Main Menu

Author Login


Our Partners

Authorized Pearson Vue Test Center

Live Online Training

Live CCNA Remote lab



CNCTC Articles- Excellence in IT TRAINING

Evernote, the best companion for work and school

By: Mon Peter I. Damiles Posted: 15 Aug, 2015
At work and at school, we are all aware that taking down notes is always an issue due to the fact that we always misplace a sheet of power that we use. Using a notepad on your computer might be the solution but still, you can't access your notes when you are outside which forces you to go home and access it. For those who are using their gadgets to take down notes and reminders, it would also be possible but again, transferring it to your computer might also need a couple of steps to accomplish.

In this article, I will be discussing about a program that might really be helpful both for students and professionals which is called Evernote.

Some of you might have heard about it but was not able to use it or even test it. Evernote is a very good program when it comes to taking down notes, setting reminders or even sharing ideas with other people. Evernote is not your typical notepad that could just save the items that you have typed. One of the best features of this program that I really love most is that it could be synced to your computers, mobile devices... ... continue |

Texas, the newest location for Facebook's Data Center

By: Mon Peter I. Damiles Posted: 31 Jul, 2015
Facebook, the leading social networking site has announced that they will be putting up their newest data center and its location would be at Forth Worth, Texas. The said data center would be the fifth data center of Facebook. The other four data centers are located at Altoona, Iowa; Prineville, Oregon; Forest City, North Carolina and at Lulea, Sweden. We are aware that the climate in Texas is really not that cool but according to reports, Facebook is aware of it and they are prepared for it.

The fifth data center would be used to better cater the needs of their users. As we all know, Facebook started 2004 and is now on the top of the list when it comes to social media sites and as of the moment, the number of users of the said social networking site is still continuously growing. We could even say that most computer users have their own Facebook account.

The said project would be their latest data center and it would also be using renewable energy. Putting up a data center in an area where the climate is a bit hot might be very intriguing to others but then again, they... ... continue |

Must have attitudes for IT professionals at work

By: Mon Peter I. Damiles Posted: 30 May, 2015
In a company, IT professionals are always present to assist users and customers regarding various issues whether it is on the technical side or just a simple customer query. Being an IT professional is not an easy task and it requires training and never ending learning.

As we all know, the IT industry is still growing and the need of IT professionals are also rising. Every year, huge number of IT students finishes their degrees but the question is, are they ready?

In this article, I will be talking about the attitudes that IT professional and fresh graduates must have in order to stay competitive to be able to cope up with the demands of the industry.

Flexibility - Being flexible means that you could easily adapt with any changes needed. This way, the company could see that even if there would be any sudden changes that could make your work difficult, you're still willing to do it.

Respect - In any office, respect is one of the most important attitudes that every employees must possess. When you respect your fellow employees, a big chance is that they'll also respect you in return. But if you don't respect them, believe me; they'll... ... continue |

Ways on how developers earn from freeware apps

By: Mon Peter I. Damiles Posted: 29 May, 2015
Ever wonder how developers earn from free programs they have created? Some of you might have asked this already. Being a developer is not an easy task and it requires a lot of patience, hard work, logic and most of all, sleepless nights. There are those developers that develop programs that are totally free, these developers are those who just wanted to help and share their skills and knowledge. In this article, I will be explaining some of the ways on how developers earn money after creating free applications.

Advertisement - Some companies insert their advertisement on free programs in order to let the users know that they are offering or selling a certain product or service. The payment depends on the agreement of the developer and the advertiser. A good example for this one is Facebook, Facebook is free to use but they offer several ways on how companies can advertise.

Premium Version - Many freeware programs has this one wherein they let users download their free version on the net which only has the basic version installed. If the user wants to access the full functions of the program, the user has the option to upgrade the free version into... ... continue |


By: Mon Peter I. Damiles Posted: 29 May, 2015
Ever wonder how developers earn from free programs they have created? Some of you might have asked this already. Being a developer is not an easy task and it requires a lot of patience, hard work, logic and most of all, sleepless nights. There are those developers that develop programs that are totally free, these developers are those who just wanted to help and share their skills and knowledge. In this article, I will be explaining some of the ways on how developers earn money after creating free applications.

Advertisement - Some companies insert their advertisement on free programs in order to let the users know that they are offering or selling a certain product or service. The payment depends on the agreement of the developer and the advertiser. A good example for this one is Facebook, Facebook is free to use but they offer several ways on how companies can advertise.

Premium Version - Many freeware programs has this one wherein they let users download their free version on the net which only has the basic version installed. If the user wants to access the full functions of the program, the user has the option to upgrade the free version into... ... continue |

Philippines, one of the slowest internet connections in Asia

By: Mon Peter I. Damiles Posted: 29 May, 2015
Most of us are aware that here in our country, internet speed is not that good. You will surely feel the difference once you have tried using the internet in other countries. So why is it that our country's internet connection is still slow but the pricing of the internet plans is almost the same with our neighboring countries.

