Evernote, the best companion for work and school
In this article, I will be discussing about a program that might really be helpful both for students and professionals which is called Evernote.
Some of you might have heard about it but was not able to use it or even test it. Evernote is a very good program when it comes to taking down notes, setting reminders or even sharing ideas with other people. Evernote is not your typical notepad that could just save the items that you have typed. One of the best features of this program that I really love most is that it could be synced to your computers, mobile devices... ... continue |
_________________
Texas, the newest location for Facebook's Data Center
The fifth data center would be used to better cater the needs of their users. As we all know, Facebook started 2004 and is now on the top of the list when it comes to social media sites and as of the moment, the number of users of the said social networking site is still continuously growing. We could even say that most computer users have their own Facebook account.
The said project would be their latest data center and it would also be using renewable energy. Putting up a data center in an area where the climate is a bit hot might be very intriguing to others but then again, they... ... continue |
_________________
Must have attitudes for IT professionals at work
As we all know, the IT industry is still growing and the need of IT professionals are also rising. Every year, huge number of IT students finishes their degrees but the question is, are they ready?
In this article, I will be talking about the attitudes that IT professional and fresh graduates must have in order to stay competitive to be able to cope up with the demands of the industry.
Flexibility - Being flexible means that you could easily adapt with any changes needed. This way, the company could see that even if there would be any sudden changes that could make your work difficult, you're still willing to do it.
Respect - In any office, respect is one of the most important attitudes that every employees must possess. When you respect your fellow employees, a big chance is that they'll also respect you in return. But if you don't respect them, believe me; they'll... ... continue |
_________________
Ways on how developers earn from freeware apps
Advertisement - Some companies insert their advertisement on free programs in order to let the users know that they are offering or selling a certain product or service. The payment depends on the agreement of the developer and the advertiser. A good example for this one is Facebook, Facebook is free to use but they offer several ways on how companies can advertise.
Premium Version - Many freeware programs has this one wherein they let users download their free version on the net which only has the basic version installed. If the user wants to access the full functions of the program, the user has the option to upgrade the free version into... ... continue |
_________________
Developer
Advertisement - Some companies insert their advertisement on free programs in order to let the users know that they are offering or selling a certain product or service. The payment depends on the agreement of the developer and the advertiser. A good example for this one is Facebook, Facebook is free to use but they offer several ways on how companies can advertise.
Premium Version - Many freeware programs has this one wherein they let users download their free version on the net which only has the basic version installed. If the user wants to access the full functions of the program, the user has the option to upgrade the free version into... ... continue |
_________________
Philippines, one of the slowest internet connections in Asia
There would be several reasons why our internet speed is still among the slowest but I think that the main reason behind is that we still cannot afford to invest on this aspect. If you are going to look at the reports generated by various tests, you will notice that we are still on the very bottom of the graph. I am pretty sure that most of us want blazing internet speeds but to tell you frankly, it still might take several years before we could attain that.
On the ranking of the fastest in Asia, Singapore is on the top of the list and that would not be a surprise. Singapore is basically known as one of the leading countries when it comes to the IT industry and it means that their technology is up to date.
If you will compare, Singapore's internet... ... continue |
_________________
Basic Functions of an Active Directory
First of all, Active Directory was developed by Microsoft and it is a service that controls both the users and the computers in a specific network. It can control the rights and the limitations of a user. The active directory is capable of disabling programs that are not needed or the folders that you could access. The said program can help the IT department of the company to implement policies and securities that are required.
The Active Directory is also the one being used to create user ID's that could access the domain. It is also where the IT department resets the password if ever a certain user forgot it. It is basically a secured way to access the network. If ever someone wants to access a computer but he/she does not have a valid account, the domain would not allow... ... continue |
_________________
New games = new hardware requirements
Hardcore gamers will always make sure that their hardware components are up to date in order to prevent hangs, lags or anything that might cause a bad experience while playing. For those who are not aware, a desktop computer is also considered as a gaming device and it is the one that needs constant upgrading.
