Israel bans imports of Apple iPad

Israel bans imports of Apple iPad
JERUSALEM – Israel has banned imports of Apple Inc.’s hottest new product, the iPad, citing concerns the powerful gadget’s wireless signals could disrupt other devices.
Customs officials said Thursday they have already confiscated about 10 of the lightweight tablet computers since Israel announced the new regulations this week. The ban prevents anyone — even tourists — from bringing iPads into Israel until officials certify that they comply with local transmitter standards.
Continue reading…


Reasons The 80’s Were A Cooler Time To Grow Up Than The 90’s

Reasons The 80’s Were A Cooler Time To Grow Up Than The 90’s

10) MTV actually played videos in the 80’s.

9) There were only one kind of Nike tennis shoes (white with a red swish), and they didn’t cost $125.

Continue reading…


Cisco IPSec VPN Design (Networking Technology)

IPSec VPN Design (Networking Technology)
[ad#Google Adsense300-250]
Publisher: Cisco Press | ISBN: 1587051117 | edition 2005 | CHM | 384 pages | 8,87 mb
The definitive design and deployment guide for secure virtual private networks
* Learn about IPSec protocols and Cisco IOS IPSec packet processing
* Understand the differences between IPSec tunnel mode and transport mode
* Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives
* Overcome the challenges of working with NAT and PMTUD
* Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates
* Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access
* Apply fault tolerance methods to IPSec VPN designs
* Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN)
* Add services to IPSec VPNs, including voice and multicast
* Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs.





Prey 0.3.3

Prey is a lightweight application that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free.
[ad#Google Adsense300-250]
Recover what is rightfully yours
Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief.

Silent but deadly
Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.

And because there’s always hope
You may be thinking “but what’s the point of this program if the guy will probably just format the thing right away?” and you’re completely right. However, experience shows that thieves tend to look in stolen computers for valuable information, so there’s actually a chance you can catch the guy
Besides, if by using Prey you can keep alive a tiny bit of hope that you’ll recover your computer, isn’t it already worth it?
WEb
http://preyproject.com/
Download Link
http://preyproject.com/releases/prey-0.3.3-win.exe

Prey is a lightweight application that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free.
Recover what is rightfully yours
Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief.

Silent but deadly
Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.

And because there’s always hope
You may be thinking “but what’s the point of this program if the guy will probably just format the thing right away?” and you’re completely right. However, experience shows that thieves tend to look in stolen computers for valuable information, so there’s actually a chance you can catch the guy
Besides, if by using Prey you can keep alive a tiny bit of hope that you’ll recover your computer, isn’t it already worth it?
WEb
http://preyproject.com/
Download Link
http://preyproject.com/releases/prey-0.3.3-win.exe