Thursday, February 23, 2012

【 Weak current College 】 restore system protection and defense


System restore point if the restore time do not work, or restore the other questions? does system restore is only a display? it how you want to use to reach our want a result using the restore system environment estate users generally do not install other protection software, once the restoration software was penetrating, will bring a larger security threats.
Restore the system vulnerable because the disk device ** driver, that is with a disk device does not have a close contact, as long as the attackers use extraction or bypass methods have the disk requests sent to a real disk.
Penetrating fundamentals
You must allow read and write requests without restoring the system the physical drive, but rather to the underlying physical disk device. Here is a penetrating thoughts that a disk is from the upper-layer request published to lower, as long as the monitor send path, comparison operations can be used as a restore penetrating role.
Penetrating restore system, implementation of network attacks
Know how to penetrate the principle after the restore is very simple, since the restore system on a disk drive, as long as * lift * the * driver we and the relationship between the real disk, bypass ** relationship, it is equal to direct the restore. There are no more than one of the following three conditions:
I. DR0 device ** equipment chain pick chain. This method is actually on the removal of a harddiskDR0 ** device. Specify the device what ** device, first generation robot dog virus will this domain to zero, causing the restore system device is cleared, all the requests do not reach directly by restoring the system ** disk device. For preparedness of the restore system was successfully attacked. Most of the restore system in China had no way to fight against this kind of technology. But this technique also has some **, can only be removed in the physical device DR0. File request first reached the disk volumes, disk volume ** device removal, on the system. So the robot dog virus uses its own way of parsing a file system, to the implementation of network attacks.
Second, will they create a virtual disk device as the disk volume is mounted to the file system on a virtual disk read and write disk that insinuate to real issued a request to the underlying device. Relative robot dog, this approach does not require extraction with a disk system, you can pass the file on the virtual disk operation, the operation result is and on the real disk operation is the same, you can successfully penetrate the restore. Here is a way that he did not direct send disk read and write requests, send SCSI-REQUEST-BLOCK issued to lower disk device.
3. do not use a driver, penetrating directly into the user mode to restore the system. Disk system provides a set of passthrough command to send the request directly to disk, you can obtain disk information or even directly read and write disk sectors. IDE/SCSI/ATAPassThrough instruction through restore, RING3 use Devicelocontrel function to send the request. Most of the restore system on this ** is not strict, or not **, resulting in RING3 can reach under attack.
Restore system defense
We know that Internet/public places almost 100% of the installed equipment, in the event of a restore to restore the system to be penetrated, Tad visible to restore the system on the network is very important, active defense more major.
First, the more the underlying disk read and write to the monitor. They developed a greater degree of difficulty, the short term there is no way to form a larger scale. GuardField this system if you have some time can be modified, or you can use existing system compatibility, disk monitor chassis operations. Its advantage is you can even earlier monitoring
Second, the hook, you can just the right amount of self protection and recovery. If an attacker on the Defender is producing some targeted attacks, an attacker can easily fall into a passive pay to play. If you have to hook up the attackers have poorer.
Three, behavior management and prevention
1. the establishment of good security practice, do not open suspicious e-mail and suspicious Web sites;
2, many viruses exploit propagation, be sure to patch the system in a timely manner;
3. install professional anti-virus software to upgrade to the latest version, and open the real-time monitor;
4. to set the Administrators account is more complicated passwords to prevent virus spread through password guessing.
Restore system future trends
We now have GuardField protection, malicious attackers will develop some new updates to GuardField. They may be used which means that the speculation in two main areas: first, the underlying or updated disk read/write technology, bypasses disk IRP analysis, written directly to disk. Second, a tool for GuardField itself, on the destruction, delinking GuardField. After about two days to have the new driver, to decouple our GuardField.


Saturday, February 18, 2012

【 Weak current College 】 disk is write protected solutions


General colleagues in the u disk is FAT32 format, now let's put it into NTFS format:

If your USB disk is in the computer: a case study L plate

1, win + r, enter cmd.exe (the boot dos, windows inside) also can annex command prompt;

2. using the convert command, note the convert command is not available on the current disk conversion so in L: any letter, here to d: disk directory, for example;

3. Enter the following command convertL:/fs: ntfs/nosecurity/x

A preliminary solution to the problem.

Note: this method can be used only for emergency use. MIS-typing likely recurrence of the write-protection issues, testing ...

Migration Hongge primary (hi.baidu.com/xinbar)

2. changes to policy

When you restart after reinstalling the write-protection issues, please do the following

1. choose U letter right-properties-hardware

2. Select the u disk to Tsinghua PTIC as for example diagram

3. Select Properties-strategy

4. strategy to as shown.

The issue is resolved. Because I was in accordance with the above two steps of change, netizens can not convert format back to change the policy of method a try is feasible, it is best if feasible

3. modify the registry

1, win + r to open the registry (i.e. the start-run) and type regedit.exe

2. Enter the following directory HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies

If it has not established that the StorageDevicePolicies this

3. establish a DWORD value named WriteProtect and its value to 0

4. restart

The above is a general practice, but in practice, to carry out the above operations sometimes cannot solve the problem, the write-protect against this problem I have the following

5. restart with u restart, when the system reboots to u disk light flashing, unplug the USB thumb drive

6. system restart after inserting the USB disk, USB disk operation to resume normal

Additional explanation: the registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies; HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies WriteProtect value also in changed to 0;

Declaration: in addition to modifying the registry method two only when time resolved u disk write protection, carefully chosen, it is best not to carry out conversion format operation, if the format conversion, FAT32 to NTFS data is lost, when the USB disk is restored and can be formatted to FAT32 to NTFS FAT32, into simple, but in turn is in trouble, and go after the data is easy to lose.





Thursday, February 16, 2012

【 Weak current College 】 XP hard disk partitioning operations efficient and flexible



1. one minute partition and format the hard drive

Right click on the "my computer", select "manage" command. In the open "computer management" window, expand the "computer management" → "storage" → "disk management". Later, in the right pane to see the current hard disk partitions.


In the "Unassigned" disk space on the right click, select "new partition" command. In the partition Wizard window, select the partition type is "extended partition" and click "next", enter the new partition's size, and then in the settings section of the disk file format, and check "not formatted", the last click "Finish" button to complete the partition operation. Then open "my computer", right-click on the new partition, select the "format" command, use the quick format, then in under a minute to complete the partition to format the entire operation.

2. disconnection and merging disk partitions

If a partition on your hard disk capacity is too large, it can be split into two partitions. First of all the disk partitions of any file to another partition. After the "disk management" in the right-click the partition, select "delete logical partitions" command. After you complete the partition deletion confirmation, the partition in the list will be identified as "not assigned" disk space.

After that, in accordance with the above operation, in the "Unassigned" disk space, use the "new partition" command to set the new partition's size, and format the new partition of two.

Need to merge two partitions, you can save all data, use the "delete logical partitions" command, to obtain two blank in the "Unassigned" partition. Then select the "Unassigned" partition, right-click and choose "new partition" command, to complete the merge partition.

3. compression partitions increase disk space

If a disk partition space nervous, and the data in the partitions is not a regular reader, you can leave the partition can be compressed to "increase" you can use the space. Because the compressed partition must be NTFS disk formats, so for a FAT32 disk format partitions, at the command prompt window, execute the/FS "Convert drive letter: NTFS" command, the partition is converted to NTFS disk formats. Then, right-click the partition you want to compress and select "Properties" command. In the opened window choose the "General" tab, check the "compressed drive to save disk space". After you close the window, the system will be disk compression operation is complete we will find the partition free space increase.

4. the command line for the expansion

If a partition of the remaining space, you can also use the partition mode, expansion of to increase available space. At the command prompt window, execute the "Diskpart" command to start the disk management tool on the command line. Then execute the command "listpartition" to display a list of the current system partition.
Suppose you want to delete the third partition, as the second partition volume expansion, you can execute the command "SelectParTtition3" so that the third partition has focus properties, and then do one of the "DeletePartition" you can delete the third partition.

Then perform "Selectpartition2" command, so that the 2nd partition has focus properties, and then do one of the "Extend" command, it will be before delete partition space, automatically added to the partition 2. If the expansion of partition 2 uses NTFS disk formats, the expansion does not lose any data. The final implementation of the "Exit" command to return to the "my computer" you can see the hard disk partition has been expanding.

5. double upgrade the hard disk transfer rate

If you have two hard drives, with dynamic volumes in WindowsXP, can greatly enhance the hard disk transfer rate. First of all, the two hard drives in all partitions to NTFS disk formats. Then open the "disk management" window, use the right click on two hard drives, in the pop-up menu, select "convert to dynamic disk" command, the two hard drives are converted to dynamic disks.

Right-click the second hard after the black area, select "new volume" command. In the Open ** box, click the "next step", occurs 3 options, select the "striped". Click on the "next step", a second hard drive will appear in the "you can select" list, select the space below, enter the amount you want to control a single hard drive space. Click "next", for the establishment of a partition is assigned a drive letter. Click on "next", choose to use the NTFS disk formats, to quickly format the partition, then click "Finish". At this point in "disk management" window displays a list of partitions out of the gray area that is newly created striped volumes.

Open "my computer" and you will see the new partition, when this partition for data reads, you can reach nearly twice the data rate. Use the same steps for the remaining space is new as a striped volume, disk array can be disguised to enjoy the advantages of high data transfer rates.


