Wednesday, September 22, 2010

how to connect two computer share files using crossover cables

If you need to connect two computers but you don't have access to a network and can't set up an ad hoc network, you can use an Ethernet crossover cable to create a direct cable connection.
Generally speaking, a crossover cable is constructed by reversing ("crossing over") the order of the wires inside so that it can connect two computers directly. A crossover cable looks almost exactly like a regular Ethernet cable (a "straight-through" cable), so make sure you have a crossover cable before following these steps.
Crossover cable (left); straight-through cable (right)
Before buying a crossover cable, check your network adapter. Some newer network adapters automatically "crossover" when they detect that they are connected directly to another network adapter using a regular Ethernet cable.
To connect two computers with a crossover cable
This works best if both computers are running this version of Windows.
1. Plug each end of the crossover cable into a network port on the back of each computer.
2. On one of the computers that is running this version of Windows, do the following:
Click to open Network and Sharing Center.
3. In the network map at the top of Network and Sharing Center, double-click the unidentified network icon. (If you have more than one network, this icon will be labeled multiple networks.).
4. If network discovery and file sharing are turned off, in Network, click the Information bar containing the following message: "Network discovery and file sharing are turned off. Network computers and devices are not visible. Click to change...," and then click Turn on network discovery and file sharing. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
5. In the Network discovery and file sharing dialog box, select one of the following options:
o No, make the network that I am connected to a private network
o Yes, turn on network discovery and file sharing for all public networks
The first option is usually the best choice because it only affects the network that you are connected to.
Notes
o Networks created with crossover cables are automatically set up as "Public place" networks, which means that network discovery, file sharing, and printer sharing are off by default.
o For Gigabit Ethernet or token ring networks, you will need a slightly different kind of crossover cable. For more information, contact a cable manufacturer.
Icons for both computers should now be visible in the Network window. Double-click each computer icon to share printers and other resources.
Note
• If one of the computers is running Windows XP, it can take some time for that computer to appear in the Network window. You might need to move both computers to the same workgroup. You can do that by changing the workgroup on either computer. To change a workgroup, see Join or create a workgroup. You might also need to turn on file and printer sharing on the computer running Windows XP.

Recovering system information

Tools provided by the operating system and Recovery Manager software are designed to help you with the following tasks for safeguarding your information and restoring it in case of a system failure:
Backing up your information regularly to protect your important system files.
Making a set of recovery discs (Recovery Manager software feature). Recovery discs are used to start up (boot) your computer and restore the operating system and software programs to factory settings in case of system failure or instability.
Creating system restore points (operating system feature). System restore points allow you to reverse undesirable changes to your computer by restoring the computer to an earlier state.
Recovering a program or driver (Recovery Manager software feature). This feature helps you reinstall a program or driver without performing a full system recovery.
Creating recovery discs
After setting up the computer for the first time, be sure to create a set of recovery discs of the full factory image. The recovery discs are used to start up (boot) the computer and recover the operating system and software to factory settings in case of system instability or failure.
NOTE: Handle these discs carefully and keep them in a safe place. The software allows the creation of only one set of recovery discs.
Note the following guidelines before creating recovery discs:
You will need high quality CD-R, DVD-R, DVD-R with double-layer support, DVD+R, or DVD+R with double-layer support discs (purchased separately).
Note: Read-write discs, such as CD-RW, DVD ± RW, and DVD±RW double-layer discs, are not compatible with the Recovery Manager software.
The computer must be connected to AC power during this process.
Only one set of recovery discs can be created per computer.
Number each disc before inserting it into the computer optical drive.
If necessary, you can exit the program before you have finished creating the recovery discs. The next time you open Recovery Manager, you will be prompted to continue the disc creation process.
To create a set of recovery discs:
Select Start > All Programs > Recovery Manager > Recovery Manager.
Recovery Manager opens.
Click Advanced Options.
Note: If you are operating the computer on battery power, you will be prompted to connect to AC power before you can go to the next step.
Click Recovery disc creation, and then click Next.
Follow the on-screen instructions.
When to back up
On a regularly scheduled basis
Note: Set reminders to back up your information periodically.
Before the computer is repaired or restored
Before you add or modify hardware or software
Using system restore points
When you back up your system, you are creating a system restore point. A system restore point allows you to save and name a snapshot of your hard drive at a specific point in time. You can then recover back to that point if you want to reverse subsequent changes made to your system.
Note: Recovering to an earlier restore point does not affect data files saved or e-mails created since the last restore point.
You also can create additional restore points to provide increased protection for your system files and setting.

IMPROVE THE SECURITY OF YOUR WIRELESS HOME NETWORK .

Wireless Networks are a great way to share files, printers, and your Internet connection to any computer in your home. With a wireless network adapter installed on your portable computer, you are no longer tied to your desk. You can communicate with friends, read the news, and surf the Web anywhere you can receive a wireless network signal.
The risks Wireless networks don't stop at the walls of your home. In fact, wireless networks often extend more than 300 feet from your wireless router. If you live in an apartment, dorm, or condominium, you may have dozens of neighbors who can access your wireless network. If you live in a house, your neighbors and even people on the street may be able to connect to your network.
It's one thing to let a neighbor borrow your lawn mower, but you should think twice about allowing anyone to access your home network. There are several good reasons for this. People who can connect to your wireless network might be able to:
Slow down your Internet performance.
View files on your computers and spread dangerous software.
Monitor the Web sites you visit, read your e-mail and instant messages as they travel across the network, and copy your usernames and passwords.
Send spam or perform illegal activities with your Internet connection.
By setting up security features on your wireless network, you can make it very difficult for uninvited guests to connect.
How to Protect Your Wireless Network
Most wireless networks are completely unprotected when you first set them up. However, in just a few minutes, you can protect your wireless network by using the same method banks use to protect your password when you log on to their Web sites: encryption. Encryption scrambles data on your wireless network so that only computers that have the encryption key can read your communications.
You Have Several Choices For Wireless Encryption:
64-bit WEP (Wired Equivalent Protection). The original wireless encryption standard, it is now outdated. The main problem with it is that it can be easily "cracked." Cracking a wireless network means defeating the encryption so that you can establish a connection without being invited.
128-bit WEP. An updated, more secure version of the original WEP. However, skilled attackers can still crack 128-bit WEP in a few hours or less, giving them access to your network.
WPA-PSK (also known as WPA-Personal). A more secure alternative to WEP, but because it is newer, it is not as widely supported. Microsoft Windows supports WPA, so this type of encryption is the best choice if you plan to connect only Windows XP computers to your wireless network. However, if you have wireless devices that don't support WPA, such as media extenders or wireless cameras, you'll have to use WEP on your network instead.
You might also see the security method called "WPA-Enterprise." As the name suggests, this method of network encryption is designed for business use. Setup for WPA-Enterprise is more complex than for other types of encryption, and it requires special network infrastructure.
WPA2. The newest type of wireless encryption, WPA2 provides the highest level of encryption available. WPA2 encryption should be your first choice if your wireless router and all of your wireless computers and devices support it.

Even though one type of encryption may be better than another, any type will dramatically improve your network's security by making you a more difficult target.
Tip: To learn the quickest and easiest way to protect your wireless network, read Set up a wireless network and follow the steps in the sections "Configure your wireless router" and "Connect your computers and devices." The article walks you through the process of configuring your network to use 128-bit WEP.
Can Wireless Encryption be "cracked"?
The short answer is, "Yes." Any encryption can be cracked. An individual with knowledge of computers and networking, and who is willing to spend a few hours researching free "hacking" tools, can crack encryption in a few hours (or less). However, most users who want to connect without authorization lack the expertise to crack 64-bit or 128-bit WEP. In a crowded neighborhood with numerous unprotected networks, anyone looking for a free connection will likely choose the unprotected network rather than spend the time to crack your WEP encryption. Therefore, WEP encryption offers better protection than not having encryption enabled at all.
An expert user can also crack WPA-PSK encryption if you use a short passphrase (like a password, only containing a sequence of words.) However, a longer passphrase provides excellent protection. Currently there are no freely available tools to crack WPA2 encryption. So if you enable WPA encryption on your network, you can rest easy knowing that your wireless network is as secure as it can be.
Over time, new cracking tools will be developed that could increase the vulnerability of WPA and WPA2. So, it's important to stay up to date with the latest encryption technologies. At least once a year, check to see if new technology is available for you to use.
Wireless Security Tips
Follow these tips to keep your data safe when using wireless networks:
If you use WEP encryption, change your encryption key once a month. If someone manages to learn your key, they will be locked out again when you change it.
Don't connect to unprotected wireless networks—it's possible for someone to monitor your Internet usage and even record your passwords.
If you do connect to an unprotected wireless network, don't visit a Web site that requires a password unless the Web site is encrypted. To find out if it's encrypted, look for a lock symbol in the lower-right corner of your browser.

