Wednesday, September 22, 2010

how to connect two computer share files using crossover cables

If you need to connect two computers but you don't have access to a network and can't set up an ad hoc network, you can use an Ethernet crossover cable to create a direct cable connection.
Generally speaking, a crossover cable is constructed by reversing ("crossing over") the order of the wires inside so that it can connect two computers directly. A crossover cable looks almost exactly like a regular Ethernet cable (a "straight-through" cable), so make sure you have a crossover cable before following these steps.
Crossover cable (left); straight-through cable (right)
Before buying a crossover cable, check your network adapter. Some newer network adapters automatically "crossover" when they detect that they are connected directly to another network adapter using a regular Ethernet cable.
To connect two computers with a crossover cable
This works best if both computers are running this version of Windows.
1. Plug each end of the crossover cable into a network port on the back of each computer.
2. On one of the computers that is running this version of Windows, do the following:
Click to open Network and Sharing Center.
3. In the network map at the top of Network and Sharing Center, double-click the unidentified network icon. (If you have more than one network, this icon will be labeled multiple networks.).
4. If network discovery and file sharing are turned off, in Network, click the Information bar containing the following message: "Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to change...," and then click Turn on network discovery and file sharing. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
5. In the Network discovery and file sharing dialog box, select one of the following options:
o No, make the network that I am connected to a private network
o Yes, turn on network discovery and file sharing for all public networks
The first option is usually the best choice because it only affects the network that you are connected to.
Notes
o Networks created with crossover cables are automatically set up as "Public place" networks, which means that network discovery, file sharing, and printer sharing are off by default.
o For Gigabit Ethernet or token ring networks, you will need a slightly different kind of crossover cable. For more information, contact a cable manufacturer.
Icons for both computers should now be visible in the Network window. Double-click each computer icon to share printers and other resources.
Note
• If one of the computers is running Windows XP, it can take some time for that computer to appear in the Network window. You might need to move both computers to the same workgroup. You can do that by changing the workgroup on either computer. To change a workgroup, see Join or create a workgroup. You might also need to turn on file and printer sharing on the computer running Windows XP.

Recovering system information

Tools provided by the operating system and Recovery Manager software are designed to help you with the following tasks for safeguarding your information and restoring it in case of a system failure:
Backing up your information regularly to protect your important system files.
Making a set of recovery discs (Recovery Manager software feature). Recovery discs are used to start up (boot) your computer and restore the operating system and software programs to factory settings in case of system failure or instability.
Creating system restore points (operating system feature). System restore points allow you to reverse undesirable changes to your computer by restoring the computer to an earlier state.
Recovering a program or driver (Recovery Manager software feature). This feature helps you reinstall a program or driver without performing a full system recovery.
Creating recovery discs
After setting up the computer for the first time, be sure to create a set of recovery discs of the full factory image. The recovery discs are used to start up (boot) the computer and recover the operating system and software to factory settings in case of system instability or failure.
NOTE: Handle these discs carefully and keep them in a safe place. The software allows the creation of only one set of recovery discs.
Note the following guidelines before creating recovery discs:
You will need high quality CD-R, DVD-R, DVD-R with double-layer support, DVD+R, or DVD+R with double-layer support discs (purchased separately).
Note: Read-write discs, such as CD-RW, DVD ± RW, and DVD±RW double-layer discs, are not compatible with the Recovery Manager software.
The computer must be connected to AC power during this process.
Only one set of recovery discs can be created per computer.
Number each disc before inserting it into the computer optical drive.
If necessary, you can exit the program before you have finished creating the recovery discs. The next time you open Recovery Manager, you will be prompted to continue the disc creation process.
To create a set of recovery discs:
Select Start > All Programs > Recovery Manager > Recovery Manager.
Recovery Manager opens.
Click Advanced Options.
Note: If you are operating the computer on battery power, you will be prompted to connect to AC power before you can go to the next step.
Click Recovery disc creation, and then click Next.
Follow the on-screen instructions.
When to back up
On a regularly scheduled basis
Note: Set reminders to back up your information periodically.
Before the computer is repaired or restored
Before you add or modify hardware or software
Using system restore points
When you back up your system, you are creating a system restore point. A system restore point allows you to save and name a snapshot of your hard drive at a specific point in time. You can then recover back to that point if you want to reverse subsequent changes made to your system.
Note: Recovering to an earlier restore point does not affect data files saved or e-mails created since the last restore point.
You also can create additional restore points to provide increased protection for your system files and setting.

