Friday, July 31, 2009

Safe Online Shopping


How can you tell if an online company is legit when you're thinking of buying something? Well, there are some key things to look out for:
If you get an unsolicited email about a product from a company you don't know, then DEFINITELY do your homework before you buy. Check out their reputation, or see if the same product is available from an online business you trust.
Since web addresses can change, look on the site for an address and phone number. Know where to complain or contact if you are dissatisfied or have a question. You might also want to review the Privacy Policy to make sure they won't sell your information to marketers.
Read the refund and return policy (if the website does not have one). Can the item be returned? What if it is opened? Is there a restocking fee? What about damaged merchandise.
If the site displays the BBB Online Reliability logo, click it and read the popup (hold your Ctrl key if you have a pop-up stopper) to make sure the company is currently participating.
Keep a record of your online purchase. Print out the page with the seller's name, address, and phone number. Print out the page about the item you ordered. Print any email confirmation messages you get and any follow-up messages about problems in shipping.

Thursday, July 30, 2009

What kind of attachments can contain viruses


Basically, anything that is executable (able to run). You're generally safe with picture files, text files, and the like. However, it still pays to scan first.
Here is a very short list of the most common to watch out for:

-exe
-zip
-scr
-vbs
-bat
-com
-pif
-asp
-doc
-xls
Those are the most common; don't misinterpret this to mean that if you get one of these files it's automatically a virus. A ".zip" file may be nothing more than a set of compressed files your friend sent you to look at. A "doc" or "xls" file may simply be an MS Office file. It's just that these type of files could also be viruses.
A couple other virus tricks you need to be aware of. First, MS Office files can contain what are called "Macro Viruses". Without getting into too much detail, these files can run a "macro" (a macro is a mini-program run from within another program) that can be as destructive as any "regular" virus. So, my advice on MS Office attachments is not to open them unless you are expecting them. If they just show up, verify with the sender first.
The other trick you need to look out for is an extra extension added to an attached file. For example, you may have something like "mypicture.jpg.vbs". In fact, if you don't have your computer set to view file extensions, it may just look like "mypicture.jpg" and omit that last "vbs" part.
This may appear to be a jpg picture file, but it's actually a Visual Basic Script file. If executed, it will happily infect your computer with a virus.
So, be careful out there.

Wednesday, July 29, 2009

How to Find What Virus was Removed

Norton does a great job of protecting me from viruses. It will pop up and let me know that it is scanning outgoing and incoming mail. While receiving email, if the program runs across a virus it will pop up a save window letting me know where the backup file is being saved, This is usually the quarantine folder within the Norton program. With Outlook / Outlook Express simply right click the paperclip icon in the preview pane. You'll see that the attachment is called "Norton Antivirus Deleted1.txt", click the file.
A message will come up in notepad telling you the name of the infected document that was removed and what virus it contained
McAfee has very similar features: it scans my incoming and outgoing mail and it pops up to let me know when there's a threat in my email. The pop up window in McAfee also has the name of the potential virus with a link to more information concerning the virus in question.
This is nice and because you can see the threat without going though the procedure of clicking the paperclip for the name of the virus like in the before mentioned Norton antivirus. However, you can view the virus information by clicking on the paperclip like you do with Norton if you didn't catch the virus name in the initial pop up and would like view information on it.
Both McAfee and Norton have virus information sections of their website. This is a good place to take any information that you have gathered on the virus or threat, and plug it in. This can give you a really good idea about what's going on in your system and over time make you a virus expert.

Tuesday, July 28, 2009

Secure Website Problems

You may not have the correct security settings for you to connect to secure web pages. For instance, let's say you want to get in on one of our great software specials and when you click "Checkout" you can't get to the page.
-With Internet Explorer go to Tools/Internet Options and select the "Advanced" tab. Scroll down to the bottom of the list and make sure the following are checked: Use SSL 2.0 and Use SSL 3.0
-Click the "Refresh" button (green arrows) and the page should appear.
-With Firefox you'll get a pop-up window telling you that you cannot connect because SSL is disabled.
- Go to Tools/Options, click "Advanced", and scroll to the bottom. Under "Security" check off the following: Use SSL 2.0 and Use SSL 3.0

-Click OK. Try connecting to the secure site again and it should come up.
-If you are a Netscape user you'll get a pop-up window telling you that you cannot connect because SSL is disabled.
-Go to Edit/Preferences and expand "Privacy & Security" by clicking the arrow next to it. Select "SSL" from the list. Check off the following: Use SSL 2.0 and Use SSL 3.0
-Click OK. Try connecting to the secure site again and it should come up.
-If there is still a problem, check your Firewall/Network Configuration. Make sure that the SSL port (port 443) is open. Since every setup/software is different, we can't give exact instructions. Check your manual or help file for details.
-Hopefully, though, it's just an SSL problem and you'll be on your way.

