Monday, October 10, 2011

How to Make Ringtones for the iPhone

Since Apple first released the iPhone, it has gained significant market share in the mobile phone market world-wide. The phone uses 3G and 4G data services in addition to WiFi connection(s). This allows it to be used as a comprehensive communications device from anywhere data services are available. One of the iPhone's most popular features is allowing users to set custom ringtones for individual callers, SMS text messages, new email, and alarm settings. A common task that iPhone users face is making new ringtones from popular songs or other audio sources.

How to Make Ringtones for the iPhone

Step 1 – Open the iTunes program on the computer. The application is installed in the Mac computer doc by default and will install a program icon on the Windows computer's desktop.how to make ringtones for iphone How to Make Ringtones for the iPhone
Step 2 – Pick a song from your iTunes library.
Step 3 – Pick a part of the song that you want to use for the ringtone. iTunes and the iPhone will only support a ringtone that is up to 35 seconds in duration. Note the starting and stopping point on the iTunes player for the part of the song that you want to make into a ringtone.
Step 3 – Right click the song title (Ctrl Click on the Mac).
Step 4 – Select “Get Info” then enter the starting and stopping times for the ringtone selected from Step 3.
Step 5 – Choose the “Advanced” and “Create AAC” menu options to create an AAC from the existing song in your iTunes library. If this option is not available, click “Edit,” “Preferences,” and “General” and change the import settings to “AAC” as the preferred format.
Step 6 – Ctrl Click (on a Mac) or right click the new AAC file and choose “Show in Explorer.” Rename the file with a new file extension, “.m4r”
Step 7 – Delete the AAC file created from the iTunes library and then drag the .m4r file onto the iTunes desktop to load the new ringtone into your library.
Step 8 – Move the ringtone file from your iTunes library to your phone by dragging the song icon onto the iPhone icon in iTunes to complete loading the new ringtone. * Note that your phone must be connected to the computer for it to appear in the iTunes menu.

iPhone 4S Features and Specs (Order and Price Details – inc Unlocked)

The refreshed iPhone 4S have officially been made available for pre-ordering starting since monring of Friday, October 7, 2011, on Apple online stores or mobile service providers’ online stores in several countries, including United States via AT&T, Verizon and Sprint; United Kingdom via O2, T-Mobile, Orange, Three and Vodafone, Australia via Optus, Telstra, Vodafone and Virgin Mobile; Canada via Bell, Fido, Koodo, MTS, Rogers, SaskTel, Telus and Virgin Mobile; Germany via O2, Telekom and Vodafone; and France via Orange, SFR, Bouygues Telecom and Virgin Mobile.


While the features of iPhone 4S is considered by many to be underwhelming with just minor upgrade from iPhone 4, but the smartphone is still a hit among Apple fanboys, especially with projected huge pent-up demand due to a longer than usual gap of 16 months between release, and is expected to be selling like hotcakes.
iPhone 4S features:
  • Dual-core A5 chip (upgraded from single-core A4 chip)
  • 512 MB RAM
  • 3.5″ Retina display (640×960 resolution with 800:1 contrast ratio and500 cd/m2 max brightness)
  • Fingerprint-resistant oleophobic coating
  • New antenna design which automatically switch between two antennas to provide the best signal.
  • 8MP rear-facing camera (upgraded from 5MP)
  • 1080p full HD video recording at 30 fps (upgraded from 720p HD video recording)
  • f/2.4 aperture (upgraded from f/2.8)
  • Video stabilization via built-in gyroscope
  • World phone and can work on UMTS/HSDPA/HSUPA (850, 900, 1900, 2100 MHz), GSM/EDGE (850, 900, 1800, 1900 MHz) and CDMA EV-DO Rev. A (800, 1900 MHz) networks
  • Intelligent Siri voice command personal assistant
  • iOS features
  • iCloud features
  • Talk time: Up to 8 hours on 3G, up to 14 hours on 2G (GSM); Standby time: Up to 200 hours; Internet use: Up to 6 hours on 3G, up to 9 hours on Wi-Fi; Video playback: Up to 10 hours; Audio playback: Up to 40 hours
  • Height: 4.5 inches (115.2 mm); Width: 2.31 inches (58.6 mm); Depth: 0.37 inch (9.3 mm); Weight: 4.9 ounces (140 grams)
  • 802.11b/g/n Wi-Fi (802.11n 2.4GHz only) and Bluetooth 4.0 wireless technology
  • Three-axis gyro; Accelerometer; Proximity sensor; Ambient light sensor
Price of iPhone 4S (with two-year wireless service contract with AT&T, Verizon or Sprint):
  • 16GB (Black or White): $199
  • 32GB (Black or White): $299
  • 64GB (Black or White): $399
Price of unlocked and contract free iPhone 4S:
  • 16GB (Black or White): $649
  • 32GB (Black or White): $749
  • 64GB (Black or White): $849
The iPhone 4S will available in store from October 14 on the above countries, plus Japan. The shipment for pre-order will start around October 14 too.
Shop for iPhone 4S on Apple Store Online (US) or Apple store of respective countries.