IMPROVE THE SECURITY OF YOUR WIRELESS HOME NETWORK .

Wireless Networks are a great way to share files, printers, and your Internet connection to any computer in your home. With a wireless network adapter installed on your portable computer, you are no longer tied to your desk. You can communicate with friends, read the news, and surf the Web anywhere you can receive a wireless network signal.
The risks Wireless networks don't stop at the walls of your home. In fact, wireless networks often extend more than 300 feet from your wireless router. If you live in an apartment, dorm, or condominium, you may have dozens of neighbors who can access your wireless network. If you live in a house, your neighbors and even people on the street may be able to connect to your network.
It's one thing to let a neighbor borrow your lawn mower, but you should think twice about allowing anyone to access your home network. There are several good reasons for this. People who can connect to your wireless network might be able to:
Slow down your Internet performance.
View files on your computers and spread dangerous software.
Monitor the Web sites you visit, read your e-mail and instant messages as they travel across the network, and copy your usernames and passwords.
Send spam or perform illegal activities with your Internet connection.
By setting up security features on your wireless network, you can make it very difficult for uninvited guests to connect.
How to Protect Your Wireless Network
Most wireless networks are completely unprotected when you first set them up. However, in just a few minutes, you can protect your wireless network by using the same method banks use to protect your password when you log on to their Web sites: encryption. Encryption scrambles data on your wireless network so that only computers that have the encryption key can read your communications.
You Have Several Choices For Wireless Encryption:
64-bit WEP (Wired Equivalent Protection). The original wireless encryption standard, it is now outdated. The main problem with it is that it can be easily "cracked." Cracking a wireless network means defeating the encryption so that you can establish a connection without being invited.
128-bit WEP. An updated, more secure version of the original WEP. However, skilled attackers can still crack 128-bit WEP in a few hours or less, giving them access to your network.
WPA-PSK (also known as WPA-Personal). A more secure alternative to WEP, but because it is newer, it is not as widely supported. Microsoft Windows supports WPA, so this type of encryption is the best choice if you plan to connect only Windows XP computers to your wireless network. However, if you have wireless devices that don't support WPA, such as media extenders or wireless cameras, you'll have to use WEP on your network instead.
You might also see the security method called "WPA-Enterprise." As the name suggests, this method of network encryption is designed for business use. Setup for WPA-Enterprise is more complex than for other types of encryption, and it requires special network infrastructure.
WPA2. The newest type of wireless encryption, WPA2 provides the highest level of encryption available. WPA2 encryption should be your first choice if your wireless router and all of your wireless computers and devices support it.

Even though one type of encryption may be better than another, any type will dramatically improve your network's security by making you a more difficult target.
Tip: To learn the quickest and easiest way to protect your wireless network, read Set up a wireless network and follow the steps in the sections "Configure your wireless router" and "Connect your computers and devices." The article walks you through the process of configuring your network to use 128-bit WEP.
Can Wireless Encryption be "cracked"?
The short answer is, "Yes." Any encryption can be cracked. An individual with knowledge of computers and networking, and who is willing to spend a few hours researching free "hacking" tools, can crack encryption in a few hours (or less). However, most users who want to connect without authorization lack the expertise to crack 64-bit or 128-bit WEP. In a crowded neighborhood with numerous unprotected networks, anyone looking for a free connection will likely choose the unprotected network rather than spend the time to crack your WEP encryption. Therefore, WEP encryption offers better protection than not having encryption enabled at all.
An expert user can also crack WPA-PSK encryption if you use a short passphrase (like a password, only containing a sequence of words.) However, a longer passphrase provides excellent protection. Currently there are no freely available tools to crack WPA2 encryption. So if you enable WPA encryption on your network, you can rest easy knowing that your wireless network is as secure as it can be.
Over time, new cracking tools will be developed that could increase the vulnerability of WPA and WPA2. So, it's important to stay up to date with the latest encryption technologies. At least once a year, check to see if new technology is available for you to use.
Wireless Security Tips
Follow these tips to keep your data safe when using wireless networks:
If you use WEP encryption, change your encryption key once a month. If someone manages to learn your key, they will be locked out again when you change it.
Don't connect to unprotected wireless networks—it's possible for someone to monitor your Internet usage and even record your passwords.
If you do connect to an unprotected wireless network, don't visit a Web site that requires a password unless the Web site is encrypted. To find out if it's encrypted, look for a lock symbol in the lower-right corner of your browser.

