Saturday, May 30, 2015

Home Remedies


Home Remedies for Instant Glow in the face


Honey & Lemon









Take 1 tablespoon of lemon juice and 1 tablespoon of honey. Mix it till the honey dissolves properly. wet slightly your face and apply it on your face and leave it for 15-20 minutes. Honey and lemon works like a natural bleacher, which makes your skin glowing and radiant instantly. Wash your face thoroughly with cold water.

Papaya & Honey











Take a piece of papaya and mash it with well . Take a tablespoon of honey and mix well with papaya pulp. Slightly wet your face and apply it on your face. Leave it for 15 minutes. Rinse thoroughly with cold water.

Sugar








Take some sugar. Add lemon juice and a few drops of olive oil to it. Mix it well and use it as a face scrubber.With the help of Olive oil you can wet your face slightly and apply it to the skin , sugar will remove dead cells, and lemon juice will naturally bleach your skin.

Turmeric









Take turmeric powder and mix lemon juice in it. Make a paste and apply it on your skin. Do not take too much turmeric because it produces heat so if some people are with heat bosy they will get heat boils.Let the mask dry, and then, wash off thoroughly with cold water.


Friday, May 29, 2015

Get Healthy And Glowing Skin - 3 Fruits


These 3 Fruits will help you To Get Healthy And Glowing Skin


Banana
Eat Bananas because it is very good for health not only that it contain of rich Vitamin A,B,and E its a anti-ageing agent.
Opt for a facial using a freshly mashed banana mixed with honey to get glowing skin.it also help in proper blood circulation in our body because it contains fiber, minerals, magnesium and potassium. it also build immune levels.

Orange
Oranges are rich source of Vitamin C, which helps to improves skin texture. It naturally slows down the process of ageing.
Dry orange peels, make a powder. store this in an airtight container. Use this as a natural scrub once or twice weekly for clear and glowing skin.

Apple
Apples contains high antioxidant action, It helps minimize wrinkles and fine lines keeping the bowels clean.

Apply apple juice mixed with some honey on your face; let it dry and wash off. This is a very good hydrating face mask.

Thursday, May 28, 2015

What is Ban?


What is Ban?
Ban is a legal mechanism that prevents employee or residents from re-entering the same country or a person who served ban is will be unable to work or live in specific Country.
Types of Ban in United Arab Emirates:
There are Two Types of Ban in United Arab Emirates.
1. Immigration Ban
2. Labour Ban, Employment Ban or Work permit  Ban
Immigration Ban
What is Immigration Ban?
All countries except UAE and GCC nationals need permission for the Government of UAE (Ministry of Immigration) to enter in UAE or any part of UAE, as each Emirate of UAE has their own Immigration section with different rules and regulations.
So, if you are denied to enter in UAE you should know you have Immigration ban from Government of UAE.
Reason of Immigration Ban:
There are numerous reasons of immigration bans in UAE but we will discuss the most important and popular cause of bans in Emirates.
You will be banned or you cannot enter UAE or any emirate of UAE if you have Immigration Ban due to any Criminal offences, Illegal Visa entry or exit, Fake passports entry and exits, Weapons or ammunition, Drugs, Bounced cheques, Murder case, Serious Abusing case with UAE Citizens, inappropriate relationship, theft, rape, violence, Breaking serious Rules and regulation of UAE Government, or any other crimes.
How to Remove Immigration Ban?
The mostly asked question is how to remove immigration ban, is there any way or any e-services provided from government of UAE or from Ministry of Immigration? The answer will be a big NO.
You will face immigration ban till the time you are cleared by Ministry of Immigration or you have served your Sentence.

