Samsung SCX Errors and Reset

Samsung SCX series printers (SCX-4521, SCX-5530, SCX-6220, SCX-6320, SCX-6322) are piece of office equipments for use at home or in small business. These space-saving All-in-One printers provide high quality laser printing, high color digital scanning, copying and faxing.
User can press “Menu” key on display to go through the menus and choices. There are many that are useful to the technicians. You can set the machine to continue copying if toner empty or to stop if toner empty. If you wish it to continue, go to “ignore toner empty” and set it to “ON”. Density, paper feed, power save, etc are also adjusted here. Go to “Reports” and then to “billing/Counters” for total count. You can also print out a report which will tell you all of the user choices and what their current setting is, which probably includes total count also.
SCX 5530 Drum Reset:
After replacing the drum with a new one, press “Menu” and then press up/down keys until “New Drum” displays. Then press “Mode/enter”. When you see “New drum unit?” press “1” to select yes and to reset the drum count.
Error Messages:
  • Authentication failed: Wrong password
  • Comm Error, Connection Error: Fax line error problem
  • Data read/check USB: Time expired,; try again
  • Data write/ check USB: Inadequate memory
  • Door open: Front or rear cover open.
  • Enter again: Keystroke error
  • File access denied: Change server settings
  • File Name exist: Change file name
  • File name over limit: Delete some files
  • Fuser open
  • Incompatible: Problem with machine you are communicating with.
  • Low heat error: Off and On or fuser problem
  • LSU motor: Laser polygon motor problem

Bitmap fonts and scalable fonts (Printer Basics)

computer font (or fount) is an electronic data file containing a set of glyphs, characters, or symbols such as dingbats. Although the term font first referred to a set of metal type sorts in one style and size, since the 1990s most fonts are digital, used on computers. There are three basic kinds of computer font file data formats:
Bitmap fonts
Bitmap fonts consist of a series of dots or pixels representing the image of each glyph in each face and size. A bitmap font stores each character as a picture made of a pattern of dots. The basic disadvantage of bitmap fonts is that the fonts are only available for a defined size. If the size of a bitmap font is changed the original typeface is destroyed, for example, if a bitmap font is scaled up, the edges of the letters or symbols become jagged.
Outline fonts
Outline fonts or vector fonts are collections of vector images, i.e. a set of lines and curves to define the border of glyphs. Early vector fonts were used by vector monitors and vector plotters using their own internal fonts, usually with thin single strokes instead of thick outlined glyphs. Outline fonts (also called vector fonts) use B├ęzier curves, drawing instructions and mathematical formulas to describe each glyph, which make the characer outlines scalable to any size.
Stroke fonts
A glyph's outline is defined by the vertices of individual strokes and stroke's profile. Its advantages over outline fonts include reducing number of vertices needed to define a glyph, allowing the same vertices to be used to generate a font with a different weight, glyph width, or serifs using different stroke rules, and the associated size savings. In essence, stroke-based fonts are small, scaleable, updateable, and customizable — and give developers the chance to deliver excellent looking text to Chinese, Japanese, and Korean customers anywhere.
The benefits of stroke-based fonts are:
  1. Compact format
  2. Updateable code
  3. Variable weight (light to bold, and anything in between)
  4. High-quality, scaleable output
  5. The ability to optimize the rendered characters for various output devices
  6. The ability to deploy one unified, stroke-based font in all of a developer’s products

Internet Security and Acceleration Server

ISA Server is a complete solution by Microsoft for providing an access point between the Internet and the corporate internal network. It can operate as a firewall, limiting access to and from the internal organization network. ISA Server provides a proxy and caching server enabling access to resources on the Internet to internal network clients. It also acts as a VPN endpoint, and provide Internet Access for client systems in a Business Networking environment.
ISA server provides advanced protection for networks. It operates as a firewall and examines every packet flowing through it providing a good protection from hackers, viruses etc.It supports multiple networks and enables the configuration of network and firewall rules that filter the flow of traffic between all networks.
All firewall rules can be viewed and modified in a single location by using ISA Server management console making it easier to avoid security breaches due to firewall misconfiguration. It can also be integrated with Active Directory infrastructure to provide authentication. ISA provides fast and secure access to corporate applications and data such as MS Exchange Server and Internal Web Servers.
ISA 2006 introduces a variety of improvements upon the previous version, ISA 2004, including support for authentication via Secure LDAP, (LDAPS) to multiple LDAPS providers or Active Directory forests, integrated support for Exchange 2007 (also backported to ISA 2004), support for publishing Microsoft SharePoint, Single sign-on, Cross-Array Link Translation, Web Publishing Load Balancing (with cookie-based affinity for Integrated NLBS) as well as variety of improvements to wizards such as a Branch Office VPN Connection Wizard, improved certificate management, and Link translation. ISA Server 2006 is only available in a 32 bit version. It also does not work on Windows Server 2008 due to the extensive changes to the networking stack.

What is LAN

LAN stands for local area network. It is a group of two or more workstaions that share a common communication line within a small defined area. LANs are typically used in the home, office or on one or more floors of a building. They have the flexibility to connect as few as two or in some cases thousands of workstations. LANs are extremely popular because of their wide applications for business and personal use. By joining workstations together, users have shared access to each other’s files or hardware such as printers or CD drives. There are many different approaches to setting up a LAN. The principal types you are likely to encounter are described in this chapter under the headings Topologies and Protocols. LANs can also be linked together
by various means to enable communication between different groups in an organisation.

Ethernet Operation

Ethernet is a LAN technology that functions at the data link layer. Ethernet uses the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) mechanism to send information in a shared environment. Ethernet was initially developed with the idea that many devices would be connected to the same physical piece of wiring. The acronym CSMA/CD describes the actual process of how Ethernet operates on a shared medium.
Ethernet is standardized as IEEE 802.3. The combination of the twisted pair versions of Ethernet for connecting end systems to the network, along with the fiber optic versions for site backbones, is the most widespread wired LAN technology. It has been in use from around 1980[1] to the present, largely replacing competing LAN standards such as token ring, FDDI, and ARCNET.
Carrier Sense and Multiple Access
In a traditional, or hub-based, Ethernet environment, only one NIC can successfully send a frame at a time. All NICs, however, can simultaneously listen to information on the wire. Before an Ethernet NIC puts a frame on the wire, it will first sense the wire to ensure that no other frame is currently on the wire. If the cable uses copper, the NIC can detect this by examining the voltage levels on the wire. If the cable is fiber, the NIC can detect this by examining the light frequencies on the wire. The NIC must go through this sensing process, since the Ethernet medium supports multiple access—another NIC might already have a frame on the wire. If the NIC doesn’t sense a frame on the wire, it will transmit its own frame; otherwise, if a frame is found on the wire, the NIC will wait for the completion of the transmission of the frame and then transmit its own frame.
Collision Detection
If two or more devices simultaneously sense the wire and see no frame, and each places its frame on the wire, a collision will occur. In this situation, the voltage levels on a copper wire or the light frequencies on a piece of fiber get messed up. For example, if two NICs attempt to put the same voltage on an electrical piece of wire, the voltage level will be different from that of only one device. Basically, the two original frames become unintelligible (or indecipherable). The NICs, when they place a frame on the wire, examine the status of the wire to ensure that a collision does not occur: this is the collision detection mechanism of CSMA/CD.
If the NICs see a collision for their transmitted frames, they have to resend the frames. In this instance, each NIC that was transmitting a frame when a collision occurred creates a special signal, called a jam signal, on the wire. It then waits a small random time period, and senses the wire again. If no frame is currently on the wire, the NIC will then retransmit its original frame. The time period that the NIC waits is measured in microseconds, a delay that can’t be detected by a human. Likewise, the time period the NICs wait is random to help ensure a collision won’t occur again when these NICs retransmit their frames.