If you use WPA-PSK to encrypt your network, set a long pass phrase of at least 20 random characters. Better yet, use the full 63 characters by typing a sentence you can remember—just don't make it something that's easily guessed, like a line from a movie.

Wednesday, September 15, 2010

Set Up a Wireless Network without a Router

Wireless networks are helpful because they let you use your computer and connect to the Internet anywhere in your home or office. However, most wireless networks use a wireless router, which can be expensive. If you have more than one computer, you can set up a wireless network without buying a wireless router and save yourself some money. In an ad hoc network, computers and devices are connected directly to each other, rather than to a hub or router. People generally set up these networks to temporarily share files, presentations, or an Internet connection among multiple computers and devices. Computers and devices in ad hoc networks must be within 30 feet of each other. Ad hoc networks can only be wireless, so you must have a wireless network adapter installed in your computer to set up or join an ad hoc network.
An ad hoc network is a temporary connection between computers and devices used for a specific purpose, such as sharing documents during a meeting or playing multiple-player computer games. You can also use an ad hoc network to temporarily share an Internet connection. Ad hoc networks can only be wireless, so you must have a wireless network adapter installed in your computer to set up or join an ad hoc network. Ad hoc wireless networks work more like walkie-talkies, because the computers communicate directly with each other. By enabling Internet Connection Sharing on one of the computers, you can share Internet access.
Ad hoc networking might seem like a much smarter alternative to using a wireless router, but it does have some disadvantages:
1. If the computer connected to the Internet is shut down, all computers that are part of the ad hoc network lose their Internet access.
2. To connect to the Internet, one computer always needs a wired network connection.



To connect your computers to the Internet using an ad hoc wireless network, follow these high-level steps.
1. Enable Internet Connection sharing on the Internet-connected computer. You can skip this step if you don't need to access the Web.
2. Set up the ad hoc wireless network on the Internet-connected computer.
3. Add your other computers to the wireless network.


How to enable Internet Connection Sharing
On networks with wireless routers, the router has the important job of forwarding communications from the computers on your home network to the Internet. On ad hoc networks, you must assign one computer to serve this role. The computer you choose must have a wired connection to the Internet, and it should be left on whenever you want to be able to use your other computers.
How to set up the first computer
To set up an ad hoc wireless network that allows computers to share an Internet connection without a router
1. If necessary, install a wireless network adapter.
2. Click Start, and then click Control Panel.
3. Under Pick a category, click Network and Internet Connections.
4. Under or pick a Control Panel icon, click Network Connections.
5. Right-click your wireless network connection, and then click Properties.
6. In the Wireless Network Connection Properties dialog box, click the Wireless Networks tab.
7. On the Wireless Networks tab, under preferred networks, click Add.
8. In the Wireless network properties dialog box, on the Association tab, type the name of your ad hoc wireless network in Network name (SSID) box (shown in step 10).
9. Clear the key is provided for me automatically check box and select the ‘this is a computer-to-computer (ad hoc) network’’ check box.
10. Create a 13-digit password and type it in both the Network key and Confirm network key boxes. For the best security, include letters, numbers, and punctuation. Then click OK.
11. Click OK again to save your changes.
Notes:
o If one or more of the networked computers is joined to a domain, you need to have a user account on that computer to see and access shared items on it.
o An ad hoc network is automatically deleted after all users disconnect from the network or when the person who set up the network disconnects and goes out of range of the other users of the network, unless you choose to make it a permanent network when you create it.
o If you share your Internet connection, Internet connection sharing (ICS) will be disabled if:
 You disconnect from the ad hoc network.
 You create a new ad hoc network without disconnecting from the old ad hoc network for which you enabled ICS.
 You log off and then log back on (without disconnecting from the ad hoc network).
o If you set up an ad hoc network and share your Internet connection, and then someone logs on to the same computer by using Fast User Switching, the Internet connection will still be shared, even if you didn't intend to share it with that person.


How to set up additional computers
If the computer you want to add to your network does not have built-in wireless network support, install a wireless network adapter.
Windows automatically detects the new adapter and notifies you that it found a wireless network.
Now connect your computer to your wireless network
1. Right-click the Wireless Network icon in the lower right corner of your screen, and then click View Available Wireless Networks.
2. The Wireless Network Connection window appears and displays your wireless network listed with the SSID you chose. If you don't see your network, click Refresh Network List in the upper left corner. Click your network, and then click Connect in the lower right corner.
3. Windows prompts you to enter a key. Type your encryption key in both the Network key and Confirm network key boxes, and then click Connect.
Windows shows its progress as it connects to your network. After you're connected, you can close the Wireless Network Connection window.
Repeat these three steps on each computer that you want to connect to your ad hoc wireless network.
Now you can browse from any computer you added to your home network.

SET UP A WIRELESS NETWORK

A network can be one computer connected to the Internet, or two or more computers connected to each other (and also to the Internet). In a wireless network, the computers are connected by radio signals instead of wires or cables. Advantages of wireless networks include mobility and no unsightly wires. Disadvantages can include a slower connection than a wired network and interference from other wireless devices, such as cordless phones.
A wireless network can make using your computer more relaxing by letting you take it anywhere in your house—to your couch, your bedroom, or even your backyard. With a wireless network, you don't have to go out of your way to use the Internet, because it's everywhere in your home. You also don't have to be tied to your office to take care of other computer-related tasks—with a wireless network, you're always connected. You can search the Web for 'reseed lawn' and then, while reclining in front of the TV, print out your garden center shopping list on the printer in your home office.
Adding a wireless network to your home is easier than you think. It requires four steps:
Choose your wireless equipment.
Connect your wireless router.
Configure your wireless router.
Connect your computers and devices.
CHOOSE YOUR WIRELESS EQUIPMENT
The first step to setting up a wireless network is to make sure you have the equipment you need. You'll need at least two network components: a wireless router and a wireless network adapter.
Wireless router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Be sure you get a wireless router and not a wireless access point.
Wireless network adapter. Connects your computer to your wireless router. If you have a newer portable computer, you might already have wireless capabilities built in. Make sure you have an adapter for every computer on your network.
You can also connect your digital video recorder (DVR) or media extender to your wireless network. If the device has a wired network connection, use a wireless game adapter for a single device or a wireless bridge to connect multiple devices. Wireless game adapters aren't just for games—they'll work with anything that has a wired network port.
Connect Your Wireless Router
Locate your cable modem or DSL modem, and unplug it from its port to turn it off.
If you connect your modem to the wall in a similar way that you connect your TV to your cable television outlet, you probably have a cable modem, and it probably has a coaxial cable connected to it (like the round black or white cable you plug into your TV).
If you connect your modem through the phone lines, you probably have a DSL modem, and it probably has a phone cable connected to it.
If you currently use a dial-up connection to connect to the Internet, set up your wireless network using ad hoc Internet sharing.
Connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
To connect your router to your modem:
If you currently have a computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
If you don't currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
Plug in your router. After a minute or two, the Internet, WAN, or WLAN light on your router should light up, indicating that it has successfully connected to your modem.
5. Configure Your Wireless Router
There are two ways to configure your wireless router: using Windows Connect now and manually.
If your router supports Windows Connect Now, you don't need to continue reading this article. You can configure your wireless router and Windows XP computers quickly and easily by following the instructions in Using Windows Connect Now technology
If you don't have a router that supports Windows Connect Now, you need to manually configure your router:
Using the network cable that came with your wireless router, temporarily connect your computer to one of the wired network ports on your wireless router (any port that isn’t labeled Internet, WAN, or WLAN).
Turn your computer on; it will automatically connect to your router.
3. Open Microsoft Internet Explorer and type in the address to configure your router, as described in your router's instruction manual.
4. Create a password if a prompt appears. The address and password you use will vary depending on what type of router you have, so refer to the instructions included with your router.
Tip: Write down your passwords on a piece of paper and store them in your home safe if you have one. If you don't have a home safe, store your passwords with your other important family documents. If you think of your passwords as important documents, you'll always know where to find them.
Now that you have configured your wireless router, named your wireless network, protected it, and assigned an administrative password, you are ready for the last step:
Disconnect the network cable from your computer—you'll be able to connect wirelessly from now on. Connect your computers and devices
If your computer does not have wireless network support built in, you can install a wired or a wireless network adapter. Windows will automatically detect the new adapter and might prompt you to insert the CD that came with it. The on-screen instructions will guide you through the configuration process.
To connect your computer to your wireless network
Right-click the wireless network icon in the lower right corner of your screen, and then clicks View Available Wireless Networks.
Note: If you run into problems, consult the documentation that came with your network adapter. Don't hesitate to call the manufacturer's technical support number for help.
The Wireless Network Connection window appears and displays your wireless network listed with the SSID you chose. If you don't see your network, click Refresh network list in the upper left corner. Click your network, and then click Connect in the lower right corner.
Windows prompts you to enter a key. Type the encryption key that you wrote down earlier in both the Network key and Confirm network key boxes, and then click Connect.
4. Windows will show its progress as it connects to your network. If the Wireless Network Connection window continues to show Acquiring Network Address, you may have mistyped the encryption key—click Cancel and return to step 3.
After you're connected, you can close the Wireless Network Connection window. Now you're ready to browse the Web wirelessly. You can also create a wireless network in your home that connects your computers, printers, cameras, games, and other accessories for easy access and enjoyment.