There would be several reasons why our internet speed is still among the slowest but I think that the main reason behind is that we still cannot afford to invest on this aspect. If you are going to look at the reports generated by various tests, you will notice that we are still on the very bottom of the graph. I am pretty sure that most of us want blazing internet speeds but to tell you frankly, it still might take several years before we could attain that.

On the ranking of the fastest in Asia, Singapore is on the top of the list and that would not be a surprise. Singapore is basically known as one of the leading countries when it comes to the IT industry and it means that their technology is up to date.

If you will compare, Singapore's internet... ... continue |

Basic Functions of an Active Directory

By: Mon Peter I. Damiles Posted: 27 May, 2015
For those who are working in an office with a large network, I am pretty sure that your company is using the Active Directory service of Microsoft to handle computers inside your office. Active Directory is recommended for offices that handles several computers. In this article, I will be explaining the role of an Active Directory in a company.

First of all, Active Directory was developed by Microsoft and it is a service that controls both the users and the computers in a specific network. It can control the rights and the limitations of a user. The active directory is capable of disabling programs that are not needed or the folders that you could access. The said program can help the IT department of the company to implement policies and securities that are required.

The Active Directory is also the one being used to create user ID's that could access the domain. It is also where the IT department resets the password if ever a certain user forgot it. It is basically a secured way to access the network. If ever someone wants to access a computer but he/she does not have a valid account, the domain would not allow... ... continue |

New games = new hardware requirements

By: Mon Peter I. Damiles Posted: 22 May, 2015
Computer games were created years ago and it evolved as years goes by. There are several gaming consoles available in the market and usually, gamers tend to spend money on their gaming devices to better improve their gaming experience.

Hardcore gamers will always make sure that their hardware components are up to date in order to prevent hangs, lags or anything that might cause a bad experience while playing. For those who are not aware, a desktop computer is also considered as a gaming device and it is the one that needs constant upgrading.

New games on the market are being released from time to time and that it why upgrading your hardware is a thing you might want to consider. Most of you might be asking if why it is needed. The answer is simple, new games = new hardware requirements.

In this present time where games looks and feels real already, it would definitely need a video card that is capable of rendering the graphics and a processor that could support them. Your current hardware components might still be capable of running a newly released game but it could only run on its lowest setting. When a game setting is... ... continue |

Protecting your wireless connection at home

By: Mon Peter I. Damiles Posted: 29 Apr, 2015
Many of us are already using wireless routers at home so that our hand held devices and laptops could connect without the use of long cables. It is usual for users who do not have knowledge on computers to let someone set it up for them which includes setting up the password for your wireless routers.

Even if our routers already asks for passwords, we are still not 100 percent sure that no one could connect to your connection especially if you have a computer geek neighbor. And that is why I am writing this article to give some tips on how to have a secured wireless connection at home.

SSID Name - This SSID name serves as the name of your wireless connection where you will connect to. At purchase, the name of this is usually the brand of router you possess but you could change this one. When you change your SSID name, make sure that it is not easy for them to distinguish where it is coming from. Some users tend to name their SSID by their names, last names or even address which is a big no because they could easily distinguish you. It would be better... ... continue |

Importance of monitoring the server room

By: Mon Peter I. Damiles Posted: 23 Apr, 2015
Almost all companies nowadays are relying on computers for their daily work and that is why it would be very important for the IT department of every company to monitor their respective server rooms to make sure that everything is in good condition. Some companies strictly implement the said monitoring but for some, they don't and that is why I am writing this article to remind everyone the importance of this task.

Below are the things that require constant monitoring for the server room.

Room Temperature - We are all aware that the our temperature nowadays are already rising and we must make sure that the room temperature of our server rooms are enough to cool down our devices. Having a server room that has a bad air-condition unit could result to problems. It could possibly fry your routers, switches and your other networking devices and that would be the worst that could happen to your IT department. Again, to make sure that your devices are cool enough to work 24/7, monitoring the room temperature is very important.

Cable and Power Connections - Most of the time, cables are the culprit when it comes to intermittent connections. It would be best to... ... continue |

Computer preventive maintenance guide

By: Mon Peter I. Damiles Posted: 31 May, 2014
Maintaining a computer could be compared to a car wherein you need to check it every now and then in order to make sure that it's running at its peak. It is called preventive maintenance because we prevent any failure that might occur by inspecting and maintaining it well. Unlike a car, maintaining a computer would be a lot easier. Below would be some tips that could help you maintain your computer.

Disk Defragmenter - Defragging your disks could help speed up your computer by rearranging files on your disk.

Registry cleaner program - Installing a registry cleaner program could help your computer run faster by fixing your registry.

Cleaning your case - Once in a while, it would be a good idea to clean your case in order to clear dusts for better airflow. One of the very reasons why a computer overheats is that the heat dissipated by the components couldn't go out because of a dirty case. While cleaning your case, you could also try managing your wires properly. It would also result to a better airflow for your case. Adding an additional fan could also help a lot.

