I am quite sure that there was an instance in your life that you were a bit **** with your computer’s performance. If you’re one of those users who are currently experiencing slow computer response time, this might be helpful for you. In this article, I’ll be sharing some tips on how you could tweak your computer to make it a bit faster.
As we all know, all things has its lifespan including computers. Computers are already common nowadays and could be seen in most homes. Most of us might be aware that a single desktop computer or even a laptop has several parts. In a desktop computer, parts can be replaced easily but for a laptop, a laptop repair specialist is required because repairing a laptop is more complicated compared to repairing a desktop. Most of the time, we just replace a... continue | comments (0)
Internet savvy likes chatting and even making call from their friends from any part of the world. In the previous years, Yahoo messenger is the common and well used software applications to chat and make calls.
Recently, Skype dominates the cyber world through chat, calls, and even video calls. It even surpasses the popularity of Yahoo messenger.
In the past, Skype has released different versions in two options: free and premium.
Many of you might not be familiar with DD-WRT. To start, DD-WRT is a linux based firmware which can be flashed to your router for additional features. This is an opensource program which means that it is free of charge.
Using DD-WRT on your router is almost the same as your current firmware. It also has a web gui which makes it easier to configure. You don’t need to be a computer geek to be able to use this one. Below... continue | comments (0)
VPN or Virtual Private Network is normally used by offices or for users that are always on the go, with the help of a VPN, you can securely access the files and resources which are based in your office or on a central network. Your IP address will depend on your server. If your VPN server is in Indonesia, then you’ll also be getting an Indonesia IP. That’s how VPN works. In this article, I’ll be showing you the simple... continue | comments (0)
You should learn the Basics of Networking as well as intermediate and advanced networking before you can become a Network Administrator.
You need to learn how to design a network, crimp a cat5e cable, configure TCP/IP's of Computer workstations, setup a network printer, configure internet connection sharing, Setup a... continue | comments (4)
For those who are not familiar with remote access, it is the ability of a computer to connect to another computer and control it via network or internet by using a username and password for security purposes. Remote access has many use, it can be used to access your files and folders at home, access your office server or even in troubleshooting someone’s computer.
There would be times that you’ll be experiencing network problems at home. If you don’t know the basics, your best solution might be to call someone who is good in computers. After paying him, you’ll realize that your LAN Router was just turned off or your LAN cable is not connected to your computer. These are some of the basics which most people are not aware about. If you know the basics, this would eliminate paying someone to turn your... continue | comments (0)
Most of you might not be familiar with dual WAN routers. A dual WAN router is a router that offers two slots for WAN which allows you to use two ISP providers at the same time. Dual WAN routers are mostly used by companies to prevent internet downtime. As we all know, internet in our country is really not that stable compared to other countries and that is why having a dual WAN router can really be important.
In a school or a company, monitoring the network especially those who has a big network with hundreds of computers is not an easy task but with programs that could help you, it would be easier. In this article, I would be sharing a free program but with limited license that would help you monitor your network easily. This program can really be helpful especially for those who are working as an IT support or as a network engineer.
External DVD Drive – As I’ve said in the first part of this article, not all computers has DVD drives installed especially in an internet shop, in an office or even the latest net book laptops in the market. In this case, you can use an external DVD drive to install something or if you need to reformat a computer. Basically, reformatting requires a CD/DVD drive for you to install your operating system including the drivers. You can also use... continue | comments (1)
Most of us think that Local Area Networking (LAN) is a very complicated thing to do because of the Network Cables, networking equipments and everything. It is true that networking is really a big topic to be discussed and is really complicated to do. But in Computer Networking, there are also the basics and normally it can be found at home.
Let us begin sharing a printer using Windows XP
- Clcik Start
- Select Settings
- Select and Click Printers and Faxes
- A list of Installed printers on your computer will appear eg.. hp, canon, epson etc..
- Right Click the printer you want to share
- Select and Click Sharing...
- A security warning will appear telling you to use the Network setup wizard to safely share your printer to the network.... continue | comments (1)
Where can you find the MAC address of a Computer?
You can find the MAC address of a computer using windows xp or windows 2000 server operating systems by going to command prompt and typing ipconfig /all and then press enter. You can see an entry called Physical... continue | comments (0)
(This is the concluding part of the 5 article series for Media Server At Home. Now, lets continue our discussion about unRAID.)