New games on the market are being released from time to time and that it why upgrading your hardware is a thing you might want to consider. Most of you might be asking if why it is needed. The answer is simple, new games = new hardware requirements.
In this present time where games looks and feels real already, it would definitely need a video card that is capable of rendering the graphics and a processor that could support them. Your current hardware components might still be capable of running a newly released game but it could only run on its lowest setting. When a game setting is... ... continue |
_________________
Protecting your wireless connection at home
Even if our routers already asks for passwords, we are still not 100 percent sure that no one could connect to your connection especially if you have a computer geek neighbor. And that is why I am writing this article to give some tips on how to have a secured wireless connection at home.
SSID Name - This SSID name serves as the name of your wireless connection where you will connect to. At purchase, the name of this is usually the brand of router you possess but you could change this one. When you change your SSID name, make sure that it is not easy for them to distinguish where it is coming from. Some users tend to name their SSID by their names, last names or even address which is a big no because they could easily distinguish you. It would be better... ... continue |
_________________
Importance of monitoring the server room
Below are the things that require constant monitoring for the server room.
Room Temperature - We are all aware that the our temperature nowadays are already rising and we must make sure that the room temperature of our server rooms are enough to cool down our devices. Having a server room that has a bad air-condition unit could result to problems. It could possibly fry your routers, switches and your other networking devices and that would be the worst that could happen to your IT department. Again, to make sure that your devices are cool enough to work 24/7, monitoring the room temperature is very important.
Cable and Power Connections - Most of the time, cables are the culprit when it comes to intermittent connections. It would be best to... ... continue |
_________________
Computer preventive maintenance guide
Disk Defragmenter - Defragging your disks could help speed up your computer by rearranging files on your disk.
Registry cleaner program - Installing a registry cleaner program could help your computer run faster by fixing your registry.
Cleaning your case - Once in a while, it would be a good idea to clean your case in order to clear dusts for better airflow. One of the very reasons why a computer overheats is that the heat dissipated by the components couldn't go out because of a dirty case. While cleaning your case, you could also try managing your wires properly. It would also result to a better airflow for your case. Adding an additional fan could also help a lot.
Uninstall unneeded programs - If there would be programs on your... ... continue |
_________________
Advancement of newer laptops vs the old ones
Speed - Newer laptops of course would be faster because of its newer processors. Due to better processors, laptops can now support high end games.
Size - Now, we already have what we call net books. It is like a smaller laptop but with a slower processor. 5 years ago, normal laptop sizes are only 14 and 15 inches.
Weight - Laptops now is lighter in weight unlike before that when you do have a laptop inside your bag, you are like carrying several books at your back. Laptops nowadays are thinner which made it lighter and is easier to carry.
High tech features - Laptops now do have biometrics and facial detection for better security. Besides that, laptop nowadays already support touch capable screens which eliminates the... ... continue |
_________________
Microsoft's Surface Pro 3, A tablet that could be transformed into a laptop
Processor - 4th Gen Intel Core i3, i5 or i7
Storage and RAM - 64 GB or 128GB with 4GB RAM / 256GB or 512GB with 8GB RAM
Display - 12" Multitouch
Weight - 1.76 lbs
Camera - 5.0 MP for both front and back cameras
Connectivity - Wi-Fi / Bluetooth
Battery Life - Up to 9 hours
OS - Windows 8.1 Pro
As I've said, this is not the very first transformer tablet but in my opinion, this would be the best so far due to it's fast processor. Usually, tablets only possess small processors like the intel atom but for this one, having an i series processor... ... continue |
_________________
Tips on creating a strong password
Avoid using your name and your birthday - This is very common nowadays wherein they use their name together with their birthday as their password. For example, your name is Rachel and your birthday is Nov. 25 and so your password would be rachel1125. This kind of password is very weak and would be a piece of cake to open for hackers.
