Monday, June 29, 2009

How your Find Free Cable Internet in your area?


Many internet cable provider normally offer free connection for the first few month or very cheap service in start. Some internet providers offer 2 month free internet in start if you pay payments for next 6 month.There are many DSL/Cable Internet web sites where you can search for best and cheap internet connection in your area. Usually the cheapest high speed cable Internet rate is of $15.00 a month, but this is not a standard rate , We have seen cheap cable Internet at $6.95 a month, but that's usually only for the first few months. But you can cheap more if you're getting value-added services: free anti-virus protection, free installation, etc.
Here are some advice for check connection:
-Avoid anything that sending you bulk e-mail with the words free cable Internet and you can use it any ware। -Don't trust offers of unlimited free cable Internet।
-Some internet provider offers you free trial for some period but ask for your credit card, and then automatically charge you after the trial period has expired। -Beware of offers for a free cable modem or other equipment।

Tips On Buying A Computer Memory.


- Introduction of Computer memory.
The Computer memory plays very important role in data processing. Computer memory means the computer can use powerful program with large size. It also improves the data procession speed of computer, that is way it is very important to verify When purchasing a computer memory, this memory is suitable for your computer and needs. Below is a listing of different considerations and tips to look for when purchasing computer memory.

-Type Of Memory
There are many types of memory available in market, Before purchasing any memory or considering purchasing memory it is important that you distinguish the type of memory that is required। Below is a listing of some of the configurations of computer memory.

-Memory type: SIMM, DIMM, RIMM,

-Amount of Pins: 72-Pin, 30-Pin,

-Speed of memory: 10ns, 60ns, 70ns, etc


Sunday, June 28, 2009

How to protect your computer with advanced backup and recovery?


A backup is a duplicate copy of a file, program or disk that can be used if the original copy is lost, damaged, or destroyed. Thus, if you regularly take backups of your sensitive data or programs and update them as and when needed, system failures can be covered easily through these backups. For example, in Norton Ghost, you can takes backup of your complete system within minute. Norton Ghost by Symantec provides us a complete solution of system backup. Norton Ghost has a very simple wizard base control panel to help the all level of users. Norton Ghost offerings with the full system backup and restore, partition backup, file and folders backup, backup using compression and encryption and incremental backups also.
Using Norton Ghost, you can create the image of full hard disk to another hard disk, or image of one partition to other partitions. You can store this image to almost any media CD/DVD, USB, external storage device, zip drive and network drive also. You can download this tool for any windows version using Symantec website. Download it and run the easy setup.
-After installation launch Norton Ghost, the first screen will appear with title “Norton Ghost Year”. First click on “Backup” (Backup your computer to a Ghost image file) link and then click on Next button to start backup process.
-Here you can select disk or partition to backup, If you want to create backup of your C drive (windows with all installed programs), then select only C drive under “Source” section. Now under destination section, select the option “File” (hard disk) or “Recordable CD or DVD” (if you have CD/DVD writer and empty writeable CD/ DVD) and click Next button.
-Now click on Browse button to choose destination drive then enter image file name and click on “Save” button.
-Again press the Next button to open Advance settings (optional setting), click on advance settings button, if want to choose compression, image password and others features.
-Now click on Next button to view the summary. Press “Run Now” button to start process
-Here a message will prompt you, save your data and close all open application.
-When you pressed Ok button, your system will restart to run Norton Ghost (DOS base process).

Friday, June 26, 2009

Hard Drive


Your hard drive, or also called hard disk, is a gigantic diskette in your computer. It is one disk big enough to store you Operating System, games and programs. Without it, your PC is just an empty shell.
-Check Your BIOS
Better beware of older systems with large hard drives. If you have an older motherboard, your BIOS might not recognize hard drives larger than 2.1 GB. Hopefully, your BIOS is EPROM which means although read only (noticed the ROM?) it can be edited by authorized editors. Nearly all newer motherboards support that. All you need to do is to go online, go to your motherboard manufacturer's website and try to download a flash BIOS update. Install it and it should be done.
-Are You FAT Enough?
If you have a large capacity hard drive with more than 2.1 GB, you might have a problem. Windows 95 itself will only recognize a partition with not more than 2.1 GB. You need FAT32. With FAT32, you can have one large capacity hard drive without partitioning. You will also save some space with FAT32. In short, larger hard drives require FAT32.
-Consider Partitioning
Although you can have one big fat hard drive as one partition, you should consider partitioning as well, if you have a big hare drive. Partitioning is the method of dividing an area on a disk into smaller portions of lesser capacities that can be recognized by the operating system. Picture this: your hard drive is a cake. It is easier to eat a cake divided into pieces than to eat it whole.Partitioning enables you to achieve greater efficiency and functionality from high-capacity disks (2.1GB or greater). You can create partitions by using FDISK on a system running in MS-DOS mode or by using a third-party disk utility. Remember that after partitioning, all data will be loss so be careful.You can set aside a small partition for backup purposes. In case you should decided to format, just format the partition you use to store Windows. Your data in the backup partition is still there. But be careful! If you format a FAT32 partition with a FAT16 formatting utility, your partitions with data in it will all be loss! So never install DOS after formatting Windows. Because DOS utilizes FAT16, your FAT32 partition will all be gone.
-Access Time or Seek Time?
If you want to buy a hard drive but are confused with the specifications of access time and seek time, remember that the key to the speed of a hard drive is the average access time. This is the time taken to access a single sector to the time when the drive's head reaches the sector. But beware, some ads quote seek time that is not the appropriate measurement. Access time is seek time plus latency (the time it takes for the chosen sector to come around to be positioned under the read/write head)
-Speed, Not Space
A lot of people are confused between speed and space. If you have a Quantum Fireball with 1.2 GB and a Quantum Bigfoot with 3.5 GB surely you should put the Bigfoot as the master and Fireball as the slave right? Wrong! You should always consider speed as well as space. The Quantum Fireball has a faster access time. A faster hard drive means better performance. Make sure your operating system is store in the faster hard drive. You can use the Bigfoot to store your programs or games which makes not much difference to the speed. With speed hungry programs or games, store them in the faster drive too. You must know what to put where.The status of the drives is determined by setting small jumpers that are usually located next to the IDE connector on the drive itself.