Collision detected procedure

  1. Continue transmission until minimum packet time is reached (jam signal) to ensure that all receivers detect the collision.
  2. Increment retransmission counter.
  3. Was the maximum number of transmission attempts reached? If so, abort transmission.
  4. Calculate and wait random backoff period based on number of collision
  5. Re-enter main procedure at stage 1.

Adobe PageMaker

PageMaker was the first desktop publishing program, introduced in 1985 by Aldus Corporation[1], initially for the then-new Apple Macintosh but soon after also for PCs running the then-new Microsoft Windows. PageMaker was awarded an SPA Excellence in Software Award for Best New Use of a Computer in 1986.
n 1985, the first DTP program PageMaker came on the market, combined with the first affordable and low-priced Postscript printer. This first version was for Apple computers with their operating systems Mac OS only. Just some years later, a Windows version followed. The developer and manufacturer was Aldus. Meanwhile, it is part of Adobe’s product range. The current version 7.0 is made for business, small-office/ home office (SOHO) and education users to produce professional documents for printing and electronic distributing, like:
• Newsletters
• Reports
• calendars
• basic brochures
• poster
• flyers
• eBooks
The target groups of this software are business people and educators with little or no design experience. It integrates other Adobe software like Photoshop, Illustrator and Acrobat with import filters. The output formats are:
• Adobe PDF
• prepress files
• PageMaker
In order to create documents in a short time, the software package includes additions like:
• Templates for, among others, newsletters, brochures, visiting cards and flyers
• 150 PostScript fonts
• 4700 stock illustrations
• 300 stock photographs
• Acrobat Distiller 5.0 software to create PDF files
The big advantage of PageMaker is its clear comprehensibility which leads to a fast understanding of the handling.
The big disadvantages are:
• only one undo command is possible
• no spreadsheet support
• the Import of Adobe PDF is only possible as a graphic
• the Spell-Checker works in the text mode window only
• generating of bad HTML source code

HP Graphics Language (HP GL), (Printer Languages)

HPGL, sometimes hyphenated as HP-GL, is the primary printer control language used by Hewlett-Packard plotters. The name is an initialism for Hewlett-Packard Graphics Language. It later became a standard for almost all plotters. Hewlett-Packard's printers also usually support HPGL in addition to PCL.
The Hewlett Packard Graphics Language (HP GL) is widely used by pen plotters used to produce engineering drawings. HP GL has been widely emulated by other plotter manufacturers, and is the de facto standard language for pen plotters. A pen plotter is a slow device, a complex drawing can easily take have an hour to plot, and plotters are often noisy and difficult to set up. For these reasons many laser printers offer an HP GL emulation, normally copying the HP7475A desktop plotter, which can be used for draft prints of drawings.
As most laser printers do not print in color, and cannot print on the very large paper sizes used by plotters, they are normally only used for draft prints, but in a few situations, such as printed circuit board designs, laser printers are used in preference to plotters. HP GL version 2 has been incorporated into the PCL 5 language to provide PCL with vector graphics capabilities. HPGL uses two-letter mnemonics as instructions for drawing lines, circles, text, and simple symbols. HPGL has evolved over the years as HP added features to its line of pen, electrostatic, inkjet, and laser plotters and printers.
There is one primary drawback to HPGL: it is bulkier than other plotting languages, which means it takes longer to transmit an HPGL plot file. To overcome the limitation, Hewlett-Packard in 1988 introduced HPGL/2, which featured "polyline encoding," a form of data compression that reduces the plot file size and, hence, transmission time by two-thirds.
The original HP/GL-Language does not support definition of line width, as this parameter was determined by the pens loaded into the plotter. With the advent of the first inkjet plotters, line width for the "pens" specified within the HP/GL-files had to be set at the printer so it would know what line width to print for each pen, a cumbersome and error-prone process. With HP/GL-2, definition of line width was introduced into the language and allowed for elimination of this step. Also, among other improvements a binary format was defined that allowed for smaller files and shorter file transfer times, and the minimal resolution was reduced.

MAC Addresses

A MAC address is 48 bits long and is represented as a hexadecimal number. Represented in hex, it is 12 characters in length, where each character is 4 bits. Three numbering spaces, managed by the Institute of Electrical and Electronics Engineers (IEEE), are in common use for formulating a MAC address: MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names "EUI-48" and "EUI-64", where "EUI" stands for Extended Unique Identifier. To make it easier to read, the MAC address is represented in a dotted hexadecimal format, like this: FFFF. FFFF.FFFF. Some formats use a colon (:) instead; and in some cases, the colon separator is spaced after every two hexadecimal digits, like this: FF:FF:FF:FF:FF:FF. As mention in Chapter 2, the first six digits of a MAC address are associated with the vendor, or maker, of the NIC. Each vendor has one or more unique sets of six digits. These first six digits are commonly called the organizationally unique identifier. (OUI). The last six digits are used to represent the NIC uniquely within the OUI value. In theory, each NIC has a unique MAC address. In reality, however, this is probably not true. What is important for your purposes is that each of your NICs has a unique MAC address within the same physical or logical segment. A logical segment is a virtual LAN (VLAN) and is referred to as a broadcast domain. Some devices, such as Cisco routers, might allow you to change the MAC address for a NIC, while others won’t.
In TCP/IP networks, the MAC address of a subnet interface can be queried with the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. On broadcast networks, such as Ethernet, the MAC address uniquely identifies each node and allows frames to be marked for specific hosts. It thus forms the basis of most of the Link layer (OSI Layer 2) networking upon which upper layer protocols rely to produce complex, functioning networks.

Printer Ink, How to Buy?

With the advancement of technology the purchase price of a printer has come down to a great extent. But the cost of running a printer has not come down to the same extent. Printer ink amounts to be the most expensive of all printer supplies. Before you buy it you should know different types of printer ink, their advantages and disadvantages.
Different kinds of Printer Inks.
Printer inks come in different kinds.
First is the original equipment manufacturer (OEM) ink. This type is designed to work with specific printer models. It provides the best quality print and usually comes with a warranty. This is the most expensive yet reliable type of ink.
Compatible Printer Inks
Since most users prefer cheaper printer inks, they have resorted to buying compatible printer inks instead. They are designed to comply with OEM printing standards. Like OEM inks, they are designed only for specific printer brands.
Recycle Inks
Finally, remanufactured printer inks are made from recycled ink. They are the cheapest kind of ink but can be unreliable.
What should you choose?
When buying a printer ink, it is always best to check for your printer's compatibility. Different printer models work with specific printer inks. Make sure you buy only the right ink for your printer else you can damage it and void the warranty on your printer.
Do not be easily fooled by companies claiming to sell the “best” printer inks. Check for the packaging. Make sure it is not tampered and that you buy only from a reputable dealer.
If you are looking for inks that provide high quality prints, it is always best to buy an OEM ink. It is expensive but it provides lasting and better results than other types.
Buying printer cartridges online will save you a lot of money. There are several online dealers of printer ink and cartridges. These online dealers offer discounts on purchases. Buying online gives you the option of doing your research on the various suppliers and choosing the best discount price. These suppliers will deliver printer cartridges free of cost right at your doorstep, saving you money on traveling and shipping.

