shari820 Profile

Join Date:

Blogs Owned

The Latest updates from the Tech World

Visit Follow

Other Tags: mobile, IT, laptops, windows, nokia

Latest Blog Posts

  • Active Desktop Recovery Error
    on Apr 23, 2011
    In Windows XP the Active desktop recovery error is a common as well as an annoying one. This mostly occurs when the Internet Explorer doesnt gets closed safely. To recover this error, please follow the below steps.- Take a notepad- Copy and paste the...
  • Cloud Computing -2 IntroduTion
    on Feb 13, 2011
    INTRODUCTIONYears ago, the internet was just used merely for information gathering and email. Today, the internet could become a host of different types of applications which will not require any local installation in the users end. Because of the in...
  • Cloud Computing - 3 Key Features
    on Feb 13, 2011
    KEY FEATURES• Agility improves with users' ability to rapidly and inexpensively re-provision technological infrastructure resources.• Application Programming Interface (API) accessibility to software that enables machines to interact with cloud s...
  • How to Identify the version of SQL Server you are using.
    on Feb 13, 2011
    To identify the version of the SQL server your are using, just run the below Query.SELECT SERVERPROPERTY('productversion'), SERVERPROPERTY ('productlevel'), SERVERPROPERTY ('edition')...
  • Cloud Computing -1
    on Feb 13, 2011
    Cloud computing is Internet-based computing, whereby shared servers provide resources, software, and data to computers and other devices on demand, as with the electricity grid. Cloud computing is a natural evolution of the widespread adoption of vir...
  • Cloud Computing -5 Service Models
    on Feb 13, 2011
    SERVICE MODELSThe Internet functions through a series of network protocols that form a stack of layers, as shown in the figure (or as described in more detail in the OSI model). Once an Internet connection is established among several computers, it i...
  • Cloud Computing -4 Architecture
    on Feb 13, 2011
    ARCHITECTURECloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over application programming interfaces, usually...
  • Cloud Computing
    on Feb 6, 2011
    Cloud computingView more presentations from Sreehari820.
  • Useful 100 shortcuts for windows
    on Feb 5, 2011
    CTRL+C (Copy)CTRL+X (Cut)CTRL+V (Paste)CTRL+Z (Undo)DELETE (Delete)SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) CTRL while dragging an item (Copy the selected item)CTRL+SHIFT while dragging an item (...
  • Useful MS word tips in Formatting
    on Feb 5, 2011
    May be useful to you guys…………………….• Shrinking a Document to Fit If you've created a document and one or two lines spill over into a new page, you can use the "Shrink to Fit" feature to fit everything on the page. Choose File, Print...
  • How to hide conenction tab in IE
    on Feb 5, 2011
    For hiding the connection tab in windows XP, copy the below contents to a notepad and save as "Hide.reg" file. Run the Hide.reg, the connection tab in Internet explorer would have disappeared.\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\...
  • How to configure a Linux Mail Server -3
    on Jan 26, 2011
    How To Configure Linux Sendmail Clients All Linux mail clients in your home or company need to know which server is the mail server. This is configured in the file by setting the SMART_HOST statement to include the mail server. In the exa...
  • How to configure a Linux Mail Server -6
    on Jan 26, 2011
    Common Errors Due To Incomplete RPM Installation Both the newaliases and m4 commands require the sendmail-cf and m4 RPM packages. These must be installed. If they are not, you'll get errors when running various sendmail related commands. • Sample E...
  • How to configure a Linux Mail Server -1
    on Jan 26, 2011
    Introduction Email is an important part of any Web site you create. In a home environment, a free web based email service may be sufficient, but if you are running a business, then a dedicated mail server will probably be required. This Project will...
  • How to configure a Linux Mail Server -5
    on Jan 26, 2011
    Sendmail Masquerading Explained If you want your mail to appear to come from and not, then you have two choices: • Configure your email client, such as Outlook Express, to set your email address to user@mysite...
  • How to configure a Linux Mail Server -8
    on Jan 26, 2011
    The Rules du Jour Spamassassin Tool There are groups of open source developers that create and update customized spamassassin configuration files that make the tool even more effective. They have even made life easier for the harried systems administ...
  • How to configure a Linux Mail Server -4
    on Jan 26, 2011
    The /etc/mail/access File You can make sure that only trusted PCs on your network have the ability to relay mail via your mail server by using the /etc/mail/access file. That is to say, the mail server will relay mail only for those PCs on your netwo...
  • How to configure a Linux Mail Server -2
    on Jan 26, 2011
    Installing Sendmail Most RedHat and Fedora Linux software products are available in the RPM format. You will need to make sure that the sendmail, sendmail-cf, and m4 software RPMs are installed. (Chapter 6, "Installing RPM Software", will tell you ho...
  • How to configure a Linux Mail Server -9
    on Jan 26, 2011
    A Simple PERL Script To Help Stop SPAM Blacklists won't stop everything, but you can limit the amount of unsolicited spam you receive by writing a small script to intercept your mail before it is written to your mailbox. This is fairly simple to do,...
  • How to configure a Linux Mail Server -7
    on Jan 26, 2011
    Fighting SPAM Unsolicited Commercial Email (UCE or SPAM) can be annoying, time consuming to delete and in some cases dangerous when they contain viruses and worms. Fortunately there are ways you can use your mail server to combat SPAM. Using Public S...