Lijit Ad Wijit

Buy Sell Today

Affiliate Banner

Access Ad

Elite Ad

MBA Degree Online

MBA Degree Online

Online MBA Degree Programs
The decision to pursue an Online MBA could not be made at a better time. Employers today are demanding more education from their employees than ever before. An accredited online MBA degree will carry significant value in any organization's hiring and career advancement decisions. Plus, there is a direct correlation between higher salaries and earning and MBA.
In difficult economic times, going back to school to build new skills -- and make yourself more attractive to future employers -- becomes extremely popular, even for people with full-time jobs. MBAs are especially popular since the degree is usually meant to prepare someone for more advanced, leadership roles in business (or even government). But is an MBA degree worth the extra years of schooling -- especially when you could be spending that time working full-time?
At first glance, the numbers indicate that the answer is a definite yes. A recent survey of accounting/financial workers of varying skill and seniority levels found that CFOs without a degree had an average salary of only $38,920, those with a Bachelors Degree earned $88,836, and MBAs earned an average of $104,284. The return on investment for an MBA certainly seems worthwhile. Some studies indicate the MBAs earn up to 145% more over their lifetime than non-degree holders. So getting your MBA, while sometimes expensive, is certaining economical.
However, there are many mitigating factors affecting an online MBA. Keep in mind that the salary figures quoted above are fairly flexible and can vary widely based on a number of factors. For instance, the type of work you're going into can make a huge difference; consulting jobs will often pay more than finance/accounting jobs, though each could have a different compensation/bonus structure. Your previous experience also speaks volumes. If you're fresh out of business school and go hunting for an investment banking job after years in a marketing firm, odds are good that your starting salary will be much lower than someone with greater comparable experience.
An online MBA is still a very good idea. The numbers are still very persuasive. Statistics from the Graduate Management Admissions Council (the folks who administer the GMAT) indicate that in many cases someone's pre- and post-MBA salary can jump 50% or more. For example, someone working in marketing making an average of $42,000 before getting their MBA can make an average of $80,000 after receiving their degree. That's nearly doubling your money!
An MBA may not be equivalent to a winning lottery ticket, but the odds are good that your earnings will increase after earning your degree -- making those extra years of school worthwhile. Just be sure that you're pursuing the right degree for the right reasons and, of course, good luck with that graduate school application!

What is SSH (Secure Shell)?

What is SSH (Secure Shell)?
SSH (Secure Shell) is a protocol for creating a secure connection between two computers.

SCP and SFTP - Secure File Transfer Using SSH

SCP and SFTP are replacements for the legacy `cp` and `ftp` file transfer applications.
SCP and SFTP enable secure encrypted file transfer over an SSH connection.

Free SSH Servers . . .
There are several free SSH implementations available. Some support only SSH, while others also support SCP and SFTP.
[Operating Systems Supported: AIX, HP-UX, Irix, Linux, NeXT, SCO, SNI/Reliant Unix, Solaris, Digital Unix/Tru64/OSF, Mac OS X, and Cygwin]
[Operating Systems Supported: Linux, Mac OS X, FreeBSD, NetBSD, OpenBSD, Solaris, Irix, True64, AIX, HP-UX]
[Operating Systems Supported: NetBSD, FreeBSD, Linux]
[Operating Systems Supported: GNU/Linux on Sparc, Intel, PPC and Alpha, FreeBSD, Solaris and IRIX]
[Operating Systems Supported: Windows]
[Operating Systems Supported: Windows]

Free SSH Clients . . .
[Operating Systems Supported: AIX, HP-UX, Irix, Linux, NeXT, SCO, SNI/Reliant Unix, Solaris, Digital Unix/Tru64/OSF, Mac OS X, and Cygwin]
[Operating Systems Supported: NetBSD, FreeBSD, Linux]
[Operating Systems Supported: GNU/Linux on Sparc, Intel, PPC and Alpha, FreeBSD, Solaris and IRIX]
[Operating Systems Supported: Windows]
[Operating Systems Supported: Win32 and Unix]
[Operating Systems Supported: Windows]
[Operating Systems Supported: Windows (SCP and SFTP, no SSH)]
[Operating Systems Supported: Macintosh]
[Operating Systems Supported: Macintosh]
[Operating Systems Supported: Macintosh (SFTP only)]
[Operating Systems Supported: Palm OS]
[Operating Systems Supported: Palm OS]

Bypassing Websense using HTTP Tunneling

Bypassing Websense using HTTP Tunneling
You can also bypass Websense by using HTTP Tunneling. HTTP Tunneling programs work well to bypass Websense. Most programs also come with options, which help you to destroy the history of your Internet and Widows activity. What this means is that you can ensure comfort and security of your online activities and can spoof your web browser information, which helps to thwart hacking missions. One can download HTTP Tunneling software programs from the Internet quite easily and inexpensively.