REASONS FOR SLOW INTERNET CONNECTION- DISCOVER HOW TO SOLVE SLOW INTERNET CONNECTION

No matter how fast your Internet connection is, there are times when things will slow down to a crawl. This article will help you sort out what kinds of things can go wrong, learn what you can do about them, and discover how to get the most from your Internet connection.
The type of connection you have makes a difference
The type of Internet connection you use is the most important factor in determining your connection speed. The three most common ways to connect to the Internet from home are dial-up, DSL, and cable. If you have a choice, cable is usually the fastest, but both DSL and cable are faster than dial-up.
If you use a dial-up connection, there are a couple of good ways to optimize your Internet speed. First, use the fastest modem you can. The fastest modem you can use will send and receive information at a rate of 56 kilobits per second (Kbps). You won't get a full 56 Kbps speed most of the time, but with a good phone line, you should approach at least 45-50 Kbps.
Second, make sure that your phone line is in good condition. If the telephone wiring in your home or business is old or deteriorating, you might be picking up stray signals or cross talk from other phone lines. These problems will slow your Internet connection because the modem will have to send the same information over and over until it is transmitted without interruption. Check your telephone wires to be sure they are not damaged, frayed, or twisted around power or other telephone cables. If you notice crackling in your phones, you might want to contact your phone provider to have them check the lines inside and outside your home to make sure they are in good condition.
Tips for wireless network users
When connecting to a wireless network (Wi-Fi), your Internet connection speed can be affected by both where your computer is located and whether other wireless devices are in the same area. Wireless networks operate on frequencies that are similar to those used by other devices, such as microwave ovens or cordless phones. Operating a 2.4 gigahertz (GHz) cordless phone next to your 2.4 GHz wireless laptop can cause interference, or completely block the wireless network connection. If you want to make phone calls while surfing the web, either use a wired telephone or cordless phone that operates at a different frequency than your wireless network.
Proximity to the wireless access point or router, as well as physical obstructions, can affect the quality of your Internet connection. To improve your connection speed, move closer to the access point and make sure that there are no physical obstructions between the access point and your computer.

Computer woes: spyware, viruses, and other programs
The health of your computer can affect your Internet connection. Spyware and viruses can definitely cause problems, but your Internet connection speed can also be affected by add-on programs, the amount of memory the computer has, hard disk space and condition, and the programs that are running.
Two of the most frequent causes of poor Internet performance are spyware and viruses. Spyware can slow your system by interfering with your browser and monopolizing your Internet connection. Spyware monitors your Internet use and keystrokes, which adds delays. The problem is compounded when there are multiple spyware programs running at the same time. If the problem is severe enough, you can lose connectivity altogether. To get your Internet performance back, you should regularly run an antispyware program to clean out any spyware infestation. For more information, see Scan for spyware and other potentially unwanted software.
Computer viruses can also cause poor Internet performance. When a virus infects a computer, it installs computer code which will attempt to propagate itself, usually by sending copies of itself through e mail. Some viruses can multiply at the rate of hundreds of e mail messages per minute, which leaves little computing power and Internet connection bandwidth for anything else. Viruses often do not give any obvious indication that they are running, so it is best to run your antivirus software at all times.
Browser add-ons also cause performance problems. Browser add-ons are programs, such as multimedia add-ons, search bars, or other programs that usually appear on your browser's toolbar. Many browser add-ons can add to a rich browsing experience, offering multimedia or specialized document viewing. However, some add-ons can slow your Internet connection. If you suspect that add-ons are causing slow performance, try starting Internet Explorer in Add-ons disabled mode. Add-ons are disabled only for the session, but if you find your performance improves, you can use the Add-on Manager to turn them off permanently. To access the Add-on Manager from Internet Explorer, click Tools, and then click Add-on Manager. For more information, see how do browser add-ons affect my computer?
Like all computer programs, Internet Explorer requires a certain amount of computing power, memory, and disk space to run efficiently. Every webpage you view is first downloaded to memory and then saved to temporary disk files. Running another program that is using lots of memory and computing power can compete with Internet Explorer and cause delays. If you find your Internet connection running slowly and you have other programs running, try closing them. If you want to run several programs, consider increasing the memory you have on your computer. Low disk space can also cause performance problems. You can increase your disk space by deleting Internet Explorer's temporary files. To learn how to delete temporary files, see Delete webpage history.
Outside factors that affect connection speeds
Unfortunately, there are events and conditions that are outside your control. Even with a fast connection, external factors, such as busy websites or spreading computer viruses, can slow the entire web. Popular websites can become overwhelmed with users. For example, when a television commercial mentions a website, many people might try to visit the site at the same time. If the website isn't prepared to handle the traffic, you might encounter delays.
During times of heavy computer virus outbreaks, the Internet can slow down. Many viruses spread by causing computers to send out hundreds or thousands of copies of the virus. This can slow the Internet by sheer volume. You can see what major outbreaks are currently happening by visiting your antivirus vendor's website, or the Security at Home website.
Local Internet congestion can also result in slower-than-normal connection speeds. These slowdowns occur when many people try to connect to the Internet at the same time, and they occur most often at peak activity times, such as after school hours when students get home and connect to the web.
If you're on a corporate network, general network and proxy server use can affect your Internet performance. Most network administrators monitor Internet use, and will try to keep people from doing things like downloading large files during peak hours. If you find that your Internet access is slow at times, you might discuss it with your network administrator.

HOW TO CHANGE YOUR IP ADDRESS

There are several reasons why people change their IP address; most people from different countries have different reasons some censorship, some to participate in online business but whatever yours may be just know that you are at right place.
The first thing you will need is a software, in my teaching I will be specifically talking about one particular company and their software because I use it very well, but there others I have used that equally works well. The name of this software is known as freedom, they happen to have so many servers with which you can switch over and use some are ‘US’’ SERVERS, ‘GERMAN’’ SERVERS, SWITZERLAND and many more but wherever you are you have the ability to access any of their servers and it is easy to use so far you follow my instruction. First thing to do is to register, please fill in right details when you are through, go to email and activate your account, to do this go to www.your-freedom.net under the ‘LOGIN’’ you will see ‘REGISTER’’, click on it and register.
The next step is to download the software to do go to www.your-freedom.net, you will see DOWNLOADS click on it, a new page will open showing different option such as ‘WINDOWS FULL INSTALLER’’, If you are using windows operating system then select ‘MIRROR US’’ under ‘WINDOWS FULL INSTALLER’’ and save the download.
After downloading the software you will need to install, after installing it a small page consisting of different languages will pop up, select the language you understand for example English. Then another page will pop up, there you will see configuration click on it, another page will open entirely, click on the USE WIZARD, then another page will pop up which says WELCOME, click next, it will ask you to fill in proxy address and port, don’t fill anything instead click next, leave the TWEAK as NONE, and click next, it takes you another page also click next, it will start looking searching for their servers close to you once it is through, it will show different servers, select one of them, now go to ACCOUNT INFORMATION and fill your password and username you registered on their website then click SAVE AND EXIT. Now you will find out that it is only one page that is left open, look at the toolbar of that page you will see PORTS click on it, you will see SOCKS 4/5, WEB PROXY and OPENVPN PORT, check there boxes, just these three. Now you are through configuring your freedom software.
NOTE: while doing the above your computer needs to be connected to the internet.
Next is to configure your browser that you will use to surf the web for instance OPERA or FIREFOX.
First of all let’s look at how to configure OPERA.
Open you opera browser, click on tools, click on preferences, then click on advanced, click on network, click on proxy servers, another page will open, click on all of them and configure the proxies (all proxies) to 127.0.0.1 and configure all the ports to 8080 and click on enable http 1.1 proxy, then save. Now if you use opera as your browser, you ip has been changed to use it, first click on start connection on freedom software and then start browsing with your opera the same thing applies to Firefox.
Secondly to configure Firefox
Open your Firefox browser, then click on tools, click on options, click on advanced, click on network, click on settings, then click on configure manually, under http proxy, type in 127.0.0.1 and under PORT type 8080, click on use this proxy server for all protocols and then save. You have finally configured your Firefox to use a different IP address.
The good thing about freedom is that about freedom is that they have both paid account and FREE USERS, but the paid tariffs is as cheap as the free tariff and the paid tariffs are more flexible than free tariff, so I will advise you to go for the paid tariff is as cheap as 5 euro per month. If you have any problems feel free to let me know.

