I need some clarity on stealth mode

I've enabled stealth mode on my laptop, but I can still see my "Mark Goodchild's Laptop" on another computer in a Finder window under "Shared." Is that right?

So the ability for another computer to see mine on a network in the Finder is on a different level...
Yes. Just have File Sharing on so people on the same network can connect to your Mac.

Similar Messages

  • I need some clarity

    As scheduled in the roadworks thing I saw, work was to be performed on my road (by UK POWER NETWORKS (EDF ENERGY)) no doubt to power up the fibre cabinet, and this morning four vans appear, working on the cabinet again. When walking by I asked an OR guy how much longer it would be and he said not long at all now, so I can only assume they're almost ready to make it live (hopefully anyway).
    Anyway, I need some clarity if the cabinet does go live very soon.
    1) I'm currently with BE, who have begun getting a reputation of losing customers due to them holding back on fibre products and having network capacity problems. To switch to BT I presume I ask for a migration authorisation code and then phone BT and give them that whilst making the order (or would it be better if I ordered on the website)? My phone line itself is with BT, not BE.
    2) When I signup to Infinity eventually, I would also like to scrap anytime phone calls as I plan to use VOIP/SIP technologies instead. What would be the best way to do this? Should I arrange this just before I order Infinity, or should I arrange this after I've been activated on Infinity?
    3) How accurate are line estimations for fibre currently? For example, I get roughly 19mbit sync on ADSL2+ Annex A at 3dB SNR with BT giving an estimate of 17.5mbit. I presume with fibre the estimation BT gives is rather conservative and is usually slightly 5%-10% higher in reality, unless of course you have a seriously bad line riddled with joints or what not? I consider my line quite good, with a 25.5dB attenuation at the mentioned sync and SNR.
    4) I'm not racist or anything, but I prefer talking to people in the UK, preferably with a English accent as I can understand them clearly. How is this typically with BT? And if it's not typically speaking to people in a UK call centre then is there a way I can, if needed, speak to someone in the UK (or is it just a matter of ringing back until someone from the UK answers my call)?
    5) Throttling; Based on the experiences people have had with Infinity, how has your experience been with this? I understand BT's throttling policy is targetted at P2P, which assumably covers services such as torrent, not actual downloads from websites or FTP. I have read the fair usage policy so there's no need to direct me to that, I just want to know the experiences of users on Infinity themselves.
    And finally...
    6) I have a Cisco 887VA router, which does ADSL2+ and VDSL2 (up to 100mbit, 17a Profile), after BT Openreach have installed their modem can I at a later time (e.g. after the 10 day settling period they recommend) change it so that my Cisco 887VA router directly connects to the VDSL socket, or is this against BT's agreement?
    Thanks in advance.

    1 - Yep a MAC should be fine.
    2 - do it at the time of ordering Infinity
    3 - Pretty accurate, in fact most seem to be quite conservative
    4 - Technical help is based offshore
    5 - In my experience and according to BT only P2P is throttled
    6 - you should be able to use it. Quite a lot of people use the Draytek kit with no issues
    If you want to say thanks for a helpful answer,please click on the Ratings star on the left-hand side If the the reply answers your question then please mark as ’Mark as Accepted Solution’

  • I have seen this problem here and other forums but I need some clarity.

