Friday, December 26, 2008

Turn Off Internet Explorer Content Advisor

How do I get rid of Content Advisor in XP Pro? I started it accidentally & is a real pain on Internet.

Content Advisor is possibly one of the most poorly implemented filtering solutions available for Internet Explorer. If the password is lost you need a registry hack to get rid of the password. Disabling Content Advisor retains the password you set when it was created (or hopefully you set). If the rating system gets corrupted it causes otherwise safe sites to become inaccessible. Fortunately you can override Content Advisor if you need to.

If you know the password for Content Advisor, Open Tools > Internet Options from the IE menu, click the Content tab and click the Disable button. This will prompt you for the Supervisor password. If you never created a Supervisor password, leave this blank and click OK. If you did create a password, enter the password to turn off Content Advisor.

If you lost the password for Content Advisor, you need to edit the Windows Registry to reset the password to nothing. From Start > Run type regedit and click OK.

In the Registry Editor expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, expand CurrentVersion, expand policies. Click on the Ratings folder to expose the Content Advisor registry keys. Highlight the key called Key and delete it either with your delete key or by right-clicking and choosing delete.




Close Registry Editor. Close all instances of Internet Explorer. Open IE and choose Tools > Internet Options from the menu, selecting the Content tab for the Content Advisor. Click the Disable button. You will be required to enter a password in order to proceed. Create a password to turn off Content Advisor and click OK. To get rid of the password, you can repeat the steps above. Your Content Advisor is now turned off.

Sunday, November 16, 2008

What is Port Forwarding


Port forwarding is the literal act of forwarding a network port from one single network to another. This networking technique is used to allow external users to reach ports on private IP addresses from the outside via a router. An example of port forwarding would be to allow remote computers, such as public machines on the internet, to connect to a specific computer inside a private LAN. In typical home networking setups, internet access is through a DSL or Cable modem and these modems are commonly connected to a router. The router is then connected to several networked computers by WiFi or Ethernet. When communicating online, the router is the only device that can be seen on the internet as it holds a public IP address, but all computers behind the router will be invisible. Port forwarding is necessary for the router, as it will need to distinguish which direction to send information received from both the internet and the networked computers. For more information on Port Forwarding and Routers, check out PortForward as they are an excellent source of information hundreds of types of different router models. If you are looking for corporate support for router troubles and port forwarding, contact ComputerServiceNow for Cisco Router Help and choosing the right routers and firewalls.

Wednesday, November 12, 2008

I Spy with My Eye-Fi


It is like out of a James Bond movie, a wireless SD card that sends your pictures to your computer at home! It’s much faster than emailing pictures from your cell phone. All Eye-Fi Cards come with everything needed to set up and connect to your home Wi-Fi network, then insert the card into your digital camera and start capturing memories. It stores pictures like a regular SD card and as soon as you come into your wireless network your camera automatically downloads your pictures onto your computer at home. Eye-Fi Card works with 802.11g, 802.11b and backwards-compatible 802.11n wireless networks Eye-Fi software works with Windows XP, Windows Vista, Mac OS X (10.4 and 10.5) Eye-Fi software works with Internet Explorer 6 and 7 (Windows only), Firefox 2.0 (Windows and OS X) and Safari 3 ( OS X 10.4 -10.5) Eye-Fi card requires an Internet connection for setup and a wireless router with DHCP enabled for wireless transfers Eye-Fi Card works with virtually all digital cameras that accept SD memory cards. Here is a list of compatible >cameras Easy download is not the only feature, it also has crime fighting features! A lady who was vacationing in Florida was devastated when her camera bag was stolen from a restaurant when she accidentally left it behind. When she got home she not only received her vacation pictures but also the pictures of the thieves who actually worked at the restaurant! While the SD cards run about $100.00 a piece, as a photographer myself I can appreciate being able to download my pictures from a shoot location to my computer at home. It could mean not carrying extra SD cards, providing unlimited picture taking. Not to mention that if stolen my camera could eventually find its way back home.

Tuesday, November 11, 2008

Gmail Voice And Vİdeo Chat

google’s e-mail service Gmail launched Gmail Voice And Video Chat. to make this service work the only thing you must do is to install plugin from:
http://mail.google.com/videochat
I really appreciate for this useful service to google.As a person who uses gmail and gtalk every minutes of life.We as gmail users, we really need such a useful services. And i hope there will be more useful services like Gmail Voice And Video Chat



Monday, September 22, 2008

5 Tips To Keep Hackers From Connecting To Your Wireless Home Network and Stealing Your Identity

Drive up and down any neighborhood with a Laptop and wireless network card and chances are very good there is an unprotected wireless network waiting for anyone to connect. Imagine the hacker or your neighbor who has been using your connection and possibly capturing all data being transmitted over the Network. Your Email, Bank and Credit Card account information vulnerable and out in the open for anyone to steal.