Troubleshooting sequence for printing issues 2

Print a Self Test page from the printer by disconnecting the printer’s USB cable from the Computer or from the printer side.
To isolate whether the issue is with printer’s Hardware or Software let’s print a Test page from the printer by disconnecting the printer’s USB cable from the Computer or from the printer side.
Now, the results show two scenarios:
One is Hardware issue(If the self test is not printed from printer).
Second one is Software issue(If the self test is printed from printer).
Hardware Scenario:
If the printer does not print a Self Test page from the printer, it confirms that the printer hardware is not functioning properly.Educate the Customer by stating that I’m sorry to say this. As per the results, I suspect that the printer hardware is not functioning properly. However, let us try some more troubleshooting steps to isolate and fix the issue.
Step 1: Connect the printer directly to wall out let.
Step 2: Check the ink level.
Step 3: Cleaning of cartridge and printer contacts.
Step 4: Perform a Power cycle steps to remove static electricity from printer.
Follow the steps to Power cycle the printer :
1.Unplug the power supply from the wall outlet.
2.Unplug the power supply from the back of the printer.
3.Wait at least 20 seconds, and then plug in the supply back into the wall outlet.
4.Plug in the power supply back into the printer.
5.Press the power button to turn the printer on.
After performing all the steps, try printing a Self-Test page from printer.

Control Codes

Control Codes
A control code is a character that initiates a printer function, for example
Carriage Return (CR), Line Feed (LF), Form Feed (FF), etc.
Carriage Return (CR)
A carriage return is a special code that moves the cursor (or print head) to the beginning of the current line. In the ASCII character set, a carriage return has a decimal value of 13 (0D Hex).
Line Feed (LF)
A line feed is a code that moves the cursor on a display screen down one line. In the ASCII character set, a line feed has a decimal value of 10 (0A Hex).
On printers, a line feed advances the paper one line.
Form Feed (FF)
Printers that use continuous paper normally have a form feed button or command that advances the paper to the beginning of the next page.
A special character that causes the printer to advance one page length or to the top of the next page. In systems that use the ASCII character set, a form feed has a decimal value of 12 (0C Hex).

Offset Printing

The proper name of the process of offset printing is offset lithography, though it is usually called offset printing; or just offset. Offset printing is the most popular kind of printing used these days. The offset printing is so common that almost 40 % of the printing jobs are done by the usage of offset printing. The presence of offset printing is almost felt in every industry. Offset printing is the method most widely used for commercial printing runs of about 1,000 to 100,000. Typically, the speed of printing is much faster than office copiers, and very high quality can be achieved. Examples of offset printings include: catalogues, brochures, books, magazines, newspapers, maps, cards, and stationery. When used in combination with the lithographic process, which is based on the repulsion of oil and water, the offset technique employs a flat (planographic) image carrier on which the image to be printed obtains ink from ink rollers, while the non-printing area attracts a water-based film (called "fountain solution"), keeping the non-printing areas ink-free.
Usually, artwork files prepared on a computer, are used to produce a printing plate. The plate
is fitted to an offset printing press. Ink is applied to the image on the plate and, as the press
rotates, the ink offsets to a rubber blanket on another cylinder. The ink is again offset from the
blanket to paper or other material.
The most common kind of offset printing is derived from the photo offset process, which involves using light-sensitive chemicals and photographic techniques to transfer images and type from original materials to printing plates. In current use, original materials may be an actual photographic print and typeset text. However, it is more common — with the prevalence of computers and digital images — that the source material exists only as data in a digital publishing system. Offset litho printing on to a web (reel) of paper is commonly used for printing of newspapers and magazines for high speed production. it cant print variable repeat in one machine.
Offset printing holds about 70% of the printing market. Other printing processes include:
gravure, letterpress, flexographic, intaglio, and silk screening.

Dots Per Inch (DPI)

You have probably heard this term many times before especially in the context of printing your digital photos. DPI is sometimes used as a measurement of digital photo printing quality while the truth is that DPI is an indicator of the printer quality.
Dots per inch (DPI) is a measure of spatial printing or video dot density, in particular the number of individual dots that can be placed within the span of one linear inch (2.54 cm.) The DPI value tends to correlate with image resolution, but is related only indirectly.
DPI is a physical characteristic of a printer. Every printer prints dots that when put next to each other comprise a photo. Each dot has a physical size. DPI is also known as the maximum resolution that a printer is capable of. Low-end printers have lower DPI while high-end printers have higher DPI.
The range of DPI supported by a printer is most dependent on the print head technology it uses. A dot matrix printer, for example, applies ink via tiny rods striking an ink ribbon, and has a relatively low resolution, typically in the range of 60 to 90 DPI. An inkjet printer sprays ink through tiny nozzles, and is typically capable of 300-600 DPI.[1] A laser printer applies toner through a controlled electrostatic charge, and may be in the range of 600 to 1800 DP.
if a printer supports 1200 DPI it means that the printer can print 1200 dots per inch (on both X or Y axis). When printing it is important to make sure that the DPI is higher or equal to the number of pixels per inch in the source photo. If the DPI is lower the printer will not be able to fully display the high resolution photo. When the DPI is higher the printer will use multiple dots to represent one photo pixel. DPI is not relative to the page size. DPI is a fixed number for a given printer.

Manufacturer Specific Printer Language

I have described some details of HP PCL and Adobe Postscript. There are other languages which individual printer manufactur use. In some cases the manufacturers provide their own language to use with the printer. Manufacturer also wish to have their language adopted as the industry standard, but in the real world every language has its advantages and disadvantages. Each language has its own role in industry to meet different printing requirments. Sometimes none of these languages fulfils the user requirments so professional programmers are employed to create custom applications supporting unique features.
Kyocera PreScribe
Kyocera has its own manufacturer specific language. Kyocera uses Kyocera Prescribe in addition to HP PCL emulation. Prescribe is a good language for true type fonts. Mostly it is being used for minicomputer applications and applications using barcodes.
IBM IPDS (Intelligent Printer Data Stream) has more features for IBM mainframe. IBM introduced "Advanced FunctionPrinting" (AFP). AFP is a way in which complex documents can bedescribed on IBM mainframes and minicomputers, and is converted intothe IPDS print language by the operating system on the computer. IPDS does not support other manufacturer's drivers. User must have an IPDS comatible print to print a document. But some printer manufacturers provide IPDS emulation to make PCL or Postscript available to IBM systems. User has to use an external computer to use these emulations which translates IPDS commands into PCL or Postscript.

What is DTP?