    Hey-
    (Sorry for the quick post, but I wanted to get this out there before I take off across the country so I might have some help when I am in NY by some help on here.)
    I purchased my first iPod this past Christmas. it was the iPod Nano 6 gen. I did a ton of research, read many post on various forums, and all the negative comments (except one) I felt I could live without, because I had not gotten use to any configuration of the Nano and the complaints seemed to not affect needing the Nano for exercising.
    The main problem with not being able to turn the Nano off or at least get it to a state where very little power was used seemed to be what was causing so much strife among new users. I thought I would read the posts, do some research, read the little manual that came with the Nano and the larger manual online at apple.com and figure out how Apple meant for this machine to be "turned off."
    I charged the pup up when I got it, changed my earphones to the new in the earphones and headed off to the gym. Since I had already done a considerable amount of research and played around with it to become familiar with the buttons and all before I it the gym, I felt I was OK to go for a workout. Since this was my very firs iPod, I had some challenges in synching the machine wit iTunes. I think I just need to understand the whole synch process ad probably do it manually. I turned the machine on when I got to the gym, got some tunes playing and hit the sleep/wake button so it would be a dark screen and save as much power as possible. I was actually shocked at how much power was used during the hour workout, especially since I did not play wit it at all during the workout.
    After the workout, I had learned from some people who were a bit more patient with finding oiut the best way to get the machine to use the least amount of power until their next use of the Nano. so, I turned the volume all the way down, paused the music that was playing, removed the earphones from the jack, and pressed the sleep/wake button in hopes I would have some power the next time I went to use it, which was the next day. That first workout it used about ½ of the battery icon and when I went to turn it on the next day for another workout I was shocked to see ¼ of the battery still charged.
    so, my questions or the main question is, despite all of my research on how the company meant for this machine to be put to sleep in-between uses, despite what I mentioned above what I did, is there any latest new from Apple out about why the battery hold such a crappy charge? Even following what the major Nano manual stated and even Applecare, the battery energy loss between one day was a shocker. I have read where people have not experienced this problem, but my question is does anybody know how Apple recommends that one leave the Nano when it is not in use? I understand it goes into a deep sleep after something like 36 hours, which seems insane to pick 36 hours. Also, if anybody has been able to figure out how Apple has built this machine to be put to sleep, I would really appreciate some help here.
    I have heard from many people that they can't have the Nano go to an off position because of the clock but come-on, there are many other tech devices that have a clock and are able to be put to sleep. You can still make a device to be put to sleep and still get the little energy it needs to keep the battery charged.
    any help in this area would be greatly appreciated. Let me recap on what I have learned from my research to do when not in use to keep as much energy as possible. First, make sure the volume is all the way down by the sound "waves" are not coming out of the display speaker make sure whatever is playing is on pause, make sue the pedometer is off, unplug the earphones, press the sleep/wake bottom and your good to go until you use it next. However this does not keep my battery from drawing a significant amount of power so that I have a decent amount of power for the next workout. I can't believe this is such an issue when the earlier Nanos had much more uses and must have needed much more power to even keep things working during the Sleep time.
    any help would be greatly appreciated.

    Are you on a dialup connection, using Web acceleration software?
    If so, try disabling the web accelerator. Does the download go through for you properly then?

  • Need some clarity on e-Commerce 5.0 for mySAP ERP

    Digging through the documentation I can find, I still can't make sufficient sense as to what, exactly, is required to get e-Commerce 5.0 for mySAP ERP up and running.  If we have an ECC 6.0 backend (ABAP stack only), what needs to be put into place?  From what I've heard it's supposed to be a pretty quick and simple thing to get up and running, but the documentation I've found so far just muddies the water quite a bit!

    HI,
    I  can obtain detailed description of product on russian after i installed SAP E-commerce for SAP ERP version 7.0 instead of version 5.0.
    Br,
    Dzmitry

  • Hi Experts need some clarity on these topics

    Hi Experts,
    Can anyone please guide me through the following questions
    1. What is summit implementation menthodology?
    2. What is the use of these different sevices?
    u2013 Shared Query Engine
    u2013 File Service
    u2013 Authentication
    3. Who will be the System Administrator( who can create App Sets)?
        How many Application Administrators will be in the team (who can create Applications)?
    Thanks and Regards,
    Sireesha.

    Hello,
    The Summit implementation methodology was a methodology used by Outlooksoft to implement the product. After the acquisition of Outlooksoft by SAP and gthe subsequent rebranding of the product into BPC, SAP has integrated different sets of implementation methodologies into the SAP ASAP (Accelerated SAP) methodology, which is SAP's way of doing things. Currently, SAP Expertise centers are rolling out these methodologies into BPC projects.
    Shared query engine: is the query engine BPC uses in the background to get queries and results back and from the server. Depending on the type of input the user has done/report the user need, the engine decides how to get this request handled, where to store the data and where to get the results from. The shared query engine runs on the application server.
    File Service: whenever you store pre-built reports onto the server or datafiles to be used in datamanager, basically anything that involves the user, admin or system doing something with files, these files are stored in the Webfolders (altough these may be called BPC folders these days)  directory and the file service hadles this traffic.
    Authentication: well basically you have user authentication setup using the security setup from BPC 9in the Admin tasks). This restricts users to have access to certain tasks, entities or other secured diemnsions. So the whole security setup determines authenticication on the server to what a user is allowed to do, see, to input or to edit. Then you have also authentication in the backend (between servers). This is osmething an admin should not worry to much about as the system is supposed to handle this for you. For instance, a datamanager package authenticates itself at the SQL server to store data into its tables. So there is a system authentication service too that decides if a datamanager job is allowed to talk to this SQL server instance. But agina, these technical authnetications probalby should not worry you as an admin or superuser as the system handles those. Of course IT people might e interested to figure out what services need certain types of authentication, but in general, even they should not bother too much as this all comes with the BPC design and they cannot do a lot about it anyway, just give the correct rights to certain services (as described in the installation manual)
    Finally, how many admins can there be ?
    Well you will have a pute technical systems admin somewhere who handles master password and stuuf. But that person is not a BPC admin in the true sense. Again, any IT organisation has those people. From the functional side, you should of ocurse have at least one admin, but you can vary the number based on functional requirements or maybe requirements that come from a segregation of duties principle that has been determined by an audit department. In general, you will find that the audit guys want as little admins as possible, but from an operational perspective it is normal to have at least 2 or 3 people who "manage" the system form a functional perspective.
    Hope this helps,
    Edwin van Geel
    SAP BPC EMEA