If you use WPA-PSK to encrypt your network, set a long pass phrase of at least 20 random characters. Better yet, use the full 63 characters by typing a sentence you can remember—just don't make it something that's easily guessed, like a line from a movie.

Wednesday, September 15, 2010

Set Up a Wireless Network without a Router

Wireless networks are helpful because they let you use your computer and connect to the Internet anywhere in your home or office. However, most wireless networks use a wireless router, which can be expensive. If you have more than one computer, you can set up a wireless network without buying a wireless router and save yourself some money. In an ad hoc network, computers and devices are connected directly to each other, rather than to a hub or router. People generally set up these networks to temporarily share files, presentations, or an Internet connection among multiple computers and devices. Computers and devices in ad hoc networks must be within 30 feet of each other. Ad hoc networks can only be wireless, so you must have a wireless network adapter installed in your computer to set up or join an ad hoc network.
An ad hoc network is a temporary connection between computers and devices used for a specific purpose, such as sharing documents during a meeting or playing multiple-player computer games. You can also use an ad hoc network to temporarily share an Internet connection. Ad hoc networks can only be wireless, so you must have a wireless network adapter installed in your computer to set up or join an ad hoc network. Ad hoc wireless networks work more like walkie-talkies, because the computers communicate directly with each other. By enabling Internet Connection Sharing on one of the computers, you can share Internet access.
Ad hoc networking might seem like a much smarter alternative to using a wireless router, but it does have some disadvantages:
1. If the computer connected to the Internet is shut down, all computers that are part of the ad hoc network lose their Internet access.
2. To connect to the Internet, one computer always needs a wired network connection.



To connect your computers to the Internet using an ad hoc wireless network, follow these high-level steps.
1. Enable Internet Connection sharing on the Internet-connected computer. You can skip this step if you don't need to access the Web.
2. Set up the ad hoc wireless network on the Internet-connected computer.
3. Add your other computers to the wireless network.


How to enable Internet Connection Sharing
On networks with wireless routers, the router has the important job of forwarding communications from the computers on your home network to the Internet. On ad hoc networks, you must assign one computer to serve this role. The computer you choose must have a wired connection to the Internet, and it should be left on whenever you want to be able to use your other computers.
How to set up the first computer
To set up an ad hoc wireless network that allows computers to share an Internet connection without a router
1. If necessary, install a wireless network adapter.
2. Click Start, and then click Control Panel.
3. Under Pick a category, click Network and Internet Connections.
4. Under or pick a Control Panel icon, click Network Connections.
5. Right-click your wireless network connection, and then click Properties.
6. In the Wireless Network Connection Properties dialog box, click the Wireless Networks tab.
7. On the Wireless Networks tab, under preferred networks, click Add.
8. In the Wireless network properties dialog box, on the Association tab, type the name of your ad hoc wireless network in Network name (SSID) box (shown in step 10).
9. Clear the key is provided for me automatically check box and select the ‘this is a computer-to-computer (ad hoc) network’’ check box.
10. Create a 13-digit password and type it in both the Network key and Confirm network key boxes. For the best security, include letters, numbers, and punctuation. Then click OK.
11. Click OK again to save your changes.
Notes:
o If one or more of the networked computers is joined to a domain, you need to have a user account on that computer to see and access shared items on it.
o An ad hoc network is automatically deleted after all users disconnect from the network or when the person who set up the network disconnects and goes out of range of the other users of the network, unless you choose to make it a permanent network when you create it.
o If you share your Internet connection, Internet connection sharing (ICS) will be disabled if:
 You disconnect from the ad hoc network.
 You create a new ad hoc network without disconnecting from the old ad hoc network for which you enabled ICS.
 You log off and then log back on (without disconnecting from the ad hoc network).
o If you set up an ad hoc network and share your Internet connection, and then someone logs on to the same computer by using Fast User Switching, the Internet connection will still be shared, even if you didn't intend to share it with that person.


How to set up additional computers
If the computer you want to add to your network does not have built-in wireless network support, install a wireless network adapter.
Windows automatically detects the new adapter and notifies you that it found a wireless network.
Now connect your computer to your wireless network
1. Right-click the Wireless Network icon in the lower right corner of your screen, and then click View Available Wireless Networks.
2. The Wireless Network Connection window appears and displays your wireless network listed with the SSID you chose. If you don't see your network, click Refresh Network List in the upper left corner. Click your network, and then click Connect in the lower right corner.
3. Windows prompts you to enter a key. Type your encryption key in both the Network key and Confirm network key boxes, and then click Connect.
Windows shows its progress as it connects to your network. After you're connected, you can close the Wireless Network Connection window.
Repeat these three steps on each computer that you want to connect to your ad hoc wireless network.
Now you can browse from any computer you added to your home network.

