New Scripts in Exchange 2010 SP2

New Scripts in Exchange 2010 SP2

As with most Microsoft Exchange Service Packs and some Update Rollups, Exchange Server SP2 introduces six new scripts that are useful to manage and monitor your Exchange organization.

All the canned Exchange scripts are located in the %ExchangeInstallPath%\Scripts folder (normally, C:\Program Files\Microsoft\Exchange Server\V14\Scripts). You can easily change to this folder within the Exchange Management Shell (EMS) using the command cd $exscripts. It looks dirty, but it’s not. 🙂

The six new(ish) Exchange Service Pack 2 scripts are:

  • ConvertOABVDir.ps1 – This script will convert the OAB virtual directory to an IIS web application, as well as create a new application pool called MSExchangeOabAppPool. Converting the OAB virtual directory is necessary to support different authentication methods like Kerberos and Certificate authentication. You need to execute this script on each Client Access Server. Ross Smith wrote about this script in his article, Recommendation: Enabling Kerberos Authentication for MAPI Clients.
  • ExPerfwiz.ps1 — Use this script to help automate the collection of performance data on Exchange 2007 and Exchange 2010 servers. It is no longer necessary to pick the correct counters for the Exchange Server Roles that are installed, as this script will automatically detect the roles installed and will add the appropriate counters for each role detected. This script was previously available on MSDN.
  • LargeToken-IIS_EWS.ps1 — This script and the following script, LargeToken-Kerberos.ps1, were actually released in Update Rollup 4 for Exchange Server SP1. LargeToken-IIS_EWS.ps1 increases the value of the MaxFieldLength and MaxRequestBytes IIS parameters on all CAS servers in the Active Directory site. In addition, it changes the EWS Web.config bindings on Exchange 2010 SP1 and the CAS servers. See the article, You cannot view the free/busy information of users in a mixed Exchange Server 2007 and Exchange Server 2010 environment for more info.
  • LargeToken-Kerberos.ps1 — This script sets HKLM\System\CurrentControlSet\Control\Lsa\Kerberos\Parameters values MaxPacketSize to DWORD 1 and MaxTokenSize to DWORD 65535 on all machines in the domain (or on specified machines). See New resolution for problems with Kerberos authentication when users belong to many groups for more information on these keys.
  • MessageStats.ps1 — I learned about this script by rock star Neil Johnson in MCM training from the man, himself. It’s a super-fast script replacement for the Exchange Server Profile Analyzer tool. It gathers user profile data for Exchange Server 2003 and 2007 including messages sent per mailbox per day, messages received per mailbox per day, and average message size. See Neil’s blog article, User Profile Analysis for Exchange Server 2010 (Who needs the Exchange Profile Analyzer?) for more details.
  • Reenable-AuditLoggingAgent.ps1 — On Exchange 2010 RTM, if you run “Setup.com /prepareAD” to upgrade to Exchange 2010 SP1, the “Admin Audit Log Agent” gets disabled. It will not run again until the SP1 installation has completed, meaning that admin auditing will not be captured. This script fixes that issue by rolling back msExchVersion of the agent in Active Directory. Note: The issue goes away once SP1 installation is complete.
Posted in Computers and Internet, Uncategorized | Tagged | Leave a comment

UAG DirectAccess monitoring and troubleshooting in UAG 2010 SP1

UAG DirectAccess monitoring and troubleshooting in UAG 2010 SP1

After deploying your UAG DirectAccess environment, you need to ascertain that it’s up and running, and is providing the remote access as planned. There are a few things you’ll want to check:

  • Are all the relevant services up and running? Were there any failures?
  • Are there users currently connected to the system? Are they hitting any errors?
  • A user reports that he or she had trouble connecting yesterday evening – how can you know what happened?

Fortunately, the new DirectAccess logging and monitoring functionality provides answers to these questions. Starting from SP1, UAG supports out-of-the-box logging and monitoring functionality for DirectAccess user activity, based on the TMG SQL logging infrastructure.

 

What’s new in UAG DirectAccess logging & monitoring?

In SP1, we augmented the existing UAG monitoring tool (Web Monitor), with real-time DirectAccess monitoring information. Two new screens were added: DirectAccess Monitor – Current Status, and DirectAccess Monitor – Active Sessions.

DirectAccess Current Status screen displays a “SCOM-like” health indication of UAG DirectAccess servers and relevant DirectAccess sub-components. On this screen, you can see whether the UAG DirectAccess servers in your deployment are configured for DirectAccess, and that all relevant sub-components (DNS64, IP-HTTPS, etc.) are up and running. Everything is presented at the array level so that the admin can access all the information from the console of any array node.

1

Figure 1: DirectAccess server health status screen

DirectAccess Active sessions screen presents the list of DirectAccess sessions currently connected via all UAG DirectAccess array nodes. You can see a list of currently logged on users, access level (infrastructure or intranet), NAP health status, machine account, user account, and other fields.

2

Figure 2: DirectAccess active sessions

Web Monitor is useful for monitoring the current state of your DirectAccess deployment. In order to search across DirectAccess sessions that occurred in the past, you can use either the user monitoring PowerShell snap-in or the TMG SQL log viewer. The user monitoring PowerShell snap-in now presents the user and server monitoring information at the array-level, without enabling the Security Auditing event logs.

3

Figure 3: TMG log viewer displaying DirectAccess events

 

 

How does it work?

At the beginning of a DirectAccess session, the DirectAccess client and UAG DirectAccess server establish security associations (SAs). This is a security agreement with which both computers agree on how to exchange and protect information transferred during the DirectAccess session. You can see the configured and currently opened SAs on the “Windows Firewall with Advanced Security” screen.

The UAG DirectAccess logging mechanism monitors the currently opened SAs, and uses the SA info to log and monitor DirectAccess user activity. Changes in session state are written to the SQL log for persistency. Errors encountered during the session (e.g., “a smartcard wasn’t provided”) are also monitored and written to the SQL log. In this way the logging mechanism collects and stores information about DirectAccess sessions that can be subsequently viewed on the Web Monitor DirectAccess Active Sessions screen, or via the PowerShell snap-in or TMG log viewer.

 

What else?

What happened to DirectAccess user monitoring mechanism supported in earlier UAG releases? What is the difference between the new mechanism and the old one?

The DirectAccess user monitoring mechanism supported in Forefront UAG 2010 RTM (TechNet article here) was based on IPSec logging messages printed to the Security event log. The new SP1 implementation doesn’t require IPSec logging to be enabled, but rather collects the required SA information programmatically. The PowerShell snap-in was re-designed to work over the new infrastructure for both current and historic sessions. The snap-in was also augmented to include server health info.

 

How do I enable the new DirectAccess logging and monitoring feature?