Configure a Web Proxy in Mozilla Firefox

Configure a Web Proxy in Mozilla Firefox
  1. Note the IP address and the port number of that proxy server.
  2. Open Firefox.
  3. Open the Tools menu.
  4. Select Options.
  5. Click the Connection Settings button.
  6. Check Manual Proxy Configuration.
  7. Enter the IP address of the proxy you selected into the "HTTP Proxy:" box.
  8. Enter the port number of the proxy you selected into the corresponding "Port:" box.
  9. Enter the IP address of the proxy you selected into the "SSL Proxy:" box.
  10. Enter the port number of the proxy you selected into the corresponding "Port:" box.
  11. Click the OK button.
  12. Click the OK button.

Configure a Web Proxy in Internet Explorer

Configure a Web Proxy in Internet Explorer
  1. Note the IP address and the port number of that proxy server.
  2. Open Internet Explorer.
  3. Open the Tools menu.
  4. Select Internet Options.
  5. Click on the Connections tab.
  6. Click on the LAN Settings button.
  7. Check the box next to "Use a proxy server for your LAN".
  8. Enter the IP address of the proxy you selected into the "Address:" box.
  9. Enter the port number of the proxy you selected into the "Port:" box.
  10. Click the OK button.
  11. Click the OK button.

How to find Hostname

How to find Hostname
There are different kinds of hosts like your local computer, ISP, web server etc. Here I’m going to tell you how to find hostname.

Local Hostname – To find localhost name, just open Command Prompt [CMD] and type “hostname” to get the local hostname on you computer. Also, you will get the hostname by typing “ipconfig /all”.

IP or Domain Hostname – You can also fine IP/ Domain hostname from DOS. Just type “nslookup domain.com” to get host IP address. For example if we type “nslookup google.com” then the output will be as follows . . .


Similarly, you can find the domain hostname by typing “nslookup xxx.xxx.xxx.xxx
For example, if you type Google’s IP 74.125.67.100 then it will give you the output as below:


Now, if you try this command with your domain, it will give you the IP address. Next, you may get error [see the screenshot below] while trying to get the domain from IP lookup. It’s because your domain is on a shared IP. :) It’s only possible if your domain is on a dedicated IP Address.


Also there is another way to get hostname from IP address is as follows

Just type “ping –a xxx.xxx.xxx.xxx” If you run the above command with one of Google’s IP 74.125.67.100 it will give the out put like this . . .

For the reverse action, same thing applies for shared IP.

How to find Subnet Mask

How to find Subnet Mask
If you want to find your subnet mask of the network or if you are in the network but want to know what is my subnet mask, here is a handy article for you. Subnet mask helps to identify which section of an IP address is reserved for network and which part is available for the use of host. Subnet mask is also known as netmask. Now I’m going to tell you how to find subnet mask on your local network.

Windows Vista/ XP/NT/2003 – On Windows Vista, XP or other NT versions you can follow simple steps below.
[1] Go to Start Menu -> Run
[2] Type “cmd” and press enter to open the command prompt window.
[3] Now type “ipconfig /all” [without quotes]

You will get the subnet mask on your local network like the following screenshot.

Also you get the same information from the properties of Local Area Network. Just go to Start Menu -> Settings -> Network Connections and double click the Local Area Network icon. Then just click on the support tab at the top of the window.



Linux/ Unix – On Linux or Unix system just type following commands on shell to get the subnet mask.

$ ifconfig

or

$ /sbin/ifconfig

or

$ /sbin/ifconfig interface-name

The output will be as follows…

lnc0: flags=108843 mtu 1500
inet 72.122.61.51 netmask 0xfffffff8 broadcast 72.122.61.55
ether 00:0c:29:32:8a:8c
plip0: flags=108810 mtu 1500
lo0: flags=8049 mtu 16384
inet6 fe80::1%lo0 prefixlen 64 scopeid 0×3
inet6 ::1 prefixlen 128
inet 127.0.0.1 netmask 0xff000000

The netmask is the subnet mask and displayed in hexadecimal format.

Open Proxy Closed Proxy

 Open Proxy Closed Proxy

Open proxy

An open proxy is a proxy server that is accessible by any Internet user. Generally, a proxy server allows users within a network group to store and forward Internet services such as DNS or web pages to reduce and control the bandwidth used by the group. With an open proxy, however, any user on the Internet is able to use this forwarding service.