Tuesday, February 14, 2012

【 Weak current college 】 online banking ones principle Trojan virus



With the rise of network users, all kinds of viruses, Trojans or ones that are naturally considered mouth delicious. In a number of pioneer released the fallen ones, and generate alternative ones there, a program, the network will be used improperly, to personal Internet banking account has no small losses, so that many netizens hurts a lot.
Trojan analysis
This does not last and the emergence of new online banking Trojans Win32.Troj.BankJp.a.221184 program, the viruses can be kept by third parties on the device and network communication, systems, Internet banking users. The presence of a horse but, first of all, the system will look for the system of "personal banking Professional Edition" of Windows and ** online banking account password, and then the virus will automatically replace a lot of system files and records, into the keyboard using delete corrupted system-u s e r I n I t E E Ⅹ. key login program, reach the system reboots repeatedly landing operation interface, so that the system was unable to get to the desktop that does not run, the virus Trojan horse can realize automatic updating, a serious threat to the user property and privacy.
On a single machine, the virus will be its file directory% windir% survive mshelp.dll, mspw.dll dynamic link library file, and then add the registry branch HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices power service items and attempt to back up the file% system% c a l c E E-Ⅹ. >% system% and% system% dllcachec_20218.nls u s e r I n I t E E-Ⅹ. >% system% windir% and% dllcachec_20911.nls n o t e p a d-E-E Ⅹ >% system% dllcachec_20601.nls file. Successful start automatically after virus find and replace system directory% windir% under c a l c E E Ⅹ.; % system% directory u s e r I n I t E E Ⅹ., n o t e a p E E d. Ⅹ;% system% dllcache directory c a l c E Ⅹ E,-u s e r I n I t E and E Ⅹ. n o t e a p E E d. Ⅹ files to hide up to depth.
Thus, a virus Trojan horse still no end own consolidation functions that will be created under the system root RECYCLER in Paris. Folder to contain viruses.
Virus cleanup process
When a network user accidentally infected their virus Trojan horse, you should clean it as soon as possible out of your computer, in accordance with their respective computer virus emergency response capacity, provide two scenarios here:
Method a, use the remote registry repair
As the system default, the remote registry service is turned on, at LAN users can remotely connect to the registry editor to modify the infected computer registry. First run of start menu items enter regedit in the registry editor, click the file menu to open the connect network registry project, in which you enter the infected computer IP address of the machine name (Note: the connection is successful if the other computer will need a username and password you will need to enter).
Then, locate the registry branch HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionImageFileExecutionOptions will its u s e r I n I t E E Ⅹ. delete the program (Note: sometimes there is no monitor, can't find virus hijacking of u s e r I n I t E E Ⅹ., so at this point, the project shall be found registry branch HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogon, modify the Userinit key under it as the system default value C: N D W O W I S s y s t e m e r s 32 U n I t I-E Ⅹ E), if u s e r I E n I t E been Ⅹ. viruses, you can use the Windows installation CD after the quick fix to restore u s e r I n I t E E Ⅹ. program file.
Last will use DOS commands will be virus renames and moves c_20911.nls reset command as follows: copyc: windowssystem32dllcachec_20911.nlsc: windowssystem32 finished restart the computer, the system can be back to normal.
Method two, after booting WINPE CD repair
First of all users on the computer starts, press the delete key to enter the BIOS, set up your computer to boot from the CD (Note: various brands of computer into a slightly different BIOS, refer to the stability of their instruction action), the setting is finished WinPE CD into the optical drive, and then press F10 to save the exit, then the computer restarts, enter the CD interface.
Access to the WinPE virtual system, locate the registry branch HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionImageFileExecutionOptions will its u s e r I n I t E E Ⅹ. delete the program, locate the registry branch HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogon, modify the Userinit key under it as the system default value C:WI N D O W S s y s t e m e r s 32 U n I t I E-then browse Ⅹ E, WinPE CD, i386 directory system32 folder in the u s e r I n I t E E Ⅹ. procedures are copied to the system's disk under windowssystem32 path.
Finally, remove the CD and restart the computer, virus hijacking of u s e r I n I t E E Ⅹ. will return to normal, the operating system will boot normally, repeatedly restart does not occur, the issue is resolved.
Virus prevention
The virus is not terrible, terrible virus manufacture zhezhixin. Network users must always be vigilant against property loss, but in the face of network users, in the early days of the end to facilitate what method for anti-virus, intrusion?, in fact, in the network and have no real security system, only the relative security of the platform. If you want to move from network threat reduced to the minimum, then the user should note the following points:
1. do not randomly open unknown sites and instant messaging software delivery Web site, not free to receive and click on the unknown or unidentified program (includes: exe file, picture, animation, movies, music, eBooks, etc) to prevent the Cntc.
2. open the system patch for the Automatic Updates feature, and set daily native installed security software upgrades to the latest version. To communicate on the network that you want to open the firewall, the firewall is not installed by the user shall, as soon as installed, this prevents when computer a strange program for remote connections, prior knew and are audited.
Third, to not use antivirus software on a regular basis or third-party security tool to scan your computer completely, for instant communications users such as QQ, QQ to use on the system into the patch doctors and detect ones from here, to avoid poisoning in horses infected network Bank.



Sunday, February 12, 2012

【 Weak current College 】 often following things will look manually killed Ma method



1.) check registry

See HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrenVersion and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion, all with the "Run" at the beginning of the next jianzhiming have suspicious file name. If so, you need to delete the corresponding key value, and then delete the corresponding application.

2. check the startup group)

Trojans are hidden in the startup group if you are not very subtle, but here it is automatically loaded to run better, so I still have Trojans like here resides. Start the Group folder: C:\windows\startmenu\programs\startup, the location in the registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell

FoldersStartup="C:\windows\startmenu\programs\startup"。 It is necessary to pay attention to frequently check this two places!

3.) the Win.ini and System.ini is Trojans are fond of hidden places, it is necessary to pay attention to these local

For example, the Win.ini [Windows] section of the load and run back in normal circumstances is not indicated to what program, if that is going to be careful, and see what; in the System.ini [boot] section of the Shell = Explorer.exe is loaded after the Trojans and the good place which, therefore, to note here. When you look into this: Shell = Explorer.exewind0ws.exe, please note that wind0ws.exe it is possible that the Trojan server-side program! soon check.

4.) for the following files listed will diligently checks, Trojans are also likely to hide there

C:\windows\winstart.bat、C:\windows\wininit.ini、Autoexec.bat。

5.) if the exe file to start, then run this program, see the Trojan has been loaded into memory, the port is open. If so, then either the file to launch the program, either the file bundled Trojan, had to find a program, and reinstall it.

6. start the breed horse) is a way, it is only in a specific case of boot

So, usually pay more attention to your port, take a look at the running program, use this to monitor the most Trojans should be no problem.

7.) If you think the above method is too difficult, there is a simple point:

Proper use of anti-virus software, is the prevention and elimination of Trojans easiest way!

Friday, February 10, 2012

【 Weak current college 】 computer tips you know how many (1)



1. reloading the WindowsXP without activation

If you need to reinstall the WindowsXP, usually must be reactivated. In fact as long as the first activation time, backup good Windows\System32 directory in Wpa.dbl file, there is no longer an offering for activation. After the reload WindowsXP, you only need to copy the file to the directory above.

2. How do I know my WindowsXP is activated

Open start → run, in the pop-up dialog box enter: oobe/msoobe/a, carriage return after the system will pop up a window telling you whether the system has been activated.

3. close the zip Folders feature

Do you think the zip folder in WindowsXP functionality is too slow, features are not attractive? if so, you can open the start → run, in the pop-up dialog box enter: regsvr32/uzipfldr.dll, carriage return after closing ZIP Folders feature.

4. let WindowsXP can carve a ISO file

WindowsXP has not provided direct burn ISO files, but you can download a third-party plug-in to add this functionality to the system. The plug-in download address: http://members.home.net/alexfein/is...rdersetup.msi.

5. the landing interface background color

Open the registry editor, locate the [HKEY-USERS\.DEFAULT\ControlPanel\Colors], the value of the Background to "000" (without quotation marks) so that the logon background is black.

6. completely uninstall XP

Some friends in install WindowsXP found that he does not like the operating system, then you can use the Windows98 CD to boot into DOS, and then type:
format-ur

This will delete all files in XP, and you can reinstall the Windows98/Me.

7. the system for help with straw

When you suspect that the system to restart the computer before the changes can lead to failure, you can start pressing the F8 key when the system, select "last known good configuration" to restore the changes made to your system.

8. recovery hardware previous driver

Once you have installed a new hardware driver found in system instability or hardware does not work, just in the "Device Manager" and choose "restore" button on the driver, you can revert to a previous normal system status. But you cannot restore the printer driver.

9. automatic login

Click Start → Run, enter "rundll32netplwiz.dll, UsersRunDll" (without quotation marks), and then remove the UserAccounts "Usersmustenterausernameandpasswordtousethiscomputer", click "OK", then in the pop-up dialog box, enter you want your login user name and password.

10. fast shutdown or restart shortcuts (scheduled)

Click on the desktop, right-click, select new (shortcut from the wizard, enter the location is: C:\WINDOWS\system32\shutdown.exe-s-t10 (one-s can instead-r, restart, and-t10 represents a delay of 10 seconds, you can change this number). Finished the shortcuts, follow the above method to specify an icon for it. The fast shutdown or restart of skill displayed a more beautiful dialog box prompts shutdown (restart), and you can add the "-c" I want to shutdown! "," so the sentence would be displayed in the dialog box, of course, you can write the text, but it is necessary to pay attention to could not be more than 127 characters.