DirectAccess logging and monitoring functionality is on by default. It collects DirectAccess events from the moment DirectAccess is configured and running on a UAG SP1 machine. Note that SQL logging is mandatory for DirectAccess monitoring functionality, so make sure it’s not disabled on your system.

 

Where can I find more info on this feature?

See http://technet.microsoft.com/en-us/library/gg313780.aspx for more info on UAG DirectAccess logging and monitoring, including information on the different PowerShell snap-in parameters.

 

Posted in Computers and Internet, Techie Hobbies | Tagged , , | Leave a comment

On a DA client, the DCA shows a red X or a yellow exclamation mark even when the connection works fine.

On a DA client, the DCA shows a red X or a yellow exclamation mark even when the connection works fine.

A common situation with UAG is that when a DA client connects, he sees a red X or a yellow exclamation mark even when the connection is actually working fine.

This type of thing can happen if you have configured the DA connectivity verifiers to use the URL of the NLS server. The NLS server is normally listed as an exclusion in the NRPT, because we need it to not be available to DA clients, as its unavailability is what triggers the DA client to initialize the DA connection:

clip_image002

This issue sounds like a problem with the connection itself, but we can see it is not because client can clearly connect to other internal resources, and so the DCA error is a false-negative.

This is rather simple to address. Simply use a different server as a connectivity verification method!

To do this, follow these steps:

1. Open the UAG Configuration console

2. Go to the Client Connectivity Assistant Configuration

3. Go to page 2 of the wizard – “Connection Verification”

4. Remove the NLS URL, and add in a different server that should be available (the organization’s SharePoint server, or some other website, perhaps)

5. Complete the wizard

6. Activate the configuration.

7. Re-run the Group Policy script on UAG, and deploy the new policy to clients.

Here are some additional resources which talk about NLS and NRPT in details:

http://technet.microsoft.com/en-us/library/gg502552.aspx

http://blogs.technet.com/b/tomshinder/archive/2010/04/02/directaccess-client-location-awareness-nrpt-name-resolution.aspx

http://blogs.technet.com/b/tomshinder/archive/2010/04/06/when-good-network-location-servers-go-bad-preparing-against-nls-failure.aspx

 

Posted in Computers and Internet, Techie Hobbies | Tagged , , | Leave a comment

Peeling back the onion on HP-FEX

Peeling back the onion on HP-FEX

http://virtualeverything.wordpress.com/2011/10/24/peeling-back-the-onion-on-hp-fex/

Recently, HP and Cisco in collaboration released a FEX module for the HP C7000 chassis. See here and here to read about the release from both HP and Cisco’s perspective. This post is not to discuss the business decisions behind this product release, but rather to take a closer look at the HP-FEX architecture from a technology perspective.

First off all, what the heck is a FEX? Read here  and here for some background on the term.

Now, with that out of the way, lets take a look at the networking architecture when deploying HP blade servers.

HP’s leading interconnect architecture is known as Virtual Connect FlexFabric. There are two main components to this:

  • server profile virtulization: Virtual Connect Service profiles allow one to take attributes of a server such as WWNS, MAC addresses, FC boot parameters, etc and store them as a software construct, thus making the hardware itself “stateless”. The Cisco UCS analog to this would be Service Profiles. For a deep dive into the differences, see here
  • virtualizing the 10Gb adapter port: allowing one to present up to 4x NICs to the host OS with traditional Flex10 or 3x NICs and 1x FCoE with FlexFabric interconnects. Cisco’s analog to this would be their “VIC” card which allows one to create up to 256 vNIC and vHBA and present them to the host. There are some technical differences between Flex-10 and Palo, but that is not the focus of this post either. Plenty of information out there on that subject easily available via Google.

First, lets take a look at what a HP BladeSystem architecture utilizing Virtual Connect FlexFabric architecture could look like:

The components here are 1x C7000 chassis with 16 blades utilizing FlexFabric interconnects and intgrated FlexFabric LOMs which give 2x 10Gb CNas per blade. The bottom most diagram represents a logical view from the OS perspective of a single blade. FlexFabric allows the administrator to divide a single 10Gbps CNA port into 4 devices: 3 NICs and 1HBA or 4 NICs. In this case, we have chosen 3 NICs and 1HBA to illustrate the FC/FCoE case. The operating system sees a total of 8 devices, 4 per CNA port. The OS communicates with the CNA as if it they were traditional NICs and HBAs. The FlexFabric LOM then combines these the NICs and HBAs into a FCoE stream and sends it through the midplane of the chassis up to the FlexFabric interconnects. The FlexFabric interconnects then split the FCoE traffic into their traditional Ethernet and Fiber Channel via seperate ports and send them upstream out of the chassis. In this case, a pair of Nexus 5Ks is used which has the ability to house both LAN and SAN ports. This Nexus switch could also uplink into a “core” LAN/SAN. Many architectures are possible upstream. Note that while the LAN connections are cross connected between switches, the SAN connections are *NOT*. This is because traditional fiber channel design relies on this “air-gapped” connectivity to maintain 2 separate fabrics.

Let’s contrast this with a HP BladeSystem deployment utilizing the B22HP-FEX:

This block diagram is very similar. The bottom most figure represents a logical view of a blade from an OS perspective. Unlike the FlexFabric configuration, when utilizing HP-FEX, the administrator does NOT have the option of creating 4 individual devices per CNA port. It defaults to a “regular” CNA adapter presenting one NIC and 1 HBA per port. The administrator will have to use other means of providing QoS since all the LAN traffic will travel through a single interface on the OS side. The classic example is creating multiple interfaces for VMware deployments — service console/VMotion, Production VM, backup etc. Another notable difference is the traffic is FCoE out of the chassis, where as in the FlexFabric design, it was getting broken out into its LAN/SAN counterparts. In this example I used the same number of ports for the upstream connectivity. The B22HP-FEX talks FCoE to the upstream 5Ks, which can then connect into “core” LAN/SAN infrastructures in larger deployments.