  • Roaming charges-need some clarity

    Okay, we have a 5 phone plan with US Cellular and are thinking about switching to Verizon. I want to know that I understand the roaming charges correctly. One of those phones spends most of its time with coverage only from a US Cellular tower that I know Verizon phones will roam on. If I get the 2000 Minute family plan, using the phone on a US Cellular tower will use my minutes at all times, even if I am calling another VZW phone? Nights and Weekends? But the Unlimited doesn't?
    Also, is free from any Verizon phone to another Verizon phone if you are both on Verizon towers ? From anywhere with the Unlimited plan
    Thanks.

    Here is some information on Verizonwireless calling plans for roaming, mobile to mobile and nights and weekends.
    Important Calling Plan Information
    Anytime Minutes, Mobile to Mobile, Night & Weekend Minutes and Per–Minute Rate are for use from within the Nationwide Rate and Coverage Area.
    Plan details:
    Unlimited Domestic Long Distance. (Airtime applies.)
    No domestic roaming charges. (Coverage not available in all areas)
    Night & Weekend Minutes
    Night Hrs: (M–F) 9:01 p.m.–5:59 a.m.
    Wknd Hrs: 12:00 a.m. Sat.–11:59 p.m. Sun.
    International Roaming
    Make or receive calls while traveling internationally with rates starting as low as 69¢/minute. While at home, some international destinations can be reached using 10–digit direct dialing; international long distance rates apply in addition to airtime charges. Please visit www.verizonwireless.com/international for a list of North American Dialing Pattern countries and rates.

  • Need some clarity on memory specifics

    I am so confused about what type of memory is correct for my imac after reading all the other post, i have a G4 imac flat with 800mhz, can i install a 1 GB SODIMM DDR2-667 PC2-5400 made for coreduo imac powerbook g4 into my computer?? I saw in other post that flat panel imac can use this type of RAM, before i buy it i want to be sure that it works. Please let me know. Thanks

    The answer is yes that is right chip for user slot but need tech expert to change installed chip-this is what I did.
    I have been going crazy with this memory thing but finally figured it out. I think the problem is 1) memory for certain old Macs is difficult to find and especially to match up 2) this particular model was very unique and I love mine but they only lasted 2 years. In 2002, 3 models came out, all different. In early 2003 Jobs cut down to 2 models. All the memory upgrades have to be specific to the exact model you have.
    I had to 1)check my machine for the data 2) contact Apple support for instructions on how to install. (And store does not carry any upgrade for these models-they are "obsolete".) I did find a great company though (don't waste your time with cheapies trying to get a bargain). It is IRAM and can be purchased through Newegg.com for about $80 (list is $100). But even they were wrong about the exact chip! (a 512K for user sot)
    It looks like we have the wrong specs on the configurator. You should use iRam part # IR512MSOSD.(from IRAM tech)
    this was my question:
    I sent earlier email about mem addition upgrade. I have a 2002 15" model and Apple manual states it has 144 pin So Dim slot. Also max expansion is 1 GB.
    I-Ram specs:
    ac G4 Flat Panel User Slot 15-inch 800MHz
    DDR 333MHz, 200-pin SODIMM
    Upgrade Options
    Capacity iRam Part #
    512MB IR512MSO333D
    1GB IR1GSO333D
    Machine Details
    Max Memory:
    2GB
    # of Slots:
    1
    Will the 512 MB work even though it states 200 pin as opposed to 144pin?
    So I got right one and now am running about 5 faster than before with no "thinking world" hang-ups and still use dial-up! So get one of these and use Mac support site and in 5 minutes you will be much happier with this very classic Mac!