If this sounds like your home wireless network, it's time you put security in place and lock out unwanted guest. Beyond the oblivious security measures, changing and disabling SSID broadcast, turning off your wireless router when not is use, these 5 tips will secure a home wireless network in layers, and give the boot to even the most seasoned professional.

Tip #1 - Do not use DHCP - Using DHCP is very convenient, especially for intruders. DHCP automatically hands out IP addresses to any who successfully connects to your Network. When disabled, every computer or device must be manually assigned an IP address. All computers, printers and devices on your network will need to be manually configured with static IP addresses. The threat of just handing out access is eliminated and you gain more control over who can connect to the network.

Also consider changing the router local IP address to something other than 192.168.1.1 that most wireless routers are configured by default. Use an address of 10.0.0.x for the router and for assigning IP addresses to devices on your network. Changes to the defaults set by the router manufacture will help keep intruders guessing and keep them off the network.

Tip #2 - Change The Router Default Password - While this may seems like the most logical task when setting up a wireless router, many people ignore changing the password. You will be surprised how many people think just using encryption on their wireless network will prevent someone from gaining access to your router.

With router vendors using well known default passwords such as admin for Linksys, Dlink and Netgear, encryption will not stop intruder access to the administration interface and gaining access to more than just your Network.
Best practice is to change your password using a complex password. If your name is Joseph, you can easily mix alpha, numeric, and special characters to make a password you will never forget such as J0s3ph!r0ut3r*

Tip #3 - Implement The Strongest Form Of Encryption - This can potentially be the weak point of your Network, since wireless signals transmit over the airways. A hacker does not need to be connected to the Network to steal data. Use the highest encryption available. such as WPA-Personal or WPA2 with a long pass phrase mixed with alpha,
numeric and special characters. Ignore anyone who advises you to at least use WEP, which is a very weak form of encryption.

WEP (wireless encryption protocol) is one of the earliest form of encryption and the easiest to break. You will be at risk by not upgrading to a better wireless router, that offers newer encryption technology. If you run a home business, or use online banking, there is no excuse to protect your self by making a small investment for security.

Tip #4 Enable MAC Filtering: A MAC (Media Access Control) address is a unique identifier, similar to fingerprints for people. MAC's are assigned during the manufacturing of a network device, such as a network card or Wireless adapter. Enabling MAC Filter allows you to control which wireless-equipped Computers may or may not communicate with the Router depending on their MAC addresses and not allow any Computers that have not been added to the list.

Tip #5 - Secure your Computer - Gaining access to your home network from your router is not the only entry point that exists. The sites you visit and protocols used, if not trusted, can be an invitation to theft of identity.
What do I mean by protocol? An example of a protocol is HTTP, HTTPs, FTP, etc. When creating username and passwords on websites such as financial related sites should always use HTTPS. These sites may need to install Java applets or ActiveX controls which could contain malicious code that can create a backdoor into your network remotely.


Make sure the site is authentic by verifying the certificate used and never respond to emails that claim account information is needed. Avoid being tricked into thinking it is your financial institute or site where you made a credit card purchases. Antivirus and Spyware software should always be up to date as well as making sure your Computer has the latest patches installed.

Protecting your home today involves more than just deadbolts and alarms. With technology creeping into your house in the form of wires, cables and airways, securing your personal data today involves, information, knowledge and good common sense.

Saturday, September 20, 2008

Security: How To Secure Your Wi-Fi Network?

How to secure your Wi-Fi network?

Most wireless router you bought might have an installation CD by vendor, and the CD will walked you through setting up security on your router in a step by step guide or wizard. Probably you will never have to or by the way need to use it.

Actually I never install those CD because I find these programs cumbersome and my main reason is to avoid having multiple management applications which has nothing to do with my network.

So, my suggestion here’s how to set up security on your router without using a custom application.

STEP 1 > Open a new browser.

STEP 2> you may now type in the IP address of the router in your browser. The step here is where you could access to management system of your router. Due to different vendors, you need to lookup on your router's manual for the IP address (Usually its 192.168.0.1, 196.168.1.1 or 10.10.0.1 or something similar to those matches) and the default password for the router. Please bear in mind that every brand of router’s management GUI (Graphical User Interface) is different, I can’t show you every brand as I only have one brand here to work with, so I will just direct you towards those areas which you need to configure. Please take it easy and it’s not complicated, however you might need a bit of time to trial and error on your side. Try exploring around and find the appropriate section to manage. It's usually quite simple.

