together like never before. The amount of time people are spending on the web, surfing these sites, is unprecedented. The goals of these social networking sites are not clearly written on their login pages, but it is safe to assume the main goal is, logically, to link people together across the world like never before.

However, these social networking giants have set back social skills quite a bit, unknowingly of course. While the goal is to allow people to interact socially, these sites cause their members to become computer zombies, wasting away countless hours in front of the computer monitor. With people spending so much time socializing through cyberspace, their personal social skills suffer. It is far easier to talk to someone over messaging on their favorite social network site than in person, where you have very little time to take things in and react. People are relying too much on meeting people online these days than by doing so the old fashion ways, namely in person. It is far easier to get the confidence to speak to someone over cyberspace than to do so out in public.

Well why is this a bad thing if people are still interacting? Well, when one area of public communication suffers, all areas do so as well. Not only do you lose the skills to meet, interact, and maintain a conversation with someone in public, but your overall interaction and social skills suffer. So if you have a presentation to perform in class, you may not feel comfortable speaking in front of your peers because you are not used to speaking to people face to face. I do not blame social networking sites for this unfortunate set back in social interaction. In fact, I believe that social networking, with limited time spent online, is vital to social skills today. We need to learn to balance the time we spend online with the time we spend out in the world interacting, so we can maintain a balanced social life. We need to make sure we do not lose our humanity by becoming reliant on software to interact with each other. If we can learn to balance this, we will see a spark people's self confidence, because they will have the skills to walk up to someone and interact freely without awkwardness. This will, in turn, spark the dating lives and professional lives of many people who suffer from social anxiety. When people are confident and have a good public social network, we are a happier society as a whole.

Social Networking and Social Skills
Social Networking and Social Skills
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Nate Lewis is a professional self help guide dedicated to helping anyone achieve their desired goals of self improvement. Nate is aware that many people are held back by simple flaws that can be fixed with a little bit of help and guidance. Anyone who seeks self improvement and needs guidance to reach their goals, Nate will help to the best of his ability until he succeeds in bringing happiness to his clients. http://selfimprovementjungle.com

mobile phone watches Cheap Rugged Ridge 53703 52 Soft Top With Best Buy Hon Products Hon Simplicity Ii Systems

Saturday, December 8, 2012

The Top 10 Secrets From Anthony Robbins

For more than 25 years US-based motivational speaker and success coach Anthony Robbins has been passionately pursuing the answers to questions such as 'What shapes human behaviour? And how can we create lasting change
within oursleves and others?'.

He has spoken in front of more than 3 million people around the world and sold around 35 million books and audio coaching products.

After attending his 4-day 'Unleash The Power Within' seminar recently in Kuala Lumpur I learnt many strategies to perform at your best.

The Top 10 Secrets From Anthony Robbins

I even took part in his famous barefoot walk over hot coals. This powerful physical metaphor shows how anyone can overcome their deepest and greatest fears with focus, passion and desire.

Part rock concert, part learning experience, part aerobic workout, the seminar was attended by more than 4,000 people in a giant indoor sporting stadium that was built for the Commonwealth Games.

Standing 6'7", weighing 265 lbs and with a shoe size of 16, Robbins was impressive on stage as he harnessed the energy of the crowd.

In fact, security guards have to line the stage as he is regularly swamped by over eager fans.

At 43 years old, he has been enormously successful and worked with people like President Clinton and Nelson Mandela.

What was it like?

Hot, humid, high energy and simple take home messages packaged with a high-tech light, sound and video show.

I was impressed, motivated and got some great ideas from it.

Here is my gift to you. The Top 10 Secrets of Success I learnt from spending 4 days with Tony Robbins.

1. YOUR POTENTIAL IS DETERMINED (OR LIMITED) BY YOUR SELF-BELIEF.

As the promotional material says the event was 'about creating breakthroughs, moving beyond fears and limiting beliefs, accomplishing goals and realizing true desires, turning dreams into reality, creating fulfilling relationships, and modeling the strategies of peak performers to produce a quantum difference in your life.'