COMPUTER MAINTIANANCE- WAYS TO MAINTIAN YOUR COMPUTER BETTER

Turning off your computer properly
When you're done using your computer, it's important to turn it off properly—not only to save energy, but also to ensure that your data is saved and to help keep your computer more secure. Best of all, your computer will start quickly the next time you use it.
Use the Power button on the Start menu
To turn off your computer, click the Start button, and then click the Power button in the lower right corner of the Start menu. The Power button normally looks like this:
When you click this button, your computer goes to sleep. Windows automatically saves your work, the display turns off, and any noise from the computer's fan stops. Usually, a light on the outside of your computer case blinks or turns yellow to indicate that the computer is sleeping. The whole process takes only a few seconds.
Because Windows saves your work, there's no need to close your programs and files before putting your computer to sleep. The next time you turn on your computer (and enter your password, if required), the screen will look exactly as it did when you turned off your computer.
To wake your computer, press the power button on your computer case. Because you don't have to wait for Windows to start, your computer wakes within seconds and you can resume work almost immediately.
Note
• While your computer is sleeping, it uses a very small amount of power to maintain your work in its memory. If you're using a mobile PC, don't worry— the battery won't be drained. After the computer has been sleeping for several hours, or if the battery is running low, your work is saved to the hard disk, and then your computer turns off completely, drawing no power.
Using anti-malware software to help protect your computer
Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious software. To help protect your computer against malware, make sure it is using up-to-date antivirus and antispyware software.
Windows comes with Windows Defender, which can help protect your computer against malicious and unwanted software, such as spyware and adware. Windows Defender is installed and turned on by default.
If you don't have up-to-date antivirus software on your computer, you should immediately install it because any computer that is connected to the Internet without antivirus software is vulnerable to attack, but with an up-to-date antivirus protecting your computer from malwares will be easy. Please don’t run more than one anti-virus on your computer at a time because it tends to slow your computer down.
Clean Your PC occasionally
Dust, dirt, ash, pet hair, and other contaminants can accumulate on or inside your notebook computer, causing scratches or overheating. You can extend the life of your notebook computer by removing potentially damaging buildup. Clean your notebook computer every three months as part of a regular maintenance program.
Before you begin, its recommends that you have the following cleaning materials on hand:
• Canned (or compressed) air. You can buy cans of compressed air from most computer retailers.
• Cleaning solution intended for use on LCD screens. You can buy cleaning solution from most computer retailers.
• A clean, soft cotton fiber cloth. The type of cleaning towel used for eyeglasses is preferable.
• Small vacuum cleaner with a brush attachment, or other small, stiff-bristled brushes, such as a clean makeup brush or car detailing brush.
• Clean your computer regularly to ensure that your notebook computer continues to work optimally.
When using a liquid cleaning spray, dampen your towel with it lightly. Never allow the cleaner to pool in the keyboard or use so much cleaner that it can seep into the LCD panel itself.
How to Extend the Life of your Battery
The storage capacity of the battery will decrease over time based upon usage of your computer. This is normal for all rechargeable batteries. If you run computer on battery power often, requiring one or more recharges per day, the length of the battery charge will decrease more quickly and require replacement sooner than a battery that is used occasionally. Temperature and humidity also impact battery storage capacity. Store the battery and the computer in a cool, dry place.
Under normal operating conditions, a battery should perform well for over a year, but it will retain less charge each time it is recharged. Battery Check will provide a status of your battery and notify you when it needs to be replaced.
Tips for maximizing battery life:
• Lower the brightness on the display.
• Use the Power saver power plan.
• Purchase a second battery to limit the number of re-charges on one battery.
• Remove the battery from the notebook PC when it is not being used.
• Store your notebook PC in a cool, dry location.
• Do not charge the battery for more than 8 hours.
• Remove the battery from the notebook PC when using AC power to avoid short charge and discharge cycles.
Note: A battery stored for a long period of time should be stored in a cool, dry location with approximately a 50% charge on the battery. A battery stored with little charge remaining may discharge completely and not be capable of being charged again.

WEB HOSTING TUTORIALS-LEARN ALL YOU NEED TO KNOW ABOUT WEBSITE HOSTING

If you want your Web Site to be visible to the world, it has to be hosted on a Web Server. In this tutorial i will teach you what Web Hosting is, and what Web Hosting has to offer.
Introduction to Web Hosting
How does the Web work? How can I make my own Web Site?
What is a Web Host? What is an Internet Service Provider?

What is the World Wide Web?
The Web is a network of computers all over the world.
All the computers in the Web can communicate with each other.
All the computers use a communication standard called HTTP.
Web information is stored in documents called web pages.
Web pages are files stored on computers called web servers.
Computers reading the web pages are called web clients.
Web clients view the pages with a program called a web browser.
Popular browsers are Internet Explorer and Netscape Navigator.


How does a browser fetch a web page?
A browser fetches a page from a web server by a request.
A request is a standard HTTP request containing a page address.
An address may looks like this: http://www.darling.com/page.htm.

How does a Browser Display a Web Page?
All web pages contain instructions for display
The browser displays the page by reading these instructions.
The most common display instructions are called HTML tags.
HTML tags look like this

this is a Paragraph

.

What is a Web Server?
The collection of all your web pages is called your web site.
To let others view your work, you must publish your web site.
To publish your work, you must copy your site to a web server.
Your own PC can act as a web server if it is connected to a network.
Most common is to use an Internet Service Provider (ISP).

What is an Internet Service Provider?
ISP is a shortcut for Internet Service Provider.
An ISP provides Internet services.
A common Internet service is web hosting.
Web hosting means storing your web site on a public server.
Web hosting normally includes email services.
Web hosting often includes domain name registration.

Summary
If you want other people to view your web site, you must copy your site to a public server. Even if you can use your own PC as a web server, it is more common to let an Internet Service Provider (ISP) host your site.
Included in a Web hosting solution you can expect to find domain name registration and standard email services.
You can read more about domain name registration, email and other services in the next chapters of this tutorial.


Web Hosting Providers

If you want your web site to be visible to the world, you have to store it on a web server.
Most small businesses and companies store their web site on a server provided by an Internet Service Provider (ISP).

Hosting Your Own Web
Hosting your web site on your own server is always an option. Here are some problems to consider:

Hardware Expenses
To run a "real" web site, you will have to buy some powerful server hardware. Don't expect that a low cost PC will do the job. You will also need a permanent (24 hours a day ) high speed connection to your office, and such connections are expensive.

Software Expenses
Don't forget to count the extra cost for software licenses. Remember that server licenses often are much higher than client licenses. Also note that some server software licenses might have limits on number of concurrent users.

Labor Expenses
Don't expect low labor expenses. Remember that you have to install your own hardware and software. You also have to deal with bugs and viruses, and keep your server constantly running in an environment where "everything could happen".

Using an Internet Service Provider
Renting a server from an Internet Service Provider (ISP) is a common option. Here are some advantages:

Connection Speed
Most providers have very fast connections to the Internet, like full T3 fiber-optic 45Mps connections equivalent to about 2000 traditional (28K) modems or 1000 high speed (56K) modems.

Powerful Hardware
Service providers often have many powerful web servers that can be shared by several companies. You can also expect them to have an effective load balancing, and necessary backup servers.

Security and Stability
Internet Service Providers are specialists on web hosting. Expect their servers to have more than 99% up time, the latest software patches, and the best virus protection.

Things to Consider
24-hour support
Make sure your Internet service provider offers 24-hours support. Don't put yourself in a situation where you cannot fix critical problems without having to wait until the next working day. Toll-free phone could be vital if you don't want to pay for long distance calls.

