Prime Star Studio

Home » Communications

Category Archives: Communications

iPhone Unlocking Dangerous

Since Apple released its latest gadjet, the Apple Iphone, over 5 million units have been sold. Aplle Expects to sell atleast another 12 million units in 2008 worldwide. Apple keeps improving their gadjet, and rumors are that they will soon release a 3G version iPhone for the European market. Wich will probably increase its popularity even more.

communication-044

Apple Estimates that around 20% of the iPhones that are being sold are being unlocked. Wich means breaking it free from network restrictions, so you can use any SIM card and any provider in your iPhone.
Benefits of unlocking are clear: You can make cheaper calls, use local SIMcards when you travel and your not bound to any contract to be able to use the iPhone.

Peter Smit told us that there are many unlocking solutions available onlina and offline. One solution is even better then the other when you beleive the marketing stories.
Fact is that 90% of the people who try to unlock their iPhone by themselves, have no idea what they are doing.

“When you unlock your iPhone you are flashing the core of your Phone, this brings many risks. In some of the cases you will permanently damage your $400,- Dollars iPhone, or load it with virusses or other malware that is constructed into the unlocking software” Unfortunately there are a lot of people who are still willing to take this risk. Many of them end up with a $400, broken – unusable ‘brick’.

“In many cases we are able to repair the broken phones via a new software flash, but it some cases there is no option left then to dump the phone in the garbage, as Apple does not give any warranty to unlocked phones.”

The lesson to learn is to be careful if you want to unlock your iPhone. Benefits are clear, consider the downsides of unlocking as well. And IF you decide to unlock your precios gadjet, make sure you do it with a service that understands what they are doing.

Unblock Websites

Web sites are blocked due to certain filter or blocking software that is loaded onto your computer.

In addition, large computer networks (networks at your workplace or school), a firewall is also installed and this is also used to block specific web sites. However, unblocking web sites can sometimes be a difficult task to achieve.computer-001

Proxies or proxy servers (also called anonymizers) have the ability to bypass filters on the computer or the network’s firewall. Your computer connects to a proxy and the proxy makes the connection with the blocked web site. Using a proxy is also the easiest way to access websites that have been blocked by a filter or firewall. The proxy server then allows you to browse the blocked site

The easiest way to find a proxy is to head to
http://www.tech-faq.com/proxy-sites.shtml

. Select any of the proxy and check if you are able to access it. If you are able to access the proxy site, make sure you bookmark it in your browser. If you are unable to access it, it means that the proxy is blocked. You will have to head to the page again and find a working proxy.

Once you have found a working proxy, follow the steps given below:
– Enter the site address – Scroll down the page until you see a text box and a button displaying “Go”, “Browse” or “Surf” beside it. Click on the text box and enter the address of the web page you wish to view.
– Click the button – Click on the button next to the textbox, displaying “Go”, “Browse” or “Surf” . Voila! You have successfully unblocked the site.

Unfortunately, the filters will sooner or later block the proxies. You will have to head back to the proxy list and find another proxy to use.

How Can a Person Convert Word to PDF

By default, all Windows computers do not come with a way to convert Word .doc files to Adobe Acrobat PDF files. A person wishing to convert such a file is required to download add-on software in order to make the conversion. There are currently a number of programs that will do the job.

education-002
The best way to convert Word .doc files to PDF files is to download a copy of OpenOffice.org. OpenOffice.org is a free, open source, alternative to Microsofts pricey Office suite of programs. The interface may take some getting used to, but the functionality of OpenOffice.org and its low price tag makes it a powerful alternative to the current reigning office suite for Windows.
To convert a Word .doc to a PDF, simply start up OpenOffice.org and open up the .doc file to be converted. Edit and change the text as needed, then save the file as a PDF.
How Can a Person Convert Word to PDF Locally on a Mac OS X Computer?
Mac OS X users will find that it is much easier to convert .doc files to PDF files in the OS X operating environment than it is while using Windows. This is because Apple worked with Adobe (the owners of the PDF file format) to integrate PDF functionality right into the operating system.
To convert a .doc file to a PDF, just press Cmd+P to print in any word processor, such as Pages (available as part of iWork) or Bean (a free, lightweight, standalone word processor). On the Print screen, click PDF and select “Save as PDF.” Name the file, select a good location for it, and click save.
How Can a Person Convert Word to PDF Using the Internet?
Because many Windows users do not want to download a bulky office suite like OpenOffice.org just to convert a .doc file to a PDF once in a while, numerous free websites have emerged offering .doc file to PDF file conversion on the fly. These services are completely free of charge and only take a few moments for the average sized .doc file.
To take advantage of these online services, simply visit a website such as doc2pdf.net and click “Choose File” to select a file to be converted. Set the other options as necessary and click Convert. In a few moments, a PDF version of the .doc file will be added to the .doc files folder.
Many of these free online converters will also convert Powerpoint and Excel files to PDFs as well.