How to enable the advance performance setting in windows vista?


If you have noticed that the speed of your system is very slow with windows vista then today tip is very useful for you to increase the performance of windows vista. There is some default setting in vista which is used to manage the write caching on disk. By default windows enabled the write caching on disk but the advanced performance setting is disabled.
Follow the given steps to configure the advance performance setting in Windows Vista:
To enable this feature, you will need to be logged into your computer with administrative rights.
-First right click on My Computer icon then select the option Manage.
-Here small windows will appear with title Computer Management, now select the Device Manager option, then locate the SATA Disk under the Disk Drives.
-Here select the enable advanced performance sittings on the SATA disk.
-Now click on Ok button to apply the setting and restart your computer after any changes to go into effect.

Thursday, June 25, 2009

Problems with spyware:

Several problems present themselves when a user has spyware on their system.

Pornographic advertising:
Spyware creates targeted advertisements can be a problem. The ads will be created from information such as websites and advertisements visited previously. If children are using the same computer, this can be a problem. If the adult user visits a pornographic site, the minor could receive targeted advertisements which contain pornographic material. Sometimes the targeting of ads can be for pornographic advertisements without anyone having visited adult sites.

Annoyance:
Spyware can be a huge annoyance to computer users. Created Pop Up ads often appear when web pages are opened or closed. This can cause hours of wasted effort because many of the Pop Ups create more popup ads as they are closed, in an ever expanding cycle.

Computer Memory and CPU Resource:
Some spyware allows the unauthorized use of computer memory and cpu resources. This includes running programs while a PC is not busy. However, increased use of a computer memory, processor and harddisk increases the wear and tear on the components, and reduces its functional lifetime. In some cases resources are used for malicious purposes, such as mailing spam or viruses to everyone in your addressbook.

Lose control of your PC:
Spyware can change browser's homepage and other settings without the user's knowledge or permission. These changes can include turning off firewall and security protection so the spyware can communicate with external resources, making them potentially dangerous.

Wednesday, June 24, 2009

Break or recover the router password

-Turn the power switch off and back on to recycle the power.

- Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Break or another combination.

- At the > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.

>o

Configuration register = 0x2102 at last boot

Bit# Configuration register option settings:

15 Diagnostic mode disabled.

-Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload.

-Type i to have the router reboot. The router ignores the configuration in NVRAM.

-The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog.

-Type enable ate the Router> prompt to go to privileged exec mode.

-Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.

-View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed.

-Enter the configuration mode by typing configure terminal. Change the line of enable passwords as necessary.

-All interfaces are in a shutdown state. Issue the no shutdown command on every interface that is to be used.

-Type config-register 0x2102 to return the router to normal operation at the next reloads.

- Exit configuration mode by pressing Ctrl-Z

-Save your changes by typing write memory or copy running-config startup-config.

- Reload the router and verify the passwords.

Tuesday, June 23, 2009

Database Security, Authorization and Encryption rules

Database security is concerned with authorization rules, user-defined procedures, data encryption and authentication schemes etc. Let's have a detailed overview of these concepts:

-Authentication Rules
Authentication rules are restriction on users, applied through DBMS for controlling data access and limiting actions on data. For example, a user can access a database table after giving a valid username and password. Another user can change records in the table but cannot add new records. Senior users are given full authority to take any action with the table. This authorization is applied by DBA according to the sensitivity of data and organizational rules.

-User-Defined Procedures
In addition to the passwords and usernames, users can define their own procedures for security. For example, a user can add some secret questions in the procedure, in order to secure his account. Now, whenever the user logs in, he has to give procedure name along with his password. The procedure will ask the answers of the given secret questions and on submission of correct answers the user is given access to the database.

-Encryption
Data encryption is a technique in which highly sensitive data is encoded (converted into unreadable form) before its storage or transmission over a network. The encoding method is kept tightly protected by the DBMS. The encoded data decoded (reverse process of encoding) for authenticated users only. Thus unauthorized users cannot read data and sensitive data is automatically encoded by DBMS. For example, in ATM system the pin code provided by the customer is encoded (encrypted) before its submission to the database server. A DBA can also manually encrypt data when needed.

-Authentication schemes

Illegal access to computer resources is becoming a serious problem in the modern world. Passwords and usernames cannot identify the actual person who is logging on the computer system. Password can be leaked out or stolen therefore; it is not a secure method to block illegal access. Alternatively, some systems are using other authentication schemes for this purpose. These authentication schemes include signature dynamics, fingerprints and retina prints etc. Smart cards are normally used for the implementation of these schemes. For example, fingerprints are permanently stored on the smart card and whenever user wants to log in, he is required to insert his card into a card reader. He is also required to scan his fingerprints. Now if saved fingerprints on card and his actual fingerprints match with each other he is given access otherwise access is denied.