You may use any computer on your network when you’re done with the configuration and activation of the un-Redundant Arrays of Inexpensive Disks. Just like any other servers, if you use Avahi in configuring your un-Redundant Arrays of Inexpensive Disks, it will simply be visible in your sidebars for Finder. For you to access the server, you may enter... continue | comments (1)
(This fourth part of the article will be focusing on information all about unRAID.)
There are lots of great features which un-Redundant Arrays of Inexpensive Disks offer to its patrons. This combines several drives into one volume just like the Redundant Arrays of Inexpensive/Independent Disks. These un-Redundant Arrays of Inexpensive Disks have redundancy which is built-in like the formats of its opposite counterpart. If for a reason a drive fails, any duplication you made to the un-Redundant Arrays of Inexpensive Disks... continue | comments (0)
(This the third part of our article Media Server At Home which will tackle about software installation and un-Redundant Arrays of Inexpensive Disks.)
If you also want to run the software you need to boot un-Redundant Arrays of Inexpensive Disks system off of a flash drive. A supplemental bay for storage can be freed through flash drive booting off. Both un-Redundant Arrays of Inexpensive Disks and the Operating System which is Linux’ stripped-down version can be accommodated on a 128 MB... continue | comments (0)
This is the second part of our discussion about creating media server at home.
You need to have lots of hard drives, a motherboard, a case, and a power supply to start your un-Redundant Arrays of Inexpensive Disks-based network. You may choose something from the recommended components list to improve your chances of acquiring a system that works while you may try using a processor or any motherboard available because a specific hardware is being recommended by *file-sharing software and new... continue | comments (1)
To share your files after storing it, you may need to create an array of disk which is network-attached.
Instead of storing your data the old fashioned way, you may store your videos, television programs, motion pictures, and your audio playlists on hard drives which is digital media distribution that has goodwill.
As you go along and try to balance quality with growth, searching the perfect storage solution can be deceiving as you may require for it. Things will arrive with complexities... continue | comments (0)
At this point, we are going to conclude our discussion about the safety measures for your mobile phone to make it secured with the second combat technique.
· second combat technique
The level of security at your establishment is the very thing to consider when you are to protect your mobile phone and from it you can formulate steps to apply for the realization of your goals. The least requirement that Information Technology departments seek in general is for you to remote... continue | comments (0)
Here on this part, we will tackle about the value of your mobile phone security and the first combating technique to fight phone attackers.
- the value of your mobile phone security
Your mobile phone security is absolutely valuable just like your priceless jewelry, you have to make sure that each time your eyes and all of your other senses are involved to safeguard your precious gadget. It is also based on the individual company, or the individual users the extent on... continue | comments (0)
This is the third part of our discussion. At this point, we will give focus on the following:
· Computer viruses, malicious software and trojan horses
For attackers who are roaming everywhere, especially, within the whole cyberspace, your mobile devices are the biggest target. For the security that no malicious software has penetrated the system even a single minute, a manufacturer did create the software which enables the big Information Technology department to scan all gadgets in one single inspection. Google... continue | comments (0)
Now, we will continue our discussion in our second part of our article.
· The most secured operating system
The most complicated thing to answer would be this. Last year, all of the major Operating Systems of smartphone have made remarkable steps. Blackberry is still the gold standard based from a security standpoint and enterprise control. On the other hand, the mobile phones of RIM have gadget-wide, futuristic encryption which includes a Secure Digital Card. However, Google Android, Apple iPhone, and other... continue | comments (2)
In the history of telecommunications, one thing we may never forget is that once there was a phone simply built for the sake of calling and being called. Years way-way back, the only thing you need to worry about when you have a telephone was the other line or the partly line who shares your phone connection, especially, during those times you need to make your phone call private and the only thing you want is the conversation between you... continue | comments (0)
If until this time you are finding ways and means to improve connectivity by using wireless gadgets, well, your search is over because you can now avoid experiencing slow data loading, choppy and dropped calls with the new Micro Cell 3G. This would be an almost reliable service experience that you could ever have and it lessens the hassles you have had when you were using a traditional old service. Now, with the help of Micro Cell 3G, the nightmare... continue | comments (0)
Prominent telecommunications organization EIA/TIA (Electronics Industry Association/ Telecommunications Industry Association) created standards for UTP cables in response to the popularity of UTP cables in network cabling. The established standard for UTP cable categorized it into 6 categories of wire: cat1, cat2, cat3, cat4, cat5/cat5e and cat6. However, among the 6 identified cable categories, only the cat3, cat5/cat5e and cat6 are used in Ethernet networks.