STEP 3> You should never forget this step to set a new administrator password. It’s always a good first step to start with to prevent you from forgotten it later on. The step to set here is often not located in Security section; you will need to take a look at Utilities, System Settings or User Management area. Find it and change the password immediately for any user account which is available.

STEP 4> Enable wireless security. To turn on your encryption, look under Wireless Security or equivalent tagged. The step over here will need you to either use WPA or WPA-PSK, this will only appropriate if devices on your network supported it. Otherwise you will need to use 128-bit WEP (refer to picture above). For WPA or WPA-PSK, you’d have to type in your passphrase/password, else for WEP you’d need to hit the generate key. Please note that you will need to write down your passphrase/password into a piece of paper or copy it to notepad application and transfer to a thumb drive, so that you can type/copy that password into your client machines.

STEP 5> Change your SSID. You shouldn’t make your SSID sound like “hack me”, this will probably be a default SSID, normally those did not configured their SSID will have their router name such as “linksys”, “belkin”, “aztech” or “dlink”. Try changing it to something menacing which will be a threat for them to connect. Example likes “virusgeek”, “iamvirus”, “virusspreader” or “hackingyou”. Probably you can think of something better than this. Remember you'll need this SSID when you browse through available wireless networks from your client machines. You'll find this setting under a menu called Channel or SSID.

STEP 6> Save your configuration by hitting “Apply Changes” or “Save Changes” or “Save Settings”. You will need to save every change you make to the router in order to take effect. Probably you must reboot your router multiple times during this procedure to be safe and secure.

Congratulation! You’ve covered the basics setting for you Wi-Fi network. If you would like to continue advanced up your wireless security, please go ahead and I think they’re more techie. If you are lost or paranoid, you could just turn off your SSID broadcasting. (Disabling SSID broadcasting will need you to manually type in the network name as it won’t show up in windows wireless network scan.) or alternatively you can turn on MAC address filtering which will only allow limits access to your network with a list of clients you specifically approve.

Friday, September 19, 2008

Wireless Network Security

Why Use Security?
If someone is able to wireless connect to your network from the road, near by parking lot, or adjacent house here are some things to consider. If they use your Internet connection for illegal activity, YOU are liable, not them. Also, once they are on your network, they may be able to open, delete, or change every file on your computers. There is also the possibility that the unauthorized user could spread viruses without them even realizing it.

So What Should I Do?
There are many ways to secure your connection. We are focusing on wireless security, so we will make a simple adjustment to your router. The simplest way to secure your connection is by using WEP (Wireless Encryption Protocol). Before I go any further, many hackers can find ways around this protection. It is not the best choice for large businesses (over 100 employees), but for home and small business users, this will work just fine.

Step 1 (Configure router):
Depending on your router, the specifics of this step will differ. You need to log into your router. This is done by opening your Internet Browser (Internet Explorer, FireFox, Safari, etc.) and putting the IP Address of the router in the address bar (the address bar is where you type web sites such as google.com). This IP address will either be 192.168.0.1 or 192.168.1.1; if you are unsure try both. Once you type the correct one in (and press 'Enter'), a pop-up will ask you for your user name and password. If you have never changed your password, then a default was set for you by the manufacturer. This is not the same user name and password as your computer or Internet Service Provider. If you do not know your default password, find it by clicking here.
Once logged in, look for the wireless section. This is often a button or tab found on the main page. For DLink routers there will be a button on the left menu. Now look for wireless security. For DLink routers it will be on this page. You should see a drop-down-menu. Select WEP (you may also see other choices such as WAP). Depending on your router, you will see some or all of these options. Set them as follows:


Authentication: Open WEP Encryption: 64bit Key Type: Hex Key1: PICK A 10 DIGIT NUMBER


The above 'Key' is your wireless network password. Anyone that uses your wireless connection will need to know it. Normally, you are only required to put it in your computer once and then it will remember it.

Step 2 (Computer Setup):
Now go to your wireless computer and try to connect to the network, it will ask you for the key. Enter it just as you did in the router.

Step 3 (Advanced Security):
If you would like more security then you can change some of the other options in the router. For example, instead of 64bit choose 128bit. Or instead of HEX choose ASCII. All routers are different and offer different levels of security. Basically, going to 128bit requires a longer password so it is harder for others to guess and going to ASCII requires a password with letters, not just numbers, so there are more possible passwords. You can change this around as much as you like and I do suggest changing to either 128bit or ASCII.


Note: For more information contact the manufacturer of the router. They often have a toll free number and will walk you through exactly how to do what you want. I suggest a DLink router because they have 24/7 support and are very helpful.