Monday, June 22, 2009

Tips for uncapping cable modem

ISPs frown on bandwidth hogs, and hackers who uncap cable modem limits with a cable modem un capper or an uncapping machine.
Cable Internet providers and ISPs don't limit bandwidth to make your life miserable (that's what dial-up is for.) They do it to prevent people from running huge bandwidth-hogging Web servers on their cable Internet connections.
In addition, ISPs have a whole network of customers to distribute bandwidth among. It's the same principle as parents giving every kid the same allowance – it's just fair to everyone.
-Uncapping and Docsis
One tutorial on the Internet gives you an uncap cable modem tutorial that includes instructions on how to change Docsis specifications. We won't post the instructions here. Altering Docsis is like backing up in an area with warning signs saying, “Do not back up, severe tire damage.” Uncapping machine, cable modem uncapper, the tool doesn't matter. Your ISP/cable Internet provider monitors Docsis specifications and can look for red flags. Besides, the speed increase will be negligible.
Uncapping=Increase in Bandwidth?
Stealing bandwidth is illegal. The chances that you'll gain insane amounts of bandwidth by using a cable modem uncapper or uncapping machine are negligible, and not worth getting banned from your ISP for life plus jail time. Most high-end servers can only handle 8 Mbps. Hackers on the net may be saying, in ungrammatical posts, “Uncap cable modem, u know u want too,” but you can't enjoy the bandwidth boom from the county jail.
-Uncapping Alternatives
More uncapping cable modem tips:There are many terrific cable modem speed tweaks out there. You can increase your speed and bandwidth without ever needing:
• An uncap cable modem tutorial• A cable modem uncapper• An uncapping machine• A hacker
There are excellent speed optimizer programs for purchase and available as freeware or shareware. Alternately, you can change your computer's settings yourself without needing to do anything to your cable modem.
-OneStep Cable Modem Uncap
OneStep is supposed to be the Arnold Schwarzenegger of cable modem uncapper programs, a lean mean uncapping machine.
The brainchild of shadowy criminals calling themselves “DerEngel” and “Byter,” OneStep sends disgruntled cable Internet subscribers into frenzied anticipation. But Netizens content with 3 Mbps and unwilling to face exile in the form of dialup advise against buying into the uncap cable modem program, although DerEngel reportedly insists OneStep is legit. DerEngel also plans to provide disclaimers and warning statements for those who want the mammoth 30 megabyte program.
OneStep is supposed to make uncapping safe, but many Netizens say to steer clear.
-ISP Monitoring of Cable Modem Uncapping
Your ISP and/or cable company monitors the network. If your neighbors hold an “uncap cable modem” party, the ISP can detect that your neighbors' bandwidth is above specified limits. The ISP can query the network to find your MAC address (not to be confused with Macintosh) and identify you as the source of the uncapping. In addition, many ISPs have modified the config file sent to the modem to detect when the cap is exceeded, at which point the modem shuts down. No matter how clever the uncapping machine or cable modem uncapper, the ISP can still catch you.
Legally Uncap Cable Modems?
If you're thinking about uncapping your cable modem, especially if the modem cable with a cable Internet service provider, be warned. Your service agreement prohibits uncapping, removing software blocks that limit or “cap” bandwidth.
Uncap your cable modem and you will at the very least be banned from your ISP for life. In the case of subscribers who uncapped cable modems provided by Buckeye Cable of Ohio, the FBI seized the offenders' computer equipment, although reports suggest this may have been excessive punishment.
Some critics argue that the laws about cable modem uncapping are not clearly defined. But most of us would probably do well to avoid an uncapping machine or a cable modem uncapper.
-Cable Modem Uncapper
Uncapping cable modem tips:A cable modem uncapper is a program floating around the Internet that uncaps the bandwidth limits either included in your cable modem or programmed in by your cable Internet provider. It's available in a Zip file, but be advised that using this program to uncap cable modem equipment will at the very least get your ISP service terminated. Thanks to Docsis and to the cable company monitoring users' modems for bandwidth hogging, using the cable modem uncapper program is in the category of “use at your own risk,” much like an uncapping machine.
There are also other uncapping programs users have offered in internet forums, including links to sites devoted to cable modem hacks. Again, this is murky territory.
Uncapping Doesn't Work
Several uncap cable modem proponents will tell you that they've been able to coax ten times the bandwidth out of their cable modems since they've run a cable modem uncapper or used and uncapping machine.
However, most tech experts agree that uncapping doesn't work, except on older modems. Also, experts say the bandwidth limit is enforced at the head end, and there's no way around this design. In the event you do increase the cap, you have to reboot the cable modem to make the change permanent, but once you do, the modem will contact the head end computer and download the latest settings, including the speed limits, which are most likely the ones you just tried to bypass through uncapping.
Uncapping Tutorials
Like specs on how to create viruses or how to start your own MLM business, tutorials on “how to uncap cable modem” are abundant on the Internet.” They feed the perpetual motion uncapping machine started by a few hackers and cable subscribers dissatisfied with their cable Internet service.
Like cable modem uncapper programs, cable modem uncapping tutorials are questionable at best, illegal at worst. If you do some research online, you'll find that cable modem uncapping tutorials are usually posted by poor spellers in tech forums. Most cable modem users treat them with about the same credibility as junk e-mail advertising.