Notable differences between the architectures:

  • in the FlexFabric deployment, you have the option of creating up to 4 interfaces per CNA port. On the FEX design, you do not have this capability.
  • the service profile features offered by Virtual Connect is available in the FlexFabric deployment, but not in the B22HP-FEX deployment. This is a big deal since one of the major selling points to a HP BladeSystem is the ability to utilize Virtual Connect to abstract away the server hardware.
  • in the FlexFabric deployment, you have to decide up front how many Ethernet and Fiber Channel connections you want upstream of the chassis. In the FEX design, since the traffic leaving the chassis is FCoE, you do not have to make physical wiring changes in order to allocate LAN/SAN bandwidth — it can be done via SW in the upstream Nexus 5Ks
  • both the FlexFabric interconnects and B22HP-FEX offer 2:1 oversubscription — meaning there are 16 ports downstream, 1 per blade; and 8 ports up stream or .5 per blade. However the ability to utilize vPC in the FEX on all the links allows MUCH better utilization of the links. Because some (2) of the FlexFabric connections will be chewed up for chassis interconnects to create a single virtual connect domain, you actually have a higher (worse) over subscription ratio in the FlexFabric case.
  • from a points of management perspective, the B22HP-FEX interconnects are not managed individually. They act as remote line cards in the 5K (just like the standard Cisco 2000 series FEX). Each FlexFabric interconnect (pair) on the other hand is a point of management

The lack of blade profile virtualization is a MAJOR downside to utilizing the FEX in HP BladeSystem. I don’t think anyone will argue that the FEX based network architecture is cleaner and simpler ESPECIALLY at scale; but customers will have to choose between a superior network arcthiecture, or the benefits that come along with blade profile virtualization…. unless they decide to go with Cisco UCS, in which case they can have both. ;) That being said, there are clear advantages and disadvantages to going with either design, so its going to be up to the customer to decide what is more important to them.

Posted in Computers and Internet, Techie Hobbies | Tagged , , , | Leave a comment

DIY outdoor all-weather 3G/Wi-Fi router

DIY outdoor all-weather 3G/Wi-Fi router

 Source: http://make-a-project.blogspot.com/2011/10/diy-outdoor-all-weather-3gwi-fi-router.html

My father lives in the village where no broadband connection is available. To access Internet he used creepy and hell expensive GPRS connection. Once tired by absence of normal connection and impossibility to show him some video on youtube I decided to make something to resolve this nonsense. At that time I was aware few neighbors of him are using 3G USB modems with Yagi antenna attached. After small research USB modem was bought to do the same. Unfortunately first attempts to connect to the network using solely internal antenna was complete failure. But when I was outside house and connected 1/4-wavelength long piece of copper wire into modem’s antenna socket, I was able to connect to the network.

Due to impossibility to make connection from the house, first more or less working solution included wireless router with USB port (at the time one of the cheapest TP-Link TL-MR3220) that was located in attic and this fascinating wire antenna:

It's how broadband looks far away from the city

Surely I was able to connect modem directly to PC using only external antenna and USB extension cable, but I have reasons to go wireless. To name a few:

  • I and my nephew have wi-fi enabled devices (phones, laptops, ipods, etc.) we would like to use them anywhere in the premises. So this hotspot will serve not only standalone desktop PC, but any wireless device in range.
  • I didn’t wanted use PC as a router as it often turned off because is a little loudly and located in the living room.
  • While drilling in the attic was OK, inside cabling will be a pain. Wireless access from desktop is a real saving and relief.

Few weeks after installation I visited father again and found that:

  1. Iron roof coating does not allow to connect my laptop to Wi-Fi access point from most of the courtyard;
  2. Summer happened (oops!) and under iron-coated roof heated by direct sunlight daylight temperature is more than 50° C (122° F) and router together with modem become really hot; it was promising nothing good;
  3. Connection rather unstable and disappears from time to time; though demonstrates not so bad performance, up to 0.5/0.2 Mbit DL/UL.

Inspired by performance measurements I decided to make more reliable solution with better antenna and install it outside of the house to avoid overheating.

I started with a search of the case that will be able to accommodate all required components. But I found that cases in stores either hermetically sealed (which is unacceptable in my design because of airflow is required to cool components) or does not provide adequate protection from harsh conditions and mostly expensive (appropriate sizes starts at around US $50 equivalent for the IP55 rated box). Thus I decided to go with own case design and manufacturing.

First of all I made plastic sheet bender out of nichrome wire strained between two long screws secured in the wood plank and 12V/10A power supply with alligator clips. Heat intensity was regulated by moving alligator clips along the wire. Then I used it to bend two 45cm*70cm big polystyrene sheets into shapes pictured below.

Polystyrene sheets bent into weather protective case

Polystyrene was chosen because of its availability, low cost and good frost resistance as in our region frosts under -20 degrees C are rather usual during the winter.

Protective case drawing

Plastic sheets were bent according to this drawing to form two parts (base/roof and lid) of protective case. You may refer to the previous image for resulting shapes. All sizes in millimeters.

Take into account that it’s impossible to bend relatively thick (mine is 3 mm) plastic to have sharp corners. So you should consider resulting slightly rounded corners when perform bending and maybe introduce some tolerances into design. I used bottom cutouts to make exact fit between lid and the base part.

Protective case preview

After bending lid and base was put together, secured, and four 3.2 mm assembly holes was drilled on the sides to keep resulting case in one piece. Later I drilled 6 mm holes on each side to hang the box on two crews screwed into the wall.

Assembly mounting

To make assembly more convenient I screw M3 screws and nuts together through mounting holes of the base and then melted nuts into base’ plastic using hot soldering iron. To completely secure the nuts in the base I used small amount of cyanacrylate momentary glue.

Additional insulation

To protect internal space from humidity, ventilation holes are made in the places that are safe from water sprays, but everything else should be securely insulated. I have used self-adhesive insulation ribbon for doors/windows sold in hardware store.

Ventilation

80mm cooler from broken ATX PSU was used for forced ventilation. I had drilled 12 mm vent holes first then glued sparse silkscreen mesh from inside to protect internals from insects. From my experience bugs are more dangerous for electronics mounted outdoors than water and frosts.

Heater

To heat electronics during winter frosts I decided to use two ceramic 10W, 10Ohm resistor connected in series. Total power dissipation at 12V will be 7.2W

"HVAC" system mounted

All ventilation and heating components mounted on the lid. I added two LEDs to indicate when heater or fan is on but it is not really necessary. I often use melting glue gun to mount different parts as it is done in this case: both LEDs and controller glued to the lid with a glue gun.

"HVAC" controller

To control cooling (fan) and heating (resistors) I prepared very simple circuit consisting of comparator, few resistors, 10K NTC thermistor and dual N-Channel MOSFET transistor. Comparator forms inverting and non-inverting Schmitt triggers. I calculated resistors values for this circuit using online calculators on Random Science Tools and Calculators site to turn on fan when temperature is more than 30 degrees C and turn it off if T below 27 degrees C. Heater respectively turns on if T is below about 3 degrees C and turns off when it rises more than 7 degrees C. Numbers are approximate, but tests showed I hadn’t missed anything.

Controller powered directly from 12V/1A wall PSU.