SET UP A WIRELESS NETWORK

A network can be one computer connected to the Internet, or two or more computers connected to each other (and also to the Internet). In a wireless network, the computers are connected by radio signals instead of wires or cables. Advantages of wireless networks include mobility and no unsightly wires. Disadvantages can include a slower connection than a wired network and interference from other wireless devices, such as cordless phones.
A wireless network can make using your computer more relaxing by letting you take it anywhere in your house—to your couch, your bedroom, or even your backyard. With a wireless network, you don't have to go out of your way to use the Internet, because it's everywhere in your home. You also don't have to be tied to your office to take care of other computer-related tasks—with a wireless network, you're always connected. You can search the Web for 'reseed lawn' and then, while reclining in front of the TV, print out your garden center shopping list on the printer in your home office.
Adding a wireless network to your home is easier than you think. It requires four steps:
Choose your wireless equipment.
Connect your wireless router.
Configure your wireless router.
Connect your computers and devices.
CHOOSE YOUR WIRELESS EQUIPMENT
The first step to setting up a wireless network is to make sure you have the equipment you need. You'll need at least two network components: a wireless router and a wireless network adapter.
Wireless router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Be sure you get a wireless router and not a wireless access point.
Wireless network adapter. Connects your computer to your wireless router. If you have a newer portable computer, you might already have wireless capabilities built in. Make sure you have an adapter for every computer on your network.
You can also connect your digital video recorder (DVR) or media extender to your wireless network. If the device has a wired network connection, use a wireless game adapter for a single device or a wireless bridge to connect multiple devices. Wireless game adapters aren't just for games—they'll work with anything that has a wired network port.
Connect Your Wireless Router
Locate your cable modem or DSL modem, and unplug it from its port to turn it off.
If you connect your modem to the wall in a similar way that you connect your TV to your cable television outlet, you probably have a cable modem, and it probably has a coaxial cable connected to it (like the round black or white cable you plug into your TV).
If you connect your modem through the phone lines, you probably have a DSL modem, and it probably has a phone cable connected to it.
If you currently use a dial-up connection to connect to the Internet, set up your wireless network using ad hoc Internet sharing.
Connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
To connect your router to your modem:
If you currently have a computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
If you don't currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
Plug in your router. After a minute or two, the Internet, WAN, or WLAN light on your router should light up, indicating that it has successfully connected to your modem.
5. Configure Your Wireless Router
There are two ways to configure your wireless router: using Windows Connect now and manually.
If your router supports Windows Connect Now, you don't need to continue reading this article. You can configure your wireless router and Windows XP computers quickly and easily by following the instructions in Using Windows Connect Now technology
If you don't have a router that supports Windows Connect Now, you need to manually configure your router:
Using the network cable that came with your wireless router, temporarily connect your computer to one of the wired network ports on your wireless router (any port that isn’t labeled Internet, WAN, or WLAN).
Turn your computer on; it will automatically connect to your router.
3. Open Microsoft Internet Explorer and type in the address to configure your router, as described in your router's instruction manual.
4. Create a password if a prompt appears. The address and password you use will vary depending on what type of router you have, so refer to the instructions included with your router.
Tip: Write down your passwords on a piece of paper and store them in your home safe if you have one. If you don't have a home safe, store your passwords with your other important family documents. If you think of your passwords as important documents, you'll always know where to find them.
Now that you have configured your wireless router, named your wireless network, protected it, and assigned an administrative password, you are ready for the last step:
Disconnect the network cable from your computer—you'll be able to connect wirelessly from now on. Connect your computers and devices
If your computer does not have wireless network support built in, you can install a wired or a wireless network adapter. Windows will automatically detect the new adapter and might prompt you to insert the CD that came with it. The on-screen instructions will guide you through the configuration process.
To connect your computer to your wireless network
Right-click the wireless network icon in the lower right corner of your screen, and then clicks View Available Wireless Networks.
Note: If you run into problems, consult the documentation that came with your network adapter. Don't hesitate to call the manufacturer's technical support number for help.
The Wireless Network Connection window appears and displays your wireless network listed with the SSID you chose. If you don't see your network, click Refresh network list in the upper left corner. Click your network, and then click Connect in the lower right corner.
Windows prompts you to enter a key. Type the encryption key that you wrote down earlier in both the Network key and Confirm network key boxes, and then click Connect.
4. Windows will show its progress as it connects to your network. If the Wireless Network Connection window continues to show Acquiring Network Address, you may have mistyped the encryption key—click Cancel and return to step 3.
After you're connected, you can close the Wireless Network Connection window. Now you're ready to browse the Web wirelessly. You can also create a wireless network in your home that connects your computers, printers, cameras, games, and other accessories for easy access and enjoyment.