Sunday, June 21, 2009

How to print webpage without backgrounds?

You can prints out any webpage with its background colors and with out background colors using Internet Explorer setting. Generally Internet Explorer setting "Print background colors and images" is disable, if you print webpage without background colors, then you can speed up your printing and save printer ink. But important thing to always preview WebPages before you print, in Internet Explorer go to File menu, then click on Print Preview option.

To enable or disable print background colors option, open your system Internet Explorer.

-Click the Tools menu and then go to Internet Options and open it. Here click the Advanced tab then scroll down to find the option Printing section.

-Now check the option "Print background colors and images" then Apply and ok.

Saturday, June 20, 2009

Turn on shortcut to screensaver

-You can run screensaver on your system with a single click, If you have any screensaver file like .scr extension, or first download it using Internet, there are many free sites for screensaver downloading.

-If you have not any .scr file then please go to Start button, and click on Search button. Here in search windows type *.scr and search all screen saver file from your hard disk.

-Here you will find a list of screensavers in the results. Pick a screensaver you want. You can preview it by double-clicking it.

-Right click on the file, choose Send To, and then click Desktop (create shortcut).

-To activate the screensaver, double-click the icon on your desktop.

Thursday, June 18, 2009

Be Careful with Attachments

There have been a number of really bad viruses just within the past 6 months. We've seen the W32.Beagle, W32.Netsky, MyDoom, and so on. Most of these viruses were transported or replicated from pc to pc-using email attachments. These are easy to spot if you're paying attention, simply because they are usually executable files, but not always.
Some attachments contain Macros (simple programs that run within other programs, all the titles in Microsoft Office use macros). If you're not that familiar with spotting file extensions, don't worry, that's what I'm here to talk about today. If you are a little hazy on the whole "file extension" thing then let's spend a few moments explaining it.
File extensions are what tell the program how to treat a particular piece of data. For example, most people are somewhat familiar with .doc or a .txt file extensions these are both text documents and when the user opens this file the Operating System looks at this extension and then knows how to open it.
Hackers try to use some sort of eye-grabbing ploy to get you to open their email and activate the virus, which is always an attachment. Most Anti-virus nowadays stops, or at least warns, you of these high risk attachments and even take measures to protect you. However, on the average 10-15 new viruses are created every day and I personally wouldn't count on any program to 100% protect my pc. That's why I scrutinize any email, if I wasn't expecting an attachment, I won't open it until I had a chance to talk to the sender.
Some of the more common file types used to hide viruses include:
.scr - Windows Screen Saver - USE CAUTION if you receive a screen saver via email. They can contain worms or viruses .pif - DO NOT OPEN! This is most likely a virus. Clicking it will run a program or code that can mess up your computer. .exe - executable file - a program that contains a virus, Trojan horse, or worm .pps - MS PowerPoint (can contain macro virus) .zip - Zip (compressed) file .vbs - Visual Basic script .bat - Executable MS-DOS batch file .com - DOS executable command .asp - active server page - internet script .doc - Word document (can contain macro virus) .xls - Excel file (can contain macro virus)
This is in no way a complete list. Just because an attachment may have one of these extensions doesn't mean that it is a virus, but it should send up warning flags. Hackers use clever subject lines, and viruses can appear to come from a friend so keep on your toes and don't fall victim to their deceptive traps. Scan those attachments and verify with the sender before opening.

How to enable the advance performance setting in windows vista?

If you have noticed that the speed of your system is very slow with windows vista then today tip is very useful for you to increase the performance of windows vista. There is some default setting in vista which is used to manage the write caching on disk. By default windows enabled the write caching on disk but the advanced performance setting is disabled.
Follow the given steps to configure the advance performance setting in Windows Vista:
To enable this feature, you will need to be logged into your computer with administrative rights.

-First right click on My Computer icon then select the option Manage.

-Here small windows will appear with title Computer Management, now select the Device Manager option, then locate the SATA Disk under the Disk Drives.

-Here select the enable advanced performance sittings on the SATA disk.

-Now click on Ok button to apply the setting and restart your computer after any changes to go into effect.

Tuesday, June 16, 2009

Erase Your Hard Drive


People give their old PCs away to family members, charities, and some end up at the local PC repair shop without ever being properly wiped clean. Everything stored on your PC is on the hard drive. There was a two-year experiment done by MIT graduates Ali and Eman where they collected 156 hard drives from various places (the web, ebay, PC shops, and businesses). Out of the 158 drives tested, 129 drives worked and hardly any of them were properly wiped clean. There were thousands of credit card numbers, private "adult" stuff, love letters, you name it, that was completely recoverable on these drives.
Most people believe that deleting data and then cleaning out the recycle bin does a sufficient job. This is NOT the case. When you delete something in windows, it just marks it to be overwritten. There is also a misconception that formatting a hard drive permanently erases stored data. This is also not true, a format just reconstructs the allocation table and checks the blocks on the disk. It does nothing actively to remove the data; it simply leaves it "unprotected". With both of these scenarios, if you have the right software you can recover data thought to be unrecoverable.
So, how do we erase this data on a hard drive for good? You can physically destroy the drive but that's not as easy as you think and you would be amazed at what people can recover data from. There are cases where people have drilled holes in the platters and it could still be recovered. You can take it to a PC repair store that has a Degausser that removes all the magnetism from the drive leaving it useless for good, but this can be way too expensive to justify the price for the common end user. You can write Zeros to the drive with the utilities at the hard drive manufacturer site and that will stop most people, but experienced users can still recover it.
If you don't want to destroy the drive, and are concerned about keeping your privacy then check out these two free programs that can take your hard drive to a state of non-recoverability...

