Labels

Pages

Saturday, June 14, 2014

6 amazing things you didn't know about your computer

.6 amazing things you didn't know about your computer

It's a ritual across the globe: somewhere between sticking the kettle on and complaining about last night's match, you'll probably hit the button on your ageing company PC and wait while it slowly thinks about turning on. Rather than take it for granted, though, it's worth taking a couple minutes to realize a few of the things that your poor robot slave does without you ever knowing

1. Bits, Bytes, and Size

Next time you complain about the pitiful memory capacity of your old 8GB iPod Touch, it's worth remember what makes up eight whole gigabytes. Computer science grads will know that in every gigabyte, there's 1024 megabytes; 1024 kilobytes in a megabyte, and 1024 bytes in a kilobyte. Breaking it down to the lowest level, you've got 8 bits in a byte.

Why does that matter? Because on a flash drive, each bit of data is made up of eight separate floating gates, each comprising two physical transistors, which can basically record themselves as either a '1' or a '0'. (Want to be impressed ever further? Each floating gate actually relies on quantum mechanics to work.) That means that an 8GB iPod Touch – the one you were laughing at a minute ago for being puny – has, according to my back-of-the-napkin maths, 549,755,813,888 individual gates arrayed inside that svelte aluminium body. Mighty clever engineering indeed.

2. Everything you see or hear on the internet is actually on your computer

All your computer-whizz friends probably delight in telling you how having a 'library' of videos is so 2008, that no-one torrents any more, it's all Netflix and iPlayer and 'The Cloud', whatever that means. But, you might want to remind them: every time you stream a video or the week's latest Top 40 off the web, it's actually, technically playing off your computer.

See, every internet media file has to make a local copy of itself on your machine, first. Ever wondered what that white buffering bar means on YouTube or Netflix? It's the amount of video that's been copied to the local cache, a.k.a. the amount you can still watch if your internet decides to up and die.

3. The distance data travels

A quick experiment for you: click this link, which should take you to Wikipedia. With one click, you've just fetched a bunch of data from servers in Ashburn, Virginia, about 6000km away. Your request has travelled from your computer, through a local Wi-Fi router or a modem, up to a local data centre, from there onwards (under the Atlantic Ocean, if you're in the UK), all the way to Virginia, and back again – in around 0.1 of a second, depending on how good your internet connection is.

By comparison, your body takes around 0.15 of a second for a signal to pass from your fingers, up your spinal cord to the brain, and back down again.

4. Counting Starts at Zero

At a base level, every computer's just a really big, complicated calculator. But thanks to the way its intrinsic circuitry works – with lots of little logic gates that are either 'on' or 'off' – every action that takes place at a base level is happening in binary, where things are either a 1 or a 0, with no shades of grey in between.

This actually translates up to a neat bit of programming trivia – in the computer science world, all counting (with the rather notable exceptions of Fortran and Visual Basic) starts at zero, not one.

It actually makes a lot more sense – ever thought about why the 20th century refers to the 1900s? It's because when historians decided on the dating system, they weren't clever enough to call the very first century (0-99AD) the 0th century. If they had, we'd probably have far fewer confused school children the world over.

5. The work that goes into a Ctrl+C, Ctrl+V

One rather under-appreciated fact about solid state drives (SSDs), regarded as the gold standard for fast, reliable storage, is the amount of copying they have to do. When you want to copy some data from one bit to another, it's not just a matter of shuffling the data from one part of the drive to another.

Because of the complicated way a SSD works, over-writing a block of old data with some shiny new data isn't as simple as just writing the new stuff in with a bigger, thicker Sharpie. Rather, the storage drive has to do some complicated shuffling around.


In practice, this can mean that writing a tiny 4KB file can require the drive to read 2MB (that's thousands of times more data that the 4KB file you're trying to write), store that temporarily, erase a whole tonne of blocks, then re-write all the data. It's rather labour-intensive, so think before you juggle your files around next time.

6. Code isn't as clean as you think

The majority of us put faith in bits of technology you don't quite understand – be it committing your life to a 747, or your dirty pics to Snapchat's auto-delete. When you do you generally tend to assume that the code's been scrupulously examined by teams of caffeine-fuelled programmers, with most of the niggling little bugs found and nixed.