If you cut out the hype, the simple message is if you believe in yourself enough you can achieve anything.

A memorable one-liner was "the only thing that's keeping you from getting what you want is the story you keep telling yourself".

2. MOST PEOPLE HAVE SELF-DOUBT AROUND UNIVERSAL THEMES.

Ask anyone and most people will admit they lack confidence in some areas of their life. The interesting thing I learnt from this seminar is that this self-doubt is around universal themes. These themes cross age, gender, religious, cultural and language barriers.

Common doubts include 'I am not good enough', 'I am lazy' and 'No-one loves me'.

3. YOU CAN LEARN MECHANISMS TO ELIMINATE SELF-DOUBT.

Robbins calls it 'immersion' where you break old patterns and build new ones by repetition. He uses a lot of Neuro-Linguistic Programming techniques to achieve this with his audiences.

He says "progress is not automatic".

A memorable moment in the seminar was when we had to visualize ourselves inside a bubble and inside that bubble was a series of videotapes neatly arranged in a time-line that represented all our memories in our lives so far. We had to pull out the negative videotapes and destroy them. This was followed by time spent visualising the future and how your life will look 10 and 20 years from now.

4. BELIEF IMPACTS ON MANY LEVELS.

The Robbins message was that 3 things shape our self-belief. He calls them the Triad. These are our patterns of physiology, focus and language or meaning.

He highlighted this with the quote: "where focus goes energy flows".

5. OUR VALUES AND BELIEFS SHAPE OUR ACTIONS.

Robbins believes you can "vanquish whatever is holding you back from taking action".

Walking barefoot across a bed of glowing coals is the physical metaphor he uses in his seminars to prove this point to the skeptics.

Eliminate negative self-belief and take massive action are his keys to success.

6. TO CREATE POSITIVE OUTCOMES YOU MUST TAKE MASSIVE ACTION.

"Where focus goes energy flows" is a quote used by Robbins in his presentation to highlight why you need to know your outcome and why achieving this is a must.

But many people fail to take the next step. They delay, put off and find many reasons or excuses not to act.

Robbins believes "progress is not automatic" and "action is power". Take action, even if it is the wrong action. He says it is "never a failure if you learn something".

7. MATCHING & MIRRORING CREATES CONNECTION, TRUST & EMPATHY.

Robbins spent a fair amount of time in the seminar talking about and demonstrating interpersonal communication skills.

He used people from the audience to show how the process of "matching and mirroring" the non-verbal communication and body language of others can be a very powerful way to connect with people.

In essence, you create rapport by adopting the body language of the person you are communicating with.

He believes "rapport is power" and "total responsiveness is created by a feeling of commonality".

If you have learnt these techniques before and haven't used them for a while, I suggest it is time to dust them off and put them into action next time you are communicating with someone on a one-to-one basis.

8. ANYTHING IS POSSIBLE IF YOU FOCUS ON PASSION AND PURPOSE.

Robbins believes that "to have an extraordinary quality of life you need two skills: the science of achievement (the ability to take anything you envision and make it real) and the art of fulfilment (this allows you to enjoy every moment of it)."

He says "success without fulfilment is failure".

Find your passion and purpose in life. My purpose is to make a difference in people's lives and use my gift as a speaker.

9. MODEL YOURSELF ON OTHER ACHIEVERS.

To gain improvements quickly and step up to a new level of achievement, Robbins believes learning from others who are the best in their field is the fastest way to achieve success.

He told the story of how he wanted to improve his tennis game and so employed Andre Agassi, the then number one ranked player to help him achieve this.

Who could you model yourself on?

"People's lives are a direct reflection of the expectations of their peer group," according to Robbins.

10. SUCCESS IS BUILT ON A HEALTHY, HIGH ENERGY BODY, HEART AND MIND

If you are not healthy - all of the above points are a waste of time.

Your health is determined and influenced by your lifestyle.

One major change I've made since the seminar is to eat a healthier diet and exercise more regularly.

As a speaker, my whole business depends on my ability to perform at a peak state. Like any professional athlete, the success of business is directly linked to my diet and health.

Take care of yourself, your body is ultimately your most important asset.