Error 1721

Error 1721 is a Microsoft error that is sometimes generated when you attempt to use an executable file called Cluster Administrator. The general text of Error 1721 is the following: “not enough resources are available to complete this operation.”

How Did The Problem Occur?
When you use the Cluster Administrator to connect to a cluster, an error will occur if the proper parameters are not specified. One possible reason for the error is that you did not enter the parameter with quotation marks, so the command could not be read as a complete phrase for the search. This creates a problem with the available IP ports that would be used to establish a communication through the remote procedure call, especially if there are less than a hundred ports available to process the communication flow. Along with the failure to issue the request using quotation marks, there may also be some restriction on the available port ranges when the program was originally installed.
How Do I Fix the Problem?
One place to check for restrictions on the available ports is in the MSMQ, or Microsoft Message Queuing. There may also be a need to consider that other services make use of DCOM ports that may inhibit the ability to make use of the minimum number of ports. In order to correct the situation, there will be the need to modify the registry. Microsoft provides step by step procedures to accomplish the modifications.
One thing to keep in mind is that reconfiguring a registry can be a tricky task. Ideally, persons who are well versed in computer configuration should take care of modifying the registry. Making a mistake in the modifications could create other issues that would require a professional to resolve. Save the time and trouble, and get an expert to perform the necessary changes to the registry.

Define Port Forwarding

Port forwarding, often referred to as .tunnelling. is the forwarding of network ports from one network device to another. This is commonly done using a NAT (network address translation) enabled router or server and another computer within the local network. The main purpose of using port forwarding is to allow hosts outside your local network who doesn.t have their own public IP address access to some services running on machines within your LAN.
Port forwarding is easy to set up on a router since the management interface allows for easy configuration. In some cases this easy configuration feature might be a problem since most routers cannot provide complex customization for port forwarding and other services. In such case a Linux box can do the job. With Linux, port forwarding is configured by adding iptable rules with a DNAT target to the PREROUTING chain and a SNAT target to the POSTROUTING chain. After doing so iptables will use the existent masquerade table to rewrite packages so they will reach the desired host in concordance with the port forwarding rules you provided. This is similar to OSX and BSD, however ipfw is used. In most cases ipfw is already compiled with kernel.
With port forwarding you can use a router to connect to the Internet and also run a web-server or a FTP server on a computer with your LAN. By using port forwarding you can instruct the router to forward all information that comes on a specific net port (such as 80 for the web-server or 21 for the FTP server) to a host within the local network. This means that if an outside host try to make a HTTP request towards the public IP the router has, it will be sent to the machine known to handle such request within the LAN. This is done in a transparent manner, meaning that the network client is not aware of the fact that he is accessing a machine found somewhere in the LAN. Applications of such methods are widely used both in business environments and in small home networks.
With more and more devices in the home needing to be connected to the internet or to each other, the router has become a very popular device worldwide. In such situations port forwarding is used to allow access within the network for applications that require access on a specific port, such as games or multimedia streaming software.eaming softwaR.th port forwarding you can use a router to connect to the Internet and also run a web-server or a FTP server on a computer with your LAN. By using port forwarding you can instruct the router to forward all information that comes on a specific net port (such as 80 for the web-server or 21 for the FTP server) to a host within the local network. This means that if an outside host try to make a HTTP request towards the public IP the router has, it will be sent to the machine known to handle such request within the LAN. This is done in a transparent manner, meaning that the network client is not aware of the fact that he is accessing a machine found somewhere in the LAN. Applications of such methods are widely used both in business environments and in small home networks. With more and more devices in the home needing to be connected to the internet or to each other, the router has become a very popular device worldwide. In such situations port forwarding is used to allow access within the network for applications that require access on a specific port, such as games or multimedia streaming software.
Forwards are possible with larger networks. This is done when one router or server forward packets to another router or server that delivers it to the host that should handle it. Such methods are rarely used in small home networks, but can become useful in larger networks whether or not they are connected to the Internet.
Port forwarding can be more secure than using other methods such as a DMZ (demilitarized zone). When using a DMZ all the ports of your machine are forwarded, thus you are no longer truly behind the firewall. Port forwarding provides you security by only allowing access to ports you specifically select.