The truth seems to be quite the opposite. One Quora user pointed out that buried within the source code for Java, one of the internet's fundamental bits of code, is this gem:

/**
* This method returns the Nth bit that is set in the bit array. The
* current position is cached in the following 4 variables and will
* help speed up a sequence of next() call in an index iterator. This
* method is a mess, but it is fast and it works, so don't f*ck with it.
*/
private int _pos = Integer.MAX_VALUE;

It just goes to show that even programmers rush things to get home for the next installment of Game of Thrones sometimes.

Thursday, June 5, 2014

How to Use Active Directory

Active directories enable organizations to arrange their computer data and network and store and process information in a centralized location. This is because Active Directory is a highly scalable directory service that enables efficient management of network resources. The technology on which Active Directory is based on is fairly advanced and requires a lot of expertise to manage entire directory related tasks. Therefore, to understand how to use Active Directory, we will first start with an overview of this directory service.
The Active Directory technology is based on standard Internet protocols that help you design the exact structure of your network. It uses the DNS (Domain Name System) to organize the groups of computers into domains, which are further organized into hierarchical structures. DNS is an integral part of the Active Directory. It must be first configured in the network even before installing the Active Directory. Once DNS is configured, the Active Directory can be installed by running the Active Directory Installation Wizard. Following is the procedure:
Click Start, click Run, type dcpromo in the Open field and then click OK
When no domain exists, the wizard helps you create a new domain to configure the Active Directory. Upon the completion of the installation process, you will find that the AD is divided into a logical structure and a physical structure with a virtual partition. The logical structure comprises the domains, domain trees, forests and organization units, while the physical structure consists of sites and subnets.
The logical structures help you arrange the active directory objects and manage their network accounts along with the shared resources. The physical structures on the other hand enable you to map the physical network structure of the organization, facilitate network communication and set physical boundaries.
The Active Directory domain is a set of computers sharing common resources from the AD database, having a unique domain name and its own set of security policies and trust relationships with other network domains. Within a domain's database information, objects like user accounts, groups, computer accounts, folders, printers and shared resources are stored. A forest comprises of one or multiple domains which share common directory data.
Organizational units are logical containers or subgroups within a domain which represent the functional structure of an organization. Organizational units (OUs) are used to arrange the AD objects into groups, assign group policies to them and delegate authority to the domain resources.
Since Active Directory is the foundation of Windows distributed networks, administrators can use it for locating objects such as users, security policies, distributed components, shared resources, etc. in a network domain. Windows Active Directory is accessed through WMI by creating set of references to every object and class contained in the AD data store. By accessing the directory through WMI, administrators create WMI-enabled applications to access the Active Directory information. These interfaces in turn aids administrators to create new instances, retrieve classes and instances, modify or delete instances, query Active Directory and enumerate classes and instances.

Windows 2008 Active Directory

Over the last few years, Windows 2008 has replaced the ageing Windows Server 2003 and Windows Server 2003 R2 domain controllers. However, performing any task where one has to upgrade from the earlier versions of the Windows Server DC to Windows Server 2008 without causing any disturbance in Active Directory is definitely a big task and challenge as well. The shift requires selecting the best possible method of migration and other important steps involved in the process.
Let us first look at the options available for migration from Windows 2003/ 2003 R2 Active Directory service to Windows 2008 Active Directory.
In-place Upgrading: Both Windows server 2003 and 2003 R2 can be upgraded in-place to Windows 2008 Server. For in-place upgrading, administrators are required to run adrep.exe before initiating the up gradation process in the domain controllers. Adrep.exe is executed to prepare the Active Directory environment before introducing Windows Server 2008 domain controller. This Microsoft utility is run with the following commands in Windows 2008 Active Directory:
'ADPREP /FORESTPREP' (For Schema Master)
  1. Executed on domain controller Schema Master FSMO
  2. Updates the AD forest
  3. Does not change the "Partial Attribute Set"
'ADPREP /DOMAINPREP' (For Infrastructure Master)
  1. Executed on Infrastructure Master FSMO
  2. Updates the AD domain
ADPREP /DOMAINPREP /GPPREP' (For Infrastructure Master)
  1. Executed on the Infrastructure Master FSMO
  2. Updates AD domain and the SYSVOL
ADPREP /RODCPREP (For Read only domain controllers- optional)
  1. Executed on the Domain Naming Master FSMO
  2. Updates permissions on application partitions for an RODC to be able to participate in their replication
  3. Only executed when upgrading from W2K3 AD
Restructuring: In this method, administrators are required to restructure the entire Active Directory structure. For this all the resources have to be moved from one domain to another. Active Directory Migration Tool (ADMT) is the best utility that is used for restructuring the Windows 2008 Active Directory environment.
Transitioning: With transitioning, it is possible to add the Windows 2008 domain controllers to the existing Active Directory environment. In this migration process, the first step must be to move the FSMO (Flexible Single Master Operations) roles. Next, the previous domain controller must be demoted to remove it from the new domain on Windows Server 2008.
Of all the three methods, transitioning to Windows Active Directory 2008 is best since restructuring means creating the entire directory from the scratch and with in-place upgrading administrators are stuck with limited upgrade paths. Whereas transition procedure allows administrators to retain the existing Active Directory layouts, schema, objects, contents and group policies.