11. shutdown, restart, as long as 1 seconds

If you want instant shutdown WindowsXP, you can press CTRL + ALT + DEL, and then in the pop-up Task Manager click on the "shutdown" → "shutdown", at the same time, hold down CTRL, and less than 1 seconds you will find that the system is turned off, just in the blink of an eye. Similarly, if the "shutdown" menu select "reboot", you can quickly restart.

12. find missing the Quick Launch bar

Move your mouse to an empty area of the taskbar, click the button from the pop-up menu, select "Properties" in the pop-up window, select the "tray" tab, and then from the "taskbar appearance" box in the "show quick launch check box select", "OK".

13. batch file rename

WindowsXP provides batch rename files in Explorer, select a few files, and then press F2, and then rename these files, so that all the selected files will be renamed to a new file name (in the end plus the incremental number).

14. quick lock computer

Right click on the desktop, in the shortcut menu, select new "shortcut", then the system will start the Create Shortcut Wizard, in the text box, type "rundll32.exeuser32.dll, LockWorkStation", click on "next",In the pop-up window, enter a name for the shortcut, click on "Finish". Of course, the simplest way to lock your computer directly Winkey + L.

15. let two-button mouse with scroll page features

In Control Panel, double-click the "mouse" item in the pop-up "mouse properties" dialog box select "ClickLock" bar "start click lock" keys. Then click on "settings" button in the pop-up "click lock settings" dialog, move the mouse to the shortest, click on "OK" to save. Open a Web page, click on the page scrolls, scrolls off the page, move the mouse up and down are not far away, you can implement this functionality. Once again click on the page scrolls can turn off this feature.

Wednesday, February 8, 2012

【 Weak current college 】 computer tips you know how many (2)



16. let the WindowsXP-read letters

Find the "accessibility" group "Narrator" program, click on the "voice" button, enter the "sound settings" interface to a set and save. When you put the mouse pointer to the dialog with English letters, menus, and buttons, heard a male voice reading the English

17. restoring Windows classic interface

Many people install WindowsXP first feeling is Windows becomes beautiful. Just a pity that beautiful price to consume us this is not rich in memory and memory. If you want to restore to and classic Windows-like interface and use, right click on the desktop, select "Properties" command to go to the "display properties" in the settings window. Here are the "theme" and "desktop" and "screen saver" and "look" and "set" five tabs. In the current tab's label will have a yellow highlight of bright colors, the default is the "theme" tab, where we as long as the "topic" drop-down menu, select "Windows classic", immediately you can see in the preview window displays the results, at the same time, the appearance tab contents may be changed.
Note: the "topics in WindowsXP" and the "appearance" tab are closely related, as long as you change any of these options, in another tab will see the appropriate change.

18. recovery "start" menu

WindowsXP new "start" menu or very convenient, the impact on system resources is not great. If you like the classic menus in the past, right-click the taskbar, select "blank space" in the menu, enter the properties of the "taskbar and start menu properties" in the settings window, select the "Start menu" tab, select the "classic Start menu" to return to the previous image.

19. optimization of Visual effects

WindowsXP fuck with interface is really nice, good looking behind to consume large amounts of memory as a cost, relative to the speed and appearance, we prefer to choose the former, right-click "my computer", click on "Properties/Advanced" and in "performance" section, click on the "settings/Visual effects", here you can see the appearance of all the settings, you can manually remove unwanted features. Here all the special appearance settings such as fade, smooth scrolling, slide open and so all of the Visual effects are closed off, we can save a lot of "memory".

20. disable unnecessary services components

WindowsXP and Windows2000 can as such as an HTTP server, mail server, FTP server, so whenever the WindowsXP booting, as too many service was launched, there are many services for us, the average user who is totally useless, so off they are a good choice. Operations by right-clicking "my computer", select "management/services and applications/services", you will not need to disable the service component.
Note: some services are necessary, close the WindowsXP will make the system to crash. View details for confirmation before prohibition.
Editor's Note: for WindowsXP common 90 service, there will be a special section of this article.

21. to reduce the startup project

Many applications are made at the time of installation is added to the system startup group, each time the system will auto-run, this will not only extend the start time and start the finished system resources have eaten a lot! we can reduce system load at startup of the program by selecting "start" menu's "run", type "msconfig" start "system configuration utility", enter "Startup" tab, in this window lists the system startup, load the project and source, look if you need it automatically loaded; otherwise, clear the check box in front of the project, the less loaded project, initiated the faster speed of nature. This requires a reboot to take effect.

22. turn off System Restore

"System restore" function is the Windows family of operating systems, an important characteristic when Windows runs after the problem occurred, restore the operating system. "System restore" Although often mistake people useful, but it will make your hard drive at the height of the peak, you will find that your hard drive is always busy, because WindowsXP to record actions for future restoration. If you have confidence in ourselves, then don't use it because it can occupy a lot of memory.
Turn off System Restore feature, click "start/all programs/Accessories/System Tools/System Restore" in the system restore interface, click "system restore settings" and enter "system restore settings" window, clear the "all drives on the turn off System Restore" check box so that it will delete the WindowsXP backup of system restore points, freeing the disk space it takes up.
Generally speaking, in order to take account of the system performance and system security, I propose to open the letter WindowsXP System Restore feature.

23. turn off automatic updates

The "automatic updates" is WindowsXP in order to facilitate user upgrade system and introduced a new feature, this feature can be Microsoft launch system upgrade patches or system security patches, automatically remind users to upgrade their systems, but this feature has a requirement that the user must always online, but for those of us less iron and Silver's "poor", this requires a bit demanding, so we put the "auto upgrade" feature off, changed to "upgrade" manually.
Turn off automatic updates for specific operations by right-clicking "my computer/properties/automatic updates," in the "alert settings" sectionSelect the "turn off automatic updates. I will manually update the computer ".

24. closing the remote desktop

A special feature of this feature is you can let others on another machine, and access to your desktop. In the local area network, this feature is very useful. For example you have a question you can ask for help from colleagues, he can do to you, directly through the "Remote Desktop" to access your machine to help you resolve the problem. But we only have one computer of ordinary users, this feature is redundant, so we put it off, don't let it stay there wasted memory. Specific action is by right-clicking "my computer", select "properties/remote", "Remote Desktop" in the "allow users to connect remotely to this computer" check removed.

25. disable hibernation elimination

WindowsXP-Hibernate can put the memory of the current system state completely saved to disk, when you next boot time, the system does not need to be loaded, the system initialization process, go directly to your last hibernation state, so start very quickly. But it can take up a lot of hard disk space (and the size of your memory), you can go to "control panel/power/sleep" option to turn it off in order to free up hard disk space, when I go to when you want to use to open again. Click "Start/Control Panel/power management/sleep", "enable hibernation" before check out.

26. turn off the "automatically send error report" function

We certainly have it in WindowXP, once a program terminates abnormally, the system will automatically popup a dialog box asking you whether the error is sent to Microsoft, this is XP "automatically send error" function, it can send error information to Microsoft's Web site. Although Microsoft has repeatedly pledged that can provide strong security, does not divulge individual privacy, but the information sent to Microsoft may be included in your viewing or editing of document information, maybe this is contains personal privacy or company confidential, so if you want to protect their rights, we should still put this feature off. Click "Start/Control Panel/System/Advanced", click "error reporting" button, and then select the "disable error reporting", the following "but notify me when critical errors occur" can be selected.

Close the "Internet time synchronization" function

"Internet time sync" is to keep your computer clock each week and Internet time server for a synchronization so that your system time is accurate, however this feature for us is not very useful, but also may cause panic. In General, as long as you install WindowsXP later synchronize the time on it. So we need to turn it off. Specific actions are: click "Start/Control Panel/date, time, language, and regional options" and click the "date and time/Internet time."

27. reasonable set virtual memory

For virtual memory files, WindowsXP security defaults are always located in a large, waste a lot of hard disk space, in fact, we can set the value of it. By: go to "control panel/system/advanced/performance/settings/advanced/virtual memory/change", came to the virtual memory settings window, first determine your page file where a drive letter, and then set the other letter drives page file all disabled. Suggest you give it is set to a different partition, instead of the default system is on a partition, you can improve the page file read and write speed, help system running quickly. According to Microsoft's proposal, the paging file should be set to the memory capacity of 1.5 times, but if your memory is relatively large, it takes up space is also very impressive, therefore, recommends that if used with 256 MB of memory capacity, set to 1.5 times, maximum value and minimum value, if in the above set to 512MB memory capacity of half totally feasible.

28. delete extra documents

There are many files in WindowsXP normally we rarely used, placed on your hard disk, wasted space, reduce system performance. We can put these to use couldn't file deletion, you need to delete the file are:
Help file: C:\Windows\Help directory.
Drive backup: C:\Windows\drivercache\i386 directory under the Driver.cab file.
System files backup: the average user is not available, use the command sfc.exe/purgecache deleted.
Fallback DLL files: C:\Windows\system32\dllcache directory.
Input method: directly at C:Windows\Ime folder delete chtime, imjp8_1, imkr6_1 three directories, which are traditional Chinese, Japanese, Korean input method.