In the age of computers, it is relatively simple to create documents and to produce professional printouts. Nevertheless, the results of the work with the computer clearly show the differences between specialists and amateurs. A few years ago, many specialists were involved in order to produce professional printouts: a graphic designer, a typography specialist, an illustrator, a photographer, a touch up specialist and a reprographic specialist. With a computer and special software, anyone is able to produce a layout up to the data needed by the printing office. But depending on the lack of knowledge concerning the processes, techniques, and applications, the results will have less quality and will be more expensive.The term "desktop publishing" is commonly used to describe page layout skills. However, the skills and software are not limited to paper and book publishing. The same skills and software are often used to create graphics for point of sale displays, promotional items, trade show exhibits, retail package designs, and outdoor signs. DTP is the abbreviation of „Desktop Publishing“ which means the production of printouts like catalogues, brochures and newspapers on a computer with special software. Recently, additional new output media for electronic distributing, like web pages and PDF documents, have been included. The main task of DTP or rather DTP- applications is the combination of text- and picture elements (illustrations, photos) to a printable layout. The focus of these kinds of applications is the text- processing and arrangement.
A wide range of related software tools exist in this field, including many plug-ins and tools related to the applications listed below.
# Adobe InDesign
# Adobe PageMaker, was Aldus Pagemaker
# Adobe Home Publisher, was Aldus Personal Press, was Silicon Beach Personal Press
# Advanced Print Publisher, formerly the 3B2 Publishing System
# QuarkXPress
# FrameMaker, now owned by Adobe
# iCalamus for Mac OS X
# Impression Publisher – RISC OS
# Interleaf/QuickSilver
# MemoryPress – DTP that allows online collaboration
# Microsoft Publisher
# Microsoft Word 2008 – This Word release contains a DTP mode
# OvationPro – RISC OS
# PagePlus SE (External link:
# Pages
# PageStream, formerly known as Publishing Partner
# Prince XML, by YesLogic
# Print Explosion, by Nova Development
# Print Shop, originally produced by Broderbund
# RagTime
# Ventura Publisher, now owned by Corel and originally developed by Ventura Software
# Xclamation
# UltraXML, XML Dynamic Publishing Solution
# Print MIS (, Solution provider for the printing industry
# Business Builder for Print (

All in One Multifunction Printer Tips

All in one multifunction printer have become very popular nowadays. It handles the issue of taking up all the office space with all sort of machines. In fact its combination of all regular office needs in one device. Multifunction printer can be offered in diverse functionalities and features depend on demands.Before invention of all in one multifunction printer, it was vital to have all of different functionality devices separately and was such a mess to configure and place them. But now you just sit and by pushing the button, do all send and receive documents process like a piece of cake.With all these advantages, there are some drawbacks. If you want to buy an All in one device, remembering following point may help you.
AIO for home users usually is not networked and connected with USB or parallel.
If you're planning to use it as a photocopier, it's going to cost you considerably more than having copies made at your local print shop. They're great for convenience when you need a quick copy, but you wouldn't want to do any kind of volume on them.
Another thing to consider is the quality of the various components. For example, the scanner may not be as high resolution as some stand-alone models. If you're planning to scan old photographs or negatives and want the highest possible resolution, you probably won't get quite as good a result from a multifunction printer/scanner as you would from a dedicated scanner. The quality of the image depends on DPI or dots per inch. The standard (600x600) will suffice for printing but is unsuitable as regards quality of photo. Scanner resolutions must be noticed, as these are usually low in multifunction models. There is a wide gap as regards quality between interpolated and optimal resolution.
The same goes for the printing capabilities. You can get standalone printers that will print at higher resolutions or on larger paper than most multifunction units.
The final thing to consider is that if your printer breaks down it will affect your fax, scanner and copier too. This may cause problems if your office needs these machines to do business. Also, by using your printer for multiple functions you will go through a lot of ink cartridges and toner. The cost of using these forms of ink is much higher for making copies than using a regular copy machine.
Having separate units means you would only be without one of them if you ever need repairs done. If your needs are relatively basic, however, a multifunction is a great choice. You can get all the same functions as having 3 or 4 separate machines, for less money and in a lot less space.

Port scanners

A port scanner is a piece of software used to detect if particular ports of a host (e.g. an MFP) are enabled (“open”) or disabled (“closed”). System or network administrators use port scanners to check the security of a network. But port scanners can also be used by unauthorized persons to find open ports which can be used to access a system and its data. For example, port scanners make use of handshake messages as they are defined by network protocols such as TCP or UDP. If the port scanner sends a particular message to the host on which it searches for open ports, the host sends a particular reply as it is defined by the protocol. Even if no reply is sent, the port scanner may draw a conclusion from that:

The host sends a reply corresponding to the message sent by the port scanner. This kind of reply indicates that the port is open and a service is running on the host and can be accessed.

The host sends an error message or a corresponding reply that indicates a closed

The host sends no reply at all. Usually, this indicates that the port is somehow blocked or filtered. Open ports present the highest risks as they offer potential attackers the opportunity to attack the services and applications associated with open ports as well as the operating system of the host. There are different types of port scans associated with particular protocols and particular messages which are part of a protocol. For example, the TCP SYN scan method makes use of the SYN message. Normally, this message is sent as part of the initial handshake, if another host wants to establish a connection. The TCP SYN scan method consists of the following steps:

1. The port scanner sends a SYN message to a port of the host.

2. If the port is closed, the host sends an RST message.

If the port is open, the host sends a SYN/ACK message. If the port is filtered, the host sends no reply at all.

3. When the port scanner receives the SYN/ACK message, it replies by sending an RST message. This message breaks off the handshake.

From the attacker’s point of view, the advantage of this method is that actually no connection is established as the port scan is carried out on the handshake level. Accordingly, there will be no entry in the log of the corresponding service. Though, many firewalls are able to detect this kind of s port scan.

Printing Options For a Microsoft Word Document Template

In the third of this article series on how to set up a technical document template by using Microsoft Word we'll explain the various printing options you can choose from to print your MS Word technical document.

While your document template is open, select File > Page Setup to display the Page Setup dialog box.

Click and select the PAPER tab.

Click PRINT OPTIONS button to display the PRINT tab and the print options available. This is the same dialog box that you can also reach by selecting File > Print and then selecting the Options button from the main menu.

DRAFT OUTPUT option, when selected, will print a fast and low-quality draft copy with no images. The blocks where the images are located will appear as blank spots.

I recommend you select the UPDATE FIELDS and UPDATE LINKS options to make sure you have the latest values for the date and time fields as well as the most current document links before your document is printed.

BACKGROUND PRINTING option, selected by default, allows you to continue working while a long document is sent to printer and printed on the "background."

PRINT POSTSCRIPT OVER TEXT option, when selected, prints any PostScript-coded document components (like the watermark, for example) on top of the body text, instead of underneath it.

REVERSE PRINT ORDER option, when selected, reverses the print order of the pages; prints the last page first and the first page last.

XML TAGS option, when selected, prints all the XML tags in your document, whether they are normally visible or not.

BACKGROUND COLORS and IMAGES option, when selected, prints any background images or colors (like in a watermark) underneath the body next.

FIELD CODES and HIDDEN TEXT options, when selected, print any field codes and hidden texts that you might not want printed normally. NOTE: If you do not select it, the CONTENT of the field code will still print without, however, printing the field code itself.

DOCUMENT PROPERTIES option, when selected, prints ( as a new section at the end of the Word document) all the information you have entered into the DOCUMENT PROPERTIES dialog box by selecting File > Properties from the main menu.

NOTE: If you enter more than one Comments field through selecting Insert > Field from the main menu, all comments will print in the main body of the document but only the LAST comment will be printed in the Document Properties block.

Click OK when you're done with the printing options to return to the PAPER tab.

Click OK once again to close the Page Setup dialog box.

Printer IP Address,

How can I assign IP addresses properly?

  • The Internet Protocol address is a unique number that represents a specific computer in a network. Format of the IP Address is four numbers separated by dots, e.g. '' Each number should be decimal of 0 through 255.