  • Cannot get slide show in full screen mode to come up on secondary monitor regardless of how I set up show it always opens on primary screen.  Need some help here.

    Slide show in PowerPosint for mac 2011 on iMac will not open full screen mode on secondary monitor.  Regardless of how I set the slide show preferences it always opens on primary monior with secondardy monitor having totally balck screen.  Need some help if anyone else has run into this problem.

    You should contact Microsoft for Mac Support  and/or post in their forums.

  • Need to show some fields in display mode

    Hi, i need to show some fields in display mode for VA02 transaction code( is to change the values) for some particular users. so do we have any user exits for this requirement?
    Please answer me. its very urgent.. thanks in advance. 
    ex: payment terms and freight terms.

    you can try this for header level data
    MV45AFZZ exit ""USEREXIT_FIELD_MODIFICATION"
    code would be like below
       CASE screen-name.
    To suppress  Pricing total and Cuurency field at header
          WHEN 'VBAK-NETWR'.
    *YOU CAN ADD YOUR CONDITION HERE WHICH IF SATISFY THEN *EXECUTE NEXT  LINE OR SKIP IT   
          screen-INPUT = 0.
          WHEN 'VBAK-WAERK'.
              screen-INPUT = 0
        ENDCASE.
    but it depend upon what data AND in which tab you want to hide, like is it at header level or at item level or pricing (HEADER OR ITEM) data each of them have different exit to restrict data modification.
    ENJOY SAP.

  • Have I been hacked??? "Stealth Mode connection attempt to UDP"

    My Mac Mini has been running very slowly lately. Sometimes it takes half a minute to switch between apps, and I mean simple apps like Mail and Safari and Appleworks, not Photoshop. Photoshop is a joke it runs so slow. So I've run Onyx SEVERAL times, restarted and cleared my PRam, and nothing is helping. I also noticed it seemed like my Mini was "running" a lot (the hard drive making a noise like it was up to something when I'm not doing anything). So I looked at the cable box and the Ethernet light was flashing softly, going along with the hard drive noise. Then I downloaded something called MenuMeters and it is showing that I'm receiving data constantly - it goes between about 300B/s to 1500B/s, and sometimes it shows I'm sending too. So I opened up the System Preferences and found out that "Network Time" was enabled in the Firewall preference pane. I unchecked that but my Mini is still receiving. (I'm not on any Ethernet network or anything either.) So I opened Advanced and found that the "Block UDP Traffic" box is not checked, though the other two "Enable Firewall Logging" and "Enable Stealth Mode" are checked. THEN I opened the log file and was shocked to see 1048 lines, mostly reading ""Stealth Mode connection attempt to UDP," although once in a while I saw a few that said "12190 Deny TCP." And that 1048 is just for yesterday and today. Is that normal??? Sometimes the "Stealth Mode connection" lines are single (I mean, not to a repeating number), but sometimes they repeat two, three, even five times to the same number.
    Have I been hacked? Is someone stealing our small business data? Sounds kind of ridiculous, but can't help and worry some. Or do I have a virus? I tried to google whether or not there are any Mac viruses out there, that might pertain to this, but couldn't figure out anything. What do I do? I'm not very computer savvy, other than running my apps, and don't anything about Terminal or things like that. Even as I type this MenuMeters is showing me I'm receiving SOMETHING. Yikes!
    Mini   Mac OS X (10.4.8)  