Active Directory Cleanup

Over time, user and computer accounts become obsolete or redundant which raises the need to eliminate them. The Active Directory Cleanup Wizard is a utility which is developed to eliminate such redundant or duplicate object accounts by merging them. Duplicate user and computer objects usually result when multiple directories are migrated to a new domain or the Active Directory is upgraded to a new server.
The Active Directory Cleanup Wizard, searches for such redundant objects or accounts and merges them. All the accounts, their attributes and properties are merged into a single user account so as to remove duplicity from the AD database. This in turn helps is improving the performance of the Exchange servers.
The functionalities of the Active Directory Cleanup Wizard can be summarized as follows:
  • It identifies all the duplicate objects to be merged by searching in the Windows NT accounts
  • Reviews and modifies the merge operations after the selection of accounts
  • Exports and imports list of accounts so that administrators can save the details of the merge operation as a .csv file for the purpose of review.
  • order to run the wizard, command line tools can be used.
One must not forget that Active Directory Cleanup Wizard cannot be used for cleaning up the server metadata. In fact, to perform this particular task another utility, ntdsutil.exe is used. Ntdsutil.exe is a command line tool that is primarily meant for metadata cleanup procedure. This utility is a default tool installed on each domain controller. In the entire procedure of metadata cleanup, every Active Directory data used to recognize the domain controller during the replication procedure is removed. The metadata cleanup procedure is very much appropriate, but only for those domain controllers which were not demoted using the utility dcpromo.exe.
On a domain controller that is running Windows Server 2003 with Service Pack 1 (SP1), if one runs ntdsutil.exe, then it can also remove File Replication Service (FRS) connections. In addition, the procedure also transfers the FSMO roles (master operation roles) held by the demoted domain controllers.
Here are necessary steps that you need to follow in order to carry out a metadata cleanup method:
To clean up server metadata:
  1. Open a command prompt.
  2. Type the following command, and then press Enter: ntdsutil
  3. At the ntdsutil: prompt, make sure one type: metadata cleanup
  4. At the metadata cleanup: prompt, type: remove selected server ServerName Or remove selected server ServerName1 on ServerName2
  5. In order to confirm whether the server has removed or not, type list servers in site, and then press Enter.
  6. Make sure that the domain controller that you are looking to remove is not displayed in the command output.
  7. At the metadata cleanup: and ntdsutil: prompts, type: quit