Uninstall unneeded programs - If there would be programs on your... ... continue |

Advancement of newer laptops vs the old ones

By: Mon Peter I. Damiles Posted: 30 May, 2014
We are all aware that laptops nowadays are far better compared to those created a few years back. I am one of those who own a laptop that is already more than 5 years old but I am happy to say that until now its overall condition is still good except for its battery. In this article, I would like to share several improvements that newer laptop has that laptops before do not.

Speed - Newer laptops of course would be faster because of its newer processors. Due to better processors, laptops can now support high end games.

Size - Now, we already have what we call net books. It is like a smaller laptop but with a slower processor. 5 years ago, normal laptop sizes are only 14 and 15 inches.

Weight - Laptops now is lighter in weight unlike before that when you do have a laptop inside your bag, you are like carrying several books at your back. Laptops nowadays are thinner which made it lighter and is easier to carry.

High tech features - Laptops now do have biometrics and facial detection for better security. Besides that, laptop nowadays already support touch capable screens which eliminates the... ... continue |

Microsoft's Surface Pro 3, A tablet that could be transformed into a laptop

By: Mon Peter I. Damiles Posted: 30 May, 2014
Microsoft has announced their newest product which is called the Surface Pro 3. Microsoft said that this product could possibly replace your existing laptops. This product is a tablet but again, this could also be transformed into a laptop just by adding an external keyboard. This is not the the first that a company has released a tablet that could be transformed into a laptop but in my opinion, this product could possibly stand out from the rest not just because of it's design but also because of it's speed. Below would be the specification of the said tablet.

Processor - 4th Gen Intel Core i3, i5 or i7
Storage and RAM - 64 GB or 128GB with 4GB RAM / 256GB or 512GB with 8GB RAM
Display - 12" Multitouch
Weight - 1.76 lbs
Camera - 5.0 MP for both front and back cameras
Connectivity - Wi-Fi / Bluetooth
Battery Life - Up to 9 hours
OS - Windows 8.1 Pro

As I've said, this is not the very first transformer tablet but in my opinion, this would be the best so far due to it's fast processor. Usually, tablets only possess small processors like the intel atom but for this one, having an i series processor... ... continue |

Tips on creating a strong password

By: Mon Peter I. Damiles Posted: 30 May, 2014
What is a password? A password is a code we normally use in order to keep our files and accounts secured. We normally use it in our email accounts, social networking accounts and more. Passwords are made in order to protect the contents of our accounts but most of us don't really understand how to make one. Having a strong password is really important especially nowadays wherein hackers could penetrate into anything. In this article, I'll be sharing some tips on how to make a strong password.

Avoid using your name and your birthday - This is very common nowadays wherein they use their name together with their birthday as their password. For example, your name is Rachel and your birthday is Nov. 25 and so your password would be rachel1125. This kind of password is very weak and would be a piece of cake to open for hackers.

Different passwords for different accounts - If you have several accounts, I would advice not to have the same password for all but do make sure that you'll remember each and one of them. If you think that there is a chance for you to forget it, you could write a... ... continue |

Importance of a portable hard drive

By: Mon Peter I. Damiles Posted: 30 May, 2014
A portable hard drive from the name itself is a hard drive that you could carry wherever you go. It is like a bigger version of a flash drive. The main difference of a portable hard drive with a regular flash drive is that a portable hard drive could accommodate bigger storage capacity.

Having a portable hard drive is important for those who are on the go. A function of a portable hard drive depends on the user. For those who are related to the information technology field, portable hard drives serves not just a storage but also a backup drive especially if there would be important files or data that could be needed for work. For movie buffs, a portable hard drive for them might contain TV series and several movies that they could enjoy watching for hours. For those who love to take pictures, this serves as storage for the pictures that they took.

For those who are not aware, both desktop and laptop hard drives could also be used as a portable hard drive but you need to purchase an enclosure in order for it to work. If you'll be using a laptop hard drive with an... ... continue |

A simple solution for your media player problems

By: Mon Peter I. Damiles Posted: 30 May, 2014
Have you experienced downloading a video that would not play properly on your computer? The main of this might be that your default media player might not be updated. If you are one of those who experienced this kind of problem, this article might be helpful for you.

As we all know, media players are used to play music, videos or movies but if your media player isn't fully updated, you might experience some of the problems below.

Unsupported format - This is a very common problem wherein some formats could not be played. As I have said, this is a cause of an outdated media player. Updating your media player's codec might do the trick.

No sounds - This might also be a compatibility problem. If there is a video codec, there is also a sound coded that needs to be updated but before anything else, you could try checking your audio card and your speakers.

Video Lag - I have experienced this several times already wherein a video can be played but it would not play properly. It may be possible that your video card does not support the resolution of the video that you are playing or again, an outdated media... ... continue |

Understanding Phone Tethering

By: Mon Peter I. Damiles Posted: 28 May, 2014
Tethering is the process of connecting a device to your mobile phone to share internet connection. Tethering is done by those who are subscribed to a mobile internet plan which do have the capabilities of sharing their connection to other devices. Traditionally, we only knew routers are the only devices that could possibly share an internet connection to other devices but because of the continuing development of the modern world, mobile internet can now be easily shared.