Daily Backup
Make sure your service provider runs a secure daily backup routine, otherwise you may lose some valuable data.

Traffic Volume
Study the provider's traffic volume restrictions. Make sure that you don't have to pay a fortune for unexpected high traffic if your web site becomes popular.

Bandwidth or Content Restrictions
Study the provider's bandwidth and content restrictions. If you plan to publish pictures or broadcast video or sound, make sure that you can.

Email Capabilities
Make sure your provider fully supports the email capabilities you need. (You can read more about email capabilities in a later chapter)
Front Page Extensions
Make sure your provider fully supports FrontPage server extensions if you plan to use FrontPage to develop your site.
Database Access
Make sure your provider fully supports the database access you need if you plan to use databases from your site. (You can read more about database access in a later chapter)



Hosting Capacities

Make sure you get the disk space and the traffic volume you need.
How Much Disk Space?
A small or medium web site will need between 10 and 100MB of disk space.
If you look at the size of HTML pages, you will see that the average size is very small. Maybe even smaller than 1KB. But if you look at the size of the images (button, gif, banner, jpg) used inside the pages, you will often find images many times larger than the page itself.

Expect each HTML page to take up between 5 and 50KB of disk space on your web server, depending on the use of images or other space consuming elements.
If you plan to use lots of images or graphic elements (not to mention sound files or movies), you might be needing much more disk space.
Make sure that you know your needs before you start looking for your web host.

Connection Speed
Visitors to your web site will often connect via a modem, but your host provider should have a much faster connection.
In the early days of the Internet a T1 connection was considered a fast connection. Today connection speeds are much faster.
1 byte equals to 8 bits (and that's the number of bits used to transport one character). Low speed communication modems can transport from about 14 000 to 56 000 bits per second (14 to 56 kilobytes per second). That is somewhere between 2000 and 7000 characters per second, or about 1 to 5 pages of written text.
One kilobit (Kb) is 1024 bits. One megabit (Mb) is 1024 kilobits. One gigabit (Gb) is 1024 megabits.
Before you sign up a contract with any hosting provider, surf some other web sites on their servers, and try to get a good feeling about their network speed. Also compare the other sites against yours, to see if it looks like you have the same needs. Contacting some of the other customers is also a valuable option.


Hosting Email Services

Hosting services should include proper Email Accounts and Email Services.
Email Accounts
Hosting solutions should include email accounts for each person in your company. Email addresses should appear like this:
jack@mycompany.com
Most common is to use first name or first initial and last name.

POP Email
POP stands for Post Office Protocol. POP is a standard client/server protocol for sending and receiving email.
The emails are received and held on your internet server until you pick it up with a client email program, like Outlook, Outlook Express, Netscape Messenger, etc. POP email programs are built into Netscape and Internet Explorer browsers (i.e. Microsoft Outlook Express).

IMAP Email
IMAP stands for Internet Message Access Protocol. IMAP is another standard protocol for sending and receiving email.
The emails are received and held on your internet server until you pick it up with a client email program, like Outlook, Outlook Express, Netscape Messenger, etc.
IMAP represents an improvement over POP because email stored on an IMAP server can be manipulated from several computers (a computer at home, a workstation at the office, etc.) without having to transfer messages back and forth between computers. POP was designed to support email access on a single computer.

Web-based Email
Web-based email services enable you to access email via a web browser. You log into your email account via the Web to send and retrieve email. Being able to access your email from any browser anywhere in the world is a very attractive option.
Examples of web-based email services are Yahoo! Mail and Hotmail.

Email Forwarding
Email forwarding allows you to have multiple email personalities.
With email forwarding, you can setup aliases for other email accounts like
postmaster@mycompany.com should be forwarded to peter@mycompany.com
sales@mycompany.com should be forwarded to mary@mycompany.com

Mailing Lists
Some service providers offer mailing list capabilities. This is a valuable plus if you plan sending out email to a large number of users.



Web Hosting Server Technologies
This section describes some of the most common hosting technologies.
Windows Hosting
Windows hosting means hosting of web services that runs on the Windows operating system. You should choose Windows hosting if you plan to use ASP (Active Server Pages) as server scripting, or if you plan to use a database like Microsoft Access or Microsoft SQL Server. Windows hosting is also the best choice if you plan to develop your web site using Microsoft Front Page.

Unix Hosting
Unix hosting means hosting of web services that runs on the Unix operating system.
Unix was the first (original) web server operating system, and it is known for being reliable and stable. Often less expensive than Windows.

Linux Hosting
Linux hosting means hosting of web services that runs on the Linux operating system.
CGI
Web pages can be executed as CGI scripts. CGI scripts are executables that will execute on the server to produce dynamic and interactive web pages.
Most Internet service providers will offer some kind of CGI capabilities. And many will offer preinstalled, ready to run, guest-books, page-counters, and chat-forums solutions written in CGI scripts.
The use of CGI is most common on Unix or Linux servers.

ASP - Active Server Pages
Active Server Pages is a server-side scripting technology developed by Microsoft.
With ASP you can create dynamic web pages by putting script code inside your HTML pages. The code is executed by the web server before the page is returned to the browser. Both Visual Basic and JavaScript can be used.
ASP is a standard component in Windows 95,98, 2000, and XP. It can be activated on all computers running Windows.
Many web hosting providers are offering ASP, as it is becoming a more and more popular technology.
Chili! Soft ASP
Microsoft's ASP technology runs only on Windows platforms.
However, Chili!Soft ASP is a software product that allows ASP to run on UNIX and some other platforms.

JSP
JSP is a server-side technology much like ASP developed by Sun.
With JSP you can create dynamic web pages by putting Java code inside your HTML pages. The code is executed by the web server before the page is returned to the browser.
Since JSP uses Java, the technology is not restricted to any server-specific platform.

FrontPage
FrontPage is a very common web site design tool developed by Microsoft.
FrontPage allows users to develop a web site without any deep knowledge of web development. Most Windows hosting solutions support FrontPage server extensions for users that use FrontPage to develop their web site.
If you plan to use FrontPage, you should look for a Windows hosting solution (meaning not Unix / Linux).

PHP
Just like ASP, PHP is a server-side scripting language which allows you to create dynamic web pages by putting script code inside your HTML pages. The code is executed by the web server before the page is returned to the browser.

Cold Fusion
Cold Fusion is another server-side scripting language used to develop dynamic web pages. Cold Fusion is developed by Macromedia.

Secure Server
A secure server can transmit data encrypted.
If you plan to do online credit card transactions, or other types of web communication that needs to be protected against unauthorized access, your web host must provide a secure server.




Web Hosting Database Technologies

SQL Server or Oracle for high traffic database-driven web sites.
Access or MySQL for low traffics database-access.

Web Databases
If your web site needs to update large quantities of information via the web, you will need a database to store your information.
There are many different database systems available for web hosting. The most common are MS Access, SQL Server, and Oracle.

Using the SQL Language
SQL is the language for accessing databases.
If you want your web site to be able to store and retrieve data from a database, your web server should have access to a database-system that uses the SQL language.

SQL Server
Microsoft's SQL Server is one of the most popular database software for database-driven web sites with high traffic.
SQL Server is a very powerful, robust and full featured SQL database system.

Oracle
Oracle is also a very popular database software for database-driven web sites with high traffic.
Oracle is a very powerful, robust and full featured SQL database system.

Access
When a web site requires a simple database solution, Microsoft Access is a very popular option.
Access is not well suited for very high-traffic, and not as powerful as Oracle or SQL Server.



Web Hosting Types

Hosting can be FREE, SHARED or DEDICATED.

Free Hosting
Some service providers offer free web hosting.
Free web hosting is best suited for small sites with low traffic, like family sites or sites about hobbies. It is not recommended for high traffic or for real business. Technical support is often limited, and technical options are few.
Very often you cannot use your own domain name at a free site. You have to use a name provided by your host like http://www.freesite/users/~yoursite.htm. This is hard to type, hard to remember, and not very professional.
Good: Bad:
Low cost. It's free. No domain names.
Good for family, hobby or personal sites. Few, limited, or no software options.
Free email is often an option. Limited security options.
Limited or no database support.
Limited technical support.