Thursday, September 18, 2008

Setting Up Your D-Link Wireless Network - Simple Steps to Follow

The Dlink wireless network setup is quite easy. All you need is a Dlink wireless router or a Wireless Access Point (WAP) and then you need the Dlink wireless adapter, one for each computer, which will connect to the router or the WAP. There are many components to a wireless network and it may include a broadband internet connection through a cable modem or DSL, an internet security option, wireless printers and faxes, wireless music and video players, wireless game consoles and controllers, and so on.


Dlink wireless network setup is easiest when all components are from Dlink because it ensures maximum hardware compatibility. All Dlink products come with a quick installation manual that makes it a snap to follow step-by-step instructions to get the network ready to go. There are also detailed user manuals that cover all the technical aspects of the router and adapter.

Wireless networks are quite convenient and neat because there is no mess of power wires and connecting cables but there are some things you proceed with the Dlink wireless network setup.

First thing to keep in mind is that no outsiders are able to connect to your network because by default the Dlink wireless network setup is open to everyone. You must replace all the default passwords with those of your own choice because the factory defaults are known to hackers. Default settings include the access point and adapters and passwords. There are many similar Dlink networks in the world and it must be expected that there is a high probability of your network being close to some adapter that is not part of your network. Hackers are constantly on the prowl looking for networks running on default settings because they are so easy to crack. All you need to do is create a new password and you are several times safer. Hackers are a constant threat to wireless networks so you must change the password before you open your network to the world.


During the first run of the Dlink wireless network setup you will be assisted by setup wizards. When you are answering the questions that will help you to configure the network you must make sure you change all the default values to customized ones. Just make sure that you don’t go overboard in choosing something so complicated that you yourself cannot remember it. As long as you go in for a reasonably complicated personalized setup you will be fine. Just do not choose common information like your family name, kids' names, date of birth and so on.

If you have more than one computer you wish to include in your wireless network then make sure the WAP or router is located central to all computers.

Tuesday, September 16, 2008

How to Improve the Speed of Windows Vista?

It seems the days of Windows XP are numbered, and soon people are getting accustomed to use Windows Vista on their computers. However, many users complain about the low speed of Vista. This is natural for people to look for a super fast speed, but a lot depends on your PC. So if you have a slow computer, you may find Vista a slower operating system than XP. But, if you follow some of the tips described hereunder, you may do a lot to optimize your PC and make Windows Vista work faster on it:

Increase your RAM
Before you go for Window Vista, it's a good idea to increase your RAM. You can increase it to 2GB of RAM to get your computer work faster.


Regularly Clean Registry
Just like Windows XP, your Vista registry can also be overloaded with unwanted entries, which can significantly hamper the speed of your computer. Therefore, it is highly recommended to run this registry scan regularly to improve Vista's speed.

Use ReadyBoost feature of Windows Vista
You can also use ReadyBoost, which is a new feature on Vista. If you want to run ReadyBoost, you need to insert a flash drive, and then select ReadyBoost.

Remove Spyware and Adware from your PC
Spyware and adware can prove fatal for Windows Vista, so you need to be very cautious! If the Windows Vista comes with enhanced safety feature, the adware has also improved. Therefore, you must get a Spyware and Adware scanner and use it regularly to prevent them attacking your system.

Upgrade Your Drivers
When you upgrade your computer to Vista from XP, you should also update all your drivers.

Monday, September 15, 2008

How To Backup Registry Files

Windows configuration information is in the registry. Here's a look at what's stored in the registry:

-Windows system configuration
-Hardware configuration
-Installed programs
-Types of documents each program can create
-User preferences

Registry files contain data in keys, subkeys, and named values. If the registry is not edited correctly, your system could sustain severe damage. Microsoft says you should backup registry files before editing the registry.

Registry files can be found in the following places:

Windows 2000, XP, Vista- C:\Documents and Settings\User Name\

Windows 2000, XP, Vista- C:\Windows\System32\Config\

Windows 95, 98, ME- C:\Windows\

Windows 95, 98, ME- C:\Windows\Profiles\

You can find registry files here:

Windows 95, 98 and ME- System.dat, User.dat, and Policy.pol

Windows NT, 2000, XP, Vista- Security, System.alt, Default, Sam, Software, System, Ntuser.dat

How to back up Windows registry files?

You are not allowed to back up registry files under Windows NT, 2000, XP, and Vista, while the system is running. Registry files are locked, so there is no way to reach these registry files. But, you can use an integrated Windows XP's System Restore option to backup your registry files.

1. Go to Start, and then go to Run.

2. In Open, type regedit, and then hit OK.

3. Locate and then hit the root subkey that contains all the child subkeys and values that will be backed up

4. On the File menu, hit Export.

5. In Save, select a location where you want to save the Registration Entries (.reg) file, type a file name in the File name box, and then hit Save.