Hacked iphones

iPhone is an Internet enabled and multimedia mobile phone well designed and marketed by Apple. IPhone has a multi touch screen with buttons and virtual keyboard.

The primary function of IPhone includes those of a portable media player and a camera phone with an addition of visual voicemail and text messaging. IPhone also provides Internet services including web browser, e-mail, and WiFi connectivity. IPhone also support EDGE (Enhanced Data Rates for GSM Evolution) data technology.

The IPhone was introduced on 29th June’07 for the first time in United States, and then in the UK, France, and Germany in Nov’07. Initially IPhones are sold only at AT&T network with a Simlock, in place a variety of hackers have found techniques to unbolt the device.

Not only are sure Apple stores annulled the warranty on hacked and not closed IPhones but Apple just freed a statement which says that the unlock process attached with a future IPhone update may ground your phone as a useless brick. Users from installing illegal unlocking program are strongly discouraged by Apple because the enduring incapability to use an IPhone due to fitting or installing unlocking software is not enclosed under the warranty of IPhone.

communication-022

Remember not to update your phone until you are not sure that is safe if you have already unlocked it. Bricking is somewhat done unintentionally, but bricking it entirely is something Apple should really work hard to avoid. They should try to avoid it even if it costs a revenue share from AT&T. The main concern about every user is for the safe advancement or development of Apples that so far have made the IPhone better.

IPhone software license agreements are violated by users who make illegal alteration to the software on their IPhones. There is a superior side to all this offered, you can get Apple to make firmware that does not brick IPhones and most press releases also state the feature update through the firmware. This is previously how the Play Station Portable (PSP) firmware updates were made as must haves for owners.

Unlocking the IPhone is not practically as appealing or attractive, if it means you don’t acquire the advantage of novel features. An excellent thing when you consider that the finest IPhone novelties in the previous few months are the third party hacks, but not the official Apple updates and the web apps.

It has been discovered by Apple that many of the illegal IPhone unlocking programs accessible on the net reason permanent damage to the software of IPhone. This will probably result in the customized IPhone becoming everlastingly terminal when a future IPhone software update Apple-supplied is installed. Apple tactics to let go the next IPhone software update which contains many new features counting the iTunes WiFi Music Store. Apple powerfully disheartens consumers from installing illegal unlocking programs on their IPhones. IPhone is one of the greatest gadgets today which are most popular among the youngsters and businessmen. IPhone have great features with unbelievable results.

Anonymous Proxy

An anonymous proxy, also referred to as an anonymous proxy server, allows a client to access a file, web page, or some other resources through a server which services the requests of the client through another remote server. For example, when a client accesses a web page through an anonymous proxy, the client talks to the proxy and the proxy talks to the web page, maintaining the privacy of the client, such as his/her IP address. The purpose of such a proxy, or a server, is to protect the privacy of the client from the service and from other individuals who may be logging and inspecting the client’s connection.

Such proxies are commonly used in schools and workspaces, to pass-by potential firewalls and monitoring services in place. Students will often utilize anonymous proxies to access social networking websites deemed and blocked by the school as harming the productivity of the students. Employees of a company may try to circumvent forms of monitoring within a company that may try to track or control which websites its employees are visiting.

Anonymous proxies serve as a wall between the client and the service being accessed. These servers can be used to bypass the restrictions and access these services possibly blocked by the country or some other organization providing the Internet connection, while others may use it solely for the privacy that is possibly guaranteed.
Risks Behind Anonymous Proxies
Because of how anonymous proxies, especially those running on web pages, are designed, all data sent to the proxy servers are unencrypted. Therefore, it is possible that confidential information such as logins and passwords can be recorded by a malicious proxy server. Also, through proxy chaining, some clients could potentially fall as victims to a web page displaying a false security measures, allowing all proxies within these chains to trace the client’s activities. Thus, only trusted anonymous proxies with a clear privacy policy should be used for security sake.