  • The IP address is compiled from 'network ID + user ID.' This results in three different IP address 'classes.' Representing the network ID as 'n' and the user ID as 'u,' each class has the following attributes:

Class IP Addressing First Segment Range Application Number of Networks Number of Users
A n.u.u.u 0<127 Large scale network 126 16,777,214
B n.n.u.u 128<191 Mid scale network 16,384 65,634
C n.n.n.u 192<223 Small network 2,097,150 254

For example, in a class C network, you can assign an IP address as ''

  • Devices having IP addresses with different network IDs ('n' above) cannot communicate even when they are in the same network segment.

Following is an example of a Class C IP network with 3 computers and 1 IB-21E/IB-22 printer:

Computer A
Computer B
Computer C
IB-21E/IB-22 printer

Inkjet Printers Advantages and Disadvantages

Printers have become an integral part of computers. From postage to photographs, books to blog notes, there are numerous pages of online content that you may want to print. While you may think printers are printers and all can do the job you need accomplished, there are a variety of styles of inkjet printers and each has different capabilities.  Should you buy an inkjet or a laser printer? Often people buying a new printer are confused about whether to buy a laser printer or inkjet printer. The short answer is it depends on what you’ll be using it for, and how much you’ll be using it. The following summarize the main advantages and disadvantages of inkjet printers.
Inkjet printers are the most affordable and popular printers available today; they offer high quality and fine detailed printing output. The advent of the inkjet printer has made printing much easier and faster. Since the 1980s, inkjet printers have evolved to become the most common printers used in homes and offices. Inkjet printers work by propelling droplets of ink onto the paper. The ink is released from small removable cartridges and if it is a colour inkjet printer there will normally be a black cartridge and three different coloured cartridges. You can either replace the whole cartridge or refill the cartridges with a special refill kit.
Most inkjet printers will print 2 to 6 pages in one minute (ppm). Pages with graphics will take longer and range about 1to 3 minutes. Ink jet printers are able to provide consumers with high quality prints at a very reasonable price. They are much quieter and also produce much higher quality. You can buy an inkjet printer that will produce photo quality picture prints, something that would have been impossible with a dot matrix.
Inkjet printers are considerably cheaper to buy. High end printers are capable of producing good quality images when used with special paper. Most models are relatively light weight and compact so they don't take up too much space on the desk. Ther are more viable option for photo print quality having a multi-colour output. It is usually 4-colour but there are 6-colour and even 8-colour outputs available. The recently launched Inkjet printers have sizably reduced their cost of cartridges which are now in vogue again. In contrast to additional luxurious technologies like thermal transfer printer, dye-sublimation printers, and laser printers, ink jets have the benefit of approximately no warm-up and a lesser printing cost per page.
One drawback of the ink jet printer is the cost of printer cartridges, which can be quite expensive. The design of the ink cartridges does also mean that they are prone to clogging. As the ink used is water soluble it is also important to avoid even small amounts of water coming into contact with your finished document, as this will easily cause smudging. Another disadvantage is the possibility of an affect called bleeding. This is when the ink is carried side ways and results in a smudged document. It means
the ink is carried to a side away from the preferred location by the capillary action along the fibre of the paper; the result is a muddy or smudged appearance on some types of paper. Inkjets produce goods quality print on black text but are very slow in their performance. Also the prints emerge from the printer slightly wet and may need time to dry. Inkjets aren't designed for high volume printing. Due to the cost of ink, running an inkjet printer over time is a more expensive than a laser printer.
These disadvantages have been addressed in a variety of ways:
Third-party ink suppliers sell ink cartridges at significantly reduced costs (often 10%−30% of OEM cartridge prices) and also sell kits to refill cartridges, and bulk ink, at even lower prices.
Many vendors' "intelligent" ink cartridges have been reverse-engineered. It is now possible to buy inexpensive devices to reliably reset such cartridges to report themselves as full, so that they may be refilled many times.
Print lifetime is highly dependent on the quality and formulation of the ink, as well as the paper chosen. The earliest inkjet printers, intended for home and small office applications, used dye-based inks. Even the best dye-based inks are not as durable as pigment-based inks, which are now available for many inkjet printers.

Printer Emulation

Emulator means someone who copies the words or behavior of another Synonyms. In computer sciences hardware, software or a combination of the two that enables a computer to act like another computer and run applications written for that computer is called emulator. In the past, it was often a hardware add-on that actually contained an instruction execution module for the emulated computer. Today, "emulator" more often refers to software, which provides a translation layer from the emulated computer to the computer it is running in. understand printer emulation, remember that a printer receives commands from the computer. These commands are in a specific printing language. Many manufacturers have developed printing languages but some of them have become industry standards. To meet the industry requirement manufacturers try to make their printers compatible with these de facto standards. PCL and Postscript are most popular languages and have become a standard, other manufacturers equip their printer according to the specifications of these languages. For example, while PCL was developed by Hewlett–Packard, it was widely copied by other manufacturers who offer emulations of HP printer. By the emulation of a HP printer another printer is able to understand PCL. If you are using an emulated printer, you may find “Laser Jet IIp compatible” or “PCL5 compatible” etc on it.
The term emulation especially applies to PostScript printers because Adobe itself does not produce printers and each PostScript printer produced by any manufacturer emulates PostScript. The term emulation also applies to printers that do not emulate the printer or the printing language of another manufacturer but that emulate another type of devices. For example some Laser printers have the ability to emulate other graphic output devices such as pen plotters. These printer emulate HP GL language which is used by pen plotters. In some graphic applications a plotter can take 30 minutes to print a complex drawing, while the draft output is produced from a laser printer in a few seconds. It is possible for designers to print a sample on laser printers and after finalizing the drawing it can be printed on plotter.
Adobe does not sell printers but it sells Postscript license to the manufacturers. Before Postscript Level 2, the license fees charged by Adobe were high, so some manufacturers tried to emulate the PostScript language. But nowadays license fees has been reduced and manufacturers prefer to use Postscript instead of emulated languages.

Secure Shell or SSH

Secure Shell or SSH is a point-to-point tunneling protocol that is designed to pass encrypted traffic between two specific hosts. Along with tunneling traffic at the presentation layer, SSH also can provide application layer functionality, including a login shell similar to telnet (over the encrypted tunnel), and FTP-type services. The sftp system is an implementation of an FTP-like protocol over SSH. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET and other insecure remote shells, which send information, notably passwords, in plaintext, leaving them open for interception.
The SSH protocol addresses each of the basic security concepts.
SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary. Note that SSH is a protocol that can be used for many applications. Some of the applications may require features that are only available or compatible with specific SSH clients or servers. For example, using the SSH protocol to implement a VPN is possible, but presently only with the OpenSSH server and client implementation.
Confidentiality: Each SSH connection is encrypted, preventing an eavesdropper from viewing information. For added security, SSH periodically reexchanges keys to ensure that a compromise of one set of keys does not compromise the entire session. In contrast, CTCP, IPsec, and IPv6 only exchange keys at the beginning of the connection.
Authentication: Before establishing a connection, the client must authenticate the server and the server must authenticate the client. Client authentication can be any combination of certificates (keys), passwords, or digital tokens. Although SSH is usually used with one-part authentication (a password or a key), it can support two- and three-part authentication systems. The server only uses a certificate to authenticate with the client.
Authorization: SSH limits the traffic that can enter the tunnel and can restrict how data exits the tunnel. For remote login access, SSH restricts authorization to the user’s login privileges.
Integrity: SSH uses encryption and cryptographic checksums to validate each packet. Any packet that fails an integrity check is viewed as an attack, which terminates the connection.
Nonrepudiation: Each packet is cryptographically signed using an HMAC, ensuring that the data actually came from the sender. SSH has three primary uses: establish a secure network tunnel, provide a VPN with port-forwarding characteristics, and supply application-layer login functionality.