29. remove hidden components in WindowsXP

WindowsXP in normal after installation, automatically installs many components that have a lot less than is usual, installed in the system will take up a lot of space, decrease system performance, we can use this method to delete unused components.
Use Notepad to modify C:\Windows\Inf\ directory Sysoc.inf file, use the find/replace feature in the Find box, enter the "hide" (a comma followed by hide), will be "replaced" box is set to null. And choose replace all so that all the "hide", are removed, filed exit, and then click the "Start/Control Panel/Add or remove programs", you can see many usually see components, select the unwanted programsDelete can be.

30. clean up junk files

WindowsXP in normal use will produce extension TMP, BAK, OLD, junk files, you can use the Windows search feature to find these files, and then delete them. In addition, the default is WindowsXP system failure error event and write debugging information, which information we can completely abandoned. Clicking the "Start/Control Panel/System/Advanced/startup and recovery," empty "event being written to the log file," "write debugging information drop-down box select" "no".


Monday, February 6, 2012

【 Weak current College 】 purchases four misunderstandings of the digital camera


The camera can be regarded as the last few years just pop up a digital product, QQ chat, video conference, is it a thirst. Even miles between friends, as long as we have it and the Internet, we can speak of "face to face", very convenient. With the growing popularity of broadband by now, the camera is also rapidly developing, family, Internet cafes, offices, can see it, to introduce consumers to buy a camera that is easy to fall into four major mistakes.
Myth 1: pixels higher the better?
  
"This is how many megapixels?", this is a lot of friends to buy a camera is asked most frequently in a Word, but businesses often brag about it in this regard, the big blow products how to how good, how the pixels high, how how to clear the screen. So, what exactly has played pixels of a pixel? is higher, the more clear image?, we know in fact not the case, the image sensor has a number of photographic elements, each of the photographic unit corresponds to one pixel, the more pixels, the image is generated. And as for the image if it is clear, light look pixel but no, it's also the lens material, software, processing, and other aspects are closely linked.

In addition, in the market we have common camera pixels are generally 30 million or 35 megapixels, and some businesses tend to say that their products can reach the interpolation 120 megapixels, which is all about?, the camera is using the software interpolation work out, simply put is 640 x 480 pictures widen to 1024X768, then use the software calculates the picture resolution of differences between the points, the middle color of the part of the fill color of calculation software. Do while output pictures, but the quality of the image and no real improvement, or even possibly serious distortion.

Therefore, we purchased the camera must be kept in mind: pixels and the image sharpness is not absolute.
  
Myth 2: CCD than CMOS?

In fact, the structure of the camera is not complicated, itmainly by the DSP (master IC), SENSOR (photographic equipment), LENS (lens) and peripheral circuits and software driver combinations. With photographic devices is a major technical core, its principle basically consistent with DC, DV. In today's digital imaging fields, photosensitive cells simply CCD or CMOS, including former development time longer, in DC or DV areas more widely applied; and our common camera you use relatively inexpensive CMOS-sensor. But you can never think that a certain ratio using CCD CMOS camera, it's only manufacturer of selling points too! small series have used a large domestic 1XXX element of the camera, the sensor is CCD, however the actual use of results and compare "COMS camera" is not an absolute advantage, even in clarity also slightly less.

Therefore, we buy the camera, don't blindly believe businesses, use COMS's camera isn't the difference than CCD, we need to spend more than 10 times the money on?

Myth three: lens really matter?
  
A lot of friends when buying a camera, just think of cheap or light thinking pixels, completely ignored the lens is good or bad. The camera's lens is made of glass or plastic lenses. Glass lenses are not only more expensive than the cost of plastic lenses, light transmittance and imaging quality also has a large advantage. However, many small plants, in order to save costs, and the pursuit of high profits, often reduce the number of lenses, or use the cheap plastic lens. Although these products are much cheaper in price, looks very attractive, but the actual image is but it is unable to compliment.
  
So we buy the camera, not just for the sake of cheap, or try to choose glass LENS of the camera as well.

Myth 4: Mike function really practical?
  
Individual merchants in marketing their business camera, touted the camera's Mike function. UH! camera + mic sounds all well and good, but if you buy a home with you, you will find, in fact, did you imagine so chic: video chat, in order to enable each other to hear your voice, you need to reach the camera neck, to no, you have to simply hold the camera when the phone is used, of course, at that time can see you and that is another matter.

Of course, the we do not rule out some excellent quality MIC effect, good camera does occur, but if this camera and ordinary post is too large compared to it, we really need to buy? as single a MIC, the effect is excellent, price/performance ratio and high, why?

Therefore, we buy the camera, never too much about those "chicken" function, there is no good, of course, it does not matter, there is no need to waste money in these areas.







Sunday, February 5, 2012

【 Weak current College 】 a computer host with two monitors and two sets of keyboard for twin share a host---Power By 【 China power house network 】


In general you want to set up a local area network, the two hosts were indispensable, but even the simplest-to-peer networks also need two network cards and twisted-pair, better now, and as long as the host has two display interface, connect both monitors and two sets of keyboard, and then use BeTwin software (http://download.enet.com.cn/html/060562002032501.html) can let two people simultaneously with this host. From the equipment cost, the advantages of this option is quite obvious. BeTwin supports up to 4 users, relative to the LAN hubs, routers, and other inputs, saving a lot of costs.


Easy hardware connections
Since most users of the computer can only receive one monitor, so it is first necessary to resolve the problem, dual-display-shows the programme there is a lot like AGP video card and PCI video cards programme, onboard video and PCI video cards, PCI video card + PCI video card programmes and a dual-head video card programme.
To-head video card, for example, if the video card has two D-Sub interface, you can directly use dual VGA output to display, if the video card is a D-Sub interface and a DVI connector, connect the two D-Sub interface, you will need to purchase a monitor DVI go D-Sub adaptor, and then put both monitors respectively, two video cards. First of all, the primary monitor is connected to the first D-Sub interface, then the secondary monitor is connected to the second D-Sub interface, if the second interface to DVI interface, DVI go D-Sub go connector to the DVI connector on the video card, and then the secondary monitor is connected to the Ext connector (Figure 1).

Figure 1

Then connect the peripherals, in General, each user needs to configure a set of mouse, keyboard, this is the most basic needs. Users can use PS/2 interface with USB-keyboard, USB keyboard, or use the double. In addition, you need to host has two audio, dual sound card application is relatively simple, as we can on the basis of the integrated sound card, you can install a PCI sound card. In addition, various USB game handle can also be very good support, everything after installation is complete, the system will detect multiple monitor, mouse and keyboard. Note that if a monitor, keyboard, mouse, any one of them is not connected properly, can result in WindowsXP BeTwin configuration system error.


Simple device settings by default, only the primary monitor will display that to achieve the dual display, you need to enter the "display properties" in the "settings" tab, you can see two display devices, select the second monitor, and then click the "extend my Windows desktop onto this monitor", confirmed the second monitor will show the desktop, and the mouse cursor can be moved between the two monitors.
Figure 2

Run BeTwin software, click the "workstation configuration" menu, "workstation configuration" button, then select "add new workstation", enter the name of the workstation and determine, BeTwin will search system in all of the monitor, keyboard, mouse, game handle peripherals, and display all of the hosts and clients that hosts a default name is "HOST" (Figure 3).

Figure 3

Click the "hardware configuration" button, will all be reassigned hardware using the left button, move it to the "free hardware", the main distribution of the sound card, video card, video card, as well as mouse and keyboard, the allocation method is simple, to the sound card, for example, for example, to assign the PCI sound card "1" BeTwin workstation, as long as the selected PCI sound card device, and then use the right arrow button, the audio will be assigned to the "BeTwin workstation 1", in addition to the integrated sound is assigned to the "HOST," host using the same method to assign the video card, mouse, keyboard and other device.

Because BeTwin also supports four users, we may choose in the main interface BeTwin "add workstation" adding more users, but to ensure system stability and speed of work, it is recommended that two users sharing a single host, and the computer for more than two displays, light and a sound card is too much trouble, the successful implementation of a two-person BeTwin, and use two separate computers, do not interfere with each other, give full play to the PC must have the potential. Another powerful feature comparison BeTwin, users can press their need for reasonable setting.

Thursday, February 2, 2012

【 Weak current College 】 how to get rid of email viruses five tips



The first type, choose a reliable antivirus software

To deal with e-mail virus, in the message received the virus scanning filter harmful virus is a very effective means. The user can keep the anti-virus monitor feature in mail, setting the message monitoring feature, you can receive messages for viruses, effectively prevent e-mail virus invasion. Shenzhen Server lease

The second type, periodic upgrade virus library

In particular, the antivirus software vendor to upgrade service is very attentive to its software virus definitions are in constant update status, manufacturers will be according to a recent popular virus, the virus code at any time to update to virus library, if the user does not timely upgrades, it's hard to take on new virus killing, then you can't blame the antivirus software can't find viruses.