Active Directory Backup

The Active Directory service generally operates as a database that contains all the required information about an entire network. Consequently, it gets very important to have a proper backup of this Active Directory database as it helps in avoiding any kind of disastrous condition. Active Directory is generally backed up as a part of a system state or a collection of system components depending upon each other. Therefore, it is very compulsory that administrators backup and further try to restore every single system component like system registry, class registration database, boot files, AD database, transaction logs and the reserved transaction logs together.
In order to effectively restore data from a backup, it is really very important that the Active Directory backup should be performed smartly. Besides this, it also needs to be recreated after regular time periods. It is necessary to choose the domain controllers which must be backed up as well as the backup content. However, it is important to note that any backup that is older than the tombstone lifetime (TSL) value (default 60 days) set in the AD can never be considered as a fine backup.
Restoring the Active Directory
In situation where database gets corrupted in Active Directory or any hardware or software failure take place, it is very important that administrators restore the data from the available Active Directory backup as soon as possible. Furthermore, restoration is compulsory when any AD object gets deleted or modified. However, there are many different ways using which Active Directory database can be restored. Out of those different ways Active Directory's own replication process is one. Upon replication, almost entire and the latest changes or modifications get synchronized in every domain controller. The Backup utility can be utilized for restoring the replicated content from the backup copy without any requirement of reconfiguring the domain controller.
Selection of the appropriate restoration method
There are three different types of restoration procedure using which administrators can restore the backup data of a corrupt Active Directory. Following are the details of Active Directory backup methods:
Primary restore: This method is very effective in situation when all the domain controllers of a domain get lost and there is an urgent requirement for recreating the domain from the scratch. The Primary recovery method works by rebuilding the first domain controller in the domain. The primary restore can be conducted on local computer by the group members, provided that the members are delegated for this responsibility.
Non-authoritative (Normal) restore: Normal restore method restores the data present in AD to the state before the backup was created. The data is then upgraded through the replication process. This method can be performed on a domain controller only by the domain admin.
Authoritative restore: In an authoritative restore method, some explicit data is marked as current, which is further prevented from getting overwritten all through the replication procedure. Later in tandem with the normal restore method, the current authoritative data is replicated through the domain. During an authoritative restore method, every single change made to restore an object, which occured after the backup gets lost. Ntdsutil, a command line utility can be used to carry out an authoritative restore along with system utilities of Windows Server 2003.

Active Directory Reporter

Reports generated for different activities that are conducted on the Windows Active Directory play a very important rile for administrators in keeping a proper record for reference use. In fact, the Active Directory report facilitate administrators with much needed significant information about AD infrastructure along with Ad components that includes objects, domains, sites, groups, OUs, etc. Active Directory reporter tools are helpful applications which also assist in generating routine, configuration and audit Active Directory reports. These reports facilitate in processing data about user accounts, service level availability issues, Active Directory trending, etc.
The AD management pack for Microsoft Operations Manager (MOM) offers a predefined set of reports which are specially developed to observe the performance as well as the availability of all the Active Directory services. The management pack for MOM generates complete reports, including those on service availability and reports that provide estimation on capacity planning.
However, the AD replication monitoring report is disabled in the management pack by default. So, if you wish to enable this report, administrators need to enable the data collection report using the configuration information provided in the Active Directory Latency Performance Data Collection- Sources Rule Group descriptions. The Active Directory reporter utility of the Management Pack offer diverse types of reports, some of them are explained in the next section.
Some of the reports which provide data about AD configuration information are mentioned below:
  • AD Domain Controllers: It provides a complete list of all domain controllers, along with their IP addresses and sites within a selected domain.
  • AD Role Holders: It offers a list of all computers which hold one or more operations master role or act as global catalog servers.
  • AD Replication Objects: It summarizes the AD replication topology and then provides offers a list of connection objects.
  • AD Replication Links: It provides the outline of current replication site link configuration for Active Directory.
Reports which provide information about Active Directory disk space are as follows:
  • AD DC Disk Space: This report summarizes the disk space usage and free space for Active Directory database and log volumes. This report proves very helpful for administrators as it let them to predict the volume sizes depending upon the current growth rate.
The reports through which administrators obtain information about Active Directory operations are given below:
  • AD Domain Changes: This report provides data in relation to the noteworthy changes that are made in the domain like addition or elimination of domain controllers and movement of PDC emulator operations master.
  • AD Machine Account Authentication Failures: This report summarizes data regarding to workstations which are not able to authenticate and therefore prevent Group Policy updates and software distribution to computers.
  • AD SAM Account Errors: Provides report on events which point towards the SAM that has detected an error and provide info on corrective guidance.
Reports which provide information on Active Directory replication process are as follows:
AD Replication Bandwidth: This report provides a synopsis for both uncompressed and compressed replication bandwidth over a selected period. This report is very effective in capacity planning.
AD Replication Latency: The report provides data about nominal average and maximum replication latency per naming context, per domain controller. In fact, the report can be used to confirm service legal agreements (SLA) within a domain or forest.