    You mention one of the applications you have been using is Appleworks - which is not supplied with Intel systems, only PPC Macs. This would tend to suggest that your mini is a G4 model. It would be helpful to know which model the system is, what software you have on it, how much free space you have on your hard drive, and what you typically use the system for.
    It's interesting that you note the system seems generally busy, which would go some way to explain why it may also seem rather slow, but you haven't mentioned whether you've run Activity Monitor to see what processes are active when the system seems to be active with some task that is not of your doing. If you haven't tried this yet, do so now - and let us know what processes the system shows as active when otherwise the system ought to be idle.
    To answer a few of your broad questions: When the system is connected to the internet, it's not unusual to see a certain amount of data through-putting the network connection, but in most instances this would be in the region of 100-200B/s, with occasional, brief, spikes upwards of that. In the absence of a local router that level of data is likely to be higher, since basically your Mac is managing your internet connection and maintaining a public IP address assigned by your service provider. In a system with a router, the router handles this traffic so the resultant volume of data the Mac sees would be less.
    The fact you see entries in the log of the sort you describe is not necessarily an indicator of a problem. It may suggest that the system is being probed, which as Boece has said is not at all uncommon for a system with a public IP number - and is indeed why it's most common to find systems being used 'behind' a router. The router takes the public IP number, and so systems behind it are given internal addresses by the router which are not visible to the outside world. The Router then performs something called Network Address Translation (NAT) which converts internal and public addresses as needed to ensure the computer can communicate with the internet while still staying 'invisible'.
    In your position, I would look to add a basic router between your Mac and your cable/DSL modem because a hardware firewall is generally more effective than a software firewall, and NAT will keep your system clear of most potential hacking risks.
    As for the potential for a virus - this is a bit of a thorny subject because most will (rightly) say that MacOS is not the target of any known virus that exists in the wild. Unfortunately, that doesn't mean that it will remain that way, or that it's impossible to create malware that can infect or impact Mac systems. A good line of defense can be obtained by downloading and installing ClamXav (http://www.clamxav.com/) and setting it to examine vulnerable spots such as the desktop where files are typically downloaded or your mail folders, and using it to scan the system. Generally speaking, unlike antivirus products for Windows, this software does not consume copious amounts of CPU time (it grabs between 1 and 5% on my 1.25 G4 mini while in the background) so it's worth having around.
    You also mention running OnyX several times - this is not a good thing. OnyX, like the other utilities of this type, is a useful tool in resolving performance issues, but if you find that it doesn't work when you use it once, it indicates the problem is not something that OnyX can resolve. Running it multiple times doesn't necessarily do any harm, but it does mean that macOS is continually having to build new cache files etc, which makes the system run very badly!
    So....
    (1) tell us about your system, the software on it and what you use it for.
    (2) how much free space is on your hard drive.
    (3) run Activity Monitor and tell us what it shows when the system seems to be busy doing it's own thing.
    (4) download ClamXav and run it as described.
    (5) get an inexpensive router and insert that into your system as described (we can help explain how to set everything up once you've got it if you need assistance).

  • TS1702 I need some help the apps were downloading slowly

    The apps downloaded but it didn't cause it's stuck in downloading mode what should I do?
    The iOS 6 update didn't work.
    Please I need some help.
    The apps didn't download.
    Talking Angela and Ginger didn't download.
    Talking Santa didn't update.

    Try moving the existing backup file to a safe location so that iTunes has to create an entire new file.  The backup file is located here. You can delete that backup once you get a successfull backup.
    iTunes places the backup files in the following places:
    Mac: ~/Library/Application Support/MobileSync/Backup/
    Windows XP: \Documents and Settings\(username)\Application Data\Apple Computer\MobileSync\Backup\
    Windows Vista and Windows 7: \Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup\
    Note: If you do not see the AppData or Application Data folders, you may need to show hidden files (Windows XP,  Windows Vista and Windows 7), or iTunes may not be installed in the default location. Show hidden files and then search the hard drive for the Backup directory.

  • Stealth mode connection attempts?  Reason for Open DNS in router settings?

    Console is giving me repeated messages (many times per minute) that read
    "Stealth Mode connection attempt to UDP xxxx  from 208.67.222.222:53"
    That's a little scary to the uninitiated!   I've done some rummaging here and across the net on this.  I understand little of what I found or how to stop this.  I understand that the 208.67.222.222 is Open DNS related.  I was glad to discover that as I originally thought some malicious computer somewhere was trying to gain access to my MacBook Pro.  I thought I'd delete the DNS servers to see if that would help, but they are greyed out in the Preferences--Network--DNS panel and cannot be removed. 
    From what I've investigated, those Open DNS servers are set in the router.  I know how to change or delete those, but maybe I shouldn't.  In fact, maybe someone can remind me why I put them in there in the first place (years ago).  I vaguely recall some advantage to using Open DNS (faster?), although I'll confess that, of late, too often mistyped web addresses go to an Open DNS page, which is a nuisance.
    In any event, I'd like to do something that would stop the stealth mode "attacks".  While I'm sure I could ignore it, maybe it's eating up some browser or network time.  It also seems odd that it would go on and on! 