Monday, June 15, 2009

How to compress files in Winrar using advanced parameters?

This tip will help you to manage the computer disk space using file compression utilities. You can run the data compression utility with advanced compression parameters to compress 15% more than normal method that you do not access often. Common file compression utility include Winrar is the more powerful and popular tool than other compression tools. You can download this tool from any free utilities website. Download it and run the easy setup.
Follow the given steps to compress your data with advanced parameters:
-After installation launch winrar, the first screen will appear with many options.
-Now right click on your file and then select the option "Add to archive" from the context menu.
-Here a window dialog will appear with title "Archive name and parameters". In General tab, click on "Compression Method" button to select the "Best" option from dropdown menu.
-Now select the Advanced tab and click on Compression button to display the advanced compression parameters.
-Now under the "Text Compression" area, select "Force" radio button and change the "Prediction order" value to 63 then change "Memory to use" type to 128. Now click Ok button to finish the process.
This all compression method will help you to compress your data 15% more than normal method.

Sunday, June 14, 2009

Wireless Internet Tips

Wireless Internet Sharing
If you plan on sharing your wireless internet access, you will need to have that option turned on in your settings. However, if you do not have other computers hooked up to the network at this time, for security purposes, you should leave the setting turned off until the need arises to share the wireless internet access.
--------------------------------------------------------------------------------
Wireless Internet Speeds
Coming in at the slowest is Bluetooth, followed by 802.11b, 802.11a and topping the charts currently is 802.11g. 802.11b is roughly equivalent to the traditional wired 10BaseT Wired Ethernet networks. Therefore, switching to Wi-Fi should not considerably slow down your wireless internet connection.
--------------------------------------------------------------------------------
Wireless Network Equipment While Traveling
You will need to have a wireless network card, either an adapter or integrated in your laptop. If you do not have an available slot on your PC, there are adapters you can purchase that plug into a USB port on the computer.
--------------------------------------------------------------------------------
Finding a Wireless Internet Hot Spot
There are several stores and restaurants that offer wireless internet access, such as Starbucks. If you have a particular destination in mind, you can call the hotels to see if they offer the service. There are also hot spot directories that you can search to find wireless internet access.
--------------------------------------------------------------------------------
Wireless internet - WiFi Standards
802.11 is the Wi-Fi standard, however there are other standards which are variations of the 802.11. These include:
802.11a 802.11b 802.11g 802.11i. The differences among these standards includes speed, transmission frequency, and price. 802.11g is backwards compatible with previous products, but that is not the case with 802.11a. Make sure you check on compatibility issues prior to purchasing products.
--------------------------------------------------------------------------------
Wireless Internet and Dial up
It is possible to share a wireless internet connection with dial up, but it is not a very good idea. Some access points, such as the airport extreme base station from Apple, will allow this. However, there is some slow down time with sharing a wireless internet connection, and if you decide to share a dial up connection, you won't be surfing anything fast.
--------------------------------------------------------------------------------
Finding a Wireless Internet Hot Spot in a Chain
If you are traveling and know that you will be stopping at Starbucks, for example, and want to access the internet, you can check out their website to see what specific franchises offer wireless internet access.
--------------------------------------------------------------------------------
Paying for Wireless Internet Access
Most likely, you will need to pay for the high speed wireless internet access when you travel. Starbucks for example uses T-mobile as their wireless internet provider. You will need to have a t-mobile account in order to access wi-fi at Starbucks. There are some restaurants that may advertise free Wi-Fi, but in general, you should expect to pay a fee.
--------------------------------------------------------------------------------
Nationwide Wireless Internet Service
There are a plethora of national wireless high speed internet services available. AT&T, Sprint PCS, T-mobile, and Verizon are a few which offer nationwide service. You will want to check out various pricing, roaming policies and fees for the various networks.
--------------------------------------------------------------------------------
Mixing Apples and PC's to Share Wireless Internet Connection
You can mix apple and PC on a wireless network and share a wireless internet access. For example, Apple makes an access point called the AirPort Extreme Base station. Even though it is made by Apple, it still uses the Wi-Fi standard, and PC computers with a wireless adapter on the network will be able to share the wireless internet connection
--------------------------------------------------------------------------------
Mixing Wireless Internet and Wired Internet
You can easily share a wireless internet access while still maintaining a wired network. There are many wireless routers on the market which offer both wired and wireless network capabilities. It is also possible to add on an access point after a wired router for wireless access.
--------------------------------------------------------------------------------
Configuring Wireless Access Point to Share Wireless Internet Connection
Once you install the drivers on your computer for the access point, you will be able to open up the configuration software that comes with the router. The IP address 192.168.0.0 is the lowest in the network and should be dedicated to the router. Make sure to follow the specific configuration instructions that come with your wireless router, as each product will be slightly different from one another.
--------------------------------------------------------------------------------
Wireless Internet Equipment
The beauty of the WI-FI is that it set a standard for wireless networking. Because of this, you do not need to have equipment from all the same venders in order to run a successful wireless network. You will be able to share wireless internet access as well without having equipment from all the same venders.
--------------------------------------------------------------------------------
Configuring Wireless Internet Card
You will need to use the configuration software that comes with your network card to configure your computer to work at various hot spots. Simply type in the hotspot network name (various depending on the service you are using) and state the type of network, such as access point. You can also scan available wireless broadband internet access in the area and choose which network you wish to connect with.
--------------------------------------------------------------------------------
Wireless Internet WIFI
WI-FI, the 802.11 standard, is important for a variety of reasons. Having a standard in the industry ensures that anyone using wi-fi will be using the same standard, therefore equipment and connections are interchangeable. Having a set standard makes setting up wireless networks, sharing wireless internet access and working with wireless equipment more users friendly.