Active Directory Utilities

Active Directory's directory services maintenance utility (ntdsutil.exe) is one such effective command line tool that is primarily used for providing management facilities for the AD. Maintenance of Active Directory database along with the proper management and hold of single master operations, creation of application directory partitions, elimination of metadata left by domain controllers, SAM management, retuning of DSRM password, transferring FSMO role to a domain controller and many additional tasks can be conducted by making a proper use of directory services maintenance utility. This menu-driven tool has been developed for interactive use. Though, it can also be run by taking help of scripting commands.
Some of the most frequent jobs that can be conducted by utilizing ntdsutil.exe have been summarized below:
  1. Authoritative restore: In an authoritative restore, definite data that has been marked as current is protected from getting overwritten throughout the replication process. During an authoritative restore procedure, all the changes that were made to repair and retrieve an object, which occur after creating the backup, are lost. Ntdsutil.exe is used to carry out an authoritative restore in tandem with system utilities of Windows Server 2003.
  2. Configurable Settings: Manages and controls configurable settings.
  3. Domain Management: Used for creating Naming Contexts and adding replicas to the Application Directory Partition of DNS.
  4. Files: This functionality is offered merely on booting the server into Directory Restore Mode. It just plays a role of examining the integrity of NTDS.DIT and moving all related databases.
  5. Roles (FSMO maintenance): Used for mapping the single operations master to the equivalent domain controller. For this function, ntdsutil.exe must be utilized together with NetDom or Active Directory snap-ins.
  6. Reset DSRM password: Using this utility, it gets lot easier to reset the password of directory service recover mode.
  7. Security Account Management: Meant for checking up the duplicate SIDs, especially during metadata cleanup.
Active Directory utilities are available with Windows server 2008 and Windows server 2008 R2, provided the AD DS and AD LDS server role are installed. Ntdsutil.exe is obtainable upon installing Active Directory Domain Services Tools, which are part of RSAT (Remote server Administration Tools).
Mentioned below are the steps that are necessary for running the command line utility ntdsutil.exe:
  • Click Start> right click Command Prompt> Run as administrator
  • In the elevated command prompt run ntdsutil.exe.
Reader, always remember in situation where only AD LSD server role is installed and not AD DS server role, Active Directory utilities such as dsdbutil.exe and dsmgmt.exe must be utilized in place of ntdsutil.exe for conducting the same required jobs.

Active Directory Viewer

If you are looking to navigate through the entire Active Directory database without facing any difficulty, then make sure you view the properties and attributes of objects. Adding to that you also need to view the AD schema and execute searches. Fortunately, Microsoft comes with Active Directory Explorer (AD Explorer). This AD Explorer is basically an advanced Active Directory viewer and editor using which any administrator can go across through the AD internal structure. Adding to that administrator can also view the properties, permissions and edit the attributes of AD objects without opening separate dialog boxes.
Apart from being used as an Active Directory viewer, AD Explorer is also capable of saving the snapshots of the AD database for viewing or comparing them offline. Once a saved snapshot is loaded, it is possible to navigate through it and explore it with the help of the AD Explorer. The comparison functionality of this viewer helps administrators to compare two snapshots of Active Directory database in terms of changes made in the objects, attributes and security permissions.
This particular utility is quite similar to another Active Directory viewer ADSI Edit which supports Windows Server 2003 and 2008 R2, even though ADSI Edit lacks the snapshot functionality. Furthermore, in AD Explorer, it is possible to book mark the AD objects which is often handy while viewing same objects repeatedly. Another advantage that AD explorer offers is fast navigating speed between objects that offered by the ADUC snap-in. With just a single click, all the object attributes can be viewed using AD Explorer. Moreover, the values of object attributes can be copied to the clipboard and emailed
Modification of Active Directory objects is also possible with AD Explorer, however not all objects can be modified, especially if they are once deleted. Thus, reanimating tombstone objects is not possible with AD Explorer. Also, the snapshots created with this Active Directory viewer utility cannot be used as a backup. Furthermore, the comparison report or output of two snapshots cannot be exported. If the Active Directory is the current mode, the AD explorer does not allow snapshots to be taken.