Next up will be more countries where Apple customers can purchase iPhone 4S, including Austria, Belgium, Czech Republic, Denmark, Estonia, Finland, Hungary, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Mexico, Netherlands, Norway, Singapore, Slovakia, Slovenia, Spain, Sweden,and Switzerland.
There is no news yet on when the iPhone 4S will release on other countries such as India, Indonesia, Malaysia, Brazil, although Hong Kong and China, which likely to be the hot market for iPhone 4S are rumored to have iPhone 4S by end of November.

China finds 'high-risk' Chrome flaws

A security research center in China has flagged security vulnerabilities in Google's Chrome browser that can allow attackers to remotely control a user's browser, said a report.
The three flaws were discovered by China's National Computer Network's Intrusion Protection Center, Xinhua reported, adding that the Internet company confirmed the loopholes and classified them as "high-risk".
According to the Chinese news agency, two of the Chrome vulnerabilities are related to the handling of XPath language. When the browser does not process certain XPath queries appropriately, it will lead to the same memory area to perform the release operation twice.
The third involves the SQL query operation of the Web SQL Database. When the error occurs, it can lead to the browser to write memory in past its boundary, said the report.
Both types of errors can undermine the key data structure in the system memory, allowing the attackers to execute arbitrary codes from the browser sandbox. This can compromise the user's privacy and personal information.
According to Xinhua, Google has released 14.0.835.163 version of Chrome to fix the vulnerabilities.

Friday, October 07, 2011

Steve Jobs (1955-2011)

On October 05, Steve Jobs, Apple Co-founder and former CEO passed away at the aged 56. Apple has lost a visionary and creative genius, and the world has lost an amazing human being. Here are the Bill Gates and Steve Ballmer reactions to Steve Jobs death:

Bill Gates

“I’m truly saddened to learn of Steve Jobs’ death. Melinda and I extend our sincere condolences to his family and friends, and to everyone Steve has touched through his work.
Steve and I first met nearly 30 years ago, and have been colleagues, competitors and friends over the course of more than half our lives. The world rarely sees someone who has had the profound impact Steve has had, the effects of which will be felt for many generations to come.
For those of us lucky enough to get to work with him, it’s been an insanely great honor. I will miss Steve immensely.”

Steve Ballmer

“I want to express my deepest condolences at the passing of Steve Jobs, one of the founders of our industry and a true visionary. My heart goes out to his family, everyone at Apple and everyone who has been touched by his work.”

Tuesday, October 04, 2011

Understanding Function Levels in Windows Server 2003 Active Directory

What are the domain and forest function levels in a Windows Server 2003-basedActive Directory?

Functional levels are an extension of the mixed/native mode concept introduced in Windows 2000 to activate new Active Directory features after all the domain controllers in the domain or forest are running the Windows Server 2003 operating system.
When a computer that is running Windows Server 2003 is installed and promoted to a domain controller, new Active Directory features are activated by the Windows Server 2003 operating system over its Windows 2000 counterparts. Additional Active Directory features are available when all domain controllers in a domain or forest are running Windows Server 2003 and the administrator activates the corresponding functional level in the domain or forest.
To activate the new domain features, all domain controllers in the domain must be running Windows Server 2003. After this requirement is met, the administrator can raise the domain functional level to Windows Server 2003

To activate new forest-wide features, all domain controllers in the forest must be running Windows Server 2003, and the current forest functional level must be at Windows 2000 native or Windows Server 2003 domain level. After this requirement is met, the administrator can raise the domain functional level.