Tethering your phone to other devices will depend on the connection that your phone has. It may be done using a Bluetooth, Wi-Fi or simply by a USB cable.

Bluetooth tethering - Tethering using your Bluetooth simply means that other devices could connect

Wi-Fi tethering - Tethering using your Wi-Fi or commonly known as mobile hotspot is the most common tethering being used. It means that other devices could connect to your device using Wi-Fi. Your phone acts as a router which could be used to share your phones internet connection.

USB tethering - Tethering via USB means that you could connect your phone to a device that has a USB port to share your connection.

In order to use tethering properly, you will... ... continue |

Software that could monitor your child's internet activity

By: Mon Peter I. Damiles Posted: 30 Apr, 2014
In our present generation, the greater percentage of the world knows how to use a computer. Even kids under 7 years old could even operate one. I can even see some kids who are playing with their own tablets while being pushed on their strollers. Most kids nowadays prefer facing the computer rather than playing outside with friends. Most parents might allow their children to use the computer but how could parents monitor the sites that they are visiting?

In this article, I will be sharing a program that could be useful in monitoring the sites or limiting the time they could spend using the internet. This way, parents would be sure that their children are not visiting sites that would not cause them any good.

One of the most famous programs that could help you protect your children is the K9 Web Protection. It allows you to block websites depending on the category. It can block the page when the program detects that the content of the website that is being opened is among the category that is blocked. As I have said above, it also has the feature to allow your child to use the computer for a specific... ... continue |

Faster Internet with 4G LTE

By: Mon Peter I. Damiles Posted: 23 Apr, 2014
Internet connection nowadays is far more better compared a decade before. I do remember using a dial up connection wherein you need to plug your modem to a telephone line in order to connect to the internet with a speed of only 56 kbps. Downloading a 10mb file would take you hours unlike now that it would only take you a few seconds for it to be finished. A 1.5mbps connection may already be fast for others but for some, this isn't enough and this is where LTE comes in. LTE stands for Long-Term Evolution or commonly known as the 4G connection.

LTE connection was already available years back in other countries but was only recently acquired by the Philippines. If you are not happy anymore with the current speed that you are using, upgrading to 4g/LTE might be the best solution for you.

It is nice to know that telecommunication companies are doing their very best to come up with upgrades that would benefit us. The LTE connection is a fast internet by the use of mobile data and was introduced at first for mobiles only but now, it could already be used for computers wherein you just need... ... continue |

asdasdasd dasdadsa asdads

By: Mon Peter I. Damiles Posted: 23 Apr, 2014

asdasdadsads adsads 









... |

Simple tweaks for a faster response time

By: Mon Peter I. Damiles Posted: 22 Aug, 2013

I am quite sure that there was an instance in your life that you were a bit **** with your computer’s performance.  If you’re one of those users who are currently experiencing slow computer response time, this might be helpful for you. In this article, I’ll be sharing some tips on how you could tweak your computer to make it a bit faster.

Uninstall unneeded programs – Most computer users don’t really care much about uninstalling programs that are really not... continue |

Hardware Junks to cash

By: Mon Peter I. Damiles Posted: 31 Jul, 2013

As we all know, all things has its lifespan including computers. Computers are already common nowadays and could be seen in most homes. Most of us might be aware that a single desktop computer or even a laptop has several parts. In a desktop computer, parts can be replaced easily but for a laptop, a laptop repair specialist is required because repairing a laptop is more complicated compared to repairing a desktop. Most of the time, we just replace a... continue |

What's new with Skype 5.3?

By: Ailene B. Misa Posted: 03 Nov, 2011

Internet savvy likes chatting and even making call from their friends from any part of the world.  In the previous years, Yahoo messenger is the common and well used software applications to chat and make calls. 

Recently, Skype dominates the cyber world through chat, calls, and even video calls.  It even surpasses the popularity of Yahoo messenger.

In the past, Skype has released different versions in two options: free and premium.

In this article I’m going to introduce the new Skype version 5.3,... continue |

Router Firmware Upgrade - Unleash the hidden capabilities of your router

By: Mon Peter I. Damiles Posted: 23 Oct, 2011

Many of you might not be familiar with DD-WRT. To start, DD-WRT is a linux based firmware which can be flashed to your router for additional features. This is an opensource program which means that it is free of charge.

Using DD-WRT on your router is almost the same as your current firmware. It also has a web gui which makes it easier to configure. You don’t need to be a computer geek to be able to use this one. Below... continue |

How to connect a Windows XP client to a VPN server

By: Mon Peter I. Damiles Posted: 17 Oct, 2011

VPN or Virtual Private Network is normally used by offices or for users that are always on the go, with the help of a VPN, you can securely access the files and resources which are based in your office or on a central network.  Your IP address will depend on your server. If your VPN server is in Indonesia, then you’ll also be getting an Indonesia IP. That’s how VPN works. In this article, I’ll be showing you the simple... continue |

What Short Courses to take to become a Network Administrator

By: Megan B. Bolivar Posted: 26 Sep, 2011
There are Computer Short Courses out there that offer courses for Computer Networking. One thing I know about Network Administrator is its about everything. You need to know everything about LAN and WAN.