The third type, identifying e-mail virus

Some e-mail virus has a wide range of common characteristics that identify their common ground can prevent the destruction of a sector viruses. When you receive the message, look at the size of messages, if you find messages in the content, no attachments, the size of the message itself and dozens of K or greater, then the message may contain a virus, you can register directly from the computer, and then empty the waste Inbox; remember, the next step is very important, in the after emptying the waste Inbox, be sure to compress it again mailboxes, or antivirus software in the next virus checking also reported a virus; if you find a message you receive each other's address is unknown, the domain name on a very not like normal internal mailbox, it will most likely receive a virus, this time, you can also choose to delete directly. See attachment extension name, if it is a double suffixes so most likely is a virus, because e-mail virus will choose to hide in the attachment, you can directly book subject. Shenzhen Server lease

The fourth type, let mail monitoring function

Many users to purchase anti-virus software, because of some reason not open real-time monitoring of the firewall, because anti-virus software is running in some consuming system resources, but this is inevitable, it depends on how the regulation of the use of the user. If you do not open the real-time monitoring capabilities that will allow email viruses and other computer virus took advantage of the drill, not of the empty child protection measures in the presence of computer viruses with almost no ability to resist. Therefore, in order to secure protection of computers, a virus monitoring capabilities to run.

The fifth type, test

When faced with an attachment of the message, if the attachment is executable (*.exe, * .com) or a macro function in Word document, do not select open, you can use two methods to detect viruses. One way is to use antivirus software e-mail virus monitor feature to filter out virus in mail. Alternatively, the annex to the other exists on your hard disk, and then use anti-virus software to carry out virus checking.


Wednesday, February 1, 2012

【 Weak current College 】 data archive disk storage selection



Most enterprise database data flow in growth, but the lack of control, even cannot control, money, power and data center space are limited resources, the database on the utilization of these resources must be increased.

Supplier of many ways to improve the efficiency of data archiving solutions. Data reduction techniques such as compression, single instance storage (singleinstancestorage) and most powerful sub-file de-duplication technology, this enables suppliers to 30lbs data loading 10lb data archiving. When you are not using Spinningdisk, shut it down, regardless of vendor called MAID (Copan, Nexsan) or HDS, its the 1TB drive energy consumption from 7.5W reduced to less than 1W.

But even if these drives are stopped, the MAID system still consumes is greater than or equal to its normal run-time 30% more power, because in the low-load, low-power supply efficiency. The processor is in idle state still has the power consumption, but idling memory and an up-to-date level of idling server processor EnergyStar (consumption electricity to 55W), or not.

Data archiving storage of the simplest system, I call it locked NAS (lockedNAS). Vendors including NetApp and Sun company has expanded its file system and NAS operating system will remain in the implementation of the guarantor force add in. They are modelled on the NetApp SnapLock naming patterns, the latest improvement technology of date to the end of life equipment, playing on the "read-only" flag. Such a system would be in the life of the end-to-read-only portion of the reset.

LockedNAS general system, but lack the last time I mentioned a few other features.

While NetApp file compile stalls Member verification each have many cluttered information integrity of the data block, it does not operate in the background, in case any problems are found or remotely obtain a corrupt local data block of the full version. Scalability and long-term extension is a problem, because increasingthe drive as well as every 5-7 years data transfer (because your enterprise vendors maybe will no longer support your business system) and is not a good way to solve the problem.

Disk-based data storage archiving this market sector, another competitor is ContentAddressableStorage, using each storage destination (file, email information, etc.) of the hash as a storage target (instead of the file position) of important identifier — with NAS system. And usually thinking different, CAS systems do not use the full-text index as its location, but only a hash of the selected storage object. In fact, most CAS systems, including EMC Centera, Nexsan Corporation Assurion and Caringo CAStor, the company did not give its storage content indexing.

Their internal implementation of single instance storage (for example copy the same file multiple times will cause the same redundant data), or check the filehash, to consolidate data in the background. In addition to most of the file system supports name, owner, and time stamp, most CAS system can store extended metadata. As a result, the most complex application programming interface is used for file storage and recovery, data archiving software vendors to write and test the interface. SNIA standard XMLAPI--known as XAM, a year after the first appear in the CAS, and other fixed-content storage system.

CAS suppliers attach great importance to extend metadata. ILM (currently just a concept, not products) for data classification features, functionality, and similar e-discovery capabilities are required in addition to the name and date of other data to make decisions. I have doubts that need to store a special file system API. Data archiving software or a content management system is only able to add metadata and all important full text index into independent of the file system of the database.

Some vendors have built similar NAS device, using the hash to ensure that the integrity and identify the unique identity of the data, not as the main address of the target data. Like DataDomain company equipment and NEC's Hydrastor, have all been as a backup target, but its features, and data archiving device level. DataDomain unit for data preservation and removal, and the functionality the same. Permabit company EnterpriseArchive adopt similar hash to assist in the management of NAS data.

Many such systems with RAIN (redundant array of independent nodes) structure, so a 2U server into a 1u and built-in storage groups or the distribution grid support and management of data in the array. Some systems use absorption/fix nodes, these nodes can manage the hash data to and receive data while storage support data nodes. Some systems also have both features.

If you were able to complete implementation, RAIN patterns will make 100 nodes for scalability, new nodes are available to scalability, processor speed, disk capacity, and will increase a array, once placed in the old slow node or there is a problem with the data on the nodes will be resettled, then the old node will be replaced by a small number of hits or command. However, most of the RAIN system has an associated high speed processor, this can lead to an increase in power consumption, while at the same time might cause access times fewer large data archiving to consume too much.

Tuesday, January 31, 2012

【 Weak current college 】 technical basis on standby



Hot standby in long-term use has a lot of users have summarized many of the skills experience, there are some concepts are more we need to know about, the following is the details of hot standby technology need to understand the concept.

Hot standby technology needs to be pointed out a few concepts:

1. standby technology works

Fault isolation, simple, high-availability (hot) is a kind of the point of failure to protect the transfer of business continuity. Its business recovery is not in the original server, which is in the standby server. Hot does not have the repair the failed server's features, but only fault isolation.

2. standby mode technical Active-Active

Active-Active way refers to the business rather than the server status, if the same application is not complete Active-Active manner. For example, hot two servers is sqlserver database, it is referring to a different database instance. The same database instance is not possible in hot this level Active-Active manner. Simple Active-Active is two way run to Active-Standby on both servers.

3. Standby failure detection

Fault detection is hot standby technology tasks, different double machine detection point number determines the hot standby software in functionality and performance of good and bad, not all software will have the same detection capabilities to PlusWell camputer technology software, for example, it provides a full system detection capability, that is, there are system-level detection, application-level, network level three. System-level testing through hot standby technology software provides a system for the detection of cardiac function, the application level provides the user applications, databases, and other detection feature, the network level detection provides network connection detection and optional on network path detection capabilities, so called full fault detection capabilities.

4, server resources

Hot standby resource refers to a business operation relies on the smallest of the associated services, different two-machine software provides resources, how many different, of course, you can toggle the resources available, the more software applications, also in hot standby technology in server resources mainly include, switch network IP resource, computer name, disk volume resource, the server process.

5, hot standby switch technology

-Standby switch generally consists of manually switch and failover, which is planned to switch (i.e. people switch) and non-planned switch (failover).

Need we note that not all resources have to switch to PlusWell hot backup software as an example he provides:

(1) local resource monitoring, that is not switching resources.

(2) ordinary resource, that is, you can switch the main machine resources.

(3) quick resources refers to quickly switch resources

In the General case of dual switching time is 1-5 minutes, and quickly switch in time is 3-5 seconds. Users should be according to their needs and operational features to select relevant switching service, from the price-cost point of view, the switching time that costs are also higher.

6. standby technology copy and backup concept is the difference between

Hot Backup refers to: highavailable is highly available, while the backup is a Backup, data backup, this is two different concepts, products are two functions on an entirely different product. Hot backup main guarantees the continuity of the business, realization of methods is the point of failure and backup of the transfer, the primary objective is to prevent data loss, do a test Bay, so backup is data recovery instead of application failover.




Monday, January 30, 2012

【 Weak current College 】 standby service reorganized necessity



Hot standby service is a lot of enterprise is in use or is starting to grow old with technology. As the technology development we have a certain experience. Long time of use, which is enhanced by our understanding of the technology. Hot standby service concept includes two broad and narrow.

Broadly speaking, it is important, use two servers, each backup to perform the same service. When a server fails, you can from another server, bears the service task, which does not require human intervention, automatically ensure that the system can continue to provide services.

Hot standby generally require shared storage devices. But in some cases you can also use two separate server.

Implement hot standby service needs through professional cluster software or computer software.

In a narrow sense, hot standby service especially based on active/standby mode Server hot. Server data includes database data simultaneously to two or more servers, or use a shared storage device. At the same time, only one server running. When running a server fails to start, another backup server software consultation survey (typically by heartbeat Diagnostics) to activate the standby machine, ensure that application in a short time to completely back to normal use.

Why do hot standby? hot standby service is the server's fault.

Server failure could be caused by a variety of reasons, such as equipment failure or operating system failure, software, system failures, and so on. Generally speaking, the technical personnel at the scene, the recovery server normally might need 10 minutes, hours or even days. From practical experience, unless you simply restart server (with possible risks still exist), or they often take several hours. But if the technician is not in the scene, the recovery service time is longer.

But for some important system, the user is very difficult to put up with such a long interruption in services. Therefore, you need to pass the hot standby service, to avoid prolonged interruption in services, ensure the system is long-term, reliable service.

Decide whether to use standby service, the correct approach is to examine the importance of the system and the degree of service interruption, to determine whether to use a hot standby. That is, your users can tolerate long recovery service, if the service cannot be restored will cause many influences.