Shared (Virtual) Hosting
Shared hosting is very common, and very cost effective.
With shared hosting, your web site is hosted on a powerful server along with maybe 100 other web sites. On a shared host it is common that each web site have their own domain name.
Shared solutions often offer multiple software solutions like email, database, and many different editing options. Technical support tends to be good.
Good: Bad:
Low cost. Cost is shared with others. Reduced security due to many sites on one server.
Good for small business and average traffic. Restrictions on traffic volume.
Multiple software options. Restricted database support.
Own domain name. Restricted software support.
Good support


Dedicated Hosting
With dedicated hosting your web site is hosted on a dedicated server.
Dedicated hosting is the most expensive form of hosting. The solution is best suited for large web sites with high traffic, and web sites that use special software.
You should expect dedicated hosting to be very powerful and secure, with almost unlimited software solutions.
Good: Bad:
Good for large business. Expensive.
Good for high traffic. Requires higher skills.
Multiple domain names.
Powerful email solutions.
Powerful database support.
Strong (unlimited) software support.

Collocated Hosting
Collocation means "co-location". It is a solution that lets you place (locate) your own web server on the premises (locations) of a service provider.
This is pretty much the same as running your own server in your own office, only that it is located at a place better designed for it.
Most likely a provider will have dedicated resources like high-security against fire and vandalism, regulated backup power, dedicated Internet connections and more.
Good: Bad:
High bandwidth. Expensive.
High up-time. Requires higher skills.
High security. Harder to configure and debug.
Unlimited software options.

Your Checklist
Before you choose your web host, make sure that:
The hosting type suits your current needs
The hosting type is cost effective
Upgrading to a better server is a possible solution
If needed, upgrading to a dedicated server is possible
Before you sign up a contract with any hosting provider, surf some other web sites on their servers, and try to get a good feeling about their network speed. Also compare the other sites against yours, to see if it looks like you have the same needs. Contacting some of the other customers is also a valuable option.



Web Hosting E-Commerce
If you are selling a product or a service, e-commerce might be a smart way to do business.

Internet Commerce
E-Commerce is about selling products or services over the Internet.
If you are selling a product or a service, e-commerce might be a smart way to do business. Over the Internet you can reach a large number of customers.


E-Commerce Systems
It is not a very good idea to build your own e-commerce system. Some (larger) companies might do it, but we will not recommend it if you run a smaller business. Building an e-commerce system is a complicated process, with the potential for a lot of errors.
You might buy a ready-to-use system and run it on your own server. Many systems are available on the market today, and most of them will cover your basic needs for order management and processing. But again, if you are not familiar with hosting your own web site, starting with an e-commerce site is not the right thing.
The best solution, in our opinion, is to find a hosting provider that offers an e-commerce solution.

Hosting Providers
E-commerce covers a very huge range of products. With different hosting providers you will find anything from very simple to very complex solutions.
Most providers will offer a simple and inexpensive solution that allows you to run your own "virtual store".

USE VOIP SERVICE ON MOBILE PHONE

VoIP in general is a very wonderful invention because it does not just make calls cheaper only but makes it possible for you to use your number in all the countries.
Fring is a mobile internet community and communication service that allows friends to connect, share experiences and enhance their online communities together.
MAJOR CHALLENGES FOR TRADITIONAL VOIP
Internet Connection
Another drawback of VoIP service is its frequent reliance upon another separate service - an Internet connection. The quality and overall reliability of the phone connection is entirely reliant upon the quality, reliability, and speed of the internet connection which it is using. Shortcomings with internet connections and Internet Service Providers (ISPs) can cause a lot of grief with VoIP calls. Higher overall network latencies can lead to significantly reduced call quality and cause certain problems such as echoing.
VoIP isn't entirely reliant upon internet connections, however. VoIP systems can also utilize regular telephone lines and business-grade connections like T1's for voice service. A few business VoIP Providers offer dedicated point-to-point T1 connections, thereby not relying on an internet connection for service. Although residential VoIP service typically uses only an internet connection, business-grade VoIP service can use a variety of connection methods to provide ongoing phone service.
Power outage:
Power outage is another problem that the traditional VoIP have faced these pasted years, but with the introduction of fringe some of these things don’t affect us anymore. With the aid of fringe on your phone you can use voip, sip etc. Without experiencing power outage no connecting it to an external hardware, you can just use it direct from your mobile phone and not just that you can also make your normal GSM number to become the number that will be used to reach and majority of the mobile service providers provide free gprs connection for the voip so far as u\you are using it through the phone.
Using your handset′s internet connection, you can interact with friends on all your favourite social networks including Skype®, MSN Messenger®, Google Talk™, ICQ, SIP, Twitter, Yahoo!™ and AIM®. You can listen to music with your Last.fm friends, check out what each other are up to on Facebook, and receive alerts of new Google Mail.
As well as its social appeal, fring also lets you make affordable local and international calls to landline and regular cellular numbers using your Skype Out/Skype In account or almost any internet voice service (SIP) such as SIPNET, EuteliaVoIP, VoIP VoIP and VoIP Talk, even from non-SIP enabled handsets. To sum it up, you'll not only make your phone more useful, you can also save money. This guide will help you get started.

A Nokia 6630, 6680, 6681, 6682, N70, N72, N90 or s60 handset and
• Internet GPRS, EDGE or 3G data connection (Not a WAP connection) on your mobile handset.
You need to sign up with one of this VoIP such as www.skpe.com,fring.com,icq,yahoo,googletalk.etc and keeps the user id.
SETTING UP STEP BY STEP ON FRING
Go to www.skype .com sign up to receive user id {you may sign up with other online application for their id as well}
go to www.fring.com to start downloading
 Click on download, a form will come out fill it. sms will be sent to you after filling it. when filling the form give full information including your number and country code
 in the country field select your country
 In mobile number, fill in your normal phone number using your starting with your country code. e.g. (234)8067351205. This becomes your international number.
 your international number is your fring id
 Supply your email. The confirmation screen will come out and sms will be sent. If you don’t get the sms, enter your phone number correctly and try again.
 The sms will come like this, http//www.fring.com/app/w.php?userid=95674434 & code=467889’’, notice the sms must be highlighted if not enable the feature available in the options menu of your sms message!
 On your handset open sms and click on download link.
After clicking the following appears:
‘’connection to server needed’’,
Connect?
 click ‘’yes’’ use your left soft key to begin download process, within a few seconds the handset accesses the website ,fring is downloaded to your handset and you are ready to begin the installation process.
 at the end of the downloading process.
 At the end of the downloading processes the following screen with appear: security warning unable to verify supplier, continue anyway? Click ‘’yes’’. Your mobile security is not being compromised in anyway.
 The following screen will open when you click yes: install fring?
 Click ‘’yes’’ using your left soft key.
 Then the following screen opens again: ’’install’’, view certificate’’, ’’view details’’.
 Select install and press ok using your left soft key.
 the installation begins and the following appears:
Select memory:
ph. memory[5904]
memory card[1507]
select the memory you will like to use and press ok.
 Automatic search for access points may begin. the following appears:’’ automatic search for access points’’
 If you will like it select press ok. Another screen will open which contains [Eula] end user license agreement s.
Scroll down read and press ok. After which a page opens: select access point:
• 3g portal
• orange internet
• internet 3g
• mms
• The specific access point may vary depending on your position in the world.
• select 3g/gprs not wap
• select fring username and password, once the installation is complete a message will appear briefly
• note; your fring user id is your complete international number
• Choose a username and password, may be nick name.
• Click next which allow you to add VoIP [account details] the option allows you to select any of this VoIP providers like Skype.
• Register wait for the sign in, once completed your contact s will appear.
• installation is finished, you are now ready to make your free calls
• you can decide to import your contacts to fring to make it easy for you
• Whenever you open fringe you are automatically signed in. it’s easy to use.

COMPUTER PERFORMANCE-HOW TO SPEED UP YOUR COMPUTER

Windows Ready Boost can use storage space on some removable media devices, such as USB flash drives, to speed up your computer. When you insert a device with this capability, the AutoPlay dialog will offer you the option to speed up your system using Windows Ready Boost. If you select this option, you can then choose how much memory to use for this purpose. However, there are some situations where you may not be able to use all of the memory on your storage device to speed up your computer.
Some universal serial bus (USB) storage devices contain both slow and fast flash memory, and Windows can only use fast flash memory to speed up your computer. So if your device contains both slow and fast memory, keep in mind that you can only use the fast memory portion for this purpose.
The recommended amount of memory to use for Ready Boost acceleration is one to three times the amount of random access memory (RAM) installed in your computer. For instance, if your computer has 512 megabytes (MB) of RAM and you plug in a 4 gigabyte (GB) USB flash drive, setting aside from 512MB to 1.5GB of that drive will offer the best performance boost.