You should learn the Basics of Networking as well as intermediate and advanced networking before you can become a Network Administrator.

You need to learn how to design a network, crimp a cat5e cable, configure TCP/IP's of Computer workstations, setup a network printer, configure internet connection sharing, Setup a... continue |

How to access computers remotely

By: Mon Peter I. Damiles Posted: 13 Aug, 2011

For those who are not familiar with remote access, it is the ability of a computer to connect to another computer and control it via network or internet by using a username and password for security purposes. Remote access has many use, it can be used to access your files and folders at home, access your office server or even in troubleshooting someone’s computer.

Remote access is already available in various windows operating systems though there are also some programs like... continue |

Basic Home Network Troubleshooting Fixing Common Network Problems

By: Mon Peter I. Damiles Posted: 27 Jul, 2011

There would be times that you’ll be experiencing network problems at home. If you don’t know the basics, your best solution might be to call someone who is good in computers. After paying him, you’ll realize that your LAN Router was just turned off or your LAN cable is not connected to your computer. These are some of the basics which most people are not aware about. If you know the basics, this would eliminate paying someone to turn your... continue |

Dual WAN Router - Preventing Internet Downtime

By: Mon Peter I. Damiles Posted: 18 Jul, 2011

Most of you might not be familiar with dual WAN routers. A dual WAN router is a router that offers two slots for WAN which allows you to use two ISP providers at the same time. Dual WAN routers are mostly used by companies to prevent internet downtime. As we all know, internet in our country is really not that stable compared to other countries and that is why having a dual WAN router can really be important.

With the help... continue |

How to Monitor your Network Performance (LAN) the easy way

By: Mon Peter I. Damiles Posted: 12 Jul, 2011

In a school or a company, monitoring the network especially those who has a big network with hundreds of computers is not an easy task but with programs that could help you, it would be easier. In this article, I would be sharing a free program but with limited license that would help you monitor your network easily. This program can really be helpful especially for those who are working as an IT support or as a network engineer.

While searching... continue |

Basic tools that a computer technician must have (part 2)

By: Mon Peter I. Damiles Posted: 20 Jun, 2011

External DVD Drive – As I’ve said in the first part of this article, not all computers has DVD drives installed especially in an internet shop, in an office or even the latest net book laptops in the market. In this case, you can use an external DVD drive to install something or if you need to reformat a computer. Basically, reformatting requires a CD/DVD drive for you to install your operating system including the drivers.  You can also use... continue |

How to Setup a Home Network with a Router

By: Mon Peter I. Damiles Posted: 14 Jun, 2011

Most of us think that Local Area Networking (LAN) is a very complicated thing to do because of the Network Cables, networking equipments and everything. It is true that networking is really a big topic to be discussed and is really complicated to do. But in Computer Networking, there are also the basics and normally it can be found at home.

In this article, I’ll be discussing the very basic networking for your home. This will be a step by step... continue |

How to share a Printer between multiple Computers

By: Megan B. Bolivar Posted: 09 Jun, 2011
I will tell you how to share a printer between a number of computers using Windows XP  Operating System.

Let us begin sharing a printer using Windows XP

  • Clcik Start 
  • Select Settings
  • Select and Click Printers and Faxes
  • A list of Installed printers on your computer will appear eg.. hp, canon, epson etc..
  • Right Click the printer you want to share
  • Select and Click Sharing...
  • A security warning will appear telling you to use the Network setup wizard to safely share your printer to the network.... continue |

What is a MAC Address

By: Megan B. Bolivar Posted: 05 Jun, 2011
MAC is short for Media Access Control It is a term used for Computer Networking  or Local Area Network. Every Computer in a network have their own unique Hardware address or MAC address.

Where can you find the MAC address of a Computer?

You can find the MAC address of a computer using windows xp or windows 2000 server operating systems by going to command prompt and typing ipconfig /all and then press enter. You can see an entry called Physical... continue |

Media Server At Home-5: All About unRAID-2

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This is the concluding part of the 5 article series for Media Server At Home. Now, lets continue our discussion about unRAID.)

You may use any computer on your network when you’re done with the configuration and activation of the un-Redundant Arrays of Inexpensive Disks. Just like any other servers, if you use Avahi in configuring your un-Redundant Arrays of Inexpensive Disks, it will simply be visible in your sidebars for Finder. For you to access the server, you may enter... continue |

Media Server At Home-4: All About unRAID-1

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This fourth part of the article will be focusing on information all about unRAID.)