Think about this, is it possible for a private network of a huge corporation to utilize a public network infrastructure such as the Internet for a “secure” telecommunications purposes without compromising the confidentiality and secrecy of communication process? If your answer is no, you are absolutely wrong as the utilization of public or “shared” network infrastructure like the Internet is possible and has been in use by major organizations – thanks to Virtual Private Network.
Know the general roles and functions of a network manager
With the current job salary trend favoring those in the Information Technology (IT) field, it is not surprising that the rate of students taking up computer courses dramatically increase in the past 10 years. And as organizations of all sector maximized their hardware and information resources through setting up computer networks or intranets, the demand for highly skilled Information Technology professionals called network managers boost up. And in order for the... continue | comments (0)
The government of
BT has plans to extend fiber premises up to 90% to assume that no unfavorable charges are being held against the regulatory environment or investment. They add up that if the rural areas received the £830m financial assistance, the government has earmarked the investment in broadband networks.
Cybercrime or also known as computer crime is the act of committing illegal activities through the use of a network or the internet. This is basically done by persons who posses above average skills in computers. They are also called hackers, scammers and more. Below are some of examples of cybercrimes in the world.
Ethernet Cable splitter: the easiest way to share internet - Hubs and Switches: the best way to share files and printers on LAN
Through the influx of technology, computers have been widely used at homes not one but multiple computers attached to a device to share internet connection. Without any device to connect them, it would be impossible to create more connections. Why? Simply because every internet connection contains IPs as an identification of every computer. However, if this comes to be true, internet providers will run out of IPs since almost all houses and offices and other firms utilize computers and internet.... continue | comments (0)
We will build a LAN from the ground up from purchasing LAN devices to configuring and running the network.
We need to buy the following Network devices for our Small Network.
2. Network Adapters
4. UTP cables
5.... continue | comments (0)
To be able to... continue | comments (0)
Primary DNS address is not... continue | comments (0)
- User EXEC Mode: This mode permits the administrator to use monitoring commands but limited. It is impossible to configure from this mode. On this mode, the command prompt is "router>"
- Privileged EXEC Mode: This mode permits the administrator to equip the device commands, most of which are for configuration and management, Moreover, it can... continue | comments (2)
How much do you know about packet switching? Definitely, this term will appear in Cisco CCNA certification exam. There are many new terms to learn, most of which are ambiguous words at first. An example of these is packet switching. This term is absolutely needed to fully understand in order to pass a Cisco CCNA certification exam. This article aims to clearly define and explain terms such as packet switching and how it is compared to message switching.
The need for a secured connection for online communication amongst businesses and its employees has long been answered by yet another powerful product of technology known as, the Virtual Private Network or VPN.
In a previous article it has been named as one of the basic routers used in tying up multiple networks together. What makes this tool very popular is its ability to provide a private channel for exchange of information (both receiving and sending) from a remote location or... continue | comments (1)
Maybe you are on the stage of planning to build a network connection for your home or for small business office. In this article, we will try to examine the two available options that you can use the wired and wireless networking. We will try to identify the pros and cons of each option.
Let me discuss first the wired connection.
Do you have an internet connection and want it to share to another computer at home? Let us first define what's an Ad hoc means. I'll try not to use technical terms so it's not hard for you to imagine what I'm trying to explain here. An Ad hoc simply refers to a wireless mode which turns your wi-fi enabled computer into a wireless router-like radio signal. This enables you to establish a PC to PC wireless connection, sounds interesting? I've tried... continue | comments (0)
Just to give you brief overview, computer users nowadays are choosing Wi-Fi Internet access everywhere because it is cheaper and very accessible. Anyone can be hooked over the Internet everywhere and anytime.
Most of the residential and business Internet set-ups are using Wi-Fi connection. So don't be surprised if in case you will be gong in a remote area that already had... continue | comments (1)
But, have you ever wondered how Wi-Fi came about? How it works? Let this article... continue | comments (0)
We may not be aware but networking is present in nearly every industry from offices, schools, establishments and even in our very homes making information available and accessible to everyone at anytime and making daily business operations possible.
Question is how does it work? How does networking allow the transfer of information from one computer to the other? Let's take a closer look and learn its basics.
Networking is described as the process of connecting two or more and even multiple... continue | comments (0)
This article will discuss how VoIP works and its advantage compare to an ordinary telephone line. I guess after reading this article, you will then start your VoIP.
VoIP or Voice over Internet Protocol is a method of delivering voice communications over Internet Protocol networks like internet. It is also called IP telephony, Internet telephony, and broadband telephony/phone. This will take your analog audio signals (like the... continue | comments (1)