In considering the hot standby service, you need to note that general sense of the hot standby will have a switch, the switch process may be a minute or so. During the switching, service is possible short outage. However, when the switch is completed, the service will resume normal. Therefore, the hot standby service is seamless, uninterrupted, but it can guarantee that in the event of a system failure, the ability to quickly restore normal service, the business will not be affected. But if you do not have a hot standby, in the event of a server failure, there may be several hours of service interruption, the business impact can be very serious.

Another point that needs to be stressed that the server failure and switches, storage devices, the concept is much higher. Because the server is compared to the switch, storage devices, much more complex equipment, but also includes hardware, including operating system, application software system of complex systems. Not only the equipment failure could cause service disruption, and software issues may also cause server not working properly.

It should also be noted that some other protective measures such as a disk array (RAID), data backup is very important, but it cannot replace the role of standby service.

Sunday, January 29, 2012

【 Weak current College 】 hot backup mode in fault-tolerant server application---Power By 【 China power house network 】



Hot backup method of determining is a business to own data protection of important links, a good way to data recovery rate and enterprise business sustainability. The hot-standby mode using two configuration identical server system, in fact, server cluster scenario of fault-tolerant technology is also a multi server fault-tolerant technologies.

While this section is to describe a single fault-tolerant technology is a server for high performance, fault-tolerant, its tolerance to far more than the server cluster and hot-standby mode fault tolerance to high, and therefore more suitable for those such as securities, telecommunications, financial, medical, etc. on fault tolerance special demanding industry.

Previous cluster system in the event of a failure, you need to interrupt the operation of the server, and then use the time to switch to the standby server to run above in order to carry out the repair and recovery, including the cost and loss is the user's wish to see. A fault-tolerant technology for fault-tolerant servers, the biggest advantage is that it can automatically isolate fault module, without disrupting the running module replacement for damaged parts for maintenance, and all physical fault elimination, the system automatically resynchronize run, thereby effectively solves the customer's extra worries. It is precisely for this reason, a fault-tolerant technology for fault tolerant server, is the impact of the rise of the previous years standby mode and cluster technology, more and more people are concerned about. Also, more importantly it can use industry-standard components of the server implementation (IA), competitive cost advantage that makes impressive fault tolerant servers.

Fault-tolerant server is through the CPU clock frequency, the system all hardware backup, including CPU, memory, and i/o bus, redundant backup; through system all redundant parts of synchronization run, realize the true meaning of fault tolerance. Any part of a system failure will not result in system failure and data loss. There are many fault tolerant system is based on IA Server, fully compatible with Windows2000, previously only on RISC systems, fault-tolerant can be achieved. This fault-tolerant technology in IA Server implementation, IA server reliability to 99.999 per cent, while the server is running is uninterrupted.

Standby mode and fault-tolerant servers positioned slightly different, this is determined by the difference between realization of availability. Hot backup mode in General can implement 99.9% availability, fault-tolerant servers can achieve 99.999% availability. In this way, most of the hot-standby mode applications in business continuity is not very strict industry, such as public security system, forces system or individual manufacturers, these industry allows data to be interrupted for a short period of time. While such as telecommunications, banking, securities and health care, and other demanding industries is a fault-tolerant servers all over the world. Also note that hot backup and server cluster does not like the hot backup usually require two way server configuration, and the server cluster is not strictly required, it is confusing to many readers.

In addition, because of the hot-standby mode requires at least 2 servers, resulting in the purchase of software (operating systems, middleware, dual backup software, etc), software maintenance, upgrades, system hardware upgrade needs more than a single fault-tolerant way 1 x additional inputs, and two-computer backup software failure, the maintenance of a high degree of difficulty, the customer will bring greater difficulties. Therefore, although the single fault-tolerant server hardware costs more than double machine backup mode of hardware input, while its total cost of ownership (TCO) is far below the double machine backup costs. But its flexible configuration, the hot backup mode more advantages, many hot backup scenarios are some systems integrators combine different manufacturers server products to meet different customer needs. But overall, fault-tolerant server is the future trend of development.




Saturday, January 28, 2012

【 Weak current College 】 camputer FAQs



Standby is the hub server will be installed to the backup of two servers, and at the same time, only one server running. Here we compare the concern to make the answer, I hope will be helpful to everyone.

Q: can explain what is a hot standby?

A: the so-called hot standby, is the hub server will be installed to the backup of two servers, and at the same time, only one server running. When running a server fails to start, another backup server will quickly start automatically and run (generally 2 minutes), thus ensuring the whole network uptime! hot standby works in practice is for the entire network System Center Server provides a failback capabilities.

Q: what time need hot standby?

A: this question is actually quite simple, General server to a life-long work, their work is absolutely not backed up. Therefore, the decision to use standby, I think it should first of all, the importance of the system, and end users on the service interruption for consideration of the degree of tolerance, and then to decide whether to use a hot standby. For example, network users up to tolerate long recovery service if the service cannot be quickly restored will lead to what kind of consequences, and so on.

Q: have RAID technology and data backup technology, it is also necessary to make hot standby?

Answer: this is not a clear distinction between RAID and backup all important data backup can only be solved! system problems after recovery; and RAID technology to the author's experience and can only solve the problem of the hard disk. We know that there is a problem when the server itself, regardless of the device's hardware or software system that will result in service disruption, and the RAID and backup technology just does not resolve the problems of avoiding disruption in service. Therefore, for high security needs, continuous and reliable application service network system, standby or very important. In fact, we can think of it this way: If your server is broken, you take the time to restore it to work properly so that you can understand the importance of hot standby!

Q: hot standby and differences between clusters?

A: conceptually, hot standby belong to a cluster. Clusters generally includes two categories: one category is pure application server cluster, that is, each application server has access to a unified database server, but he does not need some file-sharing, storage, etc., this cluster is relatively simple. The other type is a database server of the standby, standby, typically two servers at the same time using a shared storage device, and in General, take home, along the way (there is also a high-end system with the parallel manner, that is, two servers at the same time provide services).

Q: how to use the database services hot standby?

A: through software way hot standby. That is, do not use shared storage device, which is the native data directly in the flow between multiple hosts. Obviously, this way the biggest advantage is that saving expensive storage equipment investment, but its disadvantage is not difficult to find: produces data inconsistency, or affect the rate of database read.

We see this as an example: If a service disruption to switch to a backup server, you may have a small amount of already host completed transactions in preparation machine is not yet implemented. With the backup data recovery, backup machine startup, and subsequent actions already undertaken, the lost packet to find it quite difficult. In this way, the applicable for lost a small amount of data is not very sensitive system.

Here mention standard solution, which is based on a shared storage device and a two-computer software for hot standby. It can unattended cases provide fast switch, and no data loss, and purchase storage equipment investment is also relatively high.

Q: how to select and implement the hot standby configuration scheme?

A: 1. application-driven, careful analysis. For high availability.

2. consider using hot standby database or application server cluster, or backup software.

3. Select the identification of specific equipment, software, models, etc. The author here remind everyone that different software or hard drives, and other storage devices, there is a compatibility between them, so before you buy should consult professional, do not appear have dual machine software procurement related storage device is not compatible with such phenomena exist.

4. in the implementation is complete, be sure to test it to ensure that works fine, but it should be noted that in the course of regular running on the system is able to test the normal switch.


Friday, January 27, 2012

【 Weak current College 】 disaster backup system effectiveness of skills



As in recent years various industry information technology development, as well as the information system of the national economy became more important position and influence, the security of information systems running enterprise decision-makers are increasingly becoming the focus of attention. In particular, domestic and international of a series of security incidents and natural disasters on the frequent reality so that people can no longer be the lifeline for enterprises themselves---data and continuously operating capacity.

Information system security threats to natural causes "maintaining" efforts under threat, and thereafter will be transmitted to the external and community, information system for calamities caused serious consequences is not apparent. Building an effective protection against various disaster threats to information systems for social harmony and stability and to avoid group event will be a success in future initiatives.

However, often backfires, when many people get started and even spent a huge cost to complete the goal of disaster prevention system construction, but there was no "crash", prepared for a disaster is not immune to which their investment loss and social impacts are difficult to estimate.

Recently, the domestic similar examples of typical, such as some enterprises in the construction of disaster recovery system, and even passed the national departments of the internal control standards "and" emergency "walkthrough, still had unexpected consequences of disasters, often a small failure can lead to long hours of business to a halt, and for emergency response system construction standards have had questions, not to talk about the launch of the disaster backup center business, that seems to be running into a lot of people, the problem?

There, we need for disaster prevention in the construction of the policy makers said, this is the effectiveness of the disaster backup construction yangbingqianri Lily 1. lack of validity of the consequences of the disaster backup system, not only difficult to guarantee it run and disaster prevention objectives, its impact to your business systems is beginning to produce side effects.

In recent years, many industry disaster recovery system planners were asked to author, how to establish a disaster recovery system? end is important disaster backup technology routes or disaster recovery processes tightly organized important? how to choose proper disaster recovery technology routes? Dr is a simple construction of building an offsite disaster backup Center?

First, the effectiveness of the disaster backup system involves the construction of the actual target of disaster prevention and in line with the objectives of the disaster recovery technology routes, secondly, the knowledge of the effectiveness of the disaster backup system must realize people a deeper reason: the disaster recovery system requirements for disaster prevention full, not only preventing small probability of natural disasters, but also to prevent the probability of equipment failure and logical failure, tight multi-faceted protection network is the only way to win. Specifically, the construction of a disaster never fail, you need to get defensive system to carry out the following links:

1) the objectives of the defensive disaster to refine

Not only General said disaster prevention, and for a variety of devices and networks are prone to accidents, and even considered missing pertinent backup system would have done this kind of defensive target, this can only continue to walk the many traditional failure of disaster prevention in the construction of the old. Early in some traditional disaster recovery system, which does indeed only disaster emergency mechanisms, but does not include the frequent failures, this defensive target itself has resulted in many of our construction financing of disaster prevention in waste, causing the reconstruction must be pushed to the disaster recovery system, or to invest in more advanced protection system.