Schematics of “HVAC” controller:

"HVAC" controller schematics

BOM:

  • IRF7103 SO-8 dual MOSFET 50V, 3.0A
  • LM393 SOIC-8 dual comparator
  • 0.1uF C0805 ceramic capacitor
  • 1uF C0805 ceramic capacitor
  • 3x Molex 2-pin polar connectors 0.1″ step
  • 10K NTC thermistor R0805
  • 33K R0805 resistor
  • 39K R0805 resistor
  • 330 R0805 resistor
  • 2x 10K  R0805 resistor
  • 56K R0805 resistor
  • 22K R0805 resistor
  • 330K R0805 resistor

Bottom ventilation/drain

To ensure drainage in case water forced inside, meshed vent holes located on the bottom of the case also were drilled. Here SMA/RP-SMA connectors for Wi-Fi and 3G antennas and cable input for power supply located as well.

Novatel U720 modem

To access Internet I bought Novatel Wireless Ovation™ U720 EV-DO Rev A USB modem and data plan from local provider who is working in 800 MHz band using CDMA EV-DO Rev.A technology.

Novatel U720 modem mod

I have ordered few MS-147-to-SMA pigtails for external antenna connector but all received parts had in fact DB9 connector that does not fit on connector. So finally I disassembled the modem and made small mod by connecting commonly available U.FL-to-SMA pigtail directly to PCI-E card instead of wire connector to MS-147. U720 in fact is USB to PCI-E adapter plus PCI-E EV-DO modem.

Slim Jim antenna etching

As reception of CDMA network signal in the area where box will work is very poor, I decided to create external antenna.

I had used Slim Jim antenna calculator to calculate dimensions required for CDMA 800MHz band. CDMA 800 terminal node uses following frequencies according to modem user manual:

  • Transmit 824.7-848.31 MHz
  • Receive 869.7-893.31 MHz

I made calculation for mean frequency between 824.7 and 893.31 MHz. Then I draw the shape in design software and etched it on FR4 board to ensure correctness of the sizes and shape.

I hadn’t 30cm long etching tank so I used paper box and polyethylene film to make temporary etching container. I used direct toner transfer method for PCB artwork preparation and ferric chloride as etchant.

Antenna in enclosure

To protect antenna and ease its mounting I put antenna board inside 30cm long 1/2″ PVC plumbing pipe and put stubs on both sides. There are SMA connector on one side to connect extension cable I made using connectors and RG-316 low loss coaxial cable bought on eBay. Both stub caps are sealed with melted glue.

All router components together

Here you can see all router components together. Here goes list of all components and approximate prices in USD:

  1. 2x 45cm*70cm polystyrene sheets – $15
  2. Self-adhesive insulation ribbon for doors/windows – $3
  3. 80mm computer fan – $3 (Mine is scavenged from broken PSU, no cost for me)
  4. HVAC controller board components and FR4 – $5 (not sure as I bought only thermistor and resistors/caps and this is few cents; everything else were scavenged from old PC motherboards and FR4 I had before and don’t recall the price, but it is very small piece and also should cost few cents)
  5. Heater (2x 10W ceramic resistors) – $1.5
  6. PVC pipe, caps, pipe clips, SMA connector and FR4 for antenna – roughly $10
  7. RG-316 coaxial cable (~10’/3m) and connectors – $10
  8. Cable input and pair of screw clamps – $2
  9. 2x pigtails (U.FL/SMA, RP-SMA male/female) – $8
  10. Tripple power socket – $3
  11. 12V/1A wall PSU – $5 (I have few of them for free from old equipment)
  12. Novatel U720 USB CDMA Rev.A modem – $40
  13. TP-Link TL-MR3220 3G/802.11b/g/n wireless router – $40
  14. Collinear Wi-Fi antenna for 2.4 GHz band – $12
  15. Melted and cyanacrylate glue, double-sded adhesive tape, nylon cable ties etc. – $5

TOTAL: around $160

In total I had spent about 16 hours in total for design, production and assembly of final product.

There are notes on the flikr to help identify components.

Below you may find photos of assembled box:

Assembled box, bottom

Assembled box, front

Wi-Fi box mounted

Wi-Fi box was mounted on the pediment of the house on Nord-West side of the house. Top Internet speed I witnessed was 0.9/0.4 Mbps DL/UL according to speedtest.net using CDMA EV-DO Rev.A connection. In the area where box is working, connection using solely internal modem’s antenna is not possible.

Posted in Computers and Internet, Techie Hobbies | 1 Comment

Pray for the innocent

The killing of children is a horrific, despicable act, yet Israel condones it
IMEMC, Celine Hagbard – Every Palestinian group has harshly condemned the murder of a family sleeping in their beds in Itamar settlement last Friday, as well they should.

So why is there no equivalent renunciation by the Israeli government of its military, which kills children on a regular basis? Why, instead, did an Israeli internal investigation, which released its findings just two weeks ago, say that a 2002 missile strike in Gaza that tore apart the small bodies of 8 children asleep in their beds was ‘justified’, and that there was ‘no wrongdoing’ committed by the perpetrators of this horrendous act? (http://www.imemc.org/article/60728)

The killing of children is never justified! Under any circumstances! Why does the Israeli government condemn the killing of children when the victims are Israeli Jews, and allow the killing of children when the victims are Palestinian Arabs? This kind of double standard is blatantly racist and unjustifiable.

Why is someone like Rabbi Dov Lior, who said just last month that the killing of non-Jews, even children, is allowed under Jewish law, allowed to remain in his post as the Chief Rabbi of the Kiryat Arba settlement in Hebron, in the southern West Bank (http://www.imemc.org/article/60606)? Even Hamas, among the most extreme of the Palestinian resistance movements, condemns the killing of children under any circumstances.

In 2007, a year which saw 92 Palestinian children killed (thankfully, no Israeli children were killed in 2007), Israeli reporter Gideon Levy wrote these words about a tour he made of the Gaza Strip: “The day after Rosh Hashanah we traveled to Rafah. Dam Hamad, 14, had been killed in her sleep, in her mother’s arms, by an Israeli rocket strike that sent a concrete pillar crashing down on her head. She was the only daughter of her paralyzed mother, her whole world. In the family’s impoverished home in the Brazil neighborhood, at the edge of Rafah, we met the mother who lay in a heap in bed; everything she had in the world was gone. Outside, I remarked to the reporter from French television who accompanied me that this was one of those moments when I felt ashamed to be an Israeli. The next day he called and said: “They didn’t broadcast what you said, for fear of the Jewish viewers in France.” (http://www.haaretz.com/weekend/magazine/twilight-zone-t…30132)

And this is not to mention the 3-week long invasion of Gaza in 2008-9, in which Israeli troops killed 1400 Palestinians, 335 of whom were children. These children have as much of a right to be humanized, memorialized and remembered as the Fogel children: Yohav, 10; Elad, 4; and Hada, 3 months. Each of the 335 children killed in that invasion have names, families, siblings, parents. Why are their lives not worth reporting? Less than twenty of these children were even named in media reports of the invasion. They were killed in the most despicable, inhuman ways, living in sheer terror as Israeli bombs and tanks attacked their neighborhoods for three weeks straight.