The Top 10 Secrets From Anthony Robbins
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Thomas Murrell MBA CSP is an international business speaker, consultant and award-winning broadcaster. Media Motivators is his regular electronic magazine read by 7,000 professionals in 15 different countries. You can subscribe by visiting http://www.8mmedia.com. Thomas can be contacted directly at +6189388 6888 and is available to speak to your conference, seminar or event. Visit Tom's blog at http://www.8mmedia.blogspot.com

watches mobile phone Best Buy Hon Products Hon Simplicity Ii Systems Discount Everlast Protex 3 Evergel Training Gloves

Thursday, December 6, 2012

Top Ten Majestic Places to Visit in Asia

Asia is probably one of the most enigmatic continents in the world. Not only is it rich in very diverse cultures, but it is also rich in history. You will never run out of wonderful places to visit in this wonderful and mysterious continent.

1.) Indonessia's Breathtaking Bali

Bali is one of the very beautiful places to go to once you are in Indonesia. Do not miss out on Batubulan Village, famous for sculptures made out of fine stone. Get to enjoy Bali's culture like the Barong Dance and enjoy the beautiful crafts of its goldsmiths and silversmiths.

Top Ten Majestic Places to Visit in Asia

2.) Exotic India

If India is in your Asia tour itinerary, then you will never regret it if you went on one of those boat rides in the Ganges River. Get to see, too, the devout citizens of India while they pray and bathe on the sacred waters of the Ghats. If you want to see their temples, then the Khajuraho Temples is for you, an architectural wonder

3.) The Wonderful Side of Pakistan

Pakistan, although an intimidating country, has a lot of sceneries that tourists will love. Get to see a majestic view of the Himalayan Mountains and the Monkial Ranges. If you want to know more about Pakistan's culture and people, then the Swat Museum is a must place for you to visit.

4.) Buddhas of Bangkok

There are a lot of statues of Buddha that you can see in Bangkok, and one of the temples tourist flock to is the Reclining Buddha Temple. You must also visit the Erawan Shrine as well as the Snake Farm of Bangkok that is located near the shrine. For a more modern tour, visit the Safari World and Bangkok's Pattaya and Coral Island.

5.) What Vietnam has to Offer

Vietnam is now one of the favorite destinations of tourists. Tourists love exploring the city on their own and tasting the different food Vietnam has to offer. There are also cruises that a tourist can enjoy like the cruises along the Mekong River, and they also get to visit the smaller islands to taste the wonderful fruits Vietnam has.

6.) Unforgettable Katmandu

Another unique place to visit is the Katmandu where you will get to know more about its culture and people by strolling in the Katmandu Durbar Square. Do not forget to visit, too, the Buddhanikantha Temple, another one of its famous tourist destinations. You can also go to Pashupatinath Temple.

7.) Big China

You cannot tour all of China in a week, but here are some of the top places to visit in China. The Yangtze River Cruise is one of the favorites of not only the tourists but the local citizens as well, and in this tour, one gets to have a closer communion with nature. The other places that you must not forget visiting is the Tiananmen Square and the Forbidden City as well as the Temple of Heaven.

8.) Delightful Turkey

Turkey is one country you should not fail to visit. There are a lot of museums you can visit like the Museum of Anatolian Civilizations. You can also visit famous archeological sites like Pamukkale's Hierapolis as well as famous mosques like the Blue Mosque.

9.) Enjoying Japan

Get to experience both old and new Japan in your Asian tour. Visit the wonderful and exciting City of Tokyo, a big contrast to Japan's mountain villages where the old culture is still palpable. Also, get to know more about its people and culture by visiting the temples, shrines and palaces of Japan.

10.) Modern Singapore

Singapore is one of the world's business regions. Also, this is famous for being one of the major shopping centers in Asia and is rightfully called Shopper's Paradise. Its stores' competitive prices as well as air-conditioned malls are one of the favorite places tourists go to.

