Saturday, May 2, 2009

Six Reasons Why Microsoft’s Hyper-V Will Overtake VMware

http://www.ziddu.com/download/4580681/05-2008ClabbySixReasonsWhyMSwillovertakeVMW.pdf.html

Windows Server 2008 Reviewers Guide

The Windows Server 2008 Reviewers Guide provides a comprehensive technical overview of the innovative features and functions that make Windows Server 2008 the next-generation Microsoft Windows Server operating system and successor to Microsoft Windows Server 2003. This guide also provides information about the benefits Windows Server 2008 offers diverse users, as well as information about different scenarios.This document supports the release of Windows Server 2008.

Windows Server 2008 is upgrade IT can't refuse



As Windows Server 2008, formerly code-named Longhorn, makes its final way out of Microsoft's corral this week, our Test Center inspected the beast and was surprised."You who have followed Tom [Yager's] somewhat tepid Longhorn coverage may be shocked to discover that his in-depth review of Windows Server 2008 holds the new OS in high esteem," editor-in-chief Eric Knorr points out, in A long, long look at Windows Server 2008.Thanks in no small part to a smaller resource footprint that brings a host of capabilities, including virtualization, enhanced security and better networking, Microsoft’s 64-bit OS, Windows Server 2008, is what Tom Yager calls an upgrade that IT can't refuse."Microsoft has executed Windows Server 2008 in a way that makes commercial Linux far less appealing," Yager explains in Product review: Windows Server 2008 is the host with the most and the perfect guest. "In those places where Linux might be seen as a good fit for its performance and small footprint, any Windows Server 2008 SKU ... all but slams the door shut on Linux in a Windows shop."While Longhorn's features are already known to the public, Sean McCown shares Secrets of Windows Server 2008, those being what you need to know now, as well as "the actual impact that Longhorn will have on your organization." These include restartable ActiveDirectory Domain Services, NTFS enhancements, Server Core, Read-only domain controllers, and the list goes on.

Download Microsoft Hyper-V Server 2008 R2 Beta

Microsoft® Hyper-V™ Server 2008 R2 is a stand-alone product that provides a reliable and optimized virtualization solution enabling organizations to improve server utilization and reduce costs. With the addition of new features such as live migration and expanded processor and memory support for host systems, it allows organizations to consolidate workloads onto a single physical server and is a good solution for organizations who are consolidating servers as well as for development and test environments.By having the ability to plug into existing IT infrastructures Microsoft Hyper-V Server 2008 R2 enables companies to reduce costs, improve utilization and provision new servers. It allows IT professionals to leverage existing patching, provisioning, management and support tools and processes. IT Professionals can continue to leverage their individual skills and the collective knowledge of Microsoft tools, minimizing the learning curve to manage Microsoft Hyper-V Server 2008 R2. In addition, with Microsoft providing comprehensive support for Microsoft applications and heterogeneous guest operating systems support, customers can virtualize with confidence and peace of mind.Note: This is a pre-release version of Microsoft® Hyper-V™ Server 2008 R2 and not intended to be used in a production environment.
Download: Download details: Microsoft® Hyper-V? Server 2008 R2 Beta

7 STEPS TO A SECURE WIRELESS NETWORKS

Although all wireless equipment marked as 802.11 will have standard features such as encryption and access control each manufacturer has a different way it is controlled or accessed. This means that the advice that follows may seem a bit technical because we can only tell you what you have to do not how to do it. You should read the manual or help files that came with your equipment in order to see how to make a secure wireless network.
1. Use encryption. This is the bedrock of any secure wireless network and means that the data that passes over the wireless can only be decoded with the correct system of encryption and the correct password. Currently there are three methods of encryption for wireless networks usually referred to by their acronyms: WPA2, WPA-PSK and WEP. Each method can only be used if all the equipment on the network has the capability. As WPA2 is the most recent method of encryption, unless you have recently obtained the latest PCs, laptops & network device you probably will not be able to use it. WPA-PSK is the next best and is available on most hardware. If you are using older access points and network cards, you may find that you can only use WEP. Each method requires a “key” (a word or phrase used to make the encryption work). Make sure you use a word or phrase that would not be easily guessed. For example, don’t use your address as the key.
2. Set up your network infrastructure as “access point” and not “ad-hoc” or “peer to peer”. These last two (ad-hoc and peer-to-peer) mean that network devices such as PCs and laptops can connect directly with each other without going through an access point. You have more control over how devices connect if you set the infrastructure to “access point” and so will make for a more secure wireless network.
3. choose an obscure name for the network - This important tip to having a secure wireless network is probably not used by about 99% of home users. The technical term for the name of the wireless network is “SSID”. The default SSID is usually the name and model of the wireless router or Internet provider e.g. NetgearDG834G or Sky9091. If you leave the SSID like this it makes hacking very easy so change the SSID as soon as you set up your network. Don’t use your address, house name or family name these are too easy to guess.4. Switch off the SSID broadcast. This tip goes hand in hand with No3 in creating a secure wireless network. This means that anyone wishing to connect to your wireless network must know its SSID i.e. the name of the network.
5. Change the name and password of the administration user for the wireless router but don’t forget to make a note of what you change it to. A secure wireless network will have an admin user ID that is difficult to guess and a strong password that uses letter and numbers.
6. Unplug the wireless router whenever you are going to be away from home (or the office). It’s also a good idea to set the time that the network can be used if the device allows it. For example, in an office you may not want to unplug the wireless router at the end of every day so you could set it to only allow connections between the hours of 7:30 AM and 7:30 PM.
7. Use MAC filtering If your wireless router or access point allows it, MAC filtering easily adds one more layer to make your wireless network secure. Every network card (the device installed in PCs and laptops that connect it to a network) has its own unique code, called a “MAC address”. In Windows XP you can see the MAC address by right-clicking on the network connection, choose “status” and then the “support” tab. In the support window click on “details”. The code labeled “physical address” is the MAC code for that network connection device. Make sure it’s the wireless network connection you select as the LAN connection will have a different MAC address. Most wireless routers or access points allow you to list the MAC codes that you wish to use the network. This means that you must grant permission to any PC or laptop that wants to connect to the network.
If you can put all seven of these tips in operation you will have a very secure wireless network

O'REILLY SERVER LOAD BALANCING

http://www.ziddu.com/download/4574787/ServerLoadBalancing.pdf.html

THE COMPLETE GUIDE TO VMWARE WORKSTATION

http://www.ziddu.com/download/4574704/TheCompleteGuideToVMwareWorkstation.pdf.html