Backing up registry files in Windows 95, 98, and ME is pretty easy. For Windows NT, 2000, XP, and Vista, it's much more difficult. A registry repair program will find the correct locations and back up all of your registry data in an automatic, quick and safe manner

Benefits of Microsoft Certification

Information Technology is a rapidly changing industry with constant changes in software technology. The IT industry is very volatile and demands very high quality of professionals. Preferably those who are internationally certified by I.T. Giants like, Microsoft Corp.

The adoption and use of new technology by the industry has led to continous change in manpower requirements. As a result, a professional needs to update regularly, to keep their skill sets industry-relevant. To keep up with the changing requirements of the Software Development Industry, an IT professionals/job-seeker should not only be aware of and gain knowledge of new products, but should also get Certified by the Industry Leaders on their products.


Some employers require or prefer certain MCP, MCTS, MCPD, MCITP certifications for specific jobs that involve Microsoft products and technologies. Other vendors have their own certification programs.

Microsoft Certified Professional- MCP refers to the broad certification program for Microsoft, although in previous generations it also referred to an individual candidate who had completed any one exam within the program (subject to some exclusions).

The MCP program offers multiple certifications, based on different areas of technical expertise. To attain these certifications, a candidate must pass a series of exams within the program. Some of the current certifications are Microsoft Certified Technology Specialist -MCTS (.Net 2.0), Microsoft Certified Professional Developer- MCPD (.Net 2.0), Microsoft Certified I T Professiol - MCITP (MS SQL 2005).

The Benefits of Microsoft Certification Courses

1. Industry recognition of your knowledge and proficiency

2. Logos and certificates to identify your MCP, MCTS, MCPD, MCITP status

3. Access to an exclusive MCP, MCTS, MCPD, MCITP member Web site

4. Exclusive discounts on products and services

5. Access to career-related tools

6. Invitations to conferences, training sessions, and special events

Sunday, September 14, 2008

MCSE 2003 Courses - An Overview

Microsoft Certified Systems Engineer (MCSE) certification requires you to clear all its exams to get Microsoft certified. MCSE 2003 courses cover the content of the Windows Server 2003 track of the MCSE certification exams.

As of July 2007, there are two types of MCSE certifications, MCSE on Windows Server 2003 or MCSE 2003 in short and MCSE on Windows 2000.


Here we will discuss about MCSE 2003 courses. MCSE on Windows Server 2003 certification requirements include six core exams and one elective exam to be passed by the candidate.

Out of the total six core exams there are four networking system exams, one client operating system exam, and one design exam. Exam 70-290, exam 70-291, exam 70-293 and exam 70-294 are the four networking system exam codes.

The sole client operating system exam you can choose any one out of exam code 70-620, exam code 70-270, and exam code 70-210. For the design exam too, you can choose any one out of exam code 70-297 and exam code 70-298. You can select any one of the large number of elective exam options available to you. You need to appear in and clear a different set of exams, if you wish to upgrade you MCSE 2000 certification to MCSE 2003.

Now comes the point of getting trained for these exams. Microsoft has divided each examination into different courses. This has enabled students and teachers to understand the demands of these exams. Overall, these MCSE 2003 courses can be pursued through mainly three means, namely classroom training, distance learning, and boot camps.

Different course sets of each exam provide an easy and systematic method to approach every exam. This results in better and deep knowledge of the subject.

Let us discuss the methods by which you can pursue the various MCSE 2003 courses.

If you have the time, regular classroom training is the best way to learn thtough all the MCSE 2003 courses. It will give you hands-on training and will refresh you with real-life experiences. Also, you will be able to interact with the teacher face-to-face. This will boost your confidence and resolve your queries.

But not everyone is able to enroll in a regular course. For such individuals, online courses are the best option. There is no restriction to attend classes at a specific time. You need not travel to reach the classroom location. Just sit at home comfortably and attend online classes at your own convenience.

All study materials are distributed electronically during online training. Chat rooms, discussion forums, one-on-one interaction with the instructor are some of the unique benefits of online MCSE 2003 courses.

Not even one out of the several MCSE 2003 courses is to be taken lightly. Study hard, achieve the MCSE 2003 certification, and advance in your career.

Friday, September 12, 2008

How to Create an XP Bootable USB Flash Drive

An XP bootable flash drive is a flash memory device that has been configured to allow you to boot up Windows XP on a computer by plugging in your flash drive device into the USB port. An XP bootable flash drive is highly useful for two purposes:

  1. Booting up XP to troubleshoot on any computer that permits the boot.
  2. Transporting Windows applications between different physical locations such as home and the office.