Labour Ban or Work Permit Ban
What is Labour Ban?
Leaving a job without any reason, breaking terms and condition of Labour Contract or Started another job before finishing the first contract will cause Labour ban on you.
How many types of Labour ban?
Labour ban also known as Employment ban or work permit ban and there are two types of Labour Ban.
1. 6 months Labour ban
2. 1 year Labour ban
What is the Reason of 6 Months Labour ban?
Every Employee of UAE will be banned automatically by Ministry of Labour (MOL) if you leave a current company (job) without any solid reason, and the duration of this ban will be 6 Months. You will not allow entering again to any emirate of UAE until you cleared the ban status.
Can I travel to UAE on Visit Visa if I have 6 months ban?
Yes there is no restriction by Government or Ministry of Labours for you to enter any Emirates of United Arab Emirates on Tourist or Visit Visa.
How to Remove 6 Months Labour Ban?
Is there any way to Remove 6 months ban inside UAE?
How to remove 6 months ban?
How to remove labour ban without leaving country?
How to apply for another visa if you have labour ban for 6 months?
Internet and social sites are full of these questions that how to remove ban or is there any E-services provided for Labours by Government of UAE the answer will be big YES.
You can remove your 6 months ban without Leaving Uae by finding a job in any Free zone of United Arab Emirates or Any Government Job but you have to mention qualification above high school with 5000 AED monthly Salary, Diploma holders with 7000 AED monthly salary and Bachelor’s degree holders with 12000 monthly salary in new Agreement.
What is the Reason of 1 Year Labour ban?
Losing a case in any emirates of UAE against your employer (Company), leaving a Government Job before completing your Limited labour Contract or Violation of Terms and Conditions of your Labour Contract will put 1 year ban on you and you will not allowed to visit UAE until you finish 1 year Labour ban.
Lucky Employee who will not face Labour Ban?
Is there anyone in UAE who will not face Labour Ban? Yes below mention employees may not have a Labour ban:
Citizens of UAE will not have immigration and Labour ban.
Joining an Oil company.
Employees who are Changing job within same free zones.
Employees who are joining Government or Semi-Government Organizations.
Employees who have completed their Limited term contracts.
Employees who have completed 3 years of Service under Unlimited term contract.


Sunday, May 24, 2015

Curry Leaves for your hair


Curry Leaves for your Hair





Make Tea from Curry Leaves for your hair
Boil some curry leaves in water, squeeze a lime and add some sugar to it. Drink this tea daily for 1 week this will increase hair growth, make your hair smooth, shiny and prevent white hairs. Intake of curry leaves is good for the digestive system too and it resolves many hair problems.
Make a Hair Mask for your hair to prevent hair loss
Take some curry leaves and make a paste of them. Mix this paste with yogurt and massage it on your hair. Keep this mixture on your scalp for about 25 minutes and then wash off with a soft shampoo. Apply this mask every week consistently to see instant results in terms of hair growth. Not only that this will help your hair to look shiny, smooth and bouncy.
Make a Hair tonic to prevent hair loss

Take few curry leaves and some coconut oil in a bowl. When it mixed with curry leaves, it increases hair growth. Boil these two together until you see black deposit forming. After the deposit is formed, apply it all over your scalp after it becomes cool . Keep this mixture for one hour and then wash off with a soft shampoo. Apply this tonic twice a week and ll see the result in just fifteen days. This oil will not only stimulates hair growth but also prevents the white of hair. This is the best way for healthy hair and for hair growth

Saturday, May 23, 2015

CCNA - Port

CCNA
Cisco Certified Network Associate


PORT

The term port can refer to either physical or virtual connection points. There are two kinds of port,

Physical port:

Physical network ports allow connecting cables to computers, routers, modems and other peripheral devices. Several different types of physical ports available on computer network hardware. A physical port, as opposed to a virtual or logical port is an interface on a computer into which you can insert a connector for a device.

Examples of Physical Port: RJ45 port (Ethernet/LAN/NIC Port), Serial Port (RS-232), USB Port.


Virtual port:

                Virtual ports are part of TCP/IP networking. These ports allow software applications to share hardware resources without interfering with each other. Computers and routers automatically manage network traffic traveling via their virtual ports.


Port numbers range from 0 to 65536, but only ports numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of well-known port numbers specifies the port used by the server process as its contact port.