Advantages
So-called "anonymous" open proxies allow a user to conceal his or her IP address from the accessed service, as it is possible to use someone else's computer in order to hide one's identity and/or location. This is sometimes used to abuse or interrupt the accessed service, potentially violating its terms of service or some laws; open proxies are therefore often seen as a problem. However, anonymous open proxies increase the user's anonymity or security when browsing the web or using other Internet services: a user's true IP address can be used to help deduce information about that user as part of an attempted computer crack. Furthermore, open proxies can be used to circumvent efforts at Internet censorship by governments or organizations. Several web sites provide constantly updated lists of open proxies.

Disadvantages
It is possible for a computer to run as an open proxy server without the computer's owner knowing this. This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose. If it is caused by malware, the infected computer is known as a zombie computer. There are hundreds of thousands of open proxies online. This is rarely a matter of misconfiguration, in most cases an open proxy is unknown to the server owner. Using an open proxy can be legally dangerous: the current law in Germany, for example, makes it illegal to access a computer or network without the owner's knowledge, even if the proxy is not password-protected. There are no reasons to run a clean open proxy for an organisation, so any open proxy is suspicious. The main sign of a legal open proxy is the fact that it is not anonymizing the connection.

Running an open proxy is a high risk for the server operator; providing an anonymous proxy server can cause real legal troubles to the owner. Such services are frequently used to break into foreign computer systems, child pornography is usually consumed through proxies, and illegal content is likely to be spread through such proxies. Also, such a proxy can cause a high bandwidth usage resulting in higher latency to the subnetwork and violation of bandwidth limits. A wrongly configured open proxy can also allow access to a private subnetwork or DMZ: this is a high security concern for any company or home network because computers that usually are out of risk or firewalled can be directly attacked.

Many open proxies run very slowly, sometimes below 14.4 kbit/s, or even below 300 bit/s, while other times the speed may change from fast to slow every minute. Some, such as PlanetLab proxies, run faster and were intentionally set up for public use.

Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies. Likewise, a mail server may be configured to automatically test mail senders for open proxies, using software such as proxycheck. Increasingly, mail servers are configured out of the box to consult various DNSBL servers in order to block spam; some of those DNSBLs also list open proxies.

Closed proxy
A closed proxy is a proxy server that is only accessible to specific individuals because it only allows users within its area connect to it and/or requires a username and password.

Proxy

Proxy
Proxy may refer to one who or that which acts on behalf of someone or something else, as in:
> Proxy bomb, a bomb delivered by a person against their will
> Proxy card, a substitute card used in trading card games when a player does not own the substituted card and also can occur when proxy cards are not tradable
> Proxy fight, attempting to influence how company shareholders use their proxy votes
> Proxy marriage, common amongst European monarchs, where one party is not present in person to their marriage to the other
> Proxy murder, a murder which the murderer commits at the behest of another
> Proxy voting, a vote cast on behalf of an absent person
> Proxy war, a war where two powers use third parties as a substitute for fighting each other directly


Technical Terms:
> Proxy (statistics), a measured variable used to infer the value of a variable of interest
> Proxy (climate), a measured variable used to infer the value of a variable of interest in climate research
> Proxy authentication connects one user through another, generally to authenticate through multiple tiers in a computer system.
> Proxy pattern, a software design pattern in computer programming
> Proxy server, a computer network service that allows clients to make indirect network connections to other network services

Pay per click

Pay per click (PPC)
Pay per click (PPC) is an Internet advertising model used on search engines, advertising networks, and content sites, such as blogs, in which advertisers pay their host only when their ad is clicked. With search engines, advertisers typically bid on keyword phrases relevant to their target market. Content sites commonly charge a fixed price per click rather than use a bidding system.

Websites that utilize PPC ads will display an advertisement when a keyword query matches an advertiser's keyword list, or when a content site displays relevant content. Such advertisements are called sponsored links or sponsored ads, and appear adjacent to or above organic result on search engine results pages, or anywhere a web developer chooses on a content site.

Although many PPC providers exist, Google Adwords, Yahoo! Search Marketing, and Microsoft adCenter are the three largest network operators, and all three operate under a bid-based model. Cost per click (CPC) varies depending on the search engine and the level of competition for a particular keyword.
The PPC advertising model is open to abuse through click fraud, although Google and other search engines have implemented automated systems to guard against abusive clicks by competitors or corrupt web developers.

How to block people on Facebook

How to block people on Facebook
Facebook now is loaded with spammers, online marketers and nasty people who often disturb others by sending unwanted messages and leaves you no option but to block them. If you don’t know how to block people on facebook, its pretty simple.

You can Block people (friends) on Facebook with simple steps as mentioned below:
[1] First log in to your Facebook account the on the homepage click on the “setting” link at the top bar and select Privacy Settings.
[2] Now you can simply search the person you want to block.