    Thanks for some info on this.  Should I only see it then, when I'm in a browser?  Or, when wi-fi is on?  I'm assuming that the Mac may be checking what time it is, although it seems a little too frequent for that!  (3 times a minute?  Well, maybe that's about right, but then Apple and Open DNS should coordinate so that this message doesn't show up.)
    I did find this:  http://forums.opendns.com/comments.php?DiscussionID=1785
    Does that make sense?  It's completely benign?  And doesn't waste CPU cycles?
    One problem with all this stealth mode logging is that it fills up the Console message window!  It thus means that there is gobs of stuff I have to wade through to see if there really is something going on from the outside!
    I did find two oddballs in there (I don't think they were open DNS as they weren't 208s), so the firewall is doing something.

  • Is there any way to set a stealth  mode on the ports in Panther

    The built-in firewall in Tiger provides a 'Stealth Mode' setting that makes the ports nonresponsive to external attempts to connect. The Panther firewall doesn't have this capability. Does anyone know of a way to enable this on a Panther machine (specifically 10.3.5 & 10.3.6) - even if it involves installing a utility application is ok.

    Ok, question for Karl.
    When I go to https://www.grc.com/x/ne.dll?bh0bkyd2
    and do the ShieldsUP Stealth test from outside my hardware firewall connected directly to the internet (SSH turned off for the test) why do I get this result?:
    GRC Port Authority Report created on UTC: 2006-09-25 at 06:03:43
    Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113,
    119, 135, 139, 143, 389, 443, 445,
    1002, 1024-1030, 1720, 5000
    0 Ports Open
    0 Ports Closed
    26 Ports Stealth
    26 Ports Tested
    ALL PORTS tested were found to be: STEALTH
    Specifically ftp reports this:
    21
    FTP
    Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!
    The only thing that fails is the PING test. Because they can ping my address. I don't have firewall turned on and I am running 10.3.9 not 10.4.
    Any ideas? Is this test just not thourough enough?
    Run the test for yourself and see. You will need to click Proceed at the bottom of the page to start the test.

  • Hi, can anyone help me out with this, I need some help on designing GUI for e-learning coursewares. Some tutorials or some helpful sites will do.

    I need some help with the GUI design.

    Have you tried the line inputs on the back of your FirePod? If you update its firmware (not sure if you will need to or not), I seem to remember hearing that the FirePod can run without FW connection, i.e. stand alone. In this mode with the outs from your mixer into line ins 1-2 (2nd from left on the back) it should work fine. I say should because I have never tried. However, these are used for returns from an external effects unit. I assume here, and the important word is assume, that there are two so that they can be used as a stereo send or as a mono send. Worth a try! Let us know how it goes.
    Best, Fred

  • Need some tips for Database Developer Role.

    Dear All,
    Next week, I'm going to face an Interview for Database Developer role.
    For this, I need some more & useful information on these recommended points.
    1. Involve in a designing part of Data warehouse from
    scratch 
    2. Create complex analytic queries on large data sets.
    3. Analyse trends in key metrics.
    4. Monitoring and optimizing the performance of the database.
    Please help get the vital information on these points.
    All help will be highly appreciated.
    Thanks,

    1. Involve in a designing part of Data warehouse from
    scratch
    Design Database...
    This needs lot of information about business and its fonctionnalités, and so many.. Tables,  relationships etc...
    http://technet.microsoft.com/en-us/library/ms187099%28v=sql.105%29.aspx
    Code Design...
    SP's, Funcitions, Views, Sub queries, Joins, Triggers etc...
    DW Design
    DB size and number of reports and historical data details, reduce the normalization and etc....
    http://technet.microsoft.com/en-us/library/aa902672%28v=sql.80%29.aspx
    2. Create complex analytic queries on large data sets.
    Its all based on your current database design, size, required output, data, performance etc..
    4. Monitoring and optimizing the performance of the database.
    Perfmon, Activity monitor, spotlight, custom queries, DMV's sp_whoisactive, execution plans, and many other thirdparty tools.. and may be best experience will give best view and clarity :)
    Note : This is very big topic and its not easy to answer in few words or lines... :) goole it for more details...
    Raju Rasagounder Sr MSSQL DBA

Maybe you are looking for