Port NumberDescription
1TCP Port Service Multiplexer (TCPMUX)
5Remote Job Entry (RJE)
7ECHO
18Message Send Protocol (MSP)
20FTP -- Data
21FTP -- Control
22SSH Remote Login Protocol
23Telnet
25Simple Mail Transfer Protocol (SMTP)
29MSG ICP
37Time
42Host Name Server (Nameserv)
43WhoIs
49Login Host Protocol (Login)
53Domain Name System (DNS)
69Trivial File Transfer Protocol (TFTP)
70Gopher Services
79Finger
80HTTP
103X.400 Standard
108SNA Gateway Access Server
109POP2
110POP3
115Simple File Transfer Protocol (SFTP)
118SQL Services
119Newsgroup (NNTP)
137NetBIOS Name Service
139NetBIOS Datagram Service
143Interim Mail Access Protocol (IMAP)
150NetBIOS Session Service
156SQL Server
161SNMP
179Border Gateway Protocol (BGP)
190Gateway Access Control Protocol (GACP)
194Internet Relay Chat (IRC)
197Directory Location Service (DLS)
389Lightweight Directory Access Protocol (LDAP)
396Novell Netware over IP
443HTTPS
444Simple Network Paging Protocol (SNPP)
445Microsoft-DS
458Apple QuickTime
546DHCP Client
547DHCP Server
563SNEWS
569MSN
1080Socks

Wednesday, May 20, 2015

CCNA - OSI Layer

CCNA
Cisco Certified Network Associate

OSI Layer


1.       Application Layer
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for transfers-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Eg: WWW Browser, FTP, HTTP, Telnet, Nfs, Snmp

2.       Presentation layer
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Eg:  encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.

3.       Session Layer
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Eg: NFS, NetBios names, RPC, SQL.

4.       Transport Layer
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Eg:  SPX, TCP, UDP.

5.       Network Layer
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Eg: AppleTalk DDP, IP, IPX.

6.       Data link layer
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Eg:  PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay. 

7.       Physical layer
This layer conveys the bit stream - electrical impulse, light or radio signal  through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

Eg: Ethernet, FDDI, B8ZS, V.35, V.24, RJ45

CCNA - Network Basics

CCNA
Cisco Certified Network Associate 


Introduction to Networking and Network Basics :

It is important to understand what a network is and the importance of networks themselves. Every host has a Network Interface Card (NIC) that is used to connect it to a network.
A hub is a network device that repeats information received from a host to all other connects hosts. The hub will relay any information received from Host A to Host B and Host C. This means that all the three hosts can communicate with each other. Communication between hosts can be classified into three types:

Unicast – Communication from one host to another host only.
Broadcast – Communication from one host to all the hosts in the network.
Multicast – Communication from one host to few hosts only.

When a hub is used to network hosts, there are two problems that arise:
A hub repeats information received from one host to all the other hosts. To understand this, consider Host A sending a unicast message to Host B. When the hub receives this message; it will relay the message to both Host B and Host C. Even though the message was a unicast intended only for Host B, Host C also receives it. It is up to Host C to read the message and discard it after seeing that the message was not intended for it.

A hub creates a shared network medium where only a single host can send packets at a time. If another host attempts to send packets at the same time, a collision will occur. Then each device will need to resend their packets and hope not to have a collision again. This shared network medium is called a single collision domain. Imagine the impact of having a single collision domain where 50 or 100 hosts are connected to hubs that are interconnected and they are all trying to send data. That is just a recipe for many collisions and an inefficient network.

The problems associated with hubs can cause severe degradation of a network. To overcome these, switches are used instead of hubs. Like hubs, switches are used to connect hosts in a network but switches break up collision domain by providing a single collision domain for every port. This means that every host (one host connects to one port on the switch) gets its own collision domain thereby eliminating the collisions in the network. With switches, each host can transmit data anytime. Switches simply “switch” the data from one port to another in the switched network. Also, unlike hubs, switches do not flood every packet out all ports. They switch a unicast packet to the port where the destination host resides.



Now that you know how a switch works and improves a network, consider the one problem associated with a switched network. Earlier, you learned that hubs flood out all packets, even the unicast ones. A switch does not flood out unicast packets but it does flood out a broadcast packet. All hosts connected to a switched network are said to be in the same broadcast domain. All hosts connected to it will receive any broadcast sent out in this domain. While broadcasts are useful and essential for network operations, in a large switched network too many broadcasts will slow down the network. To remedy this situation, networks are broken into smaller sizes and these separate networks are interconnected using routers. Routers do not allow broadcasts to be transmitted across different networks it interconnects and hence effectively breaks up a broadcast domain.