Different passwords for different accounts - If you have several accounts, I would advice not to have the same password for all but do make sure that you'll remember each and one of them. If you think that there is a chance for you to forget it, you could write a... ... continue |
_________________
Importance of a portable hard drive
Having a portable hard drive is important for those who are on the go. A function of a portable hard drive depends on the user. For those who are related to the information technology field, portable hard drives serves not just a storage but also a backup drive especially if there would be important files or data that could be needed for work. For movie buffs, a portable hard drive for them might contain TV series and several movies that they could enjoy watching for hours. For those who love to take pictures, this serves as storage for the pictures that they took.
For those who are not aware, both desktop and laptop hard drives could also be used as a portable hard drive but you need to purchase an enclosure in order for it to work. If you'll be using a laptop hard drive with an... ... continue |
_________________
A simple solution for your media player problems
As we all know, media players are used to play music, videos or movies but if your media player isn't fully updated, you might experience some of the problems below.
Unsupported format - This is a very common problem wherein some formats could not be played. As I have said, this is a cause of an outdated media player. Updating your media player's codec might do the trick.
No sounds - This might also be a compatibility problem. If there is a video codec, there is also a sound coded that needs to be updated but before anything else, you could try checking your audio card and your speakers.
Video Lag - I have experienced this several times already wherein a video can be played but it would not play properly. It may be possible that your video card does not support the resolution of the video that you are playing or again, an outdated media... ... continue |
_________________
Understanding Phone Tethering
Tethering your phone to other devices will depend on the connection that your phone has. It may be done using a Bluetooth, Wi-Fi or simply by a USB cable.
Bluetooth tethering - Tethering using your Bluetooth simply means that other devices could connect
Wi-Fi tethering - Tethering using your Wi-Fi or commonly known as mobile hotspot is the most common tethering being used. It means that other devices could connect to your device using Wi-Fi. Your phone acts as a router which could be used to share your phones internet connection.
USB tethering - Tethering via USB means that you could connect your phone to a device that has a USB port to share your connection.
In order to use tethering properly, you will... ... continue |
_________________
Software that could monitor your child's internet activity
In this article, I will be sharing a program that could be useful in monitoring the sites or limiting the time they could spend using the internet. This way, parents would be sure that their children are not visiting sites that would not cause them any good.
One of the most famous programs that could help you protect your children is the K9 Web Protection. It allows you to block websites depending on the category. It can block the page when the program detects that the content of the website that is being opened is among the category that is blocked. As I have said above, it also has the feature to allow your child to use the computer for a specific... ... continue |
_________________
Faster Internet with 4G LTE
LTE connection was already available years back in other countries but was only recently acquired by the Philippines. If you are not happy anymore with the current speed that you are using, upgrading to 4g/LTE might be the best solution for you.
It is nice to know that telecommunication companies are doing their very best to come up with upgrades that would benefit us. The LTE connection is a fast internet by the use of mobile data and was introduced at first for mobiles only but now, it could already be used for computers wherein you just need... ... continue |
_________________
asdasdasd dasdadsa asdads
asdasdadsads adsads
adadsasd
adsads
adsasda
adsads
... |_________________
Simple tweaks for a faster response time
I am quite sure that there was an instance in your life that you were a bit **** with your computer’s performance. If you’re one of those users who are currently experiencing slow computer response time, this might be helpful for you. In this article, I’ll be sharing some tips on how you could tweak your computer to make it a bit faster.
Uninstall unneeded programs – Most computer users don’t really care much about uninstalling programs that are really not... continue |
_________________
Hardware Junks to cash
As we all know, all things has its lifespan including computers. Computers are already common nowadays and could be seen in most homes. Most of us might be aware that a single desktop computer or even a laptop has several parts. In a desktop computer, parts can be replaced easily but for a laptop, a laptop repair specialist is required because repairing a laptop is more complicated compared to repairing a desktop. Most of the time, we just replace a... continue |
_________________
What's new with Skype 5.3?
Internet savvy likes chatting and even making call from their friends from any part of the world. In the previous years, Yahoo messenger is the common and well used software applications to chat and make calls.