To create an XP bootable flash drive, you first need a computer that has BIOS that will permit you to configure its USB port as a configurable device. Then you need a flash memory drive that is set up to be able to act as a booting device. It might not be readily known at first if you have a flash memory drive that is going to boot; one thing to look for when you access a computer's BIOS is whether or not the plugged-in flash drive appears in the listed items on the setup screen. Hopefully this happens, and you can then select this as the first device to check during your boot sequence. Some computers might require that you hit F10 to select your flash memory device.

Assuming that you have the computer and the drive that you need, now you need to get the software that will permit you to condense Windows XP onto your flash memory device. This includes: PE Builder, which is easy to install just by following the directions; you need to install it into your root directory and make a folder in C:PEBUILDER3110a called SRSP1. This will enable you to download Windows Server 2003 Service Pack One to this place. There are only two files you need from it: setupldr.bin and ramdisk.sys. Don't extract anything else, because you may totally corrupt your current version of Windows if you do. Specifically, never run the Windows Server 2003 SP1 executable file.

Once you have these files, run your PE Builder CD (Windows XP Professional CD). Make sure you hold down the [Shift] key to prevent Autostart from launching the CD. Launch PE Builder manually. When the Source field on the main PE Builder screen, enter the letter of the drive in which you put the CD. Check to see that the Output box contains BartPE and that the "None" option is selected in the Media Output panel. Once you have all this squared away, click Build. You can watch the progress of the compression.

When it's complete you're prepared to format and copy the Windows XP Professional bootable image to the UFD with the BartPE USB Installer. Open a Command Prompt window and use the CD command to switch to the pebuilder3110a folder. Next, insert the UFD into a USB port; note the drive letter to which it is assigned, as you'll need to enter it into your next command prompt that you type.

Let's imagine that it was assigned to drive E. You will now type the following command (take note of the last letter in the command). pe2usb -f e:

When Bart is all done, you just hit any key to exit the program, and you have your XP bootable flash drive.

How to Get Rid of Spyware Completely

It's a fact that many hundreds of computer users search the web every day for guides which can show them how to get rid of spyware infections. The reality though is that no matter how much you search for ways that can how you how to get rid of spyware the only successful method is to use spyware removal tools. Now most of us don't know exactly what infections can do to a computer system and the fact remains that you will never be able to simply delete an individual file and relieve your computer of an infection. Want to find out why?

Many infections like spyware, adware, trojans and viruses have the ability to spread within a systems environment and this results in other system files and properties undergoing harmful modifications or changes. So the bottom line is that you need a PC security application which can detect the different individual signature patterns which are located within the various files on your system. If you are not willing to pay for a quality spyware removal tool then you must face the consequences because even if you can uninstall or delete an infectious program it does not mean the problem will be eliminated completely.

Infections like spyware and viruses can modify registry keys and this once again illustrates the need to use a tool which can remove these malicious entries. The symptoms one can experience with spyware infections include loss of performance or speed, program instability, frequent internet explorer crashes, pop up advertisements, new or removed desktop shortcuts as well as changed security settings. Once this malicious software is on your system it can capture personal information and send it to others around the internet so even though it might not destroy hard disk contents it is still a dangerous threat.

After having reviewed and test a number of anti spyware tools I highly recommend Xoftspyse which continues to receive much praise on the web for its solid infection removal abilities. If you want to scan your computer with the latest version you can download it directly at the link below.

Download Xoftspyse Here

Tuesday, September 9, 2008

IPv6 (Cisco) Training - Using the "ipv6 Access-class" Command

In a nutshell, the Cisco IOS "Line configuration" command named "ipv6 access-class" performs the same function as its predecessor the "access-class" command; except that it is IPv6-specific.

In other words, the "ipv6 access-class" Line configuration command is used to filter incoming and outgoing connections to and from a router based on an IPv6 access list.

Below is the proper syntax and example of using the command:

Syntax: ipv6 access-class ipv6-access-list-name {in | out}

ipv6-access-list-name - Is the argument that represents the name of an IPv6 access list. Names cannot contain a space or quotation mark, or begin with a numeric.

in - Is the keyword that means filtering will occur on incoming IPv6 connections.

out - Is the keyword that means filtering will occur on outgoing IPv6 connections.

Example:

router>enable
router#configure terminal
router(config)#ipv6 access-list ittechtips
router(config-ipv6-acl)#permit ipv6 host 2001:0DC8:0:4::2/128 any
router(config-ipv6-acl)#exit
router(config)#line vty 0 4
router(config-line)#ipv6 access-class ittechtips in
router(config-line)#end
router#copy run start

In the example above, notice that the router's prompt is in "Line configuration" mode when the "ipv6 access-class" command is being used; and filtering is occurring on incoming connections on virtual terminal lines 0 to 4 of the router based on the IPv6 access list named ittechtips.