Active Directory Query

In case you are looking to search particular information in the Active Directory structure, then definitely you have to spend too much time. No doubt, for administrators it is a boring job without the help of structured queries. But by making a proper use of Active Directory query, situation gets lot better as it let you locate users, groups, computers, contacts, OUs, subnets and servers as well. Of the many command-line tools available for Active Directory management with different versions of Windows server, the Dsquery tool is one such utility that can be used as an Active Directory query utility. By using this software explicit search criteria can be run through queries that may even further assist in searching required information quickly. This built-in tool is available if Active Directory domain Services (AD DS) server role is installed.
The dsquery command is run from an elevated command prompt. Following are the steps to open it;
Click Start, right-click Command Prompt and click Run as Administrator.
Following are various syntaxes that are used with the dsquery commands in order to search and explore Active Directory information:
  1. Dsquery computer: Finds computer in the directory by matching the search criteria that you specified.
  2. Dsquery contact: Finds contacts in the directory matching to the search criteria that has already been specified.
  3. Dsquery group: Finds groups in the directory that matches to the criteria being specified. Kindly note that if the defined search criteria in this command proves insufficient, then you must make use of the general version of the query command, dsquery *
  4. Dsquery ou: Search and find organizational units (OUs) in the Active Directory data store that actually match the search criteria being specified. Just, in case if the defined search criteria in this command are inadequate, there is option of making use of more general version of the query command, dsquery *
  5. Dsquery site: Finds site in Active Directory matching the specified search criteria. However, just like any other dsquery command, in case the predefined search criteria in the command are deficient, then you may also use more general version of the query command, dsquery *
  6. Dsquery server: Finds domain controller servers as per the search criteria that a user specifies. However, if a situation arise where the predefined search criteria in this command turn out to be insufficient, then you may use more general version of the query command, dsquery *
  7. Dsquery user: Finds user accounts in the Active Directory as per the search criteria. If the predefined search criteria in this command are inappropriate, make use of the more common version of the query command, dsquery *
  8. Dsquery quota: Finds quota specifications in the directory data store that matches the specified search criteria. Quota specification is utilized for determining the maximum number of directory objects that a particular security principal can possess in a specific directory partition. If the search criteria that was specified in this command are inadequate, then it is important to utilize he more general version of the query command, dsquery *
  9. Dsquery partition: Finds partition objects in Active Directory that matches the specified search criteria. If the predefined search criteria in this command are insufficient, use the more general version of the query command, dsquery *
  10. Dsquery *: As per the criteria mentioned in an LDAP query, the query searches for any Active Directory object.

Active Directory Browser

Active Directory management is achievable with the help of Windows Support Tools utility provided by Microsoft. The Windows support tool Ldp.exe is widely used by administrators as an Active Directory browser to perform LDAP search operation. The Lightweight Directory Access Protocol utility facilitates administrator to search for particular information through a given search criteria. This client utility can also be utilized effectively to glance through and query an LDAP based directory service such as the Active Directory.
To utilize LDP utility, the first step that needs to be taken is to connect and bind to the Active Directory for authentication. In fact, here are the steps that must be followed for connecting to the Active Directory:
1.On the Connections menu, click Connect.
2.In the dialog box, type the name of the directory server and then click OK.
Note: In case the name of the directory server in not mentioned, then the possibility is very high that the LDP will connect you to your logon server (LOGONSERVER). In fact, it may also connect you to the last server that was accessed.
After establishing the required connection with the Active Directory, a message featuring "RootDSE" information is send. This is very important information because you may require this message to use with ldp.exe utility as an Active Directory browser.
In order to bind to the directory, on the Connections menu, just click Bind so that you can authenticate yourself to the AD. The moment you get connected and authenticated to the Active Directory, you can enjoy the liberty of browsing information depending upon the permissions that have been assigned to your account. For attributes and parts of the AD tree for which access is denied, information will not be displayed.
Since the Active Directory is LDAP compliant, almost all the information is generally arranged in a hierarchical tree arrangement. Consequently, if you really wish to browse through the structure, the accurate LDAP query must be used. To browse through the directory, it is very crucial to view and analyze its tree structure. In fact, here are the steps that you need to follow:
1.On the View menu, click Tree and enter the base Distinguished Name (DN).
2.Enable the Auto Base DN Query Option and click OK to connect to the defaultNamingContext of the tree root.
In just a matter of a few minutes, the Active Directory tree structure will be displayed in the left pane of the LDP utility. And when you expand them it will display all the objects and containers. Just double click on any object on the directory tree and you will be able to view its attributes and along with the information of that particular attribute on the right pane of the LDP utility.
Results are displayed either in String format or Binary format, but it primarily depends upon the configuration of Value Parsing option (In the Options Dialog Box, click General and change the Value Parsing option to String). In String format, object attributes are displayed as follows:
Ldp: Binary blob
The LDP utility overwrites the older results with new information; therefore; increase the buffer size to retain more data. It is possible to save the results in plain text format and export the search results.

iOS 8 Review - 6 Top Features For iPhone, iPad, iPod Touch.