Monday, July 27, 2009

Email Security Scan


The problem with all the security holes that arise from day to day is that it's hard to keep up. "Am I protected?" you wonder, "I update constantly, I scrutinize all my email messages, especially attachments, and read all of Chad's awesome security articles, but how do I know for sure?"
Well, since such a large number of security holes center around email I'm glad to announce today a service that can check your system for potential exploits. The service is a web based email scanner that you can tailor to send out over 20 different emails, each attempting to defile your system with dummy exploits. It's like hiring a security agent to go over your system and tell you what aspects of your security is in good shape, and what areas could use some improvement. When set in motion, the scanner fires off the dummy viruses and exploits to the specified email address. Don't be surprised if your virus software starts popping up with security messages, as a matter of fact, this is exactly what you want to happen; it means your system is seeing the threats coming in.
The emails themselves have message bodies describing what their particular test was for and how to make sure you're protected from this sort of attack. Some of the emails have attachments and some attempt to create text documents on your desktop, the emails tell you exactly what to do to ensure the tests ran correctly, thus providing an accurate assessment of your system's defenses.
In addition to the testing your system for security holes this is also a good way to educate yourself on some email-born security issues by getting a chance to see them in action without putting yourself in any danger.

Sunday, July 26, 2009

Erase Your Hard Drive


People give their old PCs away to family members, charities, and some end up at the local PC repair shop without ever being properly wiped clean. Everything stored on your PC is on the hard drive. There was a two-year experiment done by MIT graduates Ali and Eman where they collected 156 hard drives from various places (the web, ebay, PC shops, and businesses). Out of the 158 drives tested, 129 drives worked and hardly any of them were properly wiped clean. There were thousands of credit card numbers, private "adult" stuff, love letters, you name it, that was completely recoverable on these drives.
Most people believe that deleting data and then cleaning out the recycle bin does a sufficient job. This is NOT the case. When you delete something in windows, it just marks it to be overwritten. There is also a misconception that formatting a hard drive permanently erases stored data. This is also not true, a format just reconstructs the allocation table and checks the blocks on the disk. It does nothing actively to remove the data; it simply leaves it "unprotected". With both of these scenarios, if you have the right software you can recover data thought to be unrecoverable.
So, how do we erase this data on a hard drive for good? You can physically destroy the drive but that's not as easy as you think and you would be amazed at what people can recover data from. There are cases where people have drilled holes in the platters and it could still be recovered. You can take it to a PC repair store that has a Degausser that removes all the magnetism from the drive leaving it useless for good, but this can be way too expensive to justify the price for the common end user. You can write Zeros to the drive with the utilities at the hard drive manufacturer site and that will stop most people, but experienced users can still recover it.

Saturday, July 25, 2009

How to solve low memory problems?


Normally this warning message shows when you run many programs same time than the RAM installed on your computer is designed to support. Your can solve this problem by increasing the system paging file size also called as virtual memory. Using this virtual memory windows moving information to and from the paging file for fast processing. This will free up enough RAM for other programs to run properly.
To increase the system page file follow the give path:
-Control Panel > System > Advanced > Click on Settings (Under Performance) > Advanced > Change
-Here under Drive (Volume label), you have option to select any of your hard disk drive, but the best choice is, select any drive other than C drive for virtual memory.
-Set the double Initial & Maximum Size of your Virtual Memory. Here set initial size 700 MB and maximum size up to 1000MB; you can change this size according to the free space available on your hard drive.

Friday, July 24, 2009

How to find a lost file on your Computer?


This tip will help you to enjoy the quick and easy way to find lost files on your computer. Here I recommends you, try to search a file with its file extensions (for example for word file, type *.doc, Excel *.xls, Acrobat *.pdf, *.ppt and *.exe for executable files. If you don't know the name of file but know that it contains a string of text then try to search for files containing specific text, type the text you want to find from any file or folder. This is time taking process but creates very precise result. In Look in, click the drive, folder, or network you want to search. To save time, always select the specified drive or location instead of whole computer.
Click Start Button, point to Search, and then click For File or Folders, a Search Results dialog box will appear. In Search for files or folders named, type the file name or folder name you want to find in containing text.
To specify additional search criteria, click Search Options, and then click one or more of the following options to narrow your search:
-Select Date to look for files that were created or modified on or between specific dates.
-Select Type to look for files of a specific type, such as a text or WordPad document.
-Select Size to look for files of a specific size.
-Select Advanced Options to specify additional search criteria.
-Click Search now.

Thursday, July 23, 2009

Tips about DSL Internet Service


DSL is another digital internet connection and working with high speed than any old dial-up and cable modem. There is no need to install new dedicated cable network to run DSL because data is transmitted over already exiting copper wire. This connection is ideal for internet access. DSL provider offering traffic allowed up to 1 GB with basic 128 Kbps internet connection. But if you want to play online games, downloading audio or video files and uploading data, then the traffic allowed(1 GB) in one month from DSL provider will be the main issue for you. May be some DSL provider offering you up to 2 GB or more with the same rates. Today there are many DSL providers offering DSL connection in all cities and some rural areas. DSL provides high speed on already exiting telephone lines, and same time you can use internet and as well as your line for phone. To check the availability of DSL connection first check your telephone number at which you are want to install DSL connection. If your telephone exchange is updated by DSL provider according to need of DSL technology then you may apply for DSL internet connection. For this purpose you can visit your friends or neighbors for information to getting broadband connection. You can visit your nearest Internet service provider to check DSL availability in your area and about different DSL packages.

Wednesday, July 22, 2009

How to avoid fake Security Warnings or pop-up?