In the information system security incidents, the more easily lead to disaster recovery system on the part of accidents often: database system crash fails to run, the data file is damaged or lost, storage device failure, etc., in our country, have multiple enterprise imparted the destructive force of such failure.

2) construction of hierarchical recovery system

In the past, people often believe that building an offsite disaster recovery center is what are offsite running or recovery. This really is a big mistake. People must know, offsite disaster backup center, its construction purposes can only be a great flood defence, enabling offsite disaster backup center, not only through rigorous business continuity audit process (for example, early warning mechanisms and declared mechanism), and you want to spend a lot of the disaster backup center personnel, data recovery to the production center is complex and lengthy process.

But part of the disaster backup technology routes also cannot guarantee that the start of the application system data consistency and integrity, which is a lot of complete construction of enterprises generally do not start the disaster backup center or fear of the disaster backup Center initiated important reasons. While various fault-prone (such as logical failure, equipment failure), if their recovery depends on the launch of the disaster backup center and repair, undoubtedly is risk amplification, airing, recovery of the fundamental effect is unpredictable. This is the failure occurred, the disaster recovery system as one of the many factors.

What fundamental solution lies in the boot advanced disaster recovery technology line, complete the level of recovery system, equipment failure (including logical failure) local repair, system startup this off-site disaster 14-character.

At present, some advanced disaster recovery technologies (flies Kang's continuous data protection disaster backup technology) have instant local repair ability so that you can in a very short period of time to complete the emergency response equipment failure (General or even to a few seconds). For a business system, business continuity assurance defuse internal failures may result in significant social risk and economic risk (for example, a large number of claims, etc.)

3) repair technology with the first validation technology

In the past, it is recognized by the repairing technique often "huicun" technology, is to backup data medium rewind production system, and then wait for the recovery of the start-up of the effectiveness and business, this kind of technology there are many risks, first during the long data before restoring, completely unexpected recovery time and recovery reliability. Second, once the recovery is successful, only to find that the recovered data is not one of your own, or requires data that does not exist, it is completely impossible to roll back to the initial state, the system will go into more serious non-Control state. In this type of technology, business continuity is not in the account, people looking to back has been in high spirits, where you can expect instant business continues to run?

At present, many industry leaders have to extend to verifying that the disaster recovery technologies, such technology characteristics is that in the event of data corruption, you can immediately provide the original format of the data point for validation, business system immediately run, ensuring business continuity in the paramount goal, after that, you can use the remaining idle sessions, further repair equipment. This system is referred to as "the first production, after repair".

4) focus on the study of transmission bandwidth

Offsite disaster recovery of an important area is the transmission bandwidth technology, this technology can lead to less often due to lack of data bandwidth delay is too large, causing the disaster backup center data is unavailable, and so on. Many disaster backup technology routes are in transmission bandwidth of streamline technologies excellently inner competition ability, this is very correct. Valid leaner bandwidth transmission technology to make the construction cost of disaster prevention in significantly reduced, or you can make the disaster backup center data real-time performance greatly improved, for data recovery from production centres will also be very effective speed boost.

From disaster recovery technologies mentioned, route choice and detail and perfection of construction object, is the disaster recovery system for construction of two chips, directly affects the final result of the construction of disaster recovery, not weeks and defects will lead directly to disaster or failure business system of the heart stops for a long time (omission), causing the crowd of more questions not already established a backup system? not already through the emergency plan of the internal audit?

This course will initially questioned those terribly embarrassed. Therefore, choose to have the advanced nature and effectiveness of the disaster recovery technology routes (such as aforesaid fly Kang continuous data protection technology, etc.), will be able to lead people to overcome the past for a disaster and the fear of failure, increase people's confidence in disaster for the people's heart scare will be gone, the information system will also be heading for safe and smooth.



Thursday, January 26, 2012

【 Weak current College 】 SSD disk fragmentation of understanding



Internal SSD hard drives are conducted in accordance with the BLOCK to zoning, a BLOCK has four PAGE, a PAGE of capacity is generally 4KB. If you treat it as dormitory, then probably this is the case, a dormitory with several layers (BLOCK), each floor has 4 bedrooms (PAGE), each room to live 4 students (one equivalent of 1KB).

Under normal circumstances, each hostel must be occupied by four students, then open up a new quarters, and a balanced wear algorithm is exactly the same. However, in all quarters lived on students, the SSD disk fragmentation issue came out.

Each dormitory students will not be fully stable, such as over a few days, some quarters of some students to leave school. He has vacated the beds, and the school will arrange students live in. However, it was arranged new dwell time management hostels was a bit confused, because every room once lived, what room will be free bed?

At hostel administrator hasn't completely straight, and the principal's Office prior to instruction (balanced wear algorithm), hostels have lived one by one. Poor administrator complete Halo, he can only look back completely renewed presentation of all the student dormitories are called out, and then one by one the arrangements into quarters. If this kind of thing happens in the SSD hard drive, obviously, that is the SSD disk fragmentation causes the system to slow down, because internal ongoing data processing.

Of course, the problem is not only that, when an administrator had to reschedule a students ' dormitory, the school head teacher requires an administrator to their class of students to find out the class. Whereas in previous quarters resize operation, the class of students scattered throughout the building, all floors in some rooms. To be notified to them, the administrator must be a climb to the top. If this is reflected in the SSD hard drive, the result is the application software to run slowly. If you use a hard drive terminology, this is the SSD disk fragmentation effects software too many.

From the above description, when SSD hard drive capacity basic exhausted, SSD disk fragmentation most prone to confusion. Because administrators (SSD hard disk controller), the principal's Office (balanced wear algorithm), class (application) are not in conflict. If the hard drive is empty, it will cause some of the big deal is the number of occupied some quarters, at least not prone to repeatedly adjust the data results.

Then, from the above, there is no good way to solve this problem SSD disk fragmentation? currently, you can reduce the number of living quarters, for example do 1KB/1PAGE. But this hostel Administrator's daily task, tube 100 Hostels do not light, tube 400 hostels, all the more difficult every day.

Of course, if there is no equalization trouble will be much better, they must attack first, go to the quarters empty, but when you do so, which do not guarantee the life of SSD.

In short, the SSD disk fragmentation of current SSD, was a very difficult to solve. May increase the system cache is a good idea, but if you do not have a good algorithm (management), I'm afraid I will not have very good results. We still have to look forward to working more upstream manufacturers to design of genius, but in any event, the prospect or bright SSD, after all, no product appeared to have no problem, but we have previously discussed the situation is very extreme, users may not necessarily be met.

Wednesday, January 25, 2012

【 Weak current College 】 improving hard disk performance skills to explain



No matter what type of hard drive, the default settings in the system, may not be the best working state, so if you want to make your own hard work in the best State, learn to drive a set of related parameters are not to be missed. This does not, this article below on the operating mode from the hard drive, to commend both you can improve the performance of your hard disk, hoping you will help!

1, hard disk performance improve interface transfer rate

There is a computer motherboard is based on the Foxconn 865A01-PE-6LS i865PE chipset, using a hard drive is Seagate Kuyu 7200.7 120GB, when using a professional hardware test software to test the system hardware information, I came across your hard disk in this mode should have to UDMA5, instead of the standard SATA150 and work in this mode, the performance of the hard disk transfer rate is not expected that fast, this is why? we how to solve?

In fact, the hard drive is in different operating modes, hard disk performance data transmission speed is not exactly the same, while SATA interface, transfer rate should normally be than ordinary IDE interface transfer rate to be significantly faster; whereas in this case the SATA hard drive is not achieved expected in transfer speeds, is most likely that the computer motherboard SATA channel mapping has become a common IDE channel, in which case the SATA interface will be forced to consume computer motherboard IDE2 channel, SATA interface hard drive can only be treated as normal IDE hard drives to use, this is SATA hard drive transfer rates have not imagined so fast. To the SATA hard drive interface transfer rates revert to the normal state, we need the system's BIOS parameter sets the interface, the hard work performance mode adjustment to the appropriate State, the following are the specific adjustment steps:

First restart your computer system, the startup process must be timely and press the del key, to enter the system's BIOS parameter sets the interface; the interface after, find the corresponding settings for the SATA option, check the option value is set to "CompatibleMode" or "EnabledMode", if set to "CompatibleMode", SATA hard drive will be treated as ordinary IDE hard disk, in this mode the hard drive interface transfer speed will naturally be affected, so we must adjust the SATA option value as "EnabledMode", the only way to SATA channel is mapped into a separate IDE3 or IDE4 channel, in this mode SATA hard drive interface transfer rate to revert to normal; adjust parameter settings for the SATA option, you must perform the save operation, and then restart your computer system, to make the settings take effect.