In just one incident, 12 children, including 10 siblings from the Rayan family were killed along with their parents in a missile strike on their home in Jabalya refugee camp by Israeli forces on January 1st, 2009. These children: Asad, 2; Aisha, 2; Reem, 4; Halima, 5; Maryam, 5; Abdul-Rahman, 6; Abdul-Qader, 12; Ayah, 12; Zainab, 15 and Ghassan, 16, were as innocent and undeserving of their cruel death as the Fogel children.

Kids like Hamza abu-Maria, age 7 months, who was killed on May 9th 2010 in her home in Beit Omar village, in the southern West Bank, when Israeli troops fired CS gas at non-violent demonstrators at a protest near her house.

Why is it that some children’s deaths are deemed more worthy of media attention than others, and more deserving of condemnation?

Why does the Israeli government say, and the US media repeat, the contention that the last six years have been a period of ‘relative calm’ in the Israel-Palestine conflict, when 733 Palestinian children have been killed by Israeli soldiers and settlers in that time period? Is it because only 20 Israeli children were killed in the same time period?

None of these children’s deaths are acceptable! By de-emphasizing the lives of Palestinian children, we are excusing the actions of their killers, who are, in the words of Israeli President Shimon Peres (in reference to the killing of the family at Itamar), absolute animals. This is the same President Peres who said, about the Israeli invasion of Gaza in 2008, “As a nation, there is wholehearted support for the army, the way they handled it, their restraint, their discrimination, and their responsibility.”

Why, in the eyes of Peres and other Israelis, and in the reporting by the US press, are Palestinian children’s lives somehow expendable, and their killers somehow justified in murdering them? The main debate in the Israeli press about the killing of Palestinian children during ‘Operation Cast Lead’ was the question of what this would do to Israel’s image — no one even questioned the act of killing children itself, let alone call the perpetrators ‘animals’.

As Hanna Issa, the Director-General of the Palestinian Ministry of Justice, put it: “Murder is murder, period. I don’t believe that Israel stands on a higher moral ground just because Israeli soldiers are dressed in khaki and use F-16s, apache helicopters and flechette shells to kill and maim Palestinian children while Israeli civilians are killed by suicide bombers.”

B€€FY

Posted in News and politics | Tagged | Leave a comment

How to Boost Your Wi-Fi Network Signal and Increase Range with DD-WRT

How to Boost Your Wi-Fi Network Signal and Increase Range with DD-WRT

banner

Wireless is really convenient until you drop your connection or get really low speeds. Thanks to DD-WRT, it’s easier than ever to extend your home networks range with a few simple tweaks and a spare router.

DD-WRT is a fully feature-packed alternative firmware for your router. If you don’t know what it is or how to get it on your device, you should start off with Turn Your Home Router into a Super-Powered Router with DD-WRT.

Boosting Your Signal

Fire up your web browser and direct it to your router’s configuration page. Go to Wireless > Advanced Settings.

tx power

There are three settings of interest, the first being TX Power. This is the broadcasting power of your transmitting antenna. The default is a safe value of 70, but we can kick it up a bit. Most people report that jumping up to a 100 is safe. Pushing it higher can cause excessive heat which can damage your router. I don’t have to worry about that since my “server area” is cold and I’m also a bit reckless, so I kicked mine up to 150. It’s been that way for a few weeks and I haven’t had a problem yet, but your mileage may vary. Use your common sense and discretion.

Next up is the Afterburner setting. If your wireless router and adapters support Afterburner – also known as SpeedBooster, SuperSpeed, Turbo G, and G Plus (but not Super-G) – you can enable this to get a boost. Things may slow down if they don’t support it, though, so be sure to do your homework. B-only devices won’t see any problems and N-based devices shouldn’t be negatively affected, either.

Finally, we get to Bluetooth Coexistence Mode. If you use bluetooth a lot, then you may have noticed a drop in reliability or speed with both wireless and bluetooth devices. Turning this setting on should keep the two from interfering too badly with one another.

Use a Spare Device as a Repeater

Most of us have upgraded our networks with new routers over the years. If you have your old one lying around, why not throw DD-WRT on it? I had a spare Linksys wireless access point, but after putting alternate firmware on it, I had a full-blown router on my hands. We can put our spare device to work as a repeater, which can act as a range-extender for a new section of your house or yard.

Under Wireless > Basic Settings, change the mode to Repeater.

repeater

You’ll see two sections, Wireless Physical Interface (wl0), and Virtual Interfaces (wl0.1). The physical interface is going to be receiving the signal from your main router. Plug in the SSID, configure the network mode, and decide if you wanted it to be bridged (connected with the old network) or unbridged (isolated from it). Next, come up with a new SSID for your repeater. This way, you can choose which access point to use, depending on where you are.

Click on save, then go over to the Wireless Security page.

wireless security

Enter the wireless security settings for your main router, then enter the details for your new repeater’s signal. Lastly, we need to make sure that your repeater is connected to your main router. To do that, go to Status > Wireless.

status

At the bottom of the page, you’ll see a button that says Site Survey. Click on it.

site survey

Find you main router’s wireless SSID and click Join. That’s it! Place your repeater on the other side of your house, but not so far that it doesn’t get a good signal. Then, you can connect to your new repeater and test it out.

Use Your Repeater as a Wireless Receiver

An added benefit of DD-WRT is that you can configure your repeater to act as a wireless receiver for a computer that doesn’t have one. Return to where you configured the repeating function, under Wireless > Basic Settings.

repeater bridge

Change the mode to Repeater Bridge. Now, you can plug in a device into the router’s ethernet ports and it’ll act just like it’s wired into your main router. If you’re not using it then you should turn if off, as it can cut your bandwidth otherwise.

If you’re looking to speed up browsing, Removing Advertisements with Pixelserv and Find a Faster DNS Server with Namebench can both help your cause – with or without extended ranges – thanks to DD-WRT.

Posted in Techie Hobbies | 1 Comment

Iran’s Biggest Secret

Iran’s biggest secret: the skiing’s great

Sick of the braying hordes of Meribel and Val d’Isère? Looking for a more exotic ski holiday? Then head for Tehran. Comedian Dom Joly finds beautiful peaks and great powder in the heart of the Axis of Evil

Dom Joly
Dom Joly hits the slopes in Iran

It all started with a photograph in a magazine I picked up in a Parisian dentist’s waiting room. Anyway, I was flicking through the pages when I saw this great photo. It was of two women in full burkhas, the all-encompassing black robes favoured by women in strict Islamic countries. So far, so ethnic, but these women, so representative of everything that is alien and strange to us about Islam, were skiing. It was a striking image and I had to know more.