Friday, June 12, 2009

How to Find What Virus was Removed

Norton does a great job of protecting me from viruses. It will pop up and let me know that it is scanning outgoing and incoming mail. While receiving email, if the program runs across a virus it will pop up a save window letting me know where the backup file is being saved, This is usually the quarantine folder within the Norton program. With Outlook / Outlook Express simply right click the paperclip icon in the preview pane. You'll see that the attachment is called "Norton Antivirus Deleted1.txt", click the file.

A message will come up in notepad telling you the name of the infected document that was removed and what virus it contained


McAfee has very similar features: it scans my incoming and outgoing mail and it pops up to let me know when there's a threat in my email. The pop up window in McAfee also has the name of the potential virus with a link to more information concerning the virus in question.


This is nice and because you can see the threat without going though the procedure of clicking the paperclip for the name of the virus like in the before mentioned Norton antivirus. However, you can view the virus information by clicking on the paperclip like you do with Norton if you didn't catch the virus name in the initial pop up and would like view information on it.
Both McAfee and Norton have virus information sections of their website. This is a good place to take any information that you have gathered on the virus or threat, and plug it in. This can give you a really good idea about what's going on in your system and over time make you a virus expert.

Tips about Bandwidth Tests

Reason about bad Bandwidth Results

There are many reasons to change the value of bandwidth tests such as
-Signal interference
-User location
-Downloading site status
-Viruses
-Network Bandwidth Test
If you have a network in your home or office and sharing your internet connection then first you should use bandwidth meter test to check your local network bandwidth performance. Because network bandwidth speed test applications are used to point out the problem and help to deploy network monitoring system to improve your bandwidth management. Your bandwidth speed can affect your business performance, especially if you have a business Web site you maintain on your home network.
If your are using wireless cable internet connection that result will different with regular cable internet connection. But the same disturbances affect wireless bandwidth speed tests as regular cable internet.
File size and location of file
user Time and location.
Application usage
Heavy traffic through connection

Thursday, June 11, 2009

OSPF Neighbor States

OSPF neighbors go through states before they can begin exchanging LSAs. You can examine the state of an OSPF neighbor with the help of following command:-
A#show ip ospf neighbor

a. DOWN STATE
This state occurs when configuration is mismatched on both sides e.g. If STUB is configured on one side only. STUB is one of the fields in HELLO packet. HELLO packet contains following information/fields:-
The Router-ID of the originating router.
The Area-ID of the originating router interface.
The address mask of the originating interface.
Authentication type and authentication information for the originating interface.
The Hello Interval of the originating interface.
The Router Dead Interval of the originating interface.
The router priority.
The Designated Router (DR) and Backup Designated Router (BDR) information.
Five flags for options.
The Router-ID of the originating router's neighbors.
This is the initial state of the neighbor which also indicates that no hellos were heard from this neighbor within the last dead time interval.

b. INIT OR ONE WAY STATE

One router (A) sent Hello packet to other router (B) and the information is matched on the other router (B). In response other router (B) sent acknowledgment, but it is in the pipeline. This state indicates that a router has seen its own Router-ID in the neighbor field of the HELLO packet that it received from the neighbor. It also means that bidirectional conversation was established and that DR and BDR election can occur.

c. TWO WAY STATE
Router-A sent HELLO Packet and Router-B sent acknowledgment, after that, Router-B sent Hello packet and Router-A sent acknowledgment in response. Then neighbor table is completed and DR/BDR Election process begins.

When an OSPF interface first becomes active, it begins to send hello packets. When two routers receive each other's hello, they place the neighbor in INIT STATUS. When a neighbor is in init status, it places its own Router-ID into the hello packet. When a router receives one of the new hellos with the Router-ID of its neighbor, it places the neighbor in a new state of 2-WAY. The 2-Way state ensures that here is a two-way communication between the routers. The routers must be in this state before they can negotiate a DR/BDR and exchange LSAs. After the routers have achieved the 2-Way state, OSPF enters into its final states:

d. EXSTART (MASTER/SLAVE)

A simple meaning of this state is "who will initialize the communication first". At this state, another election for the selection of Master and Slave Router begins. The neighbor with the highest IP address becomes the Master and other becomes the Slave to exchange LSA.

e. EXCHANGE (LSA REQUEST)
The router sends its database description packets to neighbors in the exchange state. The database description packets describe the entire link state database. The link-state database is synchronized after this phase. After synchronization, the router enters one of two final states. Every network in the routing table of a router has a corresponding sequence number. At this state, a router sends the sequence numbers to the neighbor router. In response, as acknowledgment, the neighbor router also sends its sequence numbers.

f. LOADING
The router also sends link state request packets to all neighbors that are in the loading state. The loading phase requests that more recent LSAs be sent. At this state the database table is completed.

g. FULL
At this state, SPF algorithm is applied and best path is calculated. Neighbors in this state are fully adjacent and routing table of neighbors are completed.