Note: Network clients can authenticate or access resources in the domain or forest without being affected by the Windows Server 2003 domain or forest functional levels. These levels only affect the way that domain controllers interact with each other.

When the first Windows Server 2003–based domain controller is deployed in a domain or forest, a set of default Active Directory features becomes available. The following table summarizes the Active Directory features that are available by default on any domain controller running Windows Server 2003:
Feature Functionality
Multiple selection of user objects Allows you to modify common attributes of multiple user objects at one time.
Drag and drop functionality Allows you to move Active Directory objects from container to container by dragging one or more objects to a location in the domain hierarchy. You can also add objects to group membership lists by dragging one or more objects (including other group objects) to the target group.
Efficient search capabilities Search functionality is object-oriented and provides an efficient search that minimizes network traffic associated with browsing objects.
Saved queries Allows you to save commonly used search parameters for reuse in Active Directory Users and Computers
Active Directory command-line tools Allows you to run new directory service commands for administration scenarios.
InetOrgPerson class The inetOrgPerson class has been added to the base schema as a security principal and can be used in the same manner as the user class.
Application directory partitions Allows you to configure the replication scope for application-specific data among domain controllers. For example, you can control the replication scope of Domain Name System (DNS) zone data stored in Active Directory so that only specific domain controllers in the forest participate in DNS zone replication.
Ability to add additional domain controllers by using backup media Reduces the time it takes to add an additional domain controller in an existing domain by using backup media.
Universal group membership caching Prevents the need to locate a global catalog across a wide area network (WAN) when logging on by storing universal group membership information on an authenticating domain controller.
Secure Lightweight Directory Access Protocol (LDAP) traffic Active Directory administrative tools sign and encrypt all LDAP traffic by default. Signing LDAP traffic guarantees that the packaged data comes from a known source and that it has not been tampered with.
Partial synchronization of the global catalog Provides improved replication of the global catalog when schema changes add attributes to the global catalog partial attribute set. Only the new attributes are replicated, not the entire global catalog.
Active Directory quotas Quotas can be specified in Active Directory to control the number of objects a user, group, or computer can own in a given directory partition. Members of the Domain Administrators and Enterprise Administrators groups are exempt from quotas.
When the first Windows Server 2003–based domain controller is deployed in a domain or forest, the domain or forest operates by default at the lowest functional level that is possible in that environment. This allows you to take advantage of the default Active Directory features while running versions of Windows earlier than Windows Server 2003.



WINDOWS SERVER 2008 BASICCONCEPTS

 
WINDOWS SERVER 2008 BASICCONCEPTS
After the success story of Windows Server 2003 Microsoft introduces Windows Server 2008 on Feb27, 2008. Then on July 22, 2009 an upgrade version is released ie Windows Server 2008 R2 whichis based on Windows NT 6.X.There are so many advance features in Windows Server 2008 which will be discussed later. Nowlet us go through the flavors available.
Windows Web Server 2008
This version is designed especially for Web Services. Compared to other versions thisincludes web hosting specific features  IIS, ASP.NET etc.
Windows Server 2008 Standard Edition
This is a basic version of Server 2008 & it includes features such as .NET framework, IIS7and Active Directory for small to medium size business solutions.It supports up to two (2) Processors & 4 GB of memory.
Windows Server 2008 Enterprise Edition
This version is designed for companies which needs enterprise level of systems. It includesall the features of standard edition.It supports up to eight (8 ) processors & 64 GB of RAM for x86 versions and up to 2 TB of RAM forx64 versions & hot swappable memory

Raising Windows Server 2008 Active Directory Domain and Forest Functional Levels


When the first Windows Server 2008–based Domain Controller is deployed in a domain or forest, the domain or forest operates by default at the lowest functional level that is possible in that environment, meaning Windows 2000 Native Mode. This allows you to take advantage of the default Active Directory features while running versions of Windows earlier than Windows Server 2008. When you raise the functional level of a domain or forest, a set of advanced features becomes available.
 