Top Ten Majestic Places to Visit in Asia
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Jonathan Williams is the travel writer for Destination Guide TV - the place to share travel videos [http://www.destinationguide.tv]. Visit [http://www.destinationguide.tv/asia] to view or share Asia travel videos [http://www.destinationguide.tv/asia].

cell phone watches Purchase Imation Black Watch 9840 Volsafe Order Emf And Anti Aging Bracelet E Q Cheap Rugged Ridge 53703 52 Soft Top With

Sunday, December 2, 2012

Impact of Social Media on Society

"Do you have Facebook?"
"Yes, of course. But I don't think you can find me, as there are too many people who have the same name as me. Try searching with my surname as well."
"Hey, you celebrated your birthday in K-Box, right? I saw the photos in your Facebook."
"Bro, I saw your comments about the YouTube video that I've posted in my blog. I'm happy that you are also deeply moved by the 'Dancing Peacock Man' as well."

Social media or "social networking" has almost become part of our daily lives and being tossed around over the past few years. It is like any other media such as newspaper, radio and television but it is far more than just about sharing information and ideas. Social networking tools like Twitter, Facebook, Flickr and Blogs have facilitated creation and exchange of ideas so quickly and widely than the conventional media. The power of define and control a brand is shifting from corporations and institutions to individuals and communities. It is no longer on the 5Cs (e.g. condominium, credit cards and car) that Singaporeans once talked about. Today, it is about the brand new Cs: creativity, communication, connection, creation (of new ideas and products), community (of shared interests), collaboration and (changing the game of) competition.

In January 2010, InSites Consulting has conducted an online survey with 2,884 consumers from over 14 countries between the ages of 18 to 55 years old on social networking. More than 90% of participants know at least 1 social networking site and 72% of participants are members of at least 1 social networking site. On the average, people have about 195 friends and they log in twice a day to social networking sites. However, 55% of the users cannot access their social network websites at work. In the past, not many adults were able to make more than 500 friends, but with social media, even a child or teenager can get to know more than 500 people in a few days by just clicking the mouse. Social media has devalued the traditional definition of "friend" where it means trust, support, compatible values, etc. Although we get to know more people, we are not able to build strong bond with all the people whom we met as our available time is limited. Hence, there is an upcoming social trend of people with wider social circles, but weaker ties (people we don't know very well but who provide us with useful information and ideas).

Impact of Social Media on Society

Social media also influences people's buying behaviours. Digital Influence Group reported that 91% of the people say consumer reviews are the #1 aid to buying decisions and 87% trust a friend's recommendation over critic's review. It is thrice more likely to trust peer opinions over advertising for purchasing decisions. 1 word-of-mouth conversation has an impact of 200 TV ads. With the prevalence use of social media, there is numerous news related to it from the most viewed YouTube video on "Armless pianist wins 'China's Got Talent'" to Web-assisted suicide cases (e.g. New Jersey college student who killed himself after video of him in a sexual encounter with another man was posted online). Thus, does social networking make us better or worse off as a society?

Positive Effects of Social Media

Besides having opportunity to know a lot of people in a fast and easy way, social media also helped teenagers who have social or physical mobility restrictions to build and maintain relationships with their friends and families. Children who go overseas to study can still stay in meaningful contact with their parents. To a greater extend, there is anecdotal evidence of positive outcomes from these technologies.

In 2008, President-elected Obama won the election through the effective use of social media to reach millions of audience or voters. The Obama campaign had generated and distributed huge amount of contents and messages across email, SMS, social media platforms and their websites. Obama and his campaign team fully understood the fundamental social need that everyone shares - the need of being "who we are". Therefore, the campaign sent the message as "Because It's about YOU" and chose the right form of media to connect with individuals, call for actions and create community for a social movement. They encouraged citizens to share their voices, hold discussion parties in houses and run their own campaign meetings. It truly changed the delivery of political message.

Obama campaign had made 5 million "friends" on more than 15 social networking sites (3 million friends on Facebook itself) and posted nearly 2,000 YouTube videos which were watched over 80 million times. At its peak, their website, MyBarackObama.com, had 8.5 million monthly visitors and produced 400,000 blog posts. In order to ensure that their contents were found by people, the Obama campaign spent .5 million on Google search in October alone, 0,000 on Advertising.com, 7,000 on Facebook in 2008, etc. Currently, Obama's Twitter account has close to 6 million followers.