Recently, Skype dominates the cyber world through chat, calls, and even video calls. It even surpasses the popularity of Yahoo messenger.
In the past, Skype has released different versions in two options: free and premium.
In this article I’m going to introduce the new Skype version 5.3,... continue |
_________________
Router Firmware Upgrade - Unleash the hidden capabilities of your router
Many of you might not be familiar with DD-WRT. To start, DD-WRT is a linux based firmware which can be flashed to your router for additional features. This is an opensource program which means that it is free of charge.
Using DD-WRT on your router is almost the same as your current firmware. It also has a web gui which makes it easier to configure. You don’t need to be a computer geek to be able to use this one. Below... continue |
_________________
How to connect a Windows XP client to a VPN server
VPN or Virtual Private Network is normally used by offices or for users that are always on the go, with the help of a VPN, you can securely access the files and resources which are based in your office or on a central network. Your IP address will depend on your server. If your VPN server is in Indonesia, then you’ll also be getting an Indonesia IP. That’s how VPN works. In this article, I’ll be showing you the simple... continue |
_________________
What Short Courses to take to become a Network Administrator
You should learn the Basics of Networking as well as intermediate and advanced networking before you can become a Network Administrator.
You need to learn how to design a network, crimp a cat5e cable, configure TCP/IP's of Computer workstations, setup a network printer, configure internet connection sharing, Setup a... continue |
_________________
How to access computers remotely
For those who are not familiar with remote access, it is the ability of a computer to connect to another computer and control it via network or internet by using a username and password for security purposes. Remote access has many use, it can be used to access your files and folders at home, access your office server or even in troubleshooting someone’s computer.
Remote access is already available in various windows operating systems though there are also some programs like... continue |
_________________
Basic Home Network Troubleshooting Fixing Common Network Problems
There would be times that you’ll be experiencing network problems at home. If you don’t know the basics, your best solution might be to call someone who is good in computers. After paying him, you’ll realize that your LAN Router was just turned off or your LAN cable is not connected to your computer. These are some of the basics which most people are not aware about. If you know the basics, this would eliminate paying someone to turn your... continue |
_________________
Dual WAN Router - Preventing Internet Downtime
Most of you might not be familiar with dual WAN routers. A dual WAN router is a router that offers two slots for WAN which allows you to use two ISP providers at the same time. Dual WAN routers are mostly used by companies to prevent internet downtime. As we all know, internet in our country is really not that stable compared to other countries and that is why having a dual WAN router can really be important.
With the help... continue |
_________________
How to Monitor your Network Performance (LAN) the easy way
In a school or a company, monitoring the network especially those who has a big network with hundreds of computers is not an easy task but with programs that could help you, it would be easier. In this article, I would be sharing a free program but with limited license that would help you monitor your network easily. This program can really be helpful especially for those who are working as an IT support or as a network engineer.
While searching... continue |
_________________
Basic tools that a computer technician must have (part 2)
External DVD Drive – As I’ve said in the first part of this article, not all computers has DVD drives installed especially in an internet shop, in an office or even the latest net book laptops in the market. In this case, you can use an external DVD drive to install something or if you need to reformat a computer. Basically, reformatting requires a CD/DVD drive for you to install your operating system including the drivers. You can also use... continue |
_________________
How to Setup a Home Network with a Router
Most of us think that Local Area Networking (LAN) is a very complicated thing to do because of the Network Cables, networking equipments and everything. It is true that networking is really a big topic to be discussed and is really complicated to do. But in Computer Networking, there are also the basics and normally it can be found at home.
In this article, I’ll be discussing the very basic networking for your home. This will be a step by step... continue |
_________________
How to share a Printer between multiple Computers
Let us begin sharing a printer using Windows XP
- Clcik Start
- Select Settings
- Select and Click Printers and Faxes
- A list of Installed printers on your computer will appear eg.. hp, canon, epson etc..
- Right Click the printer you want to share
- Select and Click Sharing...