When you are browsing the internet and suddenly a window pop up with different messages for example" free update for your computer ","scan your computer with free antivirus". May be some pop-ups messages helpful for you but you should read first in detail before clicking it. Pop-ups basically an advertiser message or unwanted program and website that might be disturb your computer performance.
If you are working with Internet Explorer and want to block the pop-ups windows and unwanted messages. Open the Internet Explorer and click on Tools menu and go to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up from all websites. But you have option to allow some websites for pop-up. For this purpose open the Pop-up Blocker Setting. Here you can add some specific websites name to allow for pop-up and click Add. If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Tuesday, July 21, 2009

CD-ROM Cleaning Tips



If your CD drive creating problem to read CD disc, taking time to read and showing message there is no disc in the drive. These are the symptoms of dirty or weak CD-drive lens, because dirty lens can create errors in reading or writing and soon will not work at all.
Follow the given steps to care and clean a CD-Drive.

-First make sure your discs are clean, unscratched and you’re loaded it properly.
-Always use laser lens cleaner to clean drive lens.
- Insert the laser lens cleaner disc and play it for 2 to 3 min.
-Using CD drive cleaner properly clean the CD-ROM laser from dust. If your drive still creating problem then open it and clean the lens with a cotton swab.

Monday, July 20, 2009

Play With Your Favorites

A cool tip to move your favorites list, because there is no any option to copy it. But using a method you can create a printable HTML document.

To create this HTML list, first open Internet Explorer. Here go to File option then you will find here option Import and Export, to run the Import/Export wizard Click here then Next.


Here you can select what to import and export, Select Export Favorites option then click Next button. Next you will get option which folder you want to export. You can select the top folder Favorites or just a specific folder.

Select "Export to a File or Address" option and give it a name and location. Click Next and Finish it. Now you have one html file and you can move it any where with you.

Sunday, July 19, 2009

How to enable the Windows Task Manager and Regedit Editor?


This tip will help you to unlock the windows Regedit Editor and Task Manager. Normally the reason of this message is that your computer has been infected by virus, trojan, or piece of spyware and message look like" Registry editor has been disabled by your administrator" or "Task Manager has been disabled by your administrator". By default Windows Task Manager and registry editor status is enabled, but a user can also disable or enable it manually. Some time a registry hack applies on both editors to disable it. Before proceeding further, first scan your system with up-to-date antivirus, and then follow the given steps to enable it.
To enable this feature, you will need to be logged into your computer with administrative rights.
First go to the link of registry tools to access the useful script file and download it to your computer hard disk.
Now double click on this file to run this .vbs file and then a small message will appear on screen.

-Here click on Open button to execute this file and you will get a confirmation message on screen.

-Click on Ok button to finish the process and now you can run the both windows editors.

Friday, July 17, 2009

Back Up Your Data


Just about everybody has important data on their hard drive, from digital pictures to important documents, emails, earmarked websites the list goes on and on. In my experience people are pretty lax about backing up their PCs, and I think this really is an area that deserves attention. With a good back up set you can bounce back from a fatal hard drive crash and be up and running with all the your pictures, documents, downloads, email and favorites before you know it. Having important files stored on removable media is also a good safety precaution in case you get a virus or Trojan horse.

There are a couple of different ways to back up important data, from the casual copy and paste to running complicated scheduled backups. There is no wrong way, as long you have a copy of everything you need.
You can save the data on a couple of different types of media (floppy, ZIP, CD-R/RW, DVD+R/RW, Flash memory, even dat drives) but for home use I really recommend either CDs or DVDs, floppies are just to small, Zips, although bigger than floppies are still small (100-200MB), and they're old and kind of expensive. Flash memory can store data but it's not really something you want to save data to and store away unless there is no other option. DAT tapes are more for the corporate end of things and are overkill in most homes. CDs are cheap, hold a lot of data, work on any PC and are easy to store.
If you use CD-RW, or DVD-RW you can actually save money by setting up a "round robin" with your backups. To do this, you need at lest 3-4 of the same backup set, take the oldest and erase it. Now use the blank disk for the new backup, the next time you do a backup use the oldest disk in the set and so on and so forth.
As for the methods of backing up, I find it's easiest when all my intended files and folders are organized in structured manner and not scattered all over my hard drive. This is a good way to insure that you don't forget anything important by hunting for a bunch of individual files. An easy way to stay organized is to create a descriptively labeled folder structure and try to be diligent about saving your data to it's designed folder.
Another good practice is to test your backups, don't just take the burning software's word for it. After a backup, explore the disk and randomly go through files and open them up to make sure that they're complete and not corrupt. Learn from my experience, waiting for a complete system failure is not a good time to check the validity of your backups. This is a good way to get yourself in a lot of trouble as well ?I know if didn't back up the pictures or movies of our kids I wouldn't be able to live with my self.
Once you have all your ducks in a row, it's time to back up. There are a number of ways to do this as well. The easiest is to open you burning program and select data CD and go through the folder then explorer and grab the folders you want to back up. When you select a folder you should see it in the "burn" selection window, once you done with your backup selection choose "burn".
If you have Windows XP you have the luxury of being able to open up the blank CD or DVD in Windows Explorer and copying and pasting the desired folders right onto the disk and select "Write files to CD" and Windows will do the rest for you. This is nice but not all of us have XP, and I personally still like to use my third-party software.
Most burning software has their own backup services, and there are a number of third-party back up titles out there. The nice thing about using these types of software is the options. Things like compression, backup jobs, and incremental backups. These are nice features especially when you have some backups that you want to insure are up to date. For instance, you can create a "Back up Set" which is basically a saved and named list of folders and files that you want backed up. This makes the whole process so easy?you can create a backup set and once a week or so your can run it and it will either create a new back up or save just the changes to the backup. These are two options that are usually found in backup programs. If you use "backup sets", it's important to keep the files organized, and in all the correct folders. You can also schedule Backup Jobs, which are basically backup sets that are scheduled to run at predetermined times, and intervals (i.e. once a week Friday at 6:00).