In 2010, after the earthquake happened in Haiti, many of the official communication lines were down. The rest of the world was not able to grasp the full picture of the situation there. To facilitate the sharing of information and make up for the lack of information, social media came in very handy to report the news about the affected area on what happened and what help was needed. Tweets from many people provided an impressive overview of the ongoing events from the earthquake. BBC covered the event by combining tweets from the work of its reporter Matthew Price in Port-au-Prince at the ground. Guardian's live blog also used social media together with the information from other news organisations to report about the rescue mission.

It has been two years since CNN officially launched iReport as a section of its website where people can upload video material, with contact information. During the Haiti crisis, CNN had published a range of social media material but not all the materials were verified. The editorial staff would vet the reports from the citizen journalists and labeled them differently compared to unverified contents. On Facebook, a group, named "Earthquake Haiti", was formed to show support and share updates and news. It had more than 14,000 members and some users even pleaded for assistance to the injured Haitians in the group. Using email, Twitter and social networking sites like Facebook, thousands of volunteers as part of Project Ushahidi were able to map reports sent by people from Haiti.

The most impressive part of the social media's impact on Haiti is the charity text-message donations that soared to over million for the victims in Haiti. People interested in helping the victims are encouraged to text, tweet and publicize their support using various social networking sites. The Global Philanthropy Group had also started a campaign to ask wealthy people and celebrities, like Ben Stiller and John Legend to use Twitter and Facebook to encourage others to give to UNICEF. An aid worker, Saundra Schimmelpfennig, allowed the advice from other aid workers and donors to post on her blog regarding to choosing which charitable organisations to support. In the meantime, donors were asking questions in Twitter, Facebook and blogs about their donations and endorsements of their favourite charities. After every crisis, the social media for social cause becomes a more effective medium to spread the word.

Negative Effects of Social Media

There are always two sides of every coin. Social media is just a tool or mean for people to use. It is still up to the users on how to use this tool (just like a knife, can help you to cut food or hurt others). Pew Research Center's Internet & American Life Project and Elon University's Imagining the Internet Center conducted a study on "The Future of Online Socializing" from the highly engaged, diverse set of respondents to an online, opt-in survey consisted of 895 technology stakeholders and critics. The negative effects presented by the respondents included time spent online robs time from important face-to-face relationships; the internet fosters mostly shallow relationships; the act of leveraging the internet to engage in social connection exposes private information; the internet allows people to silo themselves, limiting their exposure to new ideas; and the internet is being used to engender intolerance.

Some respondents also highlighted that there will be development of some new psychological and medical syndromes that will be "variations of depression caused by the lack of meaningful quality relationships", and a "new world society". The term, "Social Networking", has begun to deceive the users to believe they are social creatures. For instance, spending a couple of hours using Farmville and chatting with friends concurrently does not convert into social skills. People become dependent on the technology and forget how to socialise in face-to-face context. The online personality of a person might be totally different from his/her offline character, causing chaos when the two personalities meet. It is apparent in online dating when the couple gets together in face-to-face for the first time. Their written profiles do not clearly represent their real-life characters. It is more enticing for people to type something that others want to hear than saying the truth.

Besides the "friendship", creators of social networking sites and users redefine the term, "privacy" in the Internet as well. The challenge in data privacy is to share data while protecting personally identifiable information. Almost any information posted on social networking sites is permanent. Whenever someone posts pictures or videos on the web, it becomes viral. When the user deletes a video from his/her social network, someone might have kept it and then posted it onto other sites like YouTube already. People post photographs and video files on social networking sites without thinking and the files can reappear at the worst possible time. In 2008, a video of a group of ACJC students hazing a female student in school on her birthday was circulated and another video of a SCDF recruit being "welcomed" (was hosed with water and tarred with shoe polish) to a local fire station made its way online.