- A security warning will appear telling you to use the Network setup wizard to safely share your printer to the network.... continue |
_________________
What is a MAC Address
Where can you find the MAC address of a Computer?
You can find the MAC address of a computer using windows xp or windows 2000 server operating systems by going to command prompt and typing ipconfig /all and then press enter. You can see an entry called Physical... continue |
_________________
Media Server At Home-5: All About unRAID-2
(This is the concluding part of the 5 article series for Media Server At Home. Now, lets continue our discussion about unRAID.)
You may use any computer on your network when you’re done with the configuration and activation of the un-Redundant Arrays of Inexpensive Disks. Just like any other servers, if you use Avahi in configuring your un-Redundant Arrays of Inexpensive Disks, it will simply be visible in your sidebars for Finder. For you to access the server, you may enter... continue |
_________________
Media Server At Home-4: All About unRAID-1
(This fourth part of the article will be focusing on information all about unRAID.)
There are lots of great features which un-Redundant Arrays of Inexpensive Disks offer to its patrons. This combines several drives into one volume just like the Redundant Arrays of Inexpensive/Independent Disks. These un-Redundant Arrays of Inexpensive Disks have redundancy which is built-in like the formats of its opposite counterpart. If for a reason a drive fails, any duplication you made to the un-Redundant Arrays of Inexpensive Disks... continue |
_________________
Media Server At Home-3: Software Installation And unRAID
(This the third part of our article Media Server At Home which will tackle about software installation and un-Redundant Arrays of Inexpensive Disks.)
If you also want to run the software you need to boot un-Redundant Arrays of Inexpensive Disks system off of a flash drive. A supplemental bay for storage can be freed through flash drive booting off. Both un-Redundant Arrays of Inexpensive Disks and the Operating System which is Linux’ stripped-down version can be accommodated on a 128 MB... continue |
_________________
Media Server At Home-2: un-RAID Building And Hard Drives
This is the second part of our discussion about creating media server at home.
You need to have lots of hard drives, a motherboard, a case, and a power supply to start your un-Redundant Arrays of Inexpensive Disks-based network. You may choose something from the recommended components list to improve your chances of acquiring a system that works while you may try using a processor or any motherboard available because a specific hardware is being recommended by *file-sharing software and new... continue |
_________________
Media Server At Home: 1
To share your files after storing it, you may need to create an array of disk which is network-attached.
Instead of storing your data the old fashioned way, you may store your videos, television programs, motion pictures, and your audio playlists on hard drives which is digital media distribution that has goodwill.
As you go along and try to balance quality with growth, searching the perfect storage solution can be deceiving as you may require for it. Things will arrive with complexities... continue |
_________________
Safety Measures For Your Mobile Phone To Make It Secured: 5
At this point, we are going to conclude our discussion about the safety measures for your mobile phone to make it secured with the second combat technique.
· second combat technique
The level of security at your establishment is the very thing to consider when you are to protect your mobile phone and from it you can formulate steps to apply for the realization of your goals. The least requirement that Information Technology departments seek in general is for you to remote... continue |
_________________
Safety Measures For Your Mobile Phone To Make It Secured: 4
Here on this part, we will tackle about the value of your mobile phone security and the first combating technique to fight phone attackers.
- the value of your mobile phone security
Your mobile phone security is absolutely valuable just like your priceless jewelry, you have to make sure that each time your eyes and all of your other senses are involved to safeguard your precious gadget. It is also based on the individual company, or the individual users the extent on... continue |
_________________
Safety Measures For Your Mobile Phone To Make It Secured: 3
This is the third part of our discussion. At this point, we will give focus on the following:
· Computer viruses, malicious software and trojan horses
For attackers who are roaming everywhere, especially, within the whole cyberspace, your mobile devices are the biggest target. For the security that no malicious software has penetrated the system even a single minute, a manufacturer did create the software which enables the big Information Technology department to scan all gadgets in one single inspection. Google... continue |
_________________
Safety Measures For Your Mobile Phone To Make It Secured: 2
Now, we will continue our discussion in our second part of our article.