Saturday, July 31, 2010

INSTALL A WIRED NETWORK ADAPTER

Network adapter a device that connects your computer to a network. Sometimes called a network interface card (NIC).To connect to a network, your computer needs a network adapter. Fortunately, most computer manufacturers know that connecting to the Internet or other computers is important to computer users, and they include a network adapter with your computer..If you need to add a network adapter, first choose which method you want to use to install it. Most people prefer to use a USB (Universal Serial Bus) network adapter, because it's easy to install. If you have a portable computer, you might find a CardBus (also known as PCMCIA or PC Card) or CF network adapter better meets your needs. If you have a desktop computer with the proper amount of available space, you may also have the option of adding an internal network adapter.
The instructions you follow to install a network adapter depend on how you connect it:
Install a wired USB network adapter.
Install a wired CardBus or CF network adapter.
Install a wired internal network adapter.

How to Determine If You Have a Network Adapter
Many newer computers have a network adapter built in that you can use to connect to a wired network. If you want to install a wired network adapter and aren't sure whether your computer already has one, look for a network port on the back of the computer. Network ports resemble phone jacks, but they are slightly larger and have eight pins inside.
To See What Kind Of Network Adapters May Already Be Installed In Your Computer.

1. Click Start and then click Control Panel.
2. Click Network and Internet Connections.
3. Under or pick a Control Panel icon, click Network Connections.
4. Microsoft Windows displays your network adapters. If an adapter has a red X over it, it is disconnected. If the Network Connections window is blank, your computer doesn't have a network adapter.
If you already have a network adapter, you are ready to configure your network.

How to Install a Wired Usb Network Adapter
Connecting a USB network adapter is as easy as plugging in headphones.
Once you have the adapter
If your USB network adapter came with software, insert the CD or floppy disk into your computer, and follow the manufacturer's instructions to install the software.
Connect the network cable to the network adapter.

Connect the other end of the network cable to your networking equipment.
If you had to shut down your computer to get to the USB port, you can now turn on your computer. Windows detects and installs the new hardware, and then displays a notification informing you that the hardware has been successfully installed.
If you need to connect a computer in a different room from your networking equipment using a wired connection, read how to set up a wired network. If you are using a wireless connection, read how to set up a wireless network.

How to install a wired CardBus or CF network adapter
Most portable computers have either a CardBus or CF card slot. (They're the same thing, but the CF card slot is slightly newer and smaller.) CardBus and CF cards are more convenient than USB network adapters for portable computers because they are stored within your computer. However, some network adapters stick out from your CardBus slot.
Before installing, you need to buy a wired CardBus or CF network adapter.
Once you have the adapter
If your network adapter came with software, insert the floppy disk or CD into your computer, and follow the manufacturer's instructions to install the software.
Insert your network adapter into the slot on your computer.
Connect the network cable to the network adapter.
Connect the other end of the network cable to your networking equipment.
Within a minute or so, Windows detects and installs the new hardware, and then displays a notification informing you that the hardware has been successfully installed.
If you need to connect a computer in a different room from your networking equipment using a wired connection, read how to set up a wired network. If you are using a wireless connection, read how to set up a wireless network.

How to Install a Wired Internal Network Adapter
Internal network adapters can be more complicated to install than USB network adapters, and they can only be installed in desktop computers that have a space (generally called a slot) available for you to add the card.
Note: If you are not comfortable opening your computer's case, you should have internal hardware installed by a professional.
Once you have the adapter
Open the packaging and read the instructions.
If the network adapter came with a CD or floppy disk, you should insert the CD or floppy disk into your computer, and install the software prior to connecting the hardware.
Shut down your computer by clicking Start and then clicking Turn off Computer. Then click Turn Off.
After your computer shuts down, make note of where each cable is connected to the back of your computer. It's handy to tape a small note on each cable with a number or letter, and put a matching note next to the spot on your computer where the cable was plugged in. Then unplug all cables from your computer.

Lay your computer on a flat surface, like a desk or table. Remove the side panel from your computer's case. Depending on the case, you may need to remove screws at the back of your computer.
With the side panel removed, you can see the inside of your computer. Identify an available slot that fits your card. If necessary, remove the small metal panel protecting the opening for the slot at the back of your computer, and save the screw.
Touch an unpainted portion of your computer's case to discharge any static electricity. Then carefully insert the network adapter into the open slot. Gently wiggle the card back and forth until it rests firmly in the slot.
Replace the screw that you removed in step 6, which will help hold the card in place.
Replace the side panel to your computers case.
Connect the network cable to the network adapter.
Connect the other end of the network cable to your networking equipment.

Reconnect all cables to your computer, start your computer, and log on to Windows. Windows detects and installs the new hardware, and then displays a notification informing you that the hardware has been successfully installe

FORMAT YOUR SYSTEM-GUIDE ON HOW TO FORMAT YOUR SYSTEM AND RECOVER YOUR FILES.

Formatting your system is a lot easier than you could ever imagine. What you are actually formatting is your hard disk. Formatting erases the files on your hard disk but in the process I will teach you will show you how to restore your files after it is been crashed. Before you start up this process I will strongly advise you to connect your computer to a power source to avoid your system tripping off during the process. The need to reformat our computer arises mostly when our start up boot drive have been damaged, some are due to wanting to upgrade or create a multi-boot system. But in this article we will be looking more into clean installation and repair of your operating system, so as to recover files or delete them during installation of a new operating system using a BOOT CD/DVD.
THINGS YOU WILL REQUIRE TO FORMAT OR REPAIR YOUR COMPUTER (HARD DISC)
• The first thing you will need is a windows installation disc which is popularly known as BOOT CD.
• The next thing that is important is your product key. Necessary to complete the format or repair process.
The process of formatting is known as clean installation thereby you will lose all your files but I will show how to do both.

First thing is to put on your computer and insert the ‘boot CD’’, then restart your system. Some computers might automatically offer the option to boot from CD if they detect a bootable CD in the CD-ROM drive. If so, when you start the computer with a bootable CD in the CD-ROM drive, you'll see the message "Press any key to boot from CD." Otherwise, you can set your computer to boot from CD by using the setup program for your computer's BIOS (basic input/output system). Here's how:
 When you first start the computer, look for a short message telling you which key to press for setup. For example, some computers will have this message: Press DELETE to enter setup.
If your computer doesn't give you such a message, try pressing these commonly used keys during start-up:

DELETE
F1
F2
F3, then F2
F10
F12
CTRL+ALT+ESC
CTRL+ALT
ESC

If graphics appear during start-up, pressing ESC often makes the graphics disappear so that you can see the correct key for entering BIOS setup.
When you see the message, quickly press the indicated key. You will enter a DOS-like program that consists of one or more screens. You probably won't be able to use the mouse or touch pad while in this program. BIOS programs vary widely, but look for an option called "Boot order" or something similar.
Set the boot order to boot from CD before booting from the hard drive.

Some newer laptop computers have a Windows-based utility for configuring the BIOS. If your computer won't boot from a CD, refer to the section titled "Other Setup-related tasks" for information about starting Setup from the command prompt.
As the [(BIOS) basic input/output system] opens, then use your arrow keys on the key board to select to boot from the CD/DVD ROM.
Then hold your CTRL and ALT keys together for some seconds and leave it. This opens the windows setup in the BOOT CD/ DVD. But if your system has not completely crashed and the BIOS is not opening as I told you hold down CTRL and ALT and windows setup will appear.
On the Where do you want to install the windows page, click Drive options (advanced). Select the partition where you want to install Windows, and then click Format. This erases all files on the selected partition, so you can install Windows on a clean partition or click R to repair.

When the windows setup opens if you want to do clean installation click on ENTER but to repair your system where your files are not deleted click on R.

As the repair process continues, your files will be copied, this could take a longer time if you have much files on your computer.
After that the installation continues, another page will pop up requesting for the product key, so check for the product key of the boot CD/DVD and type it in and continue with the installation.
The please read the license terms page, click accept and continue.
Some other instructions will come up; just follow them they are easy to understand and complete the recovery process.
You will find out your information is still the way you left it.
Open MY COMPUTER.
Open LOCAL DISK (C). Browse through the hard disk
But as I told you I will show you how to recover files from clean installation process, lets continue, after installing the new operating system go to HARD DISK and you will see a folder WINDOWS.OLD here you will recover your files, as for your drivers that uninstall still under HARD DISK you will find another folder named SWSETUP, all your drivers are there.