PostScript Fonts

True Type
An outline font technology developed jointly by Microsoft and Apple. Because TrueType support is built into all Windows and Macintosh operating systems, anyone using these operating systems can create documents using TrueType fonts.
Since being introduced in 1991, TrueType has quickly become the dominant font technology for everyday use, and is even displacing PostScript in many publishing environments.
PostScript Fonts
PostScript is an object-oriented language, meaning that it treats images, including fonts, as collections of geometrical objects rather than as bit maps. PostScript fonts are called outline fonts because the outline of each character is defined. They are also called scalable fonts because their size can be changed with PostScript commands. Given a single typeface definition, a PostScript printer can produce a multitude of fonts. In contrast, many non-PostScript printers represent fonts with bit maps. To print a bit-mapped typeface with different sizes, these printers require a complete set of bit maps for each size.
The principal advantage of object-oriented (vector) graphics over bit-mapped graphics is that object-oriented images take advantage of high-resolution output devices whereas bit-mapped images do not. A PostScript drawing looks much better when printed on a 600-dpi printer than on a 300-dpi printer. A bit-mapped image looks the same on both printers.
Every PostScript printer contains a built-in interpreter that executes PostScript instructions. If your laser printer does not come with PostScript support, you may be able to purchase a DIMM that contains PostScript.

About TCP/IP

TCP/IP has become an almost universal standard in network communications. Networks of all sizes, and in particular the Internet, depend upon TCP/IP protocols to enable communications between different segments and devices. Some examples of where TCP/IP is used:
The Internet, which facilitates
communications between computers all over the world, and access to data and applications at geographically scattered sites (including the World Wide Web)
* Intranets, which make information readily visible via a browser to users of a LAN or WAN, such as within a single corporation
* Extranets, which share data between users within a group of companies, for example a supplier may create an Extranet with its major customers to facilitate sharing of information
* Private networks: LANs and WANs where data is shared and e-mails are exchanged between members of a single organisation
* Virtual Private Networks (VPNs) where remote users can be given access rights to make a dial-in connection via modem to the resources of a private network (usually protected by encryption).
The wide use of TCP/IP means that you will need to understand the essentials of this group of protocols when installing and
maintaining networked machines.

PJL Command Structure

This article gives an overview of some commands

Media Select (Alphanumeric ID Command)
Format: ESC & n # W 100[string]
Hex: 1B 26 6E # 57 64[string] (# is specified in the text below)
Function: Assigns an ID string to the media type.
Description: Media selection is one function of the Alphanumeric ID Commands. By setting operation = 100, it is possible to assign string IDs to media types.
Render Algorithm Command
Format: ESC * t # J
Hex: 1B 2A 74 # 4A (# is specified in the text below)
Function: Sets the Render Algorithm.
Description: The value of # can be in the range 0 - 12. Any other value causes the command to be ignored.
Driver Configuration Command
Format: ESC * o # W [device_id function_index Arguments]
Hex: 1B 2A 6F # 57 (# is specified in the text below)
Function: Specifies Lightness, Saturation, Scaling Algorithm, Select/Download Color Map, Trapping Mode, and Total amount toner control.
Description: The value of # is fixed to 3. (The number of bytes of device_id + function_index + Arguments)
Description: The value of # is fixed to 3. (The number of bytes of device_id + function_index + Arguments)

Production Printing

When printing for a certain project, most companies or businesses settle for wholesale cheap printing to lower printing costs. However, though bulk printing is the most cost-effective way to print your advertising materials, it would be best to know the pros and cons to decide if it really suits your need. If you want to have something printed, it is not enough to know only the design and content that you want; it is also relevant that you know which kind of printing services this will look best. This is important so you know which would truly deliver the results you want.

Production Printing enables organizations to automate the reproduction of mass quantities of an original document. The production printing processes may be categorized into two broad groups: traditional plate printing and non-traditional plateless printing. The traditional image carrier processes produce numerous reproductions of an original subject by means of a printing press, which holds an inked image carrier and applies the pressure necessary to transfer the image to a substrate. Traditional processes include such methods as letterpress. Lithography, flexography, screen printing and gravure. The non-traditional printing processes do not use traditional image carriers or presses and include photography and non-contact processes like electro photography, thermal imaging, and ink jet printing. They use digital imaging and copier-like printers that produce an image during each cycle The non-traditional printing speed is much slower than traditional plate printing processing in that a large amount of computer memory is needed for repeating or changing information during each cycle. There is no make ready and no drying time, but the overall costs are slightly higher than the traditional printing. The non-traditional printing process is used for mainly short runs, on-demand or variable information printing.

The Gel Printers

Some printer manufacturer have introduced a new inkjet technology nowadays, called GelJet technology. Machines that use this technology are equipped with a GelJet engine. The gel used in the GelJet technology is a pigment-base ink. , it does not go into the fibers of the paper, bleeding the image. The gel dries as soon as it comes into contact with the paper. This minimizes smudging and bleeding images. To understand pigment-base ink we study main component of ink.

The main components of ink are:

Chemical base:

It is the carrier for the colorant and keeps the ink in a liquid state. It can be water, oil, or other solvent.


It is the substance that gives color to the ink. It can be a dye or a pigment. Ink that uses dye as the colorant is called dye-based ink. Ink that uses pigment as the colorant is called pigment-based ink.

Dye-based ink:

It is a chemical that fully dissolves in the chemical base. Generally dye-based ink has a brighter color than pigment-based ink, but because the dyes are dissolved in the chemical base, they tend to soak into the paper, which makes the ink less efficient and causing the ink to bleed into the paper.

Pigment-based ink (Gel)

A pigment does not dissolve in the chemical base. Pigment is a very fine powder of solid colorant particles, dispersed throughout the chemical base. The pigment particles do not soak into the paper together with the chemical base, they remain on or between the fibers on the surface of the paper. Because pigment particles are larger than dye particles, pigment-based ink is more durable and ultraviolet resistant. Also the pigment particles can be coated to enhance the properties of the ink.

Hewlett Packard Printer Command Language (Printer Languages)

Hp PCL or Hewlett Packard Printer Command Language was introduced by the Hewlett-Packard. It is independent of host system, device drivers, I/O interface, and network communications. Its purpose is to bring all HP printers together under a common control structure. HP used it in its first desktop laser printer. PCL is an Escape Code language. HP has been using this language for its dot-matrix and inkjet printers before the invention of laser printers. PCL commands are compact escape sequence codes that are embedded in the print job before being sent to the printer. PCL fonts quickly translate application output into high quality raster print images. PCL has several versions available.


PCL 1 was introduced in 1980. It is simple language having capabilities for basic printing. PCL 1 prints nothing but only text. Supported by all HP LaserJet series printers (except the HP LaserJet 3100 and 3150 series products).


PCL 2 added Electronic Data Processing/Transaction functionality. Supported by all HP LaserJet series printers (except the HP LaserJet 3100 and 3150 series products).


PCL 3 was introduced in 1984 with the original HP LaserJet. Released with the following printers:

HP LaserJet series printer,

HP LaserJet Plus series printer.

It provided the commands and features required for simple high quality word processing and data printing. Allowed for the use of a limited number of bitmapped fonts and graphics.