 Apple executives introduced the next version of its mobile operating system - iOS 8. All roughness of the previous "Seven" that so much an eyesore , suddenly disappeared in the new update, and their place was taken by new opportunities with unique features within iOS. Even the wild , because imagine a mobile OS from Apple and third-party widgets keyboards to this day I could not .

During the conference, the scene voiced phrase «iOS 8 - this is the biggest release of iOS». And if all graphically just got to look a little more subdued , with fewer dynamic animation in iOS 7, the functional things have changed .

Photo


Along with the new rates for cloud storage feature was introduced iCloud iCloud Photo Library. Now all the pictures and videos can be stored in the cloud, there to create albums , edit them , and look at this store and according to locations.

Standard means of image you can now make candy . For example, right in the app "Photo" have the opportunity to align the horizon qualitatively or crop the photo . Here a few of Taps can set the shutter speed , brightness, contrast and more.

There is even photographic filters as in Instagram. Along with iOS developers Photoprogram 8 from the App Store will be able to develop your own filters to the standard application , you simply need to give the go-ahead to use them , tap on the window appears .

The standard Camera application appeared tab Time-Lapse. It is a new mode that lets you capture interesting scenes in the new accelerated format.

Messages



New application "Messages" - it's a killer of all existing messengers of App Store, as WhatsApp, Telegram and others. Let it not happen so quickly, but all to go . Judge for yourself . For example, in the program now have the ability to send instant audio messages . Video, we also can send .

Chats in the "message" is also created in the image and likeness , for example , WhatsApp, only with simplicity and minimalism inherent developers of Apple. Chats can now call it, add / remove buddies or function include "Do Not Disturb" if chat turned to mush from messages. Do you want share location? Easily. DO you want send several photos, videos, audio files? Too easy, they are also lined up in a nice gallery.

Keyboard



8 appeared in iOS predictive text input when the screen falls possible words , when you type the first few letters. The system will not just pour a huge amount of options , no, she's smart. So your iPhone when issuing words will always know whether you are communicating with one another in a message or send an important letter boss.

And most important - Apple has opened the way to the App Store side of the keyboard , so get ready to experience on your iPhone strength and power technology fast typing Swype. Of multiple keyboards in the system can be selected as the main one .

Family Sharing


Family sharing - another functionality that was asking for several years. And boom! It is now available on iOS 8. Now to one account can connect up to six family members and co-buy software, applications, music and more with the same credit card. No longer need to give someone your accounts and passwords, just add a person and you will receive an automatic notification that this person is trying to buy something with your account.

Other built-in programs will also be displayed together with the users of the same account information. For example, will be divided into Photostream photos of each family member can be put on the calendar alert for individuals, as well as watch their location on the map.

iCloud Drive

iCloud Drive - USB flash drive is a cloud with a large volume on which to store any files. In general, as DropBox, only cooler. More information on this functionality can be found on apple home page.

Health



New Health standard application will be the center of all sports applications and software for tracking health. It will store all the information that may be available to your doctor . I understand at the moment is a project - germ, which soon will be actively developed with the help of software developers in the App Store


iOS 8 Review: On iOS, 8 had such a useful system interactions with OS X, when you do not have to approach the iPhone, and Mac can be a conventional headset , smart dropdown notification , comfortable gestures in the mail, a list of favorite contacts in the list of running applications, and much more . Changes just a million and they will be presented in our traditional large-scale survey iOS 8 with screenshots and videos. The system is already actively tested on iPhone 5/5s.

How to Install iOS 8 Beta

iOS 8 logo
Apple unveiled iOS 8 at WWDC 2014 Keynote address earlier today, which includes a number of new features and improvements such as interactive notifications, support for third-party keyboards, widgets in Notification center and lots more.

The best source for iOS 8 beta downloads

We are going to update this article time by time with more iOS 8 beta downloadlinks for our readers. User can easily download iOS 8 betas from here with direct links. iOS 8 beta download links from Apple are limited only to developers, but these links are hosted on third-party servers to let general users install iOS 8 updates on their devices.


iOS 8 Beta 1 Download Links (Mirrors):

iPhone –  iOS 8 beta Download:

Download iOS 8 beta 1 for iPad Devices