Thursday, July 16, 2009

Tips about Cable Internet


Normally a high speed cable Internet is better than a dial-up and some time DSL connection. A cable internet connection load web pages three times faster than a dial-up. Cable Internet's maximum speed is 2Mbps but this is not a standard , it depends upon you internet connection provider ,connection type like many option (128Kbs,256Kbs,1Mbps or more), your home distance from main router. Another main reason if you are using dedicated connection type or sharing connection type that effect speed. In dedicated connection you can use static IP address. You will probably be limited in your choice of cable Internet service by where you live, no other provider there. Some cable internet connection provider use their cable for both purpose like cable television and internet also. High speed cable Internet may have less downtime because there are no busy signals with cable Internet access, and that is why more reliable.Your choice of a cable Internet service will also depend on factors such as:what level of service you want, e.g. dedicated connection type or sharing connection type, what kind of security you need in internet connection e.g. if you are a normal user or you are running secure business like a finance company then your choice must be different to choose connection.Whether you just use the Internet for e-mail or whether use VoIP or do broadcasting/streaming audio.

Wednesday, July 15, 2009

Tips to use Pop up Blockers


Pop-up window messages basically used for online advertising to increase the web traffic with minimum cost, but these pop-up messages can be used to damage a computer or also for hacking purpose. In routine when you are browsing the internet and suddenly a new window pop-up dialog box display with different messages for example" speed-up your internet ","free upload your files or images". All pop-up messages are not dangerous for you but some unwanted program and website that might be disturb your computer performance.
There are many free pop-up blocker software's available in market but always download it from well-known sites. Simply Download Google toolbar and install it to use its feature "Block annoying pop-up" to block the pop-up messages, You can say this is simple and best way to block unwanted program.
If you are working with Internet Explorer and want to block the pop-ups windows and unwanted messages. Open the Internet Explorer and click on Tools menu and go to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up from all websites. But you have option to allow some websites for pop-up. For this purpose open the Pop-up Blocker Setting. Here you can add some specific websites name to allow for pop-up and click Add. If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Tuesday, July 14, 2009

Finding Cheap DSL Connection Tips


These days there are different types of cheap DSL Internet connections available in the market with different rates according the need of users, for example ADSL, R-ADSL, HDSL, SDSL, and VDSL. Monthly rates of DSL connection depends upon its speed and downloading or uploading traffic allowed. DSL providers offering traffic allowed up to 1 GB with basic 128 Kbps internet connection. But if you want to play online games, downloading audio or video files and uploading data, then the traffic allowed(1 GB) in one month from DSL provider will be the main issue for you. Visit the market for the best rate DSL, may be some DSL providers offering you up to 2 GB or more traffic allowed with the same rates. Almost all DSL providers offering per month connection with the same rate but you can minimize your DSL cost to share your connection on many computers using any Internet sharing software. Normally DSL connection is available on unlimited usage but you can also buy connection for certain amount of time or hourly packages to control the monthly spend. Finally, you can reduce your DSL cost to share the business internet connection with your home, if your business or home is located near.