Middle Eastern skiing did not come as a complete surprise to me because I grew up and learnt to ski in Lebanon, which has some wonderful slopes. The picture in question, however, was taken in Iran, slap bang in the middle of the Axis of Evil. From the moment I found this out I knew that I had to go and see for myself. It took a while, but eventually, I found myself on a plane bound for Tehran.

I had been a little nervous about the journey, especially after a couple of recent sabre-rattling incidents involving the American navy. Fortunately, David Miliband, our hip young Foreign Secretary, is a Facebook friend of mine, so I sent him a message telling him that I was off to Iran for a ski holiday and would he mind postponing any aggressive actions until my return?

To my delight, he replied almost immediately, warning me not to go near one particular area. As it happened, I was not planning to go anywhere near this site, but that’s the kind of one-on-one service I want from my Foreign Secretary. I was suitably impressed.

I’d nearly not been allowed on the plane after a last-minute security check. The suspicious UK official asked me why I was going to Iran.

‘Skiing,’ I relied cheerfully.

He asked me to accompany him into a little room; I imagine there’s going to be a lot of that from now on whenever anyone spots my Iranian visa. Being born in Lebanon immediately guarantees me an anal frisk at US airports. Now that I’ve got an Iranian visa to accompany my ones from Vietnam, China and Syria, I’ll get an even more interesting reception.

Determined to not worry about the future, I tucked into British Midland’s free onboard champagne with gusto. I wasn’t going to see much more of this for a bit in the totally dry Islamic Republic. Unfortunately, just before we landed in Tehran, we hit some turbulence and I spilt a whole glass over my trousers. This made me very paranoid that I would stink of booze and be arrested and flogged the moment I set foot in the airport. All was well, however, and I managed to slip through unflogged and met up with my charming Iranian guide.

He took me on a little whistle-stop tour of the capital before we set off for my final destination, the village of Shemshak, high in the Alborz mountains.

It would not be unfair to say Tehran is a fairly unattractive city, but it’s full of things to look at and has great museums. I paid a quick visit to the Persian Carpet museum, which was amazing; the doorman said I was the first foreigner visitor for three months and he was unbelievably nice to me. This quickly became a running thread as I met one wonderfully friendly and hospitable Iranian after another.

I checked out the Central Bazaar, where I had lunch in a tiny hole-in-the-wall type place, eating delicious Fesenjan chicken in walnut and pomegranate sauce washed down with sweet tea. Being a bit of a cultural heathen, I must admit that my favourite sights in Tehran were the anti-American slogans daubed on the walls of the old US Embassy. There was great revolutionary stuff such as ‘The United States is too weak to do anything’ and ‘We will make America face a great defeat’. A huge sign above the old entrance to the embassy proclaimed a ‘Great Satan Exhibition’, though when I tried to go and see it I was refused entry and told that it was a prohibited military site. I’m sure I’ll catch it when it transfers to the V&A.

The pièce de rĂŠsistance was painted down the whole side of a block of flats – a huge ‘Down with the USA’ over an American flag with skulls for stars and bombs raining down. My guide was very embarrassed by the whole thing, but I couldn’t get enough of it. Eventually we left the city and headed off in his car towards the impressive mountains that serve as a mighty, snowy backdrop to the Iranian capital.

As is not uncommon in these sorts of destinations, my guide was a big fan of British heavy metal music. I was treated to a track from the new solo album by the former lead singer of Iron Maiden, Bruce Dickinson, famous for such songs as ‘Bring Your Daughter to the Slaughter’. This particular composition was something about swords and warriors and beasts – the usual, awful, heavy metal lyrical content.

My guide was in ecstasy: ‘This Bruce Dickinson, he is great poet yes? He is like English Sufi philosopher.’

I was speechless. There are many things I could call Bruce Dickinson – but Sufi philosopher?

‘You like Judas Priest?’ asked my guide as another godawful song kicked in. This was not the soundtrack I wanted to accompany the staggering scenery we were driving through.

The farther we drove into the mountains, the less I felt the grip of the Islamic state. Here we saw almost none of the endless photos of Ayatollah Khomeini that adorn every wall in Tehran. There were also far fewer women in the all-concealing black burkhas that I’d seen in the photo. When I did spot the occasional one, they looked like fragile black ghosts, only half there and dwarfed by the huge mountains surrounding them.

There were also fewer beards – the obvious sign of devout followers of the Islamic revolution. I’ve always wondered about the relationship between facial hair and revolution. Fidel Castro, Che Guevara, Lenin, Marx, the mullahs in Iran, Frank Dobson – all beardy weirdies. Someone should make an in-depth study … But I digress.

As we neared the ski resorts I began to see more and more western-looking Iranians, some in shiny new cars with visible signs of wealth – something I didn’t see too much in Tehran.

‘Mullahs don’t snowboard,’ said my guide, smiling at me, as though reading my thoughts.

After an hour or so we arrived in Shemshak, at an altitude of 2,550m. The weather was perfect: blue skies and fresh powder on the slopes. I checked into Hotel Shemshak, which was right on the slopes. It looked like an old Austrian ski lodge and had a restaurant and a bar (coffee and soft drinks only, of course) as well as some very smiley staff who seemed thrilled to see me.

A huge poster in the hall proclaimed that it was the duty of a Muslim to look after a traveller and to reimburse him should any of his belongings go missing; all excellent stuff. My room had a balcony that allowed me to look straight on to a piste and you could ski straight out of the front door down to the nearest lift.

The chairlifts were installed by the French in the pre-revolutionary 1970s, but seemed to be in very good working order. As it was the middle of the week, the place was not at all busy, though I was told it gets quite packed at weekends when skiers from Tehran swarm into the valley. I quickly changed and got in a couple of runs before sunset.

The snow was perfect, the views spectacular and I had to pinch myself to remember that I was in Iran. The only hint was the gleam of sunlight off the golden roof of a Shia shrine far down in the valley. Around me everyone was in expensive ski gear, complete with designer shades. The only thing lacking was a couple of glĂźhweins at the two mountain cafes on the piste. I had to satisfy myself with a double espresso.

The following day I drove up to Dizin, the next, and largest, of the ski resorts. It was higher up (2,650m) and a little bit more regulated than the more cosmopolitan Shemshak. Until very recently the slopes were segregated, with women skiing on one side and men the other and a big fence plonked down in the middle of the mountain. This turned out to be pretty unenforceable as none of the religious police who monitor this sort of thing could ski.

