IT technologies and concepts explorer and analyser in the web.

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin

New IT Concepts

Share Your Comments

  • Saas - Cloud Computing

    The cloud computing : is based on this three concepts. IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service).

  • Virtualization - The new technology evelution

    Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources.....

  • http://ittechnologies.blogspot.com/2011/04/common-security-vulnerabilities-in-e.html

    Security Vulnerabilities in E-Commerce Systemin

    Most of these attacks have utilized vulnerabilities that have been published in reusable third-party components utilized by websites, such as shopping cart software and poor design of such websites. Other factor is user awareness of security vulnerabilities.

  • VPN - Virtual Private Network

    VPN is a technology which is making secure private network through the public accessible network infrastructure. Virtual Private Network represent by the short name VPN. ...

  • Saas - Cloud Computing

    The cloud computing : is based on this three concepts. IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service).

  • Virtualization - The new technology evelution

    Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources.....

Posted by Priyan Fernando 12- Oct- 2011 0 comments

Virtualization offers huge benefits in flexibility, cost-effectiveness and eco-friendliness. However, some design choices need to be made towards deploying Active Directory Domain Controllers in virtual environments. Some of these choices are general choices, but some of them apply to Hyper-V enabled...

[ Read More ]

Posted by Priyan Fernando 12- Oct- undefined 0 comments

Last month at the BUILD Conference we introduced Windows Server 8 and began discussing how it will help customers deliver the most dynamic, available, and cost-effective server platform for what we call "cloud optimized IT." I wanted to follow up on Bill Laing's blog post and dig into the advancements...

[ Read More ]

Posted by Priyan Fernando 12- Oct- undefined 0 comments

SUMMARY A virtual hosting environment lets you run multiple guest operating systems on a single host computer at the same time. Host software virtualizes resources that include the following: CPU Memory Disk Network Local devices By virtualizing these resources on a physical computer,...

[ Read More ]

Posted by Priyan Fernando 31- Aug- 2011 0 comments

Remote Client Copy from X to Y1.  Create New Logical System Name Tcode -  BD54 (This is cross client ) e.g. <sid>CLNTXXX (new client number) 2. Create a new client Tcode -  SCC4 Fill in the fields with the relevant information for the new client e.g. client number XXX 3. ...

[ Read More ]

Posted by Priyan Fernando 31- Aug- undefined 0 comments

MINISAP is a full-fledged Basis SAP system without the SAP applications (FI, CO, MM, SD, etc.). It has every Basis function of a standard SAP-R/3 system (ABAP/4 Development Workbench, Data Transfer Workbench, Computer Center Management System - CCMS, etc.) and, therefore, is a very good means to get...

[ Read More ]

Posted by Priyan Fernando 5- Jul- 2011 0 comments

Firewalls.The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advantage, it is essential. Yet connecting a private network to the Internet can expose...

[ Read More ]

Posted by Priyan Fernando 5- Jul- undefined 0 comments

IPS - intrusion Prevention Systems IDS - intrusion Detection System. Layered security is the key to protecting any size network, and for most companies, that means deploying both intrusion detection systems (IDS) and intrusion prevention systems (IPS). When it comes to IPS...

[ Read More ]

Posted by Priyan Fernando 30- Jun- 2011 0 comments

What is APN? APN stands for Access Point Name and it is a gateway or protocol that allows people to gain access to the web by using the services of mobile phone networks. These networks may be 2G, 3G, or GPRS among others. But before someone can get access to the internet, the proper settings must be...

[ Read More ]

Posted by Priyan Fernando 13- Jun- 2011 0 comments

Multi-Protocol Label Switching (MPLS) provides a mechanism for forwarding packets for any network protocol. It was originally developed in the late 1990s to provide faster packet forwarding for IP routers (see RFC 3031). Since then its capabilities have expanded massively, for example...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Enabling or Disabling the “Hibernate” option in Windows 7 or Vista is not as simple as it used to be in Windows XP. For Windows 7 a different approach has to be followed to accomplish the same job. In this post you will find how to enable or disable...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnet command is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES,...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.Most of us have experienced a situation...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background....

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software...

[ Read More ]