Monday, July 13, 2009

Tips about Coaxial Cable


Alternatives to Coaxial
Coaxial is the cable Internet standard, widely installed in business and corporation Ethernet and other types of local area network. However, other alternatives can get you online at high speeds. Twisted pair copper wire and optical fiber, better known as fiber-optic, are viable alternatives to the different coaxial cable types. However, this depends on the signal carrier technology used.
Depending on the configuration, coaxial cable may be heavier than fiber-optic cable, which is usually lightweight. However, the heavy shielding of many coaxial cables helps block signal interference from televisions and other household appliances.
Both digital fiber-optic cables and digital coaxial cable are available for use in cable Internet infrastructure, but are designed to carry different signals, optic versus electronic. It all depends on your cable Internet setup which types of digital cables you use.
-High-Band Coaxial Cables
Coaxial cable has an extremely broad bandwidth, especially digital coaxial cable, which tends to prevent loss signals. Coaxial cables have a lower attenuation and can carry hundreds of cable Internet signals. The coaxial is a relatively simple cable, yet it can carry large amounts of data. In the case of telephone and video signals, coaxial cables can handle hundreds of phone conversations and a television program taking up 3,500,000 Hz. Certainly, given this capacity, coaxial cables can handle bandwidths of 2-3 Mpbs. There is no bandwidth performance difference between the coaxial cable types.
-Coaxial Cable Safety and Maintenance
As with any wiring and infrastructure, all coaxial cable types, including digital coaxial cable, require careful handling. Although the coaxial copper shielding is strong, whether rigid or braided, it's not indestructible. Some safety and maintenance tips:
• Make sure your coaxial cables and coaxial connectors are fire resistant (FR).
• Don't buy secondhand, used or cheaply manufactured coaxial cables.
• Make sure coaxial cable shield is grounded for safety.
• If possible, house coaxial cables separately from the rest of your computer equipment and especially other cables and wires.
• Do not expose coaxial cables to water.
• Make sure the cable outlet wiring is intact.
• Keep your coaxial cables repaired with tools such as the Shake ‘n Seal Coaxial Cable Repair Kit.
-Troubleshooting Coaxial Cable Connections
Either your digital coaxial cable or your regular coaxial cable can become disconnected from the cable modem and/or the cable outlet. Check both connections if the cable Internet stops working.
If you are still getting interference from other devices in the home, replace your coaxial with the quad-shield coaxial cables. Also, interference may happen because with all coaxial cable types, the insulation degrades and the cable must be replaced. Also, the coaxial connector or splice needs to be attached to the correct copper screen to provide the return path for the cable Internet signal.
Coaxing More Speed Out of the Coax
Typically, the data transmission speed through coaxial cables is 10 Mbps. This is true for all coaxial cable types.
Can you coax more speed out of the coaxial connection, especially with digital coaxial cable? You can use a large lower-loss coaxial cable, and use the same cable throughout the signal path, to gain more bandwidth and a higher connection speed. The good news is that coaxial cables are ideal for higher bandwidths.
-Ethernet and Coaxial Cables
Thin Ethernet or 10 Base-2 is a lighter, less expensive version of 10 Base-5 or Thick Ethernet. It uses a lighter, thinner copper coaxial cable. What is the advantage of a sleeker coaxial? Besides skipping the 10 Base-5 external transceivers and simplifying the coaxial setup, thin Ethernet features well-shielded coaxial cable. The drawback is that the RG-58A/U coaxial cable used with thin Ethernet can't be interchanged with other coaxial cable types, including digital coaxial cable. Also, changing the network is difficult since the network breaks easily. Making it difficult to troubleshoot.
Despite drawbacks, thin Ethernet is a simple, inexpensive infrastructure to implement for basic cable Internet networking on a budget.
Separating Cable Signals
Your coaxial cable setup should prevent any signal interference between your television and cable modem. A coaxial cable splitter is part of your defense system. In addition to the copper shielding, signals going through your coaxial cables, including your digital coaxial cable, are separated by a cable splitter. Cable technicians will install the splitter on the side of your house and run a separate coaxial line to your cable modem. In addition, your different coaxial cable types such as triax, digital coaxial cable, twinax and biax have added reinforced casing and configurations to prevent interference with the cable Internet signal from the television signal as well as other household appliances.
-Coaxial Cable Types
Learn about coaxial cables:
Coaxial cable carries your broadband cable Internet signals. Coaxial cables are the nerves or, if you prefer, veins of your cable Internet connection. The different coaxial cable types are:
-• Rigid coaxial, with a solid copper wire sheath
-• Flexible coaxial, with a braided copper wire sheath
-• Hard line coaxial, a heavy-duty cable with rigid or semi-rigid pipe for the outside shielding
-• Triaxial cable or triax, a coaxial with a third layer of shielding, insulation and sheathing
-• Twin-axial cable or twinax, a coaxial with a balanced, twisted pair within a cylindrical shield
-• Biaxial cable or biax, a figure eight configuration of two coaxial cables
-• Digital coaxial cable, suited to any high-grade digital applications such as digital cable and digital cable Internet
Digital coaxial cable is primarily used for audio and home theater, but its powerful connectivity makes it ideal for digital cable Internet.

Sunday, July 12, 2009

Wireless Hub Tips


Is a Switch and Wireless Hub the Same Thing?
Yes and no. A switch can be described as a smart hub. A switch is used to connect computers and devices on a network, but is able to distinguish where to send transmissions.
Generally speaking, in a home wireless network, all you will need is a wireless hub. Larger, more complex networks, such as in offices, should consider using switches.
--------------------------------------------------------------------------------
Wireless Hub
A hub is used to connect devices on a network. A wireless hub does the same task on a wireless network. The devices can be computers, printers, etc. Typically, hubs are inexpensive and an excellent way to connect devices together on a network. If you want the easiest solution, Linksys provides wireless hubs and routers that are simple to configure and implement.
--------------------------------------------------------------------------------
Wireless Adapter
A wireless network adapter is a device that can make regular, wired devices able to communicate on a wireless network. Typical wireless adapters include wireless USB adapters and printer adapters. You can also purchase wireless adapters that allow desktops and laptops to connect to a wireless network.
Wireless adaptors can afford an office with older technology to upgrade to a wireless network thereby increasing flexibility of office design, set up and safety.
--------------------------------------------------------------------------------
Can I Share an Internet Connection With a Wireless Hub?
The short answer is no. If you have a broadband internet connection with all computers hooked up via a wireless hub, only one computer can have internet access at a time.
However, a router allows computers to share an internet connection. You can then hook up multiple computers to via a hub, but only one computer on that hub can use the internet at any given time.
--------------------------------------------------------------------------------
Wireless Adapter for Laptop
Wireless adapters are made for both PC slots and USB connectors. Both are easy to install and use if your laptop or desktop does not have a built in Wi-Fi card. Make sure to follow the specific wireless adapter instructions for configuration of the adapter.
Additionally, make sure you buy the right adaptor for your machine. Your best bet will be to bring all of the specs of your PC or laptop with you when you go to buy a Wireless adaptor. Then you are sure to get the right one - and don't be afraid to ask for help if you aren't sure what you are looking for. Better to ask then to bring the wrong thing home!