The lifts, however, were still segregated, with two lines, one for women and one for men. It was also illegal for men and women to share a gondola. That said, the place was still very carefree, and at a cafe halfway down one of the pistes everybody mingled happily, knocking back coffees and smoking like it was going out of style. House music was playing on the outdoor PA, with a female singer, another thing that is technically illegal: apparently a lady singing could arouse me too much. As with lots of things in Iran, everybody just turns a blind eye.

Most people on the slopes were skiers, though there was a small community of snowboarders. The whole place is incredibly cheap by western standards too, though locals complained that

a day’s skiing was now the equivalent of ÂŁ8 rather than the ÂŁ2 it cost until recently.

Overall, the skiing was superb everywhere I went. I was incredibly lucky with the weather and had sun and blue skies every day. The pistes are varied and interesting enough to keep an average skier happy for a week or so, and the off-piste skiing is amazing and very challenging. I didn’t see a single westerner during my whole stay. Personally I loved this, but it might freak out some people. A journalist for a Norwegian ski magazine wrote about some of the fabulous off-piste skiing in this area of Iran and for a couple of years it became quite the hip spot for young Norwegians, but they have all now moved on to Kashmir so you’ll have the place to yourselves.

I even solved the no drinking problem with extreme ease – but can’t go into this too much as I would get some of the Iranian home-brewers I met into trouble. Suffice to say that there was no shortage of refreshments should they be needed.

On my last night, after a meal of lamb and aubergine stew served with mountains of rice and sweet tea, I retired to my room. I was just stretching my weary body when I heard something outside. I opened the door and stepped on to my balcony.

About 100m away on the empty, floodlit piste sat two huge grey wolves, howling at the bright moon. The Sufi poet Bruce Dickinson would have loved it. The wolves must have heard me because they stopped their howling and, for a second, our eyes met. Then the sound of a muezzin calling the faithful to prayer filled the steep valley, echoing around the still, moonlit mountains. The wolves bolted into the darkness; I shivered and stepped back inside.

There are tiny moments in life that you know will stay with you forever.

&middotl Dom Joly travelled with Persian Voyages (01306 885894; persianvoyages.com). It can organise an eight-day tailor-made itinerary including visits to Dizin and Shemshak, flights, accommodation, transfers and breakfasts, from ÂŁ1,050. Eight-day non-skiing trips visiting Tehran, Esfahan and Shiraz cost from ÂŁ1,150.

Dom flew with British Midland (0870 6070 555; flybmi.com) which recently launched daily flights from Heathrow to Tehran (from ÂŁ481 return) as part of an expansion to 17 new destinations across the Middle East, Africa and Russia.

Sixty-second guide to Iran

Is it safe?

Yes, despite the embarrassing incident with the Royal Navy, and violent protests outside the British Embassy, in general Iran is very safe for tourists. Street crime is low. The Foreign Office says the main incident British nationals required consular assistance with in the country in 2006 was lost or stolen passports. It warns against going within 100km of the border with Afghanistan and 10km of the border with Iraq, and of the general possibility of terrorist attack. It also notes that there are lots of accidents in Iran caused by reckless driving.

Do I need a visa?

Yes. They can be obtained in person from the Embassy of the Islamic Republic of Iran at 16 Prince’s Gate, London SW7, open Monday to Friday 12.30 to 4pm. Tourist visas are valid for 30 days and cost ÂŁ73 for British citizens. Alternatively, several agencies can apply for a visa for you: call the embassy on 020 7225 3000 for details. The process takes about three weeks.

Is the skiing any good?

There are two main ski resorts in Iran, Dizin and Shemshak, both less than two hours’ drive from Tehran. While lifts are older than in Europe and the ski areas aren’t as extensive as the Alpine mega-resorts, the resorts are high and snow conditions can be excellent. Iranian’s don’t tend to venture far off-piste, so experts will find little competition for fresh powder.

Which resort should I pick?

Shemshak in the Alborz mountain range is more suitable for expert skiers and snowboarders. At 2,550 metres it is the lower of the two, but the lifts take you to over 3,000 metres and the slopes are steeper. Dizin is the largest ski area and is more developed, with good terrain for beginners and intermediate skiers too. The resort is at 2,650 metres (a full 350 metres higher than Europe’s highest resort) and the lifts reach 3,600 metres. There are great views to Mount Damavand too.

What else is there to do?

Tehran has some great museums and palaces, but most Western visitors rush off to see the beautiful old Persian capital of Esfahan, south of Tehran, which is famed for its magnificent mosques covered in exquisite blue mosaic tiles, decorative bridges and sprawling bazaar. If you have time, you should also visit the ancient towns of Shiraz, Persepolis and Yazd.

How long is the flight?

About five hours; Tehran is three-and-a-half hours ahead of the UK.

 

Posted in Travels | Leave a comment

The science of skiing v snowboarding

 

AS LUCK would have it, with vast swathes of the Northern hemisphere paralysed by snow, Babbage finds himself in the one place where such conditions are a boon: a ski resort. So, in lieu of our usual Difference Engine column (whose author is taking some well-deserved time off, possibly on the snowy slopes of California), he has decided to investigate whether science can help adjudicate a perennial feud between two warring factions of snow-sport enthusiasts.

Which is superior, skiing or snowboarding?