WHAT TO DO IF YOUR COMPUTER HANGS OR SHOW A BLACK SCREEN

Your computer hangs or stops responding and displays a black screen
When you try to upgrade to Windows XP, your computer might stop responding (hang) and a black screen might be displayed. This is usually caused by hardware or software that is incompatible with Windows XP.
Note: Before beginning Setup, you should compare your system's hardware to the Hardware Compatibility List. You can also find information about each of your computer's devices (such as printers, scanners, and so on) at the device manufacturer's Web site, in the Windows Catalog:
Text version of the hardware compatibility list (for all operating systems)
Text version of the Hardware compatibility list (for Windows XP only
The Windows Catalog
You can get to all of the above from Windows Hardware and Driver Central
If your computer stops responding and displays a black screen during Setup, follow these steps:
Wait at the black screen for 10 minutes to make sure that the computer does not continue with the Setup procedure. Watch the hard drive indicator to see if there is any disk activity. Setup might resolve the problem on its own.
Restart the computer to see if it stops again at the same place during Setup. Occasionally, Setup will proceed farther than the last time it stopped responding. If this occurs, restart your computer several times so that Setup will finish.
If steps 1 and 2 don't work, to revert back to Windows 98 or Windows Millennium Edition, restart the computer and choose the option to Cancel Windows XP Setup. If cancelling Windows XP Setup is not an option when you restart your computer, see step 5.
After you revert back to Windows 98 or Windows Millennium Edition, uninstall all virus protection programs, uninstall all boot manager programs (such as GoBack), and then perform a clean boot of your computer.
If the upgrade fails again, there might be a hardware incompatibility issue. You can try to disable ACPI functionality. To do this, when your computer restarts, watch for an option to press F6 to install SCSI drivers. On this screen, press F7 (not F6).
If Setup continues to stop responding, disable any unnecessary hardware. Remove any USB devices, remove or disable network cards, sound cards, and serial cards, and then restart Setup.
If you continue to receive this error message, you might need to flash (update) the BIOS on the motherboard. Please refer to the manufacturer of your computer or to the motherboard Web site for information about how to flash the BIOS.
Warning: Do not attempt to flash the BIOS unless you are an advanced user. Doing this incorrectly can make your computer unusable.
If a BIOS update does not resolve the issue, or if you are unable to obtain an updated BIOS version for the computer, you might want to install Windows XP with a Standard PC Hardware Abstraction Layer (HAL). To do so, press F7 (not F6) when you are prompted to press F6 after Setup restarts the computer for the first time.

Domain names-introduction for newbie’s.

So many people are not familiar with what domain name is all about but I will teach you all you need to know, this is essential especially important for those that will want to earn income from the internet. I can assure you that owning your own domain name is better than hosting in a sub-domain free host, which tends to give more credibility and more traffic to your site and search engine friendly.

What is a Domain Name?
A domain name is a unique name for a web site, like YAHOO.COM or simply a location on the internet.
Domain names must be registered. When domain names are registered they are added to a large domain name register, and information about your site including your internet IP address - is stored on a DNS server.
DNS stands for Domain Name System. A DNS server is responsible for informing all other computers on the Internet about your domain name and your site address. Choosing a hosting solution should include domain name registration. Your domain name should be easy to remember and easy to type.
Now in the domain name weightloss.com, you will find out that it has the domain name ‘weightloss’ which describes the location and .com extension which is known as a top-level domain telling you the type of domain.

Registering a Domain
Domains can be registered from domain name registration companies such as http://www.dotdnr.com or www.register.com or even godaddy.
These companies provide interfaces to search for available domain names and they offer a variety of domain name extensions that can be registered at the same time.
Domain Name Registration provides registration services for .com .net .org .biz .info .us .nu .ws .cc .ng .mil .int domains which are known as top level domains. But the first respectively [.net .org .biz] are the best due to they are good when it comes to search engine optimization, the top-levels domains lets you know the type of domain as I told you earlier, for example .com is for commercial purpose while .org is for organization, .ng is for country {Nigeria} e.t.c, so the tell you what a domain name is all about while a domain name explains what its location is about.
Newer domain extensions such as .biz .info and .us have more choices available as many of the popular domains have yet to be taken. While .com and .net domains are well established and recognized, most popular domains with these extensions are already registered.

Choosing Your Domain
Choosing a domain is a major step for any individual or organization.
While domains are being registered at a record, new domain extensions and creative thinking still offer thousands of excellent choices. When selecting a name it is important to consider the purpose of a domain name, which is to provide people an easy way to reach your web site. The best domains have the following characteristics:
Short - People don't like to type! The shorter your domain, the easier it is to reach and the less are the chance the user will make a typographical error while typing it.
Meaningful - A short domain is nothing without meaning, gt56nhi6er.com is only 10 characters long but would not be easy to enter or remember. Select a domain that relates to your site in a way that people will understand.
Clear - Clarity is important when selecting a domain name. You should avoid selecting a name that is difficult to spell or pronounce.
Exposure: names that are short and easy to remember are an asset. In addition to humans viewing your domain, you should consider search engines. Search engines index your site and rank it for relevance against terms people search for online. In order to maximize your sites exposure, consider including a relevant search term in your domain. Of course, this should only be considered if it still maintains a short, clear and meaningful domain.


False Domain Names - Directory Listings
Some providers will offer you a unique name under their own name like: www.yourhome.com/myhome/
This is not a real domain name, it is a directory - and you should try to avoid it.
These URLs are not desirable, especially for companies. Try to avoid them if you can afford to register a domain. Typically these are more commonly used for personal sites and free sites provided by your ISP, you may have seen www.theircompany.com/~username as a common address, this is just another way to share a single domain and provide users their own address.
Open competition in domain name registration has brought about a dramatic decrease in pricing so domain sharing is far less common since people can register their own domains for only $15 per year.

Expired Domains
Another source for domain registrations is expired domains. When you register a domain, think of it as a rental, assuming there are no legal or trademark issues with the domain name, you are free to use it as long as you continue to pay the yearly fee (you can now also register in advance as many as 10 years). Some people register domains as speculators, hoping that they can later sell them, while others may have planned to use a domain and never had the time. The result is that domains that were previously registered regularly become available for registration again. You can see, and search through a list of recently expired domains for free at http://www.dotdnr.com. If you wish to register an expired domain you pay the same fee as you would for a new registration.

Use Your Domain Name
After you have chosen - and registered - your own domain name, make sure you use it on all your web pages and on all your correspondence, like email and traditional mail.
It is important to let other people be aware of your name, and to inform your partners and customers about your web site.

LAPTOP SECURITY-HOW TO PROTECT YOUR COMPUTER

Securing your computer and the information that are contained are of great importance. Most of us store official document on their laptop while some others store non-official documents in their laptop, whatever case it might be you will agree with me that to secure our laptops is of great importance or even our desktop computer.
 The first thing to do to ensure that your laptop is secure is to have a good antivirus and antispyware installed on your laptop and always ensure that it is always up to-date. While installing the antivirus set it in such a way that it will automatically scan your computer and that it will automatically update itself when you are on the internet. Make sure that your computer is scanned at least thrice a week if not daily.
 External drives: - please do not put every external drive for example flash drive that you see on your laptop, whether that of your friends or whomever that owns it, but if it is compulsory that you put the flash drive in your laptop please scan it before you use it on your laptop to ensure that there are no viruses or worms. For your information flash drives are very good carriers of virus and worms, so avoid the use of different flash drives on your laptop.
 Wireless network:- if you use wireless network at home or office try as much as possible to ensure that you secure the connection by encrypting it. When encrypting your wireless network do not use 64-WEP encryption but rather use 128-WEP to encrypt your wireless connection. This will make it difficult for intruders to hack into your wireless network.
 Cookies:- when you visit a website, cookies of the website you visit are left in your browser, by the next time your are visiting the website they will be able to access your computer through the internet, so try to remove all necessary cookies from your computer, so as to prevent unauthorized access to your laptop.
 Spam messages:- do not open spam messages sent to your email address due to these message carry viruses and worms that can affect your laptop and don’t ever try to reply spam or scam messages sent to you because you will be confirming your email address for the spammers.
 Do not reply most messages sent to email address claiming to be yahoo support centre or Google support centre telling you to click on links that they put on the messages, that if you do not do so that your email address will be close, these messages are from people trying to get your password for your email address, so be warned.
 Encrypt your document with password so that people do not have access to them when they log on to your laptop, though this can be done in different ways but with Microsoft word 2007 it can be achieved easily.
 Do you know that somebody can have access to your to your administrator account just by logging on to Guest or any other account on your system? Well believe it or not this very much true, to avoid people access your private files from other accounts hide your folders and they will not be able to see your folders or files.