Saturday, July 11, 2009

How to increase the Browsing and Downloading speed in Windows Vista?


With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.
Follow the given steps to increase the Vista browsing speed:
First go to Advance tab in Internet Explorer and turn off the TLS (Transport Layer Security) encryption option. Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.
Follow the major fix for this problem:
-In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed.
-To use this feature, you will need to be logged into your computer with administrative rights.
-First click on Start button and type CMD in Run option then press Enter.
-At Command Prompt, type the following command and press enter.
netsh interface tcp set global autotuninglevel= disabled
-This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect.
-You can easily restore these setting by typing the following command at Command Prompt.
netsh interface tcp set global autotuninglevel= normal
-Now close the command Prompt and again restart your computer after any changes to go into effect.

Thursday, July 9, 2009

How to speed up Internet Explorer 7?


This tip will help you to increase the speed of Internet Explorer 6 to Internet Explorer 7 by modifying the maximum number of connections per server. This should allocate the additional bandwidth and reasonably improve internet browsing performance. Using registry editor, you can implement this task in all windows versions with minimum effort. Make sure before modifying your system Registry about its backup because Registry contains all information how your system runs. This backup will help you to restore Registry in case any problem occurs after modifying.
Follow the given steps to increase the explorer speed:
To use this feature, you will need to be logged into your computer with
administrative rights.
-Click Start button and type regedit in Run option then press Enter for next.
-Here locate the location to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings
-Here in right side panel, locate the values called "MaxConnectionsPerServer" and "MaxConnectionsPer1_0Server".
-If these values are not present then in right side panel, right-click to create new DWORD value with the name "MaxConnectionsPerServer" and "MaxConnectionsPer1_0Server" then assign number 6 in value data for both keys.
-Now close the registry editor and restart your computer after any changes to go into effect.

Database Security, Authorization and Encryption rules


Database security is concerned with authorization rules, user-defined procedures, data encryption and authentication schemes etc. Let's have a detailed overview of these concepts:
-Authentication Rules -Authentication rules are restriction on users, applied through DBMS for controlling data access and limiting actions on data. For example, a user can access a database table after giving a valid username and password. Another user can change records in the table but cannot add new records. Senior users are given full authority to take any action with the table. This authorization is applied by DBA according to the sensitivity of data and organizational rules.
-User-Defined प्रोसदुरे -In addition to the passwords and usernames, users can define their own procedures for security. For example, a user can add some secret questions in the procedure, in order to secure his account. Now, whenever the user logs in, he has to give procedure name along with his password. The procedure will ask the answers of the given secret questions and on submission of correct answers the user is given access to the database.
-Encryption -Data encryption is a technique in which highly sensitive data is encoded (converted into unreadable form) before its storage or transmission over a network. The encoding method is kept tightly protected by the DBMS. The encoded data decoded (reverse process of encoding) for authenticated users only. Thus unauthorized users cannot read data and sensitive data is automatically encoded by DBMS. For example, in ATM system the pin code provided by the customer is encoded (encrypted) before its submission to the database server. A DBA can also manually encrypt data when needed.
-Authentication schemes-Illegal access to computer resources is becoming a serious problem in the modern world. Passwords and usernames cannot identify the actual person who is logging on the computer system. Password can be leaked out or stolen therefore; it is not a secure method to block illegal access. Alternatively, some systems are using other authentication schemes for this purpose. These authentication schemes include signature dynamics, fingerprints and retina prints etc. Smart cards are normally used for the implementation of these schemes. For example, fingerprints are permanently stored on the smart card and whenever user wants to log in, he is required to insert his card into a card reader. He is also required to scan his fingerprints. Now if saved fingerprints on card and his actual fingerprints match with each other he is given access otherwise access is denied.

Wednesday, July 8, 2009

How to export the backup outlook contact of microsoft excel?


Microsoft's Outlook is integrated into Microsoft Office 2000, 2002, 2008 and Microsoft Exchange Server. Outlook is complete e-mail manager by which you e-mail, calendaring, and contact management. Outlook enables you to filter and organize e-mail messages, integrate and manage e-mail from multiple e-mail accounts, personal and group calendars, contacts, folders, and tasks.
Using Import and Export feature in Outlook, you can create the full backup of outlook contacts. Because without backup yon can lose your e-mail accounts data any time due to virus, power failure and hard disk problem.
Follow the given steps to export your outlook contacts to Excel file:
-Click on Start button, go to Program then click on Microsoft Outlook to export the contacts.
-Now go to File menu and click on Import and Export option. Choose Export to a file as show in the below figure then click Next.
-Now on next dialog box, choose Microsoft Excel and click Next.
-Select the Contacts Folder you want to backup to Excel file as shown below then click Next.
-Choose a name and location where to save the Excel file by clicking Browse button, then click Next.
-Click Finish to start the back up procedure which may take little time depending on how many contacts you have.