REASONS FOR SLOW INTERNET CONNECTION- DISCOVER HOW TO SOLVE SLOW INTERNET CONNECTION

No matter how fast your Internet connection is, there are times when things will slow down to a crawl. This article will help you sort out what kinds of things can go wrong, learn what you can do about them, and discover how to get the most from your Internet connection.
The type of connection you have makes a difference
The type of Internet connection you use is the most important factor in determining your connection speed. The three most common ways to connect to the Internet from home are dial-up, DSL, and cable. If you have a choice, cable is usually the fastest, but both DSL and cable are faster than dial-up.
If you use a dial-up connection, there are a couple of good ways to optimize your Internet speed. First, use the fastest modem you can. The fastest modem you can use will send and receive information at a rate of 56 kilobits per second (Kbps). You won't get a full 56 Kbps speed most of the time, but with a good phone line, you should approach at least 45-50 Kbps.
Second, make sure that your phone line is in good condition. If the telephone wiring in your home or business is old or deteriorating, you might be picking up stray signals or cross talk from other phone lines. These problems will slow your Internet connection because the modem will have to send the same information over and over until it is transmitted without interruption. Check your telephone wires to be sure they are not damaged, frayed, or twisted around power or other telephone cables. If you notice crackling in your phones, you might want to contact your phone provider to have them check the lines inside and outside your home to make sure they are in good condition.
Tips for wireless network users
When connecting to a wireless network (Wi-Fi), your Internet connection speed can be affected by both where your computer is located and whether other wireless devices are in the same area. Wireless networks operate on frequencies that are similar to those used by other devices, such as microwave ovens or cordless phones. Operating a 2.4 gigahertz (GHz) cordless phone next to your 2.4 GHz wireless laptop can cause interference, or completely block the wireless network connection. If you want to make phone calls while surfing the web, either use a wired telephone or cordless phone that operates at a different frequency than your wireless network.
Proximity to the wireless access point or router, as well as physical obstructions, can affect the quality of your Internet connection. To improve your connection speed, move closer to the access point and make sure that there are no physical obstructions between the access point and your computer.

Computer woes: spyware, viruses, and other programs
The health of your computer can affect your Internet connection. Spyware and viruses can definitely cause problems, but your Internet connection speed can also be affected by add-on programs, the amount of memory the computer has, hard disk space and condition, and the programs that are running.
Two of the most frequent causes of poor Internet performance are spyware and viruses. Spyware can slow your system by interfering with your browser and monopolizing your Internet connection. Spyware monitors your Internet use and keystrokes, which adds delays. The problem is compounded when there are multiple spyware programs running at the same time. If the problem is severe enough, you can lose connectivity altogether. To get your Internet performance back, you should regularly run an antispyware program to clean out any spyware infestation. For more information, see Scan for spyware and other potentially unwanted software.
Computer viruses can also cause poor Internet performance. When a virus infects a computer, it installs computer code which will attempt to propagate itself, usually by sending copies of itself through e mail. Some viruses can multiply at the rate of hundreds of e mail messages per minute, which leaves little computing power and Internet connection bandwidth for anything else. Viruses often do not give any obvious indication that they are running, so it is best to run your antivirus software at all times.
Browser add-ons also cause performance problems. Browser add-ons are programs, such as multimedia add-ons, search bars, or other programs that usually appear on your browser's toolbar. Many browser add-ons can add to a rich browsing experience, offering multimedia or specialized document viewing. However, some add-ons can slow your Internet connection. If you suspect that add-ons are causing slow performance, try starting Internet Explorer in Add-ons disabled mode. Add-ons are disabled only for the session, but if you find your performance improves, you can use the Add-on Manager to turn them off permanently. To access the Add-on Manager from Internet Explorer, click Tools, and then click Add-on Manager. For more information, see how do browser add-ons affect my computer?
Like all computer programs, Internet Explorer requires a certain amount of computing power, memory, and disk space to run efficiently. Every webpage you view is first downloaded to memory and then saved to temporary disk files. Running another program that is using lots of memory and computing power can compete with Internet Explorer and cause delays. If you find your Internet connection running slowly and you have other programs running, try closing them. If you want to run several programs, consider increasing the memory you have on your computer. Low disk space can also cause performance problems. You can increase your disk space by deleting Internet Explorer's temporary files. To learn how to delete temporary files, see Delete webpage history.
Outside factors that affect connection speeds
Unfortunately, there are events and conditions that are outside your control. Even with a fast connection, external factors, such as busy websites or spreading computer viruses, can slow the entire web. Popular websites can become overwhelmed with users. For example, when a television commercial mentions a website, many people might try to visit the site at the same time. If the website isn't prepared to handle the traffic, you might encounter delays.
During times of heavy computer virus outbreaks, the Internet can slow down. Many viruses spread by causing computers to send out hundreds or thousands of copies of the virus. This can slow the Internet by sheer volume. You can see what major outbreaks are currently happening by visiting your antivirus vendor's website, or the Security at Home website.
Local Internet congestion can also result in slower-than-normal connection speeds. These slowdowns occur when many people try to connect to the Internet at the same time, and they occur most often at peak activity times, such as after school hours when students get home and connect to the web.
If you're on a corporate network, general network and proxy server use can affect your Internet performance. Most network administrators monitor Internet use, and will try to keep people from doing things like downloading large files during peak hours. If you find that your Internet access is slow at times, you might discuss it with your network administrator.