Now, to disable the filtering of incoming and outgoing connections to a router, use the word "no" in front of the command like you see below:

router(config-line)#no ipv6 access-class

I hope this article was very informative and helped you quickly understand the usage of the "ipv6 access-class" Line configuration command. If you need to learn more; I suggest you visit my website, were you'll find the latest information regarding Cisco IPv6 Design and Implementation Techniques.

To your success,

Charles Ross, CCNP #CSCO10444244 is the owner of Ittechtips.com; where you'll find free comprehensive information and videos about IPv6 technology and how it works with Cisco Systems technology.

Sign-Up for "18 Free Videos" that will teach you IPv6 Address Representation In Under 10 Minutes! And, also learn more about the new "Cisco IPv6 Video Accelerated Training Course" at his website. http://www.ciscoipv6ittechtips.com

4 Fast Ways to Speed Up Your Computer

#1) Registry Cleaning

You may not know it, but a leading cause of computer sluggishness is excess "baggage" and other errors in the Windows registry. The registry stores data and information on all of your software and settings. Over time, the registry can become cluttered with broken links and other errors all of which will slow down your computer.

Using a registry repair software to clean your registry is the recommended course of action, and it's fast and easy. Registry repair tools are not standard software, but you can download many registry scanners for free. In fact, I've linked to the free downloads of my top choice registry cleaners in the link below.

#2) Disk Cleanup

Using the Disk Cleanup function is another way to help your computer run a little faster. The Disk Cleanup function removes temporary internet files and other program files that you may have downloaded. When you consider how much time you are on your computer and how many files we open and access each day, these internet files and program files can amount to an incredible amount of space over time. Disk cleanup can be run by launching it from your Windows system tools menu.

#3) Dish Defragmenting

Another easy way to speed up your computer is to use the Disk defragmenter. Generally, when the files on your computer are fragmented it takes more time for the computer to search and find and try to piece the files back together. The process is similar to the disk cleanup and can also be run from the Windows system tools menu. One thing to remember is as hard disks are very large these days, this option can take some time. If you are going to do it plan to let it run overnight.

#4) Uninstall Unwanted Programs

If there are programs installed on your computer that you are not using you may want to uninstall them from the computer. Depending on what the programs are, some of them can take up a lot of space and really impact the speed of your computer. If you delete one of the programs you are using in error, they can generally be re installed pretty easily, so not to worry. Getting rid of unwanted software can give you more space on your hard drive and speed up your computer.

As you can see, with a little bit of time and effort, you can speed up your computer and work more efficiently. Computers, like all machines require regular maintenance to run smoothly. These basic maintenance tasks will ensure that your PC is always running well and you are not delayed by frustrating problems.

Sunday, September 7, 2008

How to retrieve lost password on Windows XP

The following is the tutorial on how to retrieve lost or forgotten password in Windows XP. I'm not sure whether the commands used will work on any other Windows platforms, but it does in Windows XP.

1. Bofore restarting your computer and pressing F8 to get into Windows with "safe mode" environment, make sure you jot down all the information here.
2. You will notice there's Administrator account appears on the user menu. Logon to Windows through the administrator account. It won't request you for a password.
3. Go to Start menu and click on "run.." (Start>Run..) and type CMD.
4. At command prompt type in cd C:\Windows\System32 (assuming C is your drive where all Windows and system files reside).
5. Make a backup of your Logon.Scr file for safety purpose by typing in copy logon.scr Logon.bak.
6. After that type copy CMD.EXE logon.scr and choose Yes.
7. Finally type this following command to reset the password, net user administrator YourNewPass (assuming YourNewPass is your new password you want to change it to)
8. Restart your computer and logon with your new password.

“Forgot your password” links: Backdoor for Hackers

"Forgot your password?" features provide businesses and site owners a simple way to reset a forgotten password, provided he can verify his credentials by asking a few personal questions that should only be known to the rightful user. For years the typical question was, of course, the "Mother's maiden name" challenge. In recent years, additional challenges have emerged, such as asking the street you grew up on, your favorite pet, and grandparents' first names.

The question is whether are they all really secured? They were safe decades ago but not in this internet era, where abundant of information keep pouring in, your personal information drawn from your past is now widely available for public consumption. There's no statistical data to support this but there are isolated cases reported and even Paris Hilton is said to have fallen prey to the "what is your dog's name?" password reset hack. You may visit this great article on how it's done if you seek more proof.