Much news has been reported about online privacy breach in Facebook and Facebook is constantly revising their privacy policy and changing their privacy controls for the users. Interestingly, even when users delete their personal information and deactivate their Facebook account, Facebook will still keep that information and will continue to use it for data mining. A reporter asked whether the data will at least be anonymized. The Facebook representative declined to comment.

In the corporate world, human resource managers can access Facebook or MySpace to get to know about a candidate's true colours, especially when job seekers do not set their profiles to private. Research has found that almost half of employers have rejected a potential worker after finding incriminating material on their Facebook pages. Some employers have also checked the candidates' online details in Facebook pages to see if they are lying about their qualifications. Nowadays, younger generations have a complete disregard for their own privacy, opening doors to unwelcome predators or stalkers.

Impact of Social Media on Society
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Raymond Tay
Founder & Trainer of Leader's Wheel LLP

Having strong interest in personal development and helping others.

My Company Site: http://www.leaderswheel.com
My Learning Blog: http://www.leaderswheel.com/raymondtay

cell phone watches Order Emf And Anti Aging Bracelet E Q Low Low Price Competition Engineering 3002 43 Steel Fenderwell

Thursday, November 29, 2012

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

Intranet

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

watch cell phone Order Tablespoon Waldorf 7 Micron Silverplated Set Of

Thursday, November 22, 2012

Top 10 Appetizers For Wine Tasting Parties

Wine tasting parties are perfect for getting together either formally or informally with friends. Everyone can relax, taste a few fine wines, and snack on some delicious snacks. Wine tasting parties take a lot less work to organize than a dinner party, and they can also be very elegant.

Planning your party is still important. Pick a theme. Perhaps you will serve wines from one region only, or from places that are not generally recognized as winery country. Maybe it would be interesting to try wines made from fruit other than grapes, or try an international night where you feature wines from France, Italy, or Australia.

Once you have decided on the wines you want to serve, pair them up with appropriate appetizers. Lighter, white wines need light food to accompany them like tapenade or shrimp, while you can couple full-bodied red wines with substantial offerings like meats or even chili. If you are choosing dessert wines, you need to decide if you prefer to serve a sweet dessert appetizer with them or something savory to cut the sweetness.

Top 10 Appetizers For Wine Tasting Parties

It seems that the simplest, freshest foods bring out the best in wine, which is why bread, cheese, and fruit top the list of appetizers served at wine parties. Combinations of these foods can be used to create more appetizers, like tomato and herb bruschetta or baked brie and bread cubes.

When you are setting up for your wine tasting party, be sure to have plenty of fresh water on hand. Your guests may want to cleanse their palate between tastings, and the water will help everyone stay hydrated. You may also want to keep a receptacle available in case someone only wants to savor and then spit out the wine. Swallowing too many different types of wine can cloud their judgment when tasting other varieties or they may not like one that they try.

Keep some bland appetizers available for the actual tasting portion of your party. This will also help remove the flavors of the previous wine from your guests' palates. Once the initial tasting is all done, bring out the good appetizers and let everyone enjoy them with their favorite wines of the evening.

It can be a lot of fun to let your guests rate the wines you have chosen for the evening, giving them ratings and descriptions for what they did and did not like. Do not worry about them rating the appetizers, though; they will be a sure hit during the evening.

Make sure that there is a designated driver or that your guests can get home safely if they have imbibed a bit too much. This is another good reason to provide plenty of snacks. If they are busy eating, they will enjoy the wine but not drink too much.

Top 10 Appetizers

Bruschetta Cheese and Crackers Seasonal Fruit Bread with Olive Oil and Herbs Tapenade Chocolates Smoked Salmon Points Baked Brie Shrimp Puffs Shrimp Ring

Top 10 Appetizers For Wine Tasting Parties
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Make some easy party appetizers for your next shindig. Easy appetizer recipes do not stress you out, they taste delicious, and you can take the time to enjoy your party instead of working in the kitchen!

EasyAppetizerRecipes.net - You Make the Appetizers, We Help You Make Them Delicious

cell phone watches Cheap Rugged Ridge 53703 52 Soft Top With Sale Jackson 3018159 Pack And Pop 28 Safety