Note: In the Windows Server 2008 version of DCPROMO, when you install a new domain in a new forest, you are prompted for the function level of your choice. Therefore, it may very well be that a brand new installation of Active Directory will not hold the "default" domain or forest function levels.


Raising Domain Function Levels

To activate new domain features that available in Windows Server 2008, all domain controllers in the domain must be running Windows Server 2008. After this requirement is met, the administrator can raise the domain functional level to Windows Server 2008.
Important
Raising the domain functional levels to Windows Server 2008 is a nonreversible task and prohibits the addition of Windows 2000–based or Windows Server 2003–based Domain Controllers to the environment. Any existing Windows 2000–based or Windows Server 2003–based Domain Controllers in the environment will no longer function, and in fact, the upgrading wizard will not allow you to continue with the operation. Before raising functional levels to take advantage of advanced Windows Server 2008 features, ensure that you will never need to install domain controllers running Windows 2000-based or Windows Server 2003–based Domain Controllers in your environment.
Membership in Domain Admins, Enterprise Admins, or equivalent, is the minimum required to complete this procedure.
In order to raise the domain functional level:
  1. Log on the PDC Emulator of the domain with domain administrator credentials.
  2. Note: The PDC Emulator is usually the first DC in the domain.
  3. Open Active Directory Users and Computers by clicking Start > All Programs > Administrative Tools, and then click Active Directory Users and Computers (you can also perform this action from the Active Directory Domains and Trusts snap-in).
  4. In the console tree, right-click the domain node and then click Raise Domain Functional Level.

  5. Under Select an available domain functional level, do one of the following:
  6. Click Windows Server 2003, and then click Raise to raise the domain functional level to Windows Server 2003.
    or
    Click Windows Server 2008, and then click Raise to raise the domain functional level to Windows Server 2008.

  7. Read the warning message, and if you wish to perform the action, click Ok.

  8. You will receive an acknowledgement message telling you that the operation was completed successfully. Click Ok.

  9. You can check the function level by performing step 3 again and viewing the current function level.
Note: The current domain functional level appears under Current domain functional level in the Raise Domain Functional Level dialog box. The level increase is performed on the PDC Emulator FSMO and requires the domain administrator.

Raising Forest Function Levels

To activate new forest features that available in Windows Server 2008, all domain function levels in the forest must be running in Windows Server 2008 mode. After this requirement is met, the administrator can raise the forest functional level to Windows Server 2008.
Note that domains that are set to the domain functional level of Windows Server 2003 will automatically be raised to Windows Server 2008 at the same time that the forest functional level is raised to Windows Server 2008.
Important
Raising the forest functional levels to Windows Server 2008 is a nonreversible task and prohibits the addition of Windows 2000–based or Windows Server 2003–based Domain Controllers to any of the domains in the environment. Any existing Windows 2000–based or Windows Server 2003–based Domain Controllers in the environment will no longer function, and in fact, the upgrading wizard will not allow you to continue with the operation. Before raising functional levels to take advantage of advanced Windows Server 2008 features, ensure that you will never need to install domain controllers running Windows 2000-based or Windows Server 2003–based Domain Controllers in your environment.
Membership in Enterprise Admins, or equivalent, is the minimum required to complete this procedure.
In order to raise the forest functional level:
  1. Log on to the PDC Emulator of the forest root domain with a user account that is a member of the Enterprise Administrators group.
  2. Open Active Directory Domains and Trusts by clicking Start > All Programs > Administrative Tools, and then click Active Directory Domains and Trusts.
  3. In the console tree, right-click Active Directory Domains and Trusts, and then click Raise Forest Functional Level.

  4. Under Select an available forest functional level, do one of the following:
  5. Click Windows Server 2003, and then click Raise to raise the forest functional level to Windows Server 2003.
    or
    Click Windows Server 2008, and then click Raise to raise the forest functional level to Windows Server 2008.