Wednesday, June 10, 2009

How to recover the lost or forgotten password of Cisco switches?

This tip will help you to explain the password recovery methods for the Cisco layers 2 switches. You can use these steps also to recover the Cisco layers 3 switches (for example 3550 and 3750 series).
Follow the step-by-step procedures to recover the lost Cisco switches password:
First make sure, you have connected your PC to the console port of switch using any emulation software.
Now turn the power switch off and back on to recycle the power then release the mode button for few seconds after the LED above port 1 turns off.
Now your switch first prompt will look like this:
switch: First run the flash_init command to initialize the flash. switch: flash_init After running the flash_init command, the following information will appear as under: 1. switch: flash_init2. Initializing Flash...3. flashfs[0]: 21 files, 2 directories4. flashfs[0]: 0 orphaned files, 0 orphaned directories5. flashfs[0]: Total bytes: 77414406. flashfs[0]: Bytes used: 44994567. flashfs[0]: Bytes available: 32419848. flashfs[0]: flashfs fsck took 7 seconds.9. ...done initializing flash.10. Boot Sector Filesystem (bs:) installed, fsid: 311. Parameter Block Filesystem (pb:) installed, fsid: 4Now run the load_helper command to load any helper images.
switch: load_helper
Issue the dir flash: command to view configuration file name with detail.
switch: dir flash:
Now type the rename flash:config.text flash:config.old command to rename the previous configuration file.
switch: rename flash:config.text flash:config.text.old
Here run the boot command to restart the switch.
switch: boot
Now after booting process, type enable to enter enable mode at the switch prompt.
Switch> enable
Now again type the rename flash:config.old flash:config.text command to rename the previous configuration file.
Switch#rename flash:config.old flash:config.text
Here run the copy command to transfer the configuration file to running-config
Switch#copy flash:config.text system:running-config
Now go to global configuration mode and set the new password.
Switch# configure terminal
Switch (config)# enable secret password (type here new password)
At the end saves the running configuration to NVRAM.
Switch# write memory

Tuesday, June 9, 2009

How your Find Free Cable Internet in your area?

Many internet cable provider normally offer free connection for the first few month or very cheap service in start. Some internet providers offer 2 month free internet in start if you pay payments for next 6 month.
There are many DSL/Cable Internet web sites where you can search for best and cheap internet connection in your area. Usually the cheapest high speed cable Internet rate is of $15.00 a month, but this is not a standard rate , We have seen cheap cable Internet at $6.95 a month, but that's usually only for the first few months. But you can cheap more if you're getting value-added services: free anti-virus protection, free installation, etc.
Here are some advice for check connection:
-Avoid anything that sending you bulk e-mail with the words free cable Internet and you can use it any ware.
-Don't trust offers of unlimited free cable Internet.
-Some internet provider offers you free trial for some period but ask for your credit card, and then automatically charge you after the trial period has expired.
-Beware of offers for a free cable modem or other equipment.

Monday, June 8, 2009

How to configure BGP using Route Reflectors?

When your network have grown and a full mesh isn't feasible n*(n-1)/2 where n = the number of iBGP speaking routers. If we have 200 routers in our network that would give us 19900 BGP sessions.
SOLUTIONS
Route Reflectors
Confederations
Using standard Internal Border Gateway Protocol (IBGP) configurations, all BGP systems within an Autonomous System (AS) must peer with all other BGP systems, forming a full-mesh configuration. This presents scaling concerns, as all external information must be propagated/distributed to all BGP systems within the AS, resulting in far more information being shared between the IBGP peers then is necessary. BGP Route Reflectors (RR) provides a mechanism for both minimizing the number of update messages transmitted within the AS, and reducing the amount of data that is propagated in each message. The deployment of BGP Route Reflectors leads to much higher levels of network scalability.
A ROUTE REFLECTOR REFLECTS IBGP ROUTING INFORMATION
♦ From clients to iBGP peers and other clients
♦ From iBGP peers to clients
♦ Never from iBGP peers to iBGP peers (as before)
♦ Should not change the attributes
NEXT_HOP
AS_PATH
LOCAL_PREF
MED

Saturday, June 6, 2009

How to configure BGP using Route Reflectors?

When your network have grown and a full mesh isn't feasible n*(n-1)/2 where n = the number of iBGP speaking routers. If we have 200 routers in our network that would give us 19900 BGP sessions.
SOLUTIONS
Route Reflectors
Confederations
Using standard Internal Border Gateway Protocol (IBGP) configurations, all BGP systems within an Autonomous System (AS) must peer with all other BGP systems, forming a full-mesh configuration. This presents scaling concerns, as all external information must be propagated/distributed to all BGP systems within the AS, resulting in far more information being shared between the IBGP peers then is necessary. BGP Route Reflectors (RR) provides a mechanism for both minimizing the number of update messages transmitted within the AS, and reducing the amount of data that is propagated in each message. The deployment of BGP Route Reflectors leads to much higher levels of network scalability.
A ROUTE REFLECTOR REFLECTS IBGP ROUTING INFORMATION
♦ From clients to iBGP peers and other clients
♦ From iBGP peers to clients
♦ Never from iBGP peers to iBGP peers (as before)
♦ Should not change the attributes
NEXT_HOP
AS_PATH
LOCAL_PREF
MED

Thursday, June 4, 2009

How to eliminate the needless visual effects for better windows performance?