2. hard disk performance is the correct viewing mode

We all know that, if the hard disk works in inappropriate work mode, the data transfer speed will be greatly reduced; that's how you can know what work you hard drive in what mode State? in General, we only through the Device Manager can easily view your hard disk performance recovery current working mode:

First click the "start"/"settings"/"Control Panel" command, open the System Control Panel window, double-click the system icon, go to the System Properties window, click the window's "hardware" tab and then the corresponding labels page, click the "Device Manager" button, open the system's device list interface;

Then in the interface found "IDEATA/ATAPI controllers" project, and then double-click the project following the "primary IDE channel" option, then the pop-up option settings interface, click the "Advanced settings" tab, and then in the corresponding tab page we can clearly see the hard disk performance current mode.

Of course, if you follow the above methods do not see the hard work mode, most of your computer system has been installed the driver VIAIDEMiniportDriver; in this case we only in the system tray area found "VIABusMasterPCIIDEUtility" control icon and use the left mouse button, double-click the control icon, and then in subsequent pop-up interface can view to hard disk mode. Once you find that hard work performance mode is not in standard mode, the hard disk transfer performance is significantly impacted, in which case we will need to enter the BIOS parameters settings interface, the hard work mode resize properly in order to let the hard disk performance in top working condition.

Small Tip: as the hard drive capacity gradually increases, operating mode settings are more and more important. Typically, large-capacity hard drive work performance tends to support the work of DMA transfer mode, in this mode the hard disk transfer rate and work performance is slightly more than the normal state, so the number to confirm your hard drive supports DMA mode, then you'd better use DMA mode instead of conventional PIO mode. Replace the work mode, as long as in Figure 1 interface will transfer mode to "DMA".







Tuesday, January 24, 2012

【 Weak current College 】 buy hard skills complete guide



In order to meet the network application performance needs of growing, we usually increase the number of the new server, share business, improve system performance, i.e. landscape scale. In fact, you can improve the existing server configuration to improve the overall performance of the server, which is longitudinal extension – because the server part of matching the performance of the server is critical. While the direct purchase of the hard drive to store data is affected the performance of the Server service.

Increasing server performance is to look for restricting server performance bottlenecks. Different application possible bottlenecks is different, some want to focus on processors, memory, and to focus on buying hard disk or network i/o throughput capacity; in that case, in which applications need to focus on the server hard disk bottleneck?

Communication Server (E-mail/messaging/VOD): fast I/O is the key to this type of application, choose the hard disk i/o throughput is the main bottlenecks;

Data warehouse (online transaction processing/data mining): large commercial data storage, cataloging, indexing, data analysis, high speed business computing, and so on, you need to have good network and disk I/O throughput capacity;

Database (ERP/OLTP, etc): the server running the database, you need to have powerful CPU processing power, memory capacity to cache data, at the same time there needs to be very good I/O throughput performance;

Other applications: applications focused on data query and network communication, frequently read and write the hard drive, then choose the hard disk's performance directly affects the overall performance of the server.

Factors influencing purchase hard drive

To purchase the hard disk of the target parameter, first of all it should be mentioned that the hard disk interface standard. Today's mainstream hard drive interface interface has two kinds: EIDE and SCSI, IEEE1394 interface, of course, in addition, the USB interface and FC-al (FibreChannel-ArbitratedLoop) Fibre Channel interface products, but very rare. Now almost all computer-based General UltraDMA/33/66/100 the standard IDE interface hard disk, it has the advantage of being able to offer a lower price, the penetration rate is very high.

At the same time, some low-end server used the IDE hard drive, at present, almost all server Board is integrated with the IDE controller, but in the middle and high-end server is generally used to connect low-speed peripherals IDE optical drive and hard drive generally use SCSI interface standards such as wave yingxin server generally adopts Ultra160SCSI hard drives provide higher disk throughput capacity. SCSI interface hard drive has a very low CPU usage, support more devices and the work of the task under obvious advantages, etc., are better suited for server applications, and of course the SCSI hard drive price is much higher.

However, the optional hard disk data transfer bottleneck of the system lies not in the PCI bus or interface rate, while in the hard disk itself, which is part of the hard disk mechanical and structural design, and many other factors.

Indicators measuring the purchase of hard disk

Measure hard disk performance indicators include:

Spindle speed

Spindle speed is one of the hard disk capacity in addition all indicators, the most notable performance parameters should also determine the hard disk's internal transfer speeds and sustained transfer rate of the first decision factors. Now choose the hard disk rotational speed are 5400rpm, 7200rpm, 10000rpm and 15000rpm. Judging from the present situation, 10000rpm SCSI hard disk with cost-effective advantages, is now mainstream, and hard drive 7200rpm hard drive and the following levels in the phasing out of hard drive market.

Internal transfer rates

The level of internal transfer rate is the evaluation of a purchase hard drive a decisive factor in overall performance. Hard disk data transfer rate is divided into internal and external transfer rate; typically refer to external transfer rates as well as burst data transfer rates (BurstdataTransferRate) or interface transfer rate, measured from the hard disk cache to output data, current Ultra160SCSI technology external transfer rates have reached 160MB/s; internal transfer rate also known as the maximum or minimum sustained rate (SustainedTransferRate) refers to the purchase of hard disk platters read write data speed, now most of the mainstream HDD 30MB/s to 60MB/s. Due to the hard disk's internal transfer rate to less than the external transfer rate, only internal transfer rate can be as real to measure hard drive performance.

Single-disc capacity

In addition to contributions to growth capacity, single-disc capacity of another important significance is to increase purchase hard disk data transfer rate. Single-disc capacity increase thanks to the increase in the number of tracks and track internal linear magnetic density increases. Tracks the number of reducing head seek times of great benefit, because magnet's RADIUS is fixed, tracks the number of means of shortening the distance between the track and heads from one track to another track takes place time will be shortened. This will help to random data transmission speeds increase. And track internal linear magnetic density of growth and drive continuous data transfer speeds are directly linked. Track the increase in linear density allows each track you can store more data on the disc in each circular motion and more data is read from the head to the hard drive's buffer.

Average seek time

Average seek time is the head moves to the data track time, this is a measure of the importance of choosing the hard disk mechanical indicators, usually in 3ms ~ 13ms, recommended average seek time is greater than 8ms SCSI hard drives don't consider. Average seek time and average latency (the decision entirely by speed) together determine the hardSpare head to find clusters of data is located. The time has a direct impact on the hard drive of random data transfer speeds.

Cache

Improve the capacity of the hard disk cache is an increase the overall performance of the purchase of the hard drive. Because hard disk's internal data transfer rate and external transfer speed. So you need to do a cache to speed adapters. The size of the cache duration for hard disk data transfer rate has a great impact. It has a capacity of 4MB 512KB, 2MB, or, even, for 16MB 8MB video capture, video editing, etc. require a large amount of disk input/output, large hard disk cache is the ideal choice.

Selected server hard drive

Know your server to buy hard disk performance indicators, the next natural to choose a suitable for this specific application servers hard drive to improve system performance.

Choosing high performance hard drive

Because SCSI has a CPU utilization is low, the number of tasks associated with operating efficiency, connection equipment, connect the long distance, for most of the server application, it is recommended that you use SCSI hard drive, and the newest Ultra160SCSI controller; for the low-end of a small server applications, can be up to date on your IDE hard disk and controller. Determines the type of interface and the hard disk, will focus on the aforementioned effect drives performance specifications, depending on the speed, single-disc capacity, average seek, cache, and other factors, combined with capital budget, selected price best buy hard disk options.

RAID technology

Redundant disk array and RAID system offers more than the usual disk storage more performance indicators, data integrity, and availability of data, especially in today's hard disk i/o is always lag behind the CPU performance bottlenecks and more prominent, RAID solutions to effectively compensate for this gap.

By the disk array data checksum mode, RAID technology is divided into different levels (RAIDLevels), with different technical features, the reader can refer to the manual selection.

In order to better improve the purchase of hard disk i/o performance, recommend using RAID technology, according to the characteristics of the application, to be frequently access read-write hard drive into a RAID0 RAID1 and RAID5 or; at present, can be adopted at the low-end server, such as wave yingxin IDERAID NP200; while in the middle and high-end server, recommended SCSIRAID controller and RAID controller on technical indicators, such as the CPU type, channel type and number, number, there is no cache battery back-up, etc.; Note: motherboard integrated RAID controller because there is no hard disk controller, which uses the SCSI on motherboard, hard drive controllers take more primary processor time, causes the server's processing ability is affected.

Hot technology

In addition to the evaluation from the performance indicators on the purchase of hard drive, but also hard disk failure rate, average non-fault operation and easy maintenance. In the specific application, you first should use long life, low failure rate of the hard disk, you can reduce the probability of failure and the number of times, this involves hard disk MTBF (mean time between failures) and data protection technology, MTBF value better, such as wave yingxin servers hard disk MTBF values of more than 120 million hours in General, and the hard disk drive S.M.A.R.T. shared by (Self monitoring, analysis and reporting technology), and similar technologies, such as seagate and IBM DST (drive self test) and DFT (drive health detection), saved on your hard disk data safety is of great significance.

In addition, once the hard disk is damaged, you should consider how to ensure that data is not lost, and reduce server downtime. RAID technology can be used to ensure data reliability and security, through the hard disk of the hot technology can guarantee to replace or repair the hard disk at the same time, the server still runs correctly. Current hot technologies in the high-end server is very common, has also been used as an important server grade. General in the server's hot technology parts have hard drives, power supplies, fans, PCI slots, and SCSI hard drives also have a dedicated support hotplug technologies SCA2 interface (80-pin), and SCSI backplane, you can easily choose the hard disk of hot pluggable.