There are lots of great features which un-Redundant Arrays of Inexpensive Disks offer to its patrons. This combines several drives into one volume just like the Redundant Arrays of Inexpensive/Independent Disks. These un-Redundant Arrays of Inexpensive Disks have redundancy which is built-in like the formats of its opposite counterpart. If for a reason a drive fails, any duplication you made to the un-Redundant Arrays of Inexpensive Disks... continue |

Media Server At Home-3: Software Installation And unRAID

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

(This the third part of our article Media Server At Home which will tackle about software installation and un-Redundant Arrays of Inexpensive Disks.)

If you also want to run the software you need to boot un-Redundant Arrays of Inexpensive Disks system off of a flash drive. A supplemental bay for storage can be freed through flash drive booting off. Both un-Redundant Arrays of Inexpensive Disks and the Operating System which is Linux’ stripped-down version can be accommodated on a 128 MB... continue |

Media Server At Home-2: un-RAID Building And Hard Drives

By: Cresencio Daffon Jr. Posted: 18 Jan, 2011

This is the second part of our discussion about creating media server at home.

You need to have lots of hard drives, a motherboard, a case, and a power supply to start your un-Redundant Arrays of Inexpensive Disks-based network. You may choose something from the recommended components list to improve your chances of acquiring a system that works while you may try using a processor or any motherboard available because a specific hardware is being recommended by *file-sharing software and new... continue |

Media Server At Home: 1

By: Cresencio Daffon Jr. Posted: 17 Jan, 2011

To share your files after storing it, you may need to create an array of disk which is network-attached.

Instead of storing your data the old fashioned way, you may store your videos, television programs, motion pictures, and your audio playlists on hard drives which is digital media distribution that has goodwill.

As you go along and try to balance quality with growth, searching the perfect storage solution can be deceiving as you may require for it. Things will arrive with complexities... continue |

Safety Measures For Your Mobile Phone To Make It Secured: 5

By: Cresencio Daffon Jr. Posted: 14 Jan, 2011

At this point, we are going to conclude our discussion about the safety measures for your mobile phone to make it secured with the second combat technique.

·         second combat technique 

The level of security at your establishment is the very thing to consider when you are to protect your mobile phone and from it you can formulate steps to apply for the realization of your goals. The least requirement that Information Technology departments seek in general is for you to remote... continue |

Safety Measures For Your Mobile Phone To Make It Secured: 4

By: Cresencio Daffon Jr. Posted: 13 Jan, 2011

Here on this part, we will tackle about the value of your mobile phone security and the first combating technique to fight phone attackers. 

  • the value of your mobile phone security

Your mobile phone security is absolutely valuable just like your priceless jewelry, you have to make sure that each time your eyes and all of your other senses are involved to safeguard your precious gadget. It is also based on the individual company, or the individual users the extent on... continue |

Safety Measures For Your Mobile Phone To Make It Secured: 3

By: Cresencio Daffon Jr. Posted: 13 Jan, 2011

This is the third part of our discussion. At this point, we will give focus on the following: 

·          Computer viruses, malicious software and trojan horses  

For attackers who are roaming everywhere, especially, within the whole cyberspace, your mobile devices are the biggest target. For the security that no malicious software has penetrated the system even a single minute, a manufacturer did create the software which enables the big Information Technology department to scan all gadgets in one single inspection. Google... continue |

Safety Measures For Your Mobile Phone To Make It Secured: 2

By: Cresencio Daffon Jr. Posted: 12 Jan, 2011

Now, we will continue our discussion in our second part of our article.

·          The most secured operating system

The most complicated thing to answer would be this. Last year, all of the major Operating Systems of smartphone have made remarkable steps. Blackberry is still the gold standard based from a security standpoint and enterprise control. On the other hand, the mobile phones of RIM have gadget-wide, futuristic encryption which includes a Secure Digital Card. However, Google Android, Apple iPhone, and other... continue |

Safety Measures For Your Mobile Phone To Make It Secured: 1

By: Cresencio Daffon Jr. Posted: 12 Jan, 2011

In the history of telecommunications, one thing we may never forget is that once there was a phone simply built for the sake of calling and being called. Years way-way back, the only thing you need to worry about when you have a telephone was the other line or the partly line who shares your phone connection, especially, during those times you need to make your phone call private and the only thing you want is the conversation between you... continue |

The Tool To Improve Your Wireless Connection

By: Cresencio Daffon Jr. Posted: 02 Jan, 2011

If until this time you are finding ways and means to improve connectivity by using wireless gadgets, well, your search is over because you can now avoid experiencing slow data loading, choppy and dropped calls with the new Micro Cell 3G. This would be an almost reliable service experience that you could ever have and it lessens the hassles you have had when you were using a traditional old service. Now, with the help of Micro Cell 3G, the nightmare... continue |

Things you need to know about Category 6 UTP Cable

By: Kenneth Tello Posted: 14 Dec, 2010
Basic Information about cat6 cable and Installation tips

Prominent telecommunications organization EIA/TIA (Electronics Industry Association/ Telecommunications Industry Association) created standards for UTP cables in response to the popularity of UTP cables in network cabling. The established standard for UTP cable categorized it into 6 categories of wire: cat1, cat2, cat3, cat4, cat5/cat5e and cat6. However, among the 6 identified cable categories, only the cat3, cat5/cat5e and cat6 are used in Ethernet networks.