Tuesday, July 7, 2009

How to configure Linux Files Permissions?


Three types of permission read write and execute, Ever file and folder have three relations owner group and
others
-[ Read = r write = w execute = x ] [ owner = u group = g other = o ]
-[root@pc1 ~] # Ls -Ld /disk
-1= nature of object [d=dir -=file L=link]
-2= first three permission for owner [ rwx ]
-3= second three permission for group members [ r-x]
-4= third three permission for others [r-x]
-5= number of inodes contain by this directory
-6= owner of directory
-7= group of directory
-8= size of directory
-9= creating date of object
-10= name of object
-[root@pc1 ~] # Ls -L /disk
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir1
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir2
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir3
-Changing permission = give write permission to other on /disk
-[root@pc1 ~] # chmod 0+w /disk
-Give read write and execute permission for group on /disk
-[root@pc1 ~] # chmod g+rwx /disk
-Assigning read writ and execute permission to user, group and other with single command
-[root@pc1 ~] # chmod u+rwx , g+rwx, o – rwx /disk
-Assigning different permission with different commands which separate with semicolon
-[root@pc1 ~] # chmod u+rwx /disk ; chmod g+rwx /disk ; chmod 0+rx /disk
-Using number system =----- [ Read = 4 ] [ Write = 2 ] [ Execute = 1 ]
-rwx=7
-r-x=5
----=0
-Assigning full permission to owner and no permission for group and others
-[root@pc1 ~] # chmod 700 /disk
-Assigning full permission for owner and group no permission for other
-[root@pc1 ~] # chmod 700 /disk
-Assigning full permission to all
-[root@pc1 ~] # chmod 777 /disk
-Assigning full permission for owner and read, and execute for group and others
-[root@pc1 ~] # chmod 755 /disk
-Assigning no permission for all
-[root@pc1 ~] # chmod 000 /disk
-Assigning sticky bit permission for other
-[root@pc1 ~] # chmod o+t /disk
-Assigning suid permission for owner
-[root@pc1 ~] # chmod u+s /disk
-Assigning sgid permission for group-[root@pc1 ~] # chmod g+s /disk

How to configure Linux Files Permissions?


Three types of permission read write and execute, Ever file and folder have three relations owner group and
others
-[ Read = r write = w execute = x ] [ owner = u group = g other = o ]
-[root@pc1 ~] # Ls -Ld /disk
-1= nature of object [d=dir -=file L=link]
-2= first three permission for owner [ rwx ]
-3= second three permission for group members [ r-x]
-4= third three permission for others [r-x]
-5= number of inodes contain by this directory
-6= owner of directory
-7= group of directory
-8= size of directory
-9= creating date of object
-10= name of object
-[root@pc1 ~] # Ls -L /disk
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir1
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir2
-Drwxr-xr – x 2 root root 4096 Jan 1 1988 dir3
-Changing permission = give write permission to other on /disk
-[root@pc1 ~] # chmod 0+w /disk
-Give read write and execute permission for group on /disk
-[root@pc1 ~] # chmod g+rwx /disk
-Assigning read writ and execute permission to user, group and other with single command
-[root@pc1 ~] # chmod u+rwx , g+rwx, o – rwx /disk
-Assigning different permission with different commands which separate with semicolon
-[root@pc1 ~] # chmod u+rwx /disk ; chmod g+rwx /disk ; chmod 0+rx /disk
-Using number system =----- [ Read = 4 ] [ Write = 2 ] [ Execute = 1 ]
-rwx=7
-r-x=5
----=0
-Assigning full permission to owner and no permission for group and others
-[root@pc1 ~] # chmod 700 /disk
-Assigning full permission for owner and group no permission for other
-[root@pc1 ~] # chmod 700 /disk
-Assigning full permission to all
-[root@pc1 ~] # chmod 777 /disk
-Assigning full permission for owner and read, and execute for group and others
-[root@pc1 ~] # chmod 755 /disk
-Assigning no permission for all
-[root@pc1 ~] # chmod 000 /disk
-Assigning sticky bit permission for other
-[root@pc1 ~] # chmod o+t /disk
-Assigning suid permission for owner
-[root@pc1 ~] # chmod u+s /disk
-Assigning sgid permission for group-[root@pc1 ~] # chmod g+s /disk

Monday, July 6, 2009

How to change the default location of program installation?


You might want to change the location of your system default folder (C:\Program Files) from C drive to another system drives (D or E drive). By default software setup will attempt to install program in C:\Program Files directory. It is good practice to make the backup of the installed programs, if you installed all your programs in other than C drive. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry:
-First click on Start button then type Regedit in Run option.
-Here locate the location to:
Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
-Here in right side panel, double click on ProgramFileDir and here its default value is
C:\Program Files.
-Now modify the value to any other drive (for example D:\Program Files).
-Now close the registry editor and restart your computer after any changes to go into effect.

Sunday, July 5, 2009

Internet Error Codes and Meaning


Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.
Error Codes Meaning
-400 This is bad request error, First check you may be typing wrong URL name and server could not understand your request.
-401 You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.
-402 Payment Required Error
-403 You are trying to open any forbidden page and you are blocked by that domain.
-404 Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.
-408 This is time out error. you should send the request with in time that the server set for you.