PCL 3 provided simple word processing and data sharing. It supported not only small bitmap fonts but also small bitmap graphic printing. Many other manufacturers emulate PCL 3 referred to as LaserJet Plus emulation. PCL 3 is still in use on several impact printers which replaced the obsoleted HP models. It does not support downloadable or scalable fonts. It is pixel based printer language that primarily describes images by pixel.


Released with the following printers: HP LaserJet Series II, HP LaserJet IID, HP LaserJet IIP, and HP LaserJet IIP Plus series printers.

Provided new page printing capabilities. Supported macros, larger bitmapped fonts and graphics. Introduced in 1985.

The LaserJet Plus printer was superseded by the LaserJet series II, also an 8 p.p.m. printer. The LaserJet II series of printers included the LaserJet IIP, a 4 p.p.m. personal printer, and the LaserJet IID, a duplex version of the LaserJet II. The LaserJet II introduced the PCL 4 language, which built upon PCL 3 by adding the ability to use more, larger bitmap fonts, and more bitmap graphics. The standard LaserJet II could manage just over half a page of bitmap graphics, but with the addition of some extra memory this could be expanded to a whole page.

PCL 4 was introduced on the HP LaserJet II in 1985, adding macros, larger bitmapped fonts and graphics. PCL 4 is still popular for many applications.

PCL 4 was backwards compatible with PCL 3 (PCL 3 jobs would print perfectly well under PCL 4), but the additional features took it well beyond the bounds of word-processing, and allowed it to be used for charts, graphics and simple desktop publishing. PCL 4 has been superseded for office printers, but is still commonly used in personal printers as it requires relatively little processing power in comparison with later versions of the PCL language. The version of PCL 4 used on the LaserJet IIP was a slightly enhanced over the version used on the standard LaserJet, and provided a compression method for bitmap graphics to reduce the amount of data which the computer had to send to the printer.

DTP applications

The following is a list of major desktop publishing software. A wide range of related software tools exist in this field, including many plug-ins and tools related to the applications listed below.
There is some overlap between desktop publishing and what is known as Hypermedia publishing (i.e. Web design, Kiosk, CD-ROM). Many graphical HTML editors such as Microsoft FrontPage and Adobe Dreamweaver use a layout engine similar to a DTP program. However, some Web designers still prefer to write HTML without the assistance of a WYSIWYG editor and resort to such software, if at all, solely for complex layout that cannot easily be rendered in hand-written HTML code.
There are several different DTP applications to produce professional layouts. They are distinguished by their different functions and manufacturers. Some of them are even from the same manufacturer like the Adobe products PageMaker, Indesign and Framemaker. In
this module, it is impossible to describe all functions and features for each program. For detailed information, visit their web pages. We can only give an overall view relating to their biggest differences. The most popular DTP applications are:
• Adobe PageMaker
• Adobe InDesign
• Adobe FrameMaker
• QuarkXPress

Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access (WPA) was designed by the Wi-Fi Alliance as a temporary security solution to provide for the use of 802.1x and enhancements in the use of WEP until the 802.11i standard would be ratified. This protocol was created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP). Authentication is handled by 802.1x and TKIP is used with WEP; however, the TKIP used by WPA is not compatible with Cisco’s older and proprietary form of TKIP. WPA can operate in two modes: personal and enterprise mode. Personal mode was designed for home or SOHO usage. A pre-shared key is used for authentication, requiring you to configure the same key on the clients and the AP. With this mode, no authentication server is necessary as it is in the official 802.1x standard. Enterprise mode is meant for large companies, where an authentication server will centralize the authentication credentials of the clients. TKIP could be implemented on pre-WPA wireless network interface cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required fewer modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the keystream from short packets to use for re-injection and spoofing.
WPA2 is the IEEE 802.11i implementation from the Wi-Fi Alliance. Instead of using WEP, which uses the weak RC4 encryption algorithm, the much more secure Advanced Encryption Standard (AES)–counter mode CBC-MAC Protocol (CCMP) algorithm is used. WPA2 implements the mandatory elements of 802.11i. In particular, it introduces a new AES-based algorithm, CCMP, which is considered fully secure. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. AES is used for encryption with a 128-bit key. AES-CCMP incorporates two cryptographic techniques—counter mode and CBC-MAC—and adapts them to wireless frames to provide a robust security protocol between the client and AP. Most newer Wi-Fi CERTIFIED devices support the security protocols discussed above, out-of-the-box, as compliance with this protocol has been required for a Wi-Fi certification since September 2003.

Extensible Authentication Protocol (EAP)

Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point-to-Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is not limited to wireless LANs and can be used for wired LAN authentication, it is most often used in wireless LANs. The WPA and WPA2 standard has officially adopted five EAP types as its official authentication mechanisms.
There are two varieties of EAP: one for wireless and one for LAN connections, commonly called EAP over LAN (EAPoL).
One of the concerns in wireless is allowing a WLAN client to communicate to devices behind an AP. Three standards define this process: EAP, 802.1x, and Remote Authentication Dial In User Service (RADIUS). EAP defines a standard way of encapsulating authentication information, such as a username and password or a digital certificate that the AP can use to authenticate the user. EAP is not a wire protocol; instead it only defines message formats. Each protocol that uses EAP defines a way to encapsulate EAP messages within that protocol's messages. In the case of 802.1X, this encapsulation is called EAPOL, "EAP over LANs". EAP is basically an extension of the Point-to-Point Protocol (PPP) and one of the first forms of EAP was EAP-MD5, which used Challenge Handshake Authentication Protocol (CHAP) for authentication. When EAP is invoked by an 802.1X enabled NAS (Network Access Server) device such as an 802.11 a/b/g Wireless Access Point, modern EAP methods can provide a secure authentication mechanism and negotiate a secure PMK (Pair-wise Master Key) between the client and NAS. The PMK can then be used for the wireless encryption session which uses TKIP or CCMP (based on AES) encryption. Here are some of the extensions of EAP:
Supports CHAP with static passwords for authentication. EAP-MD5 differs from other EAP methods in that it only provides authentication of the EAP peer to the EAP server but not mutual authentication. By not providing EAP server authentication, this EAP method is vulnerable to man-in-the-middle attacks
Supports x.509v3 digital certificates for authentication. It was co-developed by Funk Software and Certicom. It is widely supported across platforms, although there is no native OS support for this EAP protocol in Microsoft Windows, it requires the installation of small extra programs such as SecureW2.
(Lightweight EAP) Supports static passwords and allows for per-session WEP keys. It provides mutual authentication and session key establishment between an EAP peer and an EAP server
(Protected EAP) Supports static and one-time passwords (OTP), where SSL secures the connection so that MS-CHAP can be used for authentication and the username and password are encrypted to protect them from an eavesdropping attack (a digital certificate is required only on the server). The PEAP standard was created by Microsoft, Cisco, and RSA after EAP-TTLS had already come on the market. Even with its late start, Microsoft’s and Cisco’s size allowed them to quickly overtake EAP-TTLS in the market. So wide is the marketplace adoption of PEAP that even Funk Software, the inventor and backer of EAP-TTLS, had little choice but to support PEAP in their server and client software for wireless networks.
Supports faster authentication, where a shared secret key is used to encrypt authentication information (similar to PEAP)
PEAPv1/EAP-GTC was created by Cisco as an alternative to PEAPv0/EAP-MSCHAPv2. It allows the use of an inner authentication protocol other than Microsoft's MSCHAPv2. EAP-GTC (Generic Token Card) is defined in RFC 3748. It carries a text challenge from the authentication server, and a reply which is assumed to be generated by a security token. EAP-GTC does not protect the authentication data in any way.