[3] Next, you will get an option next to their name. Just choose Block and you are done.
On the other hand you can also set up a Limited Profile on Facebook to get rid of unwanted people. Just follow the steps below …

[1] Log in to your Facebook account.

[2] Now, go to the My Privacy page.

[3] Next click on the Limited Profile Settings link. Face will give you a snapshot of your limited profile with a list shared features.

[4] Just select the features you want to share with your limited profile and click SAVE when you are done.

[5] Now you can add friends to this profile and only confirmed friends are allowed.

Difference between CDMA and WCDMA

Difference between CDMA and WCDMA


I just covered difference between CDMA and GSM, here is another article on similar technology WCDMA. lLet’s see what is the difference between CDMA and WCDMA

WCDMA comes from Wideband Code Division Multiple Access and CDMA, as you may guess, comes from Code Division Multiple Access. Apart from their almost the same name the two technologies don’t share much characteristics.


WCDMA is a system developed by NTT DoCoMo from Japan, based on CDMA2000 but very different. While CDMA2000 works with several pairs of 1.25 MHz frequency, the WCDMA uses a pair of 5 MHz. It may look like its big fat brother but it’s not.

Economically speaking, CDMA and WCDMA are rivals, with the balance leaning towards CDMA due to its better performance – cost ratio. WCDMA, as well as CDMA, are the basis for 3rd generation (3G) communication standard. But WCDMA goes with 3G UMTS, GSM’s best friend, with increased coverage ad low costs. 3G UTMS give you high data transmission on the internet, video calls and a lot more mobile services. It also gives you the possibility to send multiple data simultaneously, you can talk to the phone, send a text message (SMS) and check your email in the same time from your phone.

If you don’t have 3G coverage all over but you still want / need to keep it activated don’t worry, the cell phones are build to switch automatically to GSM mode when thet lost the 3G connection.

Know WhoIS info of site with DOS prompt

Know WhoIS info of site with DOS prompt

Here I’m going to tell you one very interesting way to get WhoIS information of any domain or IP address from your desktop. Yes, mostly or say almost all time we need to depend on different WhoIS websites. But, you can easily get all WhoIS information directly from DOS Command Prompt just by typing “whois www.domain.com” [without quote]. You will get the output on your DOS screen like this…

In Linux Shell you can direct get WhoIS information, but to obtain it from DOS you need to install a small EXE from Microsoft’s TechNet Webstie. You can download this EXE from here. After downloading, extract the EXE file to your System folder. [e.g. \Windows \ System32 or WinNT \ System32. If you are using Windows98 then \Windows\ System ]. That’s all, now simply type whois followed by any domain name or IP address on your command prompt and get all details. But, obviously this command will only work when you are connected with Internet.

How to increase speed of Internet

A faster Internet connection is everybody’s dream even though you may have the fastest Internet connection in the world. That is how we feel when it comes to the information that comes through the Internet.

Following are a few tips and tricks that will help to make your existing Internet connection faster. Please remember, faster Internet does not necessarily mean more bandwidth!

Windows XP Tweak
1. Login to your computer as an Administrator.
2. Click ‘Start’ and then click ‘Run’.
3. Type ‘gpedit.msc’ and press enter.
4. Click ‘+’ sign of ‘Local Computer Policy’.
5. Click ‘+’ sign of ‘Administrative Templates’.
6. Click ‘+’ sign of ‘Network’.
7. Highlight ‘QoS Packet Scheduler’.
8. Click ‘Limit Reservable Bandwidth’ and make is enabled.
9. Now set the value of ‘Bandwidth limit %’ to ‘0’ (zero).
10. Close the window.
[This will enhance the speed of the Internet connection once you restart the computer.]


Change your router

If you use a wireless router to connect to the Internet and it is slow, changing the router may help. There can be many reasons behind slow wireless Internet connections and the following are common issues.

• Low signal strength
When the wireless signal strength is low, you usually get a lower surfing speed. Changing the location of the wireless router or buying a new router with high signal capability will enhance the surfing speed.

• Low bandwidth router
‘g’ and ‘b’ classes are the most common for current wireless routers. If your Wi-Fi network is used by many users, high bandwidth ‘n’ class routers will definitely help.

• Router has not been configured properly
Many home-used wireless routers are used with factory settings. These settings may not be ideal for your broadband connection. Read the manual or get professional help to tweak and speedup the Internet connection.

Disable heavy web content
Heavy web content such as images and flash animations consume more bandwidth than you ever imagine. If you use a dial-up connection, these will turn out to be disasters. Web browser plug-ins (Ex: Flashblock Firefox extension) are used for blocking download of flash content, so the user experiences faster Internet.

Lijit Ad Wijit

Access Elite


Access eLite's







Powered by Access eLite's