· The most secured operating system
The most complicated thing to answer would be this. Last year, all of the major Operating Systems of smartphone have made remarkable steps. Blackberry is still the gold standard based from a security standpoint and enterprise control. On the other hand, the mobile phones of RIM have gadget-wide, futuristic encryption which includes a Secure Digital Card. However, Google Android, Apple iPhone, and other... continue |
_________________
Safety Measures For Your Mobile Phone To Make It Secured: 1
In the history of telecommunications, one thing we may never forget is that once there was a phone simply built for the sake of calling and being called. Years way-way back, the only thing you need to worry about when you have a telephone was the other line or the partly line who shares your phone connection, especially, during those times you need to make your phone call private and the only thing you want is the conversation between you... continue |
_________________
The Tool To Improve Your Wireless Connection
If until this time you are finding ways and means to improve connectivity by using wireless gadgets, well, your search is over because you can now avoid experiencing slow data loading, choppy and dropped calls with the new Micro Cell 3G. This would be an almost reliable service experience that you could ever have and it lessens the hassles you have had when you were using a traditional old service. Now, with the help of Micro Cell 3G, the nightmare... continue |
_________________
Things you need to know about Category 6 UTP Cable
Prominent telecommunications organization EIA/TIA (Electronics Industry Association/ Telecommunications Industry Association) created standards for UTP cables in response to the popularity of UTP cables in network cabling. The established standard for UTP cable categorized it into 6 categories of wire: cat1, cat2, cat3, cat4, cat5/cat5e and cat6. However, among the 6 identified cable categories, only the cat3, cat5/cat5e and cat6 are used in Ethernet networks.
Though cat5/cat5e UTP cable standards create reliable and fast gigabit... continue |
_________________
What is a Virtual Private Network? How it can help your company grow
Think about this, is it possible for a private network of a huge corporation to utilize a public network infrastructure such as the Internet for a “secure” telecommunications purposes without compromising the confidentiality and secrecy of communication process? If your answer is no, you are absolutely wrong as the utilization of public or “shared” network infrastructure like the Internet is possible and has been in use by major organizations – thanks to Virtual Private Network.
But what is a Virtual Private... continue |
_________________
The Roles of a Network Manager
Know the general roles and functions of a network manager
With the current job salary trend favoring those in the Information Technology (IT) field, it is not surprising that the rate of students taking up computer courses dramatically increase in the past 10 years. And as organizations of all sector maximized their hardware and information resources through setting up computer networks or intranets, the demand for highly skilled Information Technology professionals called network managers boost up. And in order for the... continue |
_________________
UK Will Spread Broadband Plans on December 6, 2010
The government of
BT has plans to extend fiber premises up to 90% to assume that no unfavorable charges are being held against the regulatory environment or investment. They add up that if the rural areas received the £830m financial assistance, the government has earmarked the investment in broadband networks.
Also, BT will include up to 40 rural market... continue |
_________________
What is cybercrime?
Cybercrime or also known as computer crime is the act of committing illegal activities through the use of a network or the internet. This is basically done by persons who posses above average skills in computers. They are also called hackers, scammers and more. Below are some of examples of cybercrimes in the world.
Hacking – Hacking is the most popular type of cybercrime. This involves someone who uses the internet or even a network to enter a restricted site for... continue |
_________________
Ethernet Cable splitter: the easiest way to share internet - Hubs and Switches: the best way to share files and printers on LAN
Through the influx of technology, computers have been widely used at homes not one but multiple computers attached to a device to share internet connection. Without any device to connect them, it would be impossible to create more connections. Why? Simply because every internet connection contains IPs as an identification of every computer. However, if this comes to be true, internet providers will run out of IPs since almost all houses and offices and other firms utilize computers and internet.... continue |
_________________
How to Install and Setup a Home or Small Office Local Area Network (LAN)
We will build a LAN from the ground up from purchasing LAN devices to configuring and running the network.