HOW TO CHANGE YOUR IP ADDRESS

There are several reasons why people change their IP address; most people from different countries have different reasons some censorship, some to participate in online business but whatever yours may be just know that you are at right place.
The first thing you will need is a software, in my teaching I will be specifically talking about one particular company and their software because I use it very well, but there others I have used that equally works well. The name of this software is known as freedom, they happen to have so many servers with which you can switch over and use some are ‘US’’ SERVERS, ‘GERMAN’’ SERVERS, SWITZERLAND and many more but wherever you are you have the ability to access any of their servers and it is easy to use so far you follow my instruction. First thing to do is to register, please fill in right details when you are through, go to email and activate your account, to do this go to www.your-freedom.net under the ‘LOGIN’’ you will see ‘REGISTER’’, click on it and register.
The next step is to download the software to do go to www.your-freedom.net, you will see DOWNLOADS click on it, a new page will open showing different option such as ‘WINDOWS FULL INSTALLER’’, If you are using windows operating system then select ‘MIRROR US’’ under ‘WINDOWS FULL INSTALLER’’ and save the download.
After downloading the software you will need to install, after installing it a small page consisting of different languages will pop up, select the language you understand for example English. Then another page will pop up, there you will see configuration click on it, another page will open entirely, click on the USE WIZARD, then another page will pop up which says WELCOME, click next, it will ask you to fill in proxy address and port, don’t fill anything instead click next, leave the TWEAK as NONE, and click next, it takes you another page also click next, it will start looking searching for their servers close to you once it is through, it will show different servers, select one of them, now go to ACCOUNT INFORMATION and fill your password and username you registered on their website then click SAVE AND EXIT. Now you will find out that it is only one page that is left open, look at the toolbar of that page you will see PORTS click on it, you will see SOCKS 4/5, WEB PROXY and OPENVPN PORT, check there boxes, just these three. Now you are through configuring your freedom software.
NOTE: while doing the above your computer needs to be connected to the internet.
Next is to configure your browser that you will use to surf the web for instance OPERA or FIREFOX.
First of all let’s look at how to configure OPERA.
Open you opera browser, click on tools, click on preferences, then click on advanced, click on network, click on proxy servers, another page will open, click on all of them and configure the proxies (all proxies) to 127.0.0.1 and configure all the ports to 8080 and click on enable http 1.1 proxy, then save. Now if you use opera as your browser, you ip has been changed to use it, first click on start connection on freedom software and then start browsing with your opera the same thing applies to Firefox.
Secondly to configure Firefox
Open your Firefox browser, then click on tools, click on options, click on advanced, click on network, click on settings, then click on configure manually, under http proxy, type in 127.0.0.1 and under PORT type 8080, click on use this proxy server for all protocols and then save. You have finally configured your Firefox to use a different IP address.
The good thing about freedom is that about freedom is that they have both paid account and FREE USERS, but the paid tariffs is as cheap as the free tariff and the paid tariffs are more flexible than free tariff, so I will advise you to go for the paid tariff is as cheap as 5 euro per month. If you have any problems feel free to let me know.