Though cat5/cat5e UTP cable standards create reliable and fast gigabit... continue |

What is a Virtual Private Network? How it can help your company grow

By: Kenneth Tello Posted: 13 Dec, 2010

Think about this, is it possible for a private network of a huge corporation to utilize a public network infrastructure such as the Internet for a “secure” telecommunications purposes without compromising the confidentiality and secrecy of communication process? If your answer is no, you are absolutely wrong as the utilization of public or “shared” network infrastructure like the Internet is possible and has been in use by major organizations – thanks to Virtual Private Network.

But what is a Virtual Private... continue |

The Roles of a Network Manager

By: Kenneth Tello Posted: 10 Dec, 2010

Know the general roles and functions of a network manager

With the current job salary trend favoring those in the Information Technology (IT) field, it is not surprising that the rate of students taking up computer courses dramatically increase in the past 10 years. And as organizations of all sector maximized their hardware and information resources through setting up computer networks or intranets, the demand for highly skilled Information Technology professionals called network managers boost up. And in order for the... continue |

UK Will Spread Broadband Plans on December 6, 2010

By: Cresencio Daffon Jr. Posted: 04 Dec, 2010

The government of United Kingdom will spread out its plans on broadband industry this coming Monday, December 6, 2010, declared by Jeremy Hunt, Britain’s culture minister.

BT has plans to extend fiber premises up to 90% to assume that no unfavorable charges are being held against the regulatory environment or investment. They add up that if the rural areas received the £830m financial assistance, the government has earmarked the investment in broadband networks.

Also, BT will include up to 40 rural market... continue |

What is cybercrime?

By: Mon Peter I. Damiles Posted: 04 Nov, 2010

Cybercrime or also known as computer crime is the act of committing illegal activities through the use of a network or the internet. This is basically done by persons who posses above average skills in computers. They are also called hackers, scammers and more. Below are some of examples of cybercrimes in the world.

Hacking – Hacking is the most popular type of cybercrime. This involves someone who uses the internet or even a network to enter a restricted site for... continue |

Ethernet Cable splitter: the easiest way to share internet - Hubs and Switches: the best way to share files and printers on LAN

By: Melissa Reyes Posted: 31 Oct, 2010

Through the influx of technology, computers have been widely used at homes not one but multiple computers attached to a device to share internet connection. Without any device to connect them, it would be impossible to create more connections. Why? Simply because every internet connection contains IPs as an identification of every computer. However, if this comes to be true, internet providers will run out of IPs since almost all houses and offices and other firms utilize computers and internet.... continue |

How to Install and Setup a Home or Small Office Local Area Network (LAN)

By: Megan B. Bolivar Posted: 14 Oct, 2010
Having a basic understanding of a Local Area Network can help you Setup, configure and install a Home or Office Network. Familiarity with PC Hardware and Software Troubleshooting and Repair is reccomended to successfully build a small LAN.

We will build a LAN from the ground up from purchasing LAN devices to configuring and running the network.

We need to buy the following Network devices for our Small Network.

1. Computers
2. Network Adapters
3. Switch
4. UTP cables
5.... continue |

How to Share your Printer to other Computers on your Home/Office using Windows Xp

By: Megan B. Bolivar Posted: 12 Oct, 2010
Sharing a printer for multiple computers will definitely gives you good reason to be happy because you will not only save money but also you save energy because you don't have to buy additional printer for other computers on your home or office and you will save your energy because you dont need to save your worksheet in your flash disk and go to the computer who have printer installed in it to print your work.

To be able to... continue |

Common errors in Joining Windows XP pro to a Windows Server 2003 Domain

By: Megan B. Bolivar Posted: 06 Oct, 2010
Joining a Windows Xp pro to a Windows Server 2003 is quite as easy as one two three as long as you follow all the requierements of joining a workstation to a domain. But what if following all the instructions on how to join a Windows Xp wont let you see the "Welcome to the new Domain" info? Well here are the common reasons why you were unable to join your Windows XP to your Domain:

Primary DNS address is not... continue |

How to setup and configure a wireless network and share your internet connection

By: Megan B. Bolivar Posted: 03 Oct, 2010
Installing and configuring a wireless network is alot easier then what you think as long as you have the IT skills to do it and having a basic understanding of (LAN) Local Area Network is a good way to start setting up your wireless network and  share your internet connection to others. You don't need to subscribed for another ISP or DSL service provider to connect your other computers to the internet just follow the steps to build your own... continue |

Lessons on CISCO Router Configuration Modes and other types of Router Memory

By: Melissa Reyes Posted: 07 Jun, 2010
To be familiar with CISCO router commands, Take a few minutes to read thisse article which is very helpful when you prepare yourself for the Cisco CCNA exam.
  1. User EXEC Mode: This mode permits the administrator to use monitoring commands but limited. It is impossible to configure from this mode. On this mode, the command prompt is "router>"
  2. Privileged EXEC Mode: This mode permits the administrator to equip the device commands, most of which are for configuration and management, Moreover, it can... continue |

Is Packet Switching similar to Message Switching?