As physical fundamentals go, there is little to tell the two disciplines apart. Both rely on converting the potential energy painstakingly accumulated by mounting a hill into kinetic energy on the downward zip. As a rigid flat surface (or two) slides over snow some of the energy is lost due to friction and released as heat (a bit is also lost due to drag generated as the rider’s silhouette cuts through the air). That heat, combined with the pressure created by the sliding surface bearing down on the ground, melts the snow underneath it. This forms a thin film of water which lubricates the bottom of the surface, explaining the eye-popping speeds attained by devotees of both disciplines. Whereas the formulae governing the downhill run are the same for the two sports, their respective biomechanics differ considerably. First, it is easier for the novice skier to keep his centre of mass tucked away safely between the skis, thus avoiding falls, even when turning. The snowboarder, meanwhile, has constantly to worry about his mass centre straying beyond the board’s edge. This is especially tricky when trying to change direction. As a result, bruised bodies are par for the course before a neophyte gets to grips with the basic technique. Moreover, the fact that snowboarders bear down on a single surface or edge with their full weight, whereas skiers divide the load, appears to translate into the latter’s better performance figures. Crucially, skiers go faster. The current speed-skiing record stands at just over 250 kph (156 mph) against 200 kph or so for a snowboard. As a result, they jump higher: 10.7 metres (35 feet) against 9.8 metres in a quarterpipe (as a concave ramp used for such antics is known). They also fly farther. The longest recorded jump on alpine skis is 112 metres, compared to a paltry 56 metres on a snowboard. That is before considering the whopping 230 metres or more attained by professional ski jumpers on “the mother of all jumping hills” in Planica, Slovenia. But since they use specially designed equipment and venues, the comparison hardly seems fair. Snowboard buffs appear to have the upper hand along just one, albeit crucial, biomechanical dimension: that of of high-velocity tumbles. When a snowboarder trips over while hurtling at speed, his frame is kept intact on a single plane by dint of both legs being locked in place on one board. Nasty falls are not, of course, unheard of. But they pale in comparison to spectacular skiing accidents. As all four of a skier’s limbs can move independently, there is more scope for the body to be put out of joint (literally) when it all spins out of control. To this Babbage, the sight of a hapless skier performing inadvertent cartwheels down a slope, flailing skis and poles lodged repeatedly in the snow, evokes images of the grisly practice of execution by dismemberment, with gravity rather than horses providing the ripping force. Croppers aside, skiers do win hands down in all other aspects of ergonomics. That is not so much because skis are somehow inherently better suited to the whole winter-resort infrastructure. Rather, it is the other way around. Ski resorts (as the name suggests) predate snowboarding by decades. They were created explicitly with skiing in mind and have changed precious little since the modern snowy getaways (ie, ones with ski lifts) began cropping up on a large scale in Alpine countries in the 1920s. Witness all the flat patches of piste which gradually bring riders to a halt (either before another downhill section or a ski-lift queue). A doddle for skiers, who can push off with poles or use the free-skate technique, they are a nightmare for snowboarders. The latter are forced to unclip the back foot and push off with it, in an attempt to imitate the propulsion method used in skateboarding (a meagre attempt, one might add, since a snowboarder’s front foot remains bound to the board at 90 degrees to the one generating the forward movement). Alternatively, they can take off the board altogether and leg it. Either way, the upshot is dispiriting, and made worse by smug skiers whizzing by unfazed. Snowboard-unfriendliness culminates in the surface lift (like a T-bar, say, or a rope tow). These pull the rider up the slope without lifting the board off the ground, as do chairlifts and other aerial contraptions. On skis, where the rider faces forward, he slaps the tow between his legs or behind the bum and lets himself be whisked up, balanced and composed. On a snowboard, the torso’s natural position is more or less perpendicular to the direction of motion. As a result, the contortions required to latch onto the tow often end in disaster. As the rider’s centre of gravity strays beyond the board’s edge, he duly flips over, is dragged for a bit, before being forced to admit defeat and remove himself from the path of an encroaching—and invariably poised—skier. This often happens a fraction of the way up the slope necessitating a despondent slide to the bottom of the lift where the whole ungainly exercise begins anew. It is a sorry spectacle. Snowboarders do hold one, if small, ergonomic advantage over skiers. Trundling around the slippery path to the restroom in inflexible, moulded ski boots is far from comfortable. Snowboarding footwear, on the other hand, is just a slightly stiffer and heavier version of ordinary boots. Not only is walking in them perfectly pleasant, but this Babbage has actually driven a manual-transmission car (with a clutch pedal) wearing a pair. Ultimately, though, the deciding argument may come from an unlikely quarter: cultural anthropology. Skiing originated as a mode of transport on snow-clad flats at least as far back as 6,000 BC. The downhill variety emerged only in the late 19th century, almost as an afterthought. It was not for another few decades that it took off as a recreational activity. (The simple explanation is that in order to get down a slope one must first get up it, which was far from easy before the advent of the ski lift.) Snowboarding, by contrast, was born not of a utilitarian desire to get around, but of unadulterated hedonism. It was conceived from the first to be fun. And all things considered, it seems the more natural way to get down a slope. In an outtake from “Lines”, a documentary about big-mountain snowboarding in Alaska, Mike Renquet, a legend of the sport, offers the following thought experiment. Imagine a caveman asked to choose how to get down a snowy mountain. Would he strap on two separate wooden slats and lean forward? Or rather stand sideways on a broader plank and lean back a little? Mr Renquet does not think the theoretical troglodyte would plump for the skis. Nor does Babbage. But then again, both he and Mr Renquet may be biased.

Posted in Hobbies | Leave a comment

Hotmail delivers aliases to help you manage and secure your email account

Starting today, you can create and manage multiple email aliases from a single Hotmail account. Together with features that we introduced in November that let you use Hotmail with any existing email address, the new aliasing feature makes it easy to use a different email address and still get all the benefits of Hotmail without having to change your primary email address and online identity.

The email address a person uses is a big part of their online identity. The average person maintains three different email addresses in order to organize different types of email, maintain different personas, or keep junk mail away from a primary email address. So there are many good reasons that people want multiple email addresses, but maintaining multiple accounts, with different user names and passwords that require you to check multiple inboxes, is inefficient. With today’s update, Hotmail helps you save time by making it easier to manage your current and future email addresses in one place.

Aliases

Hotmail (and many other email services) already allow you to just add a plus sign (‘+’) and a descriptive word to the first part of your email address. For instance, if your email address was doctor-smith@live.com and you wanted to create an alias for online shopping, you could use doctor-smith+shopping@live.com. Email sent to this alias will still be delivered to your inbox or to a particular folder. This can help with managing different types of incoming email. In addition to the plus feature, we’ve also released Sweep to help manage this type of incoming email traffic.

However, with the plus addresses that many services offer, it’s still very easy to determine your actual email address and there are times when you simply don’t want to give out any part of your real email address – that’s where our new alias feature helps you out. Email aliases let you create completely different email addresses that you can use to receive email into your primary account without anyone knowing what your primary email address is.

Let’s say you’re in the market for a new car. There are a bunch of websites that will email you price quotes, sales alerts, etc. During your car search, these messages are helpful, but once you’re done, they become clutter that can be difficult to stop. By using an alias on these websites instead of your main email address, you can avoid this. And when you’re done, just turn the alias off, ensuring future unwanted messages that are sent to that alias don’t land in your inbox.

You might also be concerned that your address could be sold to other companies or could result in a large amount of new email that you don’t want or doesn’t belong in the same place as your regular email. Or maybe you want an address that’s better suited to your hard-core gaming persona rather than your normal, professional one. Starting today, you can add up to five aliases per year to your Hotmail account, up to fifteen aliases in total, all designed to make it a lot easier to organize different types of email and personas in one Hotmail inbox without having to give out your primary email address if you don’t want to.

With the option to use Hotmail with any email address and the ability to easily add aliases, we look forward to hearing how you’re better managing and securing your online identity.

Dharmesh Mehta
Director, Windows Live Product Management

Posted in Techie Hobbies | Leave a comment