This tip will help you to increase the performance of your computer by eliminating the needless visual effects. By default windows XP gives you many options in the graphics fields to enjoy maximum graphics. For example, you can add pictures on folders and drop shadow on icon to give you better look but it will effect on the performance of your computer, especially on an older computer. Window XP has many default graphics which is not so useful for a common user, if you re-adjust these graphics then there is less effect on the user activities but the performance of computer will be increase tremendously. Here I will tell you how to choose:
To edit these settings, first you should log onto your computer with administrative rights.
-Click Start button and type sysdm.cpl in Run box then press Ok button for next.
-Here a dialog box will appear with the title "System Properties", select "Advanced" tab.
-Here click on Settings button under Performance area.
-When you have done then "Performance Options" dialog box will appear with different options. Here select the Visual Effects tab and choose the settings you want to use for the appearance and performance of windows on this computer.
Turns off all the visual effects in the option of "Adjust for best performance" and when you select the option "Adjust for best appearance" it will gives you opposite effect ,Everything will turns on. Selecting "Let Windows choose what's best for my computer" triggers, as you might guess, different choices on different computers. And to pick and choose individual effects yourself, choose "custom" then decide which ones you want.

Wednesday, June 3, 2009

How to backup of your computer installed drivers?


You can easily create the backup of your computer installed drivers (just the particular or all drivers) and use it to troubleshoot any driver problems. This backup will be very useful when you will format your computer window due to any reason. There is no need to search the drivers from internet or drivers CD, just import the driver backup and within five minute, you will complete the driver installation process. You can move this backup from one computer to other computer for installation.
-To complete the all process, we will use a simple tool called DriverMax. Using this tool, we can easily export the backup of any specific or all drivers and then import it for reinstallation later or elsewhere. You can free download (with free registration code) this tool for windows XP and Vista also. Download it and run the easy setup.After Installation launch DriverMax, the first screen you will get with title "DriverMax - Version" and options "Export drivers, Import drivers and Installed drivers report". Just click on "Export Driver" option to start backup process.
-Now after welcome screen, system will take few seconds to create the list of all installed drivers and then show you all installed drivers list.
-Here you can select any specific device driver or click on "Select all" button to create the backup of entire installed drivers.
-Press the Next button and in next screen you can select the export type (simple backup or in zip format) and then choose the backup location (always choose drive other than C drive).
-Again press the Next and system will take some time (depend upon the size of your drivers) to finish exporting the selected drivers.
-Click the "Open extraction folder button" to view the backup files or press Close button to finish it.
-Now you can use this backup files (using import option) to restore drivers backup or move to any other computer. Copy the Following link to download it.

How to secure your password from hackers attacks?

This tip will help you to secure your computer from the access of professional hackers. There are some hacker’s breaks into your computer without using any impressive programming skills but trying to find words to guess as your password. Normally people use their name, house number, mobile number and word “password” as a password. If you have very simple password then a hacker can hack your computer very easily. To safe your computer from hackers there is a best way to create a tricky password. Here I will tell you some different type of tricks to make your password that can’t guess easily by any body.
-Use the maximum characters in your password.
-Always set the password using maximum characters length, because it is simple method, if your password is longer then it is very difficult to guess.
-Use the combination of lower-case and upper case letters in your password.
-Normally computer users use the lower case in password selection but it is best practice to use the combination of both (lower-case and upper case). So using different cases in your password makes it much more difficult to crack.
-Use the combination of letters and numbers in your password.
-When you mix both letters and numbers just like one letter and one number then your password is more incomprehensible.
-Avoid using the name of your family members as password.
-Always try to avoid the name of your child, spouse, city and country name as password, because if any body knows about your personal life’s details then they try to use these detail to guess your password.
-Use any tools to create random password.
-There are many third party tools are available to create the random password. You can create passwords containing a very difficult –to-guess collection of random characters with these tools.

Tuesday, June 2, 2009

How to eliminate the needless visual effects for better windows performance?

This tip will help you to increase the performance of your computer by eliminating the needless visual effects. By default windows XP gives you many options in the graphics fields to enjoy maximum graphics. For example, you can add pictures on folders and drop shadow on icon to give you better look but it will effect on the performance of your computer, especially on an older computer. Window XP has many default graphics which is not so useful for a common user, if you re-adjust these graphics then there is less effect on the user activities but the performance of computer will be increase tremendously. Here I will tell you how to choose:
To edit these settings, first you should log onto your computer with administrative rights.
-Click Start button and type sysdm.cpl in Run box then press Ok button for next.
-Here a dialog box will appear with the title "System Properties", select "Advanced" tab.
-Here click on Settings button under Performance area.
-When you have done then "Performance Options" dialog box will appear with different options. Here select the Visual Effects tab and choose the settings you want to use for the appearance and performance of windows on this computer.
-Turns off all the visual effects in the option of "Adjust for best performance" and when you select the option "Adjust for best appearance" it will gives you opposite effect ,Everything will turns on. Selecting "Let Windows choose what's best for my computer" triggers, as you might guess, different choices on different computers. And to pick and choose individual effects yourself, choose "custom" then decide which ones you want.