By: Melissa Reyes Posted: 03 Jun, 2010

How much do you know about packet switching? Definitely, this term will appear in Cisco CCNA certification exam. There are many new terms to learn, most of which are ambiguous words at first. An example of these is packet switching. This term is absolutely needed to fully understand in order to pass a Cisco CCNA certification exam. This article aims to clearly define and explain terms such as packet switching and how it is compared to message switching.

Basically, packets from... continue |

Understanding VPN and its benefits

By: Vianca C. Villar Posted: 22 Feb, 2010

The need for a secured connection for online communication amongst businesses and its employees has long been answered by yet another powerful product of technology known as, the Virtual Private Network or VPN.

In a previous article it has been named as one of the basic routers used in tying up multiple networks together. What makes this tool very popular is its ability to provide a private channel for exchange of information (both receiving and sending) from a remote location or... continue |

Network Connection: Wired or Wireless?

By: Ailene B. Misa Posted: 06 Feb, 2010

Maybe you are on the stage of planning to build a network connection for your home or for small business office.  In this article, we will try to examine the two available options that you can use the wired and wireless networking.  We will try to identify the pros and cons of each option.

Let me discuss first the wired connection.

This is the oldest network connection in computing technology.  We called it wired network because it uses wire or what we... continue |

Share your Internet Connection using Ad hoc wireless networking

By: Ryan Elvin O. De Guzman Posted: 04 Feb, 2010

Do you have an internet connection and want it to share to another computer at home? Let us first define what's an Ad hoc means. I'll try not to use technical terms so it's not hard for you to imagine what I'm trying to explain here. An Ad hoc simply refers to a wireless mode which turns your wi-fi enabled computer into a wireless router-like radio signal. This enables you to establish a PC to PC wireless connection, sounds interesting? I've tried... continue |

How Wi-Fi Works?

By: Ailene B. Misa Posted: 19 Jan, 2010
Have you been in a coffee shop, mall or university lately? Did you notice the Wi-Fi connection in those establishments?

Just to give you brief overview, computer users nowadays are choosing Wi-Fi Internet access everywhere because it is cheaper and very accessible. Anyone can be hooked over the Internet everywhere and anytime.

Most of the residential and business Internet set-ups are using Wi-Fi connection. So don't be surprised if in case you will be gong in a remote area that already had... continue |

Troubleshooting Wireless Linksys Router for Residential Use

By: Ailene B. Misa Posted: 15 Jan, 2010
Most of the internet connections at home are already shared with different computer terminal. There are some which are shared through wired and wire less. As I mentioned in my previous article, router are very easy to operate. With its extreme functionality and its capability of providing automatic IP for your computer that is why it is commonly used nowadays.

The common brand for router is the Linksys. Due to its capability and affordability most of the consumer opts to have... continue |

The Dawn of Wi-Fi

By: Vianca C. Villar Posted: 12 Jan, 2010
Amongst all the shops alongside your area’s busy streets you chose one with a sign that reads “Wi-Fi hotspot.” You brought your laptop with you, ordered your favorite cup of coffee, sank into one of the comfy chairs at the corner stretched and eased into your routine of sifting through your e-mails, updating and checking social networking profiles/sites. You tell yourself, “Thank goodness, for Wi-Fi!”
But, have you ever wondered how Wi-Fi came about? How it works? Let this article... continue |

Networking Basics

By: Vianca C. Villar Posted: 27 Dec, 2009

We may not be aware but networking is present in nearly every industry from offices, schools, establishments and even in our very homes making information available and accessible to everyone at anytime and making daily business operations possible.
Question is how does it work? How does networking allow the transfer of information from one computer to the other? Let's take a closer look and learn its basics.
Networking is described as the process of connecting two or more and even multiple... continue |

Troubleshooting Internet Connection in Windows XP

By: Ailene B. Misa Posted: 12 Dec, 2009
This article will give you a glimpse on the basic process on how to troubleshoot internet connection for Windows XP computer. It provides frequent internet connection problems and the know how to repair it. This will discuss different ways to diagnose and determine the problem(s) in any of the following: internet browser, Telnet and FTP (file transfer protocol).

It assumes that you can connect and logon to your ISP server. Any problem with your ISP connection will not resolve in... continue |

Basic Facts of VoIP

By: Ailene B. Misa Posted: 11 Dec, 2009
Have you heard of the term VoIP? Are you aware how is this useful?

This article will discuss how VoIP works and its advantage compare to an ordinary telephone line. I guess after reading this article, you will then start your VoIP.

VoIP or Voice over Internet Protocol is a method of delivering voice communications over Internet Protocol networks like internet. It is also called IP telephony, Internet telephony, and broadband telephony/phone. This will take your analog audio signals (like the... continue |

Live Chat Software

Job Openings


Stay Informed Subscribe

Name *

Email *