What is Toner (Printer Supplies)

Toner is a powder used in laser printers and photocopiers to form the printed text and images on the paper.   Previously it was made of carbon powder. Then carbon was combined with polymer to develop the excellence of the printout. The heat of the fuser result melts toner cartridges elements to attach to the paper. The exact polymer used could be a Styrene Acryl ate Copolymer or a Polyester Resin, but it differs accordingly with the producer. Toner cartridges formulations vary from manufacturer to manufacturer and even from one machine to another machine. These formulae differ from each other in the grain size and melt point. To get a best print, some toner companies use a chemical process to grow toner particles. This results in size in more and more consistent shapes of cartridges particles. This lesser uniform shapes allow more accurate color reproduction and well-organized toner use.
In earlier machines, toner was poured by the user from a bottle into a reservoir in the machine. Modern machines feed directly from a cartridge. Empty cartridges are sometimes refilled by third party vendors.  Using toner cartridges against the laser cartridges is beneficiary. The laser printer toners are able to print thousands of pages, and are less expensive per page compared to inkjet cartridges. The printing speed is faster than inkjet cartridges while they almost work on every type of paper. In due course, they prove to be much economical if a lot of printing work is involved. A compatible cartridge benefits you with cost savings and at times massive savings up to 50%. It all depends upon your requirements to utilize these toner cartridges to enhance your printing.  Basically there are 2 types of cartridges, originals and non-originals and there are 2 types of non-originals being compatibles and remanufactured (this goes for inks also as does the information below). Otherwise known as non-genuine, after market this is how they work:- 
- Compatibles are actually a brand new cartridge manufactured to work in the same way (without breaking the trademark, copy protection laws) as the same original cartridge with the same machines. The benefit you gain from these is obviously cost savings with at times massive savings up to around 50%. The downside is they are not as environmentally friendly as remanufactured toners and there are the occasional failures and complaints about lower quality (though failure rates for the top companies making these are within industry norms and not significantly higher than those of the original manufacturers themselves) 

- Remanufactured toners however are a little different as they take an empty original (it should have only been used ONCE) and fill it with toner. As long as you buy from a reputable retailer it will have also been checked to determine if parts need to be replaced as well as toner refilled. You also get good cost savings as you do with compatibles but the environment wins out big time as you helping ‘close the loop’ by reusing an empty original. Once again the same applies as above with quality and failures.

As a fine powder, toner can remain suspended in the air for some period, and is considered to have health effects comparable to inert dust. It can be an irritant to people with respiratory conditions such as asthma or bronchitis. Following studies on bacteria in the 1970s that raised concerns about health effects resulting from pyrol, a contaminant created during manufacture of the carbon black used in black toner, manufacturing processes were changed to eliminate pyrol from the finished product. 
According to recent research, some laser printers emit submicrometer particles which have been associated in other environmental studies with respiratory diseases .

Linux Printer Installation

You can use a variety of tools to administer printers in CUPS. Some are special to your distribution, some are free and some are commercial. We tested CUPS mostly on a PC running SuSE Linux. We cannot say much about the use of CUPS with any other Linux distribution like RedHat or Linux Mandrake, but it should be very similar on any other system. The next section shows a “real life” example installation we did with a PI5501/Di450 and SuSE Linux. Any information given in this section is tested on SuSE Linux 7.3, but it should be easy to do it with nearly any other Linux distribution. But in that case we will not use SuSE’s YaST2!
Two ways on how to install a printer are shown in the following:
1. a GUI based installation (using the ESP web interface)
2. an installation with command line tools
To show this example, we used the web interface provided by CUPS. It is accessible via Port 631, the standard port for IPP and CUPS.
It is no problem if you have CUPS and other servers on the same machine while using this port.
1. Just type the following URL:
if you are working locally on your server
if you are working on a remote server. .
This procedure will lead you to the starting page of the web interface. Choose "Manage Printers" here to get to the printer overview. This screen shows you all printers installed on your system and their current status. Printers marked green are ready to print, printers marked red with an open tray are stopped. In that case you have to check whether there is a problem
2. In order to install a new one, choose "Add Printer" here.
3. Then you have to give a name to your new printer.
Note: According to the IPP specifications, CUPS is not case sensitive. That means, you do not have to look for the use of capitalization or the use of small initial letters (di351test and DI351TEST specify the same printer!).
Additionally you have the opportunity to give more information about your printer and the location or any other description that might be useful (e.g. any special features or configurations or maybe restrictions)
4. In this step you have to choose the type of connection that you are using for the printer you like to install. Possible settings you can choose are:
• Disk File
• App Socket /HP Jet Direct
• Internet printing protocol
• LPR/LPD Host or printer
• Parallel or serial ports
5. Now you have to put in a valid IP-address and a remote queue name for your printer.
Please see the given examples on the screen for the correct syntax.
6. Now choose your manufacturer. All the manufacturer names offered in this list and the model names offered in the list in Step 7 are generated by CUPS while using the PPD files stored in /usr/share/cups/model/[name of manufacturer] If your printer does not appear in this list, please make sure that there is a PPD file for it in this location. If it is not, get one and just copy it to this location.
7. Now you have to choose a printer. If your printer does not appear in the list you have to install a PPD file on your system.
You need to be logged in as root to do that (or use the “Sper user” command SU).
Now your printer is installed and ready to be configured.

Types of Viruses

Several types of viruses exist, but the popular ones are file viruses, macro (data file) viruses, and boot sector viruses. Each type differs slightly in the way it works and how it infects your system. Many viruses attack popular applications such as Microsoft Word, Excel, and PowerPoint; they are easy to use and it’s easy to create a virus for them. Because writing a unique virus is considered a challenge to a bored programmer, viruses are becoming more and more complex and harder to eradicate.
File Viruses
A file virus attacks executable application and system program files, such as those ending in .COM, .EXE, and .DLL. Most of these types of viruses replace some or all of the program code with their own. Only once the file is executed can the virus cause its damage. This includes loading itself into memory and waiting to infect other executables, further propagating its potentially destructive effects throughout a system or network. Examples of file viruses are Jerusalem and Nimda (although Nimda is usually seen as an Internet worm) may also infect common Windows files, as well as files with extensions such as .HTML, .HTM, and .ASP.
Macro Viruses
A macro is a script of commonly enacted commands that are used to automatically perform operations without a user’s intervention. Macro viruses use the Visual Basic macro scripting language to perform malicious or mischievous functions in data files created with Microsoft Office products, for example. Macro viruses are among the most harmless (but also the most annoying). Since macros are easy to write, macro viruses are among the most common viruses and are frequently found in Microsoft Word and PowerPoint. They affect the file you are working on. For example, you might be unable to save the file even though the Save function is working, or you might be unable to open a new document—you can only open a template. These viruses will not crash your system, but they are annoying. Cap and Cap A are examples of macro viruses.
Boot Sector Viruses
Boot sector viruses get into the master boot record. This is track one, sector one on your hard disk, and no applications are supposed to reside there. The computer at bootup checks this section to find a pointer for the operating system. If you have a multi-operating-system boot between various versions or instances of Windows, for example, this is where the pointers are stored. A boot sector virus will overwrite the boot sector, thereby making it look as if there is no pointer to your operating system. When you power up the computer, you will see a Missing Operating System or Hard Disk Not Found error message. Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of boot sector viruses.