We need to buy the following Network devices for our Small Network.
1. Computers
2. Network Adapters
3. Switch
4. UTP cables
5.... continue |
_________________
How to Share your Printer to other Computers on your Home/Office using Windows Xp
To be able to... continue |
_________________
Common errors in Joining Windows XP pro to a Windows Server 2003 Domain
Primary DNS address is not... continue |
_________________
How to setup and configure a wireless network and share your internet connection
_________________
Lessons on CISCO Router Configuration Modes and other types of Router Memory
- User EXEC Mode: This mode permits the administrator to use monitoring commands but limited. It is impossible to configure from this mode. On this mode, the command prompt is "router>"
- Privileged EXEC Mode: This mode permits the administrator to equip the device commands, most of which are for configuration and management, Moreover, it can... continue |
_________________
Is Packet Switching similar to Message Switching?
How much do you know about packet switching? Definitely, this term will appear in Cisco CCNA certification exam. There are many new terms to learn, most of which are ambiguous words at first. An example of these is packet switching. This term is absolutely needed to fully understand in order to pass a Cisco CCNA certification exam. This article aims to clearly define and explain terms such as packet switching and how it is compared to message switching.
Basically, packets from... continue |
_________________
Understanding VPN and its benefits
The need for a secured connection for online communication amongst businesses and its employees has long been answered by yet another powerful product of technology known as, the Virtual Private Network or VPN.
In a previous article it has been named as one of the basic routers used in tying up multiple networks together. What makes this tool very popular is its ability to provide a private channel for exchange of information (both receiving and sending) from a remote location or... continue |
_________________
Network Connection: Wired or Wireless?
Maybe you are on the stage of planning to build a network connection for your home or for small business office. In this article, we will try to examine the two available options that you can use the wired and wireless networking. We will try to identify the pros and cons of each option.
Let me discuss first the wired connection.
This is the oldest network connection in computing technology. We called it wired network because it uses wire or what we... continue |
_________________
Share your Internet Connection using Ad hoc wireless networking
Do you have an internet connection and want it to share to another computer at home? Let us first define what's an Ad hoc means. I'll try not to use technical terms so it's not hard for you to imagine what I'm trying to explain here. An Ad hoc simply refers to a wireless mode which turns your wi-fi enabled computer into a wireless router-like radio signal. This enables you to establish a PC to PC wireless connection, sounds interesting? I've tried... continue |
_________________
How Wi-Fi Works?
Just to give you brief overview, computer users nowadays are choosing Wi-Fi Internet access everywhere because it is cheaper and very accessible. Anyone can be hooked over the Internet everywhere and anytime.
Most of the residential and business Internet set-ups are using Wi-Fi connection. So don't be surprised if in case you will be gong in a remote area that already had... continue |
_________________
Troubleshooting Wireless Linksys Router for Residential Use
The common brand for router is the Linksys. Due to its capability and affordability most of the consumer opts to have... continue |
_________________
The Dawn of Wi-Fi
But, have you ever wondered how Wi-Fi came about? How it works? Let this article... continue |
_________________
Networking Basics
We may not be aware but networking is present in nearly every industry from offices, schools, establishments and even in our very homes making information available and accessible to everyone at anytime and making daily business operations possible.
Question is how does it work? How does networking allow the transfer of information from one computer to the other? Let's take a closer look and learn its basics.
Networking is described as the process of connecting two or more and even multiple... continue |
_________________
Troubleshooting Internet Connection in Windows XP
It assumes that you can connect and logon to your ISP server. Any problem with your ISP connection will not resolve in... continue |
_________________
Basic Facts of VoIP
This article will discuss how VoIP works and its advantage compare to an ordinary telephone line. I guess after reading this article, you will then start your VoIP.
VoIP or Voice over Internet Protocol is a method of delivering voice communications over Internet Protocol networks like internet. It is also called IP telephony, Internet telephony, and broadband telephony/phone. This will take your analog audio signals (like the... continue |
_________________