Mac Address - 12 digit unique value.
IP Address use to find the particular host in the network, it can be considered as 2 values, bit Network bit and Host bit.

IP Address rule for same network:
-              Network bit need to be same
-             Host bit need to be different.



Sunday, May 10, 2015

Happy Mother's Day

Mother is the name for God in the lips and hearts of little children.

M-O-T-H-E-R
“M” is for the million things she gave me,
“O” means only that she’s growing old,
“T” is for the tears she shed to save me,
“H” is for her heart of purest gold;
“E” is for her eyes, with love-light shining,
“R” means right, and right she’ll always be,
Put them all together, they spell “MOTHER,”



A man loves his sweetheart the most, his wife the best, but his mother the longest.!!!!!!!!!!!!!!

Monday, May 4, 2015

Small Business Online

Small Business 

There is a proven sequence of steps you can follow to guarantee your success when you're starting a small business online. I've seen thousands of people start and grow successful businesses by doing the following:
Find a need and fill it.
Write copy that sells.
Design and build an easy-to-use website.
Use search engines to drive traffic to your site.
Establish an expert reputation for yourself.
Follow up with your customers and subscribers with e-mail.
Increase your income through back-end sales and up selling.

Saturday, May 2, 2015

Microsoft Outlook Tips!!!!


Repair Outlook Data Files (.pst and .ost) for Outlook 2010

1.       Open Windows Explorer and select the drive:\Program Files\Microsoft Office\OFFICE14 folder.
2.       Double-click Scanpst.exe.
3.       In the Enter the name of the file you want to scan box, enter the name of the .pst or .ost file that you want to check, or click Browse to select the file.
4.       To specify the scan log options, click Options, and then click the option that you want.
5.       Click Start.

If errors are found, you are prompted to start the repair process to fix the errors.
A backup file is created during the repair process. To change the default name or location of this backup file, in the Enter name of backup file box, enter a new name, or click Browse to select the file that you want to use.

6.       Click Repair.

Start Outlook with the profile that contains the .pst file that you tried to repair.

How to save Outlook messages in PDF format


If you already have PDF printer /Adobe Acrobat software, skip to step 3.
Download and install PDF printer / Adobe Acrobat.
Select the Outlook messages you would like to have converted to PDF.
Click the Message Save Outlook toolbar button. Check the "Print" option.
Click "Save Now"
The messages will be converted to PDF according to your PDF printer settings.


Creating Rules to Manage Your Email

Click File -> Info , and then the Manage Rules & Alerts button.

Click New Rule... on the Email Rules tab. The Rules Wizard dialog will pop up

Rules & Alerts :  Select a template, choose the template that most closely resembles the action you would like to take. Ensure you select a template from the Stay Organized or Stay Up to Date sections

Rules Wizard: Edit the rule description, click on the underlined text in order to specify the details of your rule (e.g. move messages from Office Watch mailing list into the Newsletters folder). Check carefully to make sure that the details are correct and complete. Click Next

Select any additional criteria you would like to set , Select condition(s) by clicking on the underlined words and adding in your criteria.

Specify the details for those criteria in the Edit the rule description box (optional)

Type a name for the rule in the box for  Specify a name for this rule

Tick the box next to Run this rule now... if you want to apply the rule to messages already received

 When you are certain of the details of the rule and want to commit to it, click Finish

Your rule will now appear listed, with a description of the settings, in the Rules and Alerts dialog box

Password on pst-file

To set a password on your pst-file, you must bring up the Properties dialog of the pst-file in Outlook.
 Outlook 2003 and Outlook 2007
          File-> Data File Management…-> double click on your data file-> button: Change Password…
 Outlook 2010 and Outlook 2013
          File-> Account Settings-> Account Settings…-> tab Data Files-> double click on your data file-> button: Change Password…
Leave the “Old password” field empty when no password has been set yet.

நல்லமாடசாமி திருக்கோவில் - திருமலாபுரம் 2018

அருள்மிகு நண்டு என்கிற  நல்லமாடசாமி   கும்பாபிஷேகம் & கொடைவிழா   திருமலாபுரம் 2018