  6. Read the warning message, and if you wish to perform the action, click Ok.

  7. You will receive an acknowledgement message telling you that the operation was completed successfully. Click Ok.

  8. You can check the function level by performing step 3 again and viewing the current function level.
Note: To raise the forest functional level to Windows Server 2008, you must upgrade (or demote) all existing Windows 2000 or Windows Server 2003 Domain Controllers in your forest.
If you cannot raise the forest functional level, you can click Save As in the Raise Forest Functional Level dialog box to save a log file that specifies which domain controllers in the forest still must be upgraded from older operating systems.

Understanding Windows Server 2008 Active Directory Domain and Forest Functional Levels

In Windows Server 2003, functional levels were an extension of the older mixed/native mode concept introduced in Windows 2000. In Windows Server 2008 this was further extended to include new features and benefits, and are used to activate new Active Directory features after all the Domain Controllers (DCs) in the domain or forest are running Windows Server 2008 operating systems. Functional levels determine the features of Active Directory Domain Services (AD DS) that are enabled in a domain or forest.

When the first Windows Server 2008–based Domain Controller is deployed in a domain or forest, the domain or forest operates by default at the lowest functional level that is possible in that environment, meaning Windows 2000 Native Mode. This allows you to take advantage of the default Active Directory features while running versions of Windows earlier than Windows Server 2008. When you raise the functional level of a domain or forest, a set of advanced features becomes available.
After the domain functional level is raised, DCs that are running earlier operating systems cannot be introduced into the domain. For example, if you raise the domain functional level to Windows Server 2008, Domain Controllers that are running Windows Server 2003 cannot be added to that domain.
Unless you still have old NT 4.0 BDCs there's no reason for staying in Mixed Mode, and as you already know, Windows Server 2008 does not support NT 4.0 BDCs, so if you are still using them and planning to upgrade your Active Directory to Windows Server 2008, re-think your strategy.
As for Windows 2000 Native Mode, unless you still have Windows 2000 Domain Controllers, again, there's no reason for staying in that function level. However, if you still do, remember that Windows Server 2008 does only supports Windows 2000 SP4. Be sure to have SP4 on all your Windows 2000 DCs.

Domain Function Levels

To activate a new domain function level, all DCs in the domain must be running the right operating system. After this requirement is met, the administrator can raise the domain functional level. Here's a list of the available domain function levels available in Windows Server 2008:
Windows 2000 Native Mode
This is the default function level for new Windows Server 2008 Active Directory domains.
Supported Domain controllers – Windows 2000, Windows Server 2003, Windows Server 2008.
Features and benefits:
  • Group nesting – Unlike Windows NT 4.0, allows placing of a group of one scope as a member of another group of the same scope.
  • Universal security groups – Allows usage of Universal security type groups.
  • SidHistory – Enables usage of SidHistory when migrating objects between domains.
  • Converting groups between security groups and distribution groups – Unlike Windows NT 4.0, allows converting of a group type into another group type (with some limitations).
Windows Server 2003 Mode
To activate the new domain features, all domain controllers in the domain must be running Windows Server 2003. After this requirement is met, the administrator can raise the domain functional level to Windows Server 2003.

Supported Domain controllers – Windows Server 2003, Windows Server 2008.
Features and benefits include all default Active Directory features, all features from the Windows 2000 native domain functional level, plus:
  • Universal group caching – Windows Server 2003 functional level supports Universal group caching which eliminate the need for local global catalog server.
  • Domain Controller rename – By using the NETDOM command.
  • Logon time stamp update – The lastLogonTimestamp attribute will be updated with the last logon time of the user or computer. This attribute is replicated within the domain.
  • Multivalued attribute replication improvements – Allows incremental membership changes, which in turn enables having more than 5000 members in a group and better replication capabilities.
  • Lingering objects (zombies) detection – Windows Server 2003 has the ability to detect zombies, or lingering objects.
  • AD-integrated DNS zones in application partitions – This allows storing of DNS data in AD application partition for more efficient replication.
  • Users and Computers containers can be redirected – This allows the redirection of the default location of new users and computers (by using the REDIRUSR and REDIRCMP commands).
  • Support for selective authentication – Makes it possible to specify the users and groups from a trusted forest who are allowed to authenticate to resource servers in a trusting forest.