Saturday, July 4, 2009

Google security


Google is always adding new products and features. One of these is the Personalized Google Homepage. You can customize it with news, movies, weather, stock market reports and more. How convenient. But there is a dark side.
Google saves your search history. Every person, place, thing, or word you look up is stored in your history (BTW-same goes for the Google Toolbar). This can be cleared or paused on your end, but it will still be saved on the Google server. It's in their Privacy Policy:
"You can delete information from My Search History, and it will be removed from the service and no longer available to you. However, as is common practice in the industry, and as outlined in the Google Privacy Policy, Google maintains a separate logs system for auditing purposes and to help us improve the quality of our services for users."
So, if you have a Personalized Google Homepage, here's how to at least manage history items on your end...
-Click the "My Search History" link then "Remove Items". Put a check next to the items on the list you want removed, or select "All". Finally, hit the "Remove" button.
-If you don't want Search History activated, just click the "Pause" link. Again, the search info still goes to Google, but it doesn't show up in your search history display. To turn S.H. back on just hit "Resume".
-As I mentioned, the Google Toolbar also keeps your history, but it doesn't track you like the Personalized Homepage. To turn off...
-Go to the "Options" button and select the "Search" tab.
-Uncheck "drop down search history", "Save the search history...", and "Automatically search..."

Friday, July 3, 2009

How to enable the advance performance setting in windows vista?


If you have noticed that the speed of your system is very slow with windows vista then today tip is very useful for you to increase the performance of windows vista. There is some default setting in vista which is used to manage the write caching on disk. By default windows enabled the write caching on disk but the advanced performance setting is disabled.
Follow the given steps to configure the advance performance setting in Windows Vista:
-To enable this feature, you will need to be logged into your computer with administrative rights.
-First right click on My Computer icon then select the option Manage.
-Here small windows will appear with title Computer Management, now select the Device Manager option, then locate the SATA Disk under the Disk Drives.
-Here select the enable advanced performance sittings on the SATA disk.
-Now click on Ok button to apply the setting and restart your computer after any changes to go into effect
.

Wednesday, July 1, 2009

How to perform route summarization using BGP protocol?



Route summarization is the process of replacing a series of routes into a summary route with subnet mask. The main purpose of summarization is to decrease the uses of bandwidth and make the size of routing table smaller. For example if you are trying to advertise four routes 194.1.17.0/24, 194.1.18.0/24, 194.1.19.0/24 and 194.1.20.0/24 from router C to router B then the only summarized address as 194.1.16.0 255.255.248.0 will be advertised in the update packege.
This tip will help you configure BGP route summarization between two different types of routing protocols. In this case, we will try to configure three different routers with routing protocols OSPF & RIP and then advertised one summary route from router C to router B using BGP Aggregate-address command.
Follow the network topology of three different class network in given figure:
Configuration to Enable OSPF & BGP on Router B
1)In global configuration Mode:
-B (config) # router ospf 1
-(Enable ospf protocol and 1 is Autonomous number)
-B (config-router) # network 40.0.0.0 0.255.255.255 area 0
-(Advertised router B Serial Network 40.0.0.0)
-B (config-router) # network 210.100.20.0 0.0.0.255 area 0
-(Advertised router B Ethernet Network 210.100.20.0)
-B (config-router) #redistribute bgp 20 subnet metric 50
-(Redistribute bgp into ospf)
-Now configure BGP on router B
-B(config)# router bgp 20
-B (config-router) # neighbor 61.1.1.2 remote-as 10
-B (config-router) #end
-Now run show command to display the BGP updates.
-B #show ip bgp
-Now verify the summarized route in router B routing table, run the command
-B #show ip route
-Configuration to Enable RIP & BGP on Router C
2)In global configuration Mode:
-C (config) # router rip
-(Enable rip protocol)
-C (config-router) # network 210.100.30.0
-(Advertised router C Serial Network 210.100.30.0)
-C(config)#ip route 40.0.0.0 255.0.0.0 61.1.1.1
-(Create a static route to router A to complete routing table.)
-Now create four static routes and then advertised in BGP.
-C(config)# ip route 194.1.17.0 255.255.255.0 null 0
-C(config)# ip route 194.1.18.0 255.255.255.0 null 0
-C(config)# ip route 194.1.19.0 255.255.255.0 null 0
-C(config)# ip route 194.1.20.0 255.255.255.0 null 0
-Now configure BGP on router C
-C(config)# router bgp 10
-C (config-router) # neighbor 61.1.1.1 remote-as 20
-C (config-router) # redistribute static
-(Advertised static routes)
-C (config-router) # aggregate-address 194.1.16.0 255.255.248.0 summary-only
-(summary of four static routes)
-C (config-router) #end
-Now run show command to display the BGP updates.
-C #show ip bgp
-Now verify the routes in router C routing table, run the command
-C #show ip route
-Configuration to Enable OSPF & BGP on Router A
3)In global configuration Mode:
-A (config) # router ospf 1
-(Enable ospf protocol and 1 is Autonomous number)
-A(config-router) # network 40.0.0.0 0.255.255.255 area 0
-(Advertised router A Serial Network 40.0.0.0)
-A(config-router) # network 210.100.10.0 0.0.0.255 area 0
-(Advertised router A Ethernet Network 210.100.10.0)