The solution is clear; don't use data that can be easily guessed or easily discovered. You may twist the data a little (example: 1Hannah1 is the answer for "your mother's maiden name" question though the real one is Hannah or use completely different set of answers for those questions). Make sure to keep them written down and put in the safe place.

Friday, September 5, 2008

Windows Seven Pictures

Windows 7 will be released in 2010,probably Microsoft will postpone the release date of Windows 7.I hope Microsoft will give up copying Mac OS , and produce their OWN operating system.If you compare windows vista and Mac OS Tiger you will see lots of similarities.Anyway these pictures are REAL not fake.For more windows 7 pictures you check this windows 7 blog.





And everybody ,please give up using microsoft products since they are not safe .For the future of internet,please use Mozilla Firefox , and prefer Open Source operating systems.Really linux is 10000 times better than windows.And you pay nothing.And safe.Watch the video below to see what Bill Gates is planning to do with his new file called OOXML!

Tuesday, September 2, 2008

Telephone bill - this is a classic !!!

The phone bill was exceptionally high and the man of the house called a family meeting... On a Saturday morning... after breakfast...

Dad:
People this is unacceptable.
You have to limit the use of the phone.
I do not use this phone, I use the one at the office.



Mum:
Same here,
I hardly use this home telephone as I use my work telephone.


Son:
Me too,
I never use the home phone.
I always use my company mobile.


Maid:
So - what is the problem?
We all use our work telephones !!!!!

What is 3G?


Know the technology

Everyone may be knowing that the Apple's iPhone 3G has been launched in India . But many of us are not aware what is 3G. so let's have a brief look into it.

What is 3G?

3G is the next generation of wireless network technology that provides high speed bandwidth (high data transfer rates) to handheld devices. The high data transfer rates will allow 3G networks to offer multimedia services combining voice and data.

Additional features also include HSPA(High-Speed packet Access) data transmission capabilities able to deliver speeds up to 14.4Mbit/s on the downlink and 5.8Mbit/s on the uplink.

3G wireless networks have the bandwidth to provide converged voice and data services. 3G services will seamlessly combine superior voice quality telephony, high-speed mobile IP services, information technology, rich media, and offer diverse content.

What are the Advantages of 3G?

3G networks offer users advantages such as:

· New radio spectrum to relieve overcrowding in existing systems.

· More bandwidth, security, and reliability.

· Interoperability between service providers.

· Fixed and variable data rates.

· Always-online devices. 3G will use IP connectivity, IP is packet based (not circuit based).

· Rich multimedia services.

Apple's iPhone 3G

What are Some Disadvantages of 3G?

There are some issues in deploying 3G:

· The cost of upgrading base stations and cellular infrastructure to 3G is very high.

· Requires different handsets and there is the issue of handset availability.

· Base stations need to be closer to each other (more cost).

· Tremendous spectrum-license costs, network deployment costs, handset subsidies to subscribers, etc.

· High power requirements.

Wednesday, August 20, 2008

History of Wireless LAN

Below are the evolution of Wireless LAN
1970----------1985----------1991----------1997

1970 - ALOHAnet was developed at the University of Hawaii
1985 - Federal Communication Commission (FCC) announced authorized license-free spread spectrum wireless equipment in three ISM bands
1991 - The first IEEE workshop on Wireless LAN was held. Early wireless LAN products had also just appeared in the market and the IEEE 802.11 committee had just started its activities to
develop a standard for wireless LANs

1997 - Federal Communication Commission (FCC) announced authorized license-free spread spectrum wireless equipment in three U-NII bands

Friday, August 8, 2008

Wired LAN and Wireless LAN

Comparison between Wired LAN and Wireless LAN



About me

Hi,



I'm 26 years old Indian ,You can support me subscribing my free RSS feeds :) , Thanks!




Enter your email address:

Delivered by FeedBurner





Contact eMail : contact@graceinfosys.com
Find creative ways to gain experience

Networking Experience

The common lament of job seekers, that "employers only hire people with experience, yet the only way to gain experience is to get hired" applies in the computer networking field as well. Despite optimistic statements that one hears frequently regarding the number of available jobs in IT, landing an entry-level position can still prove difficult and frustrating.
More of this Feature
• Part 1: Networking Job Titles
• Part 2: Choices in Education

Join the Discussion
"Of course this is just my opinion, but I have found that experience is what most companies are looking for first. Certifications are second, and education is last."
-VMMNETADM

Related Resources
• Certification Resources
• Networking Career/Job Resources



One way to gain networking experience is to pursue a full-time programming or help desk "internship" during the summer months, or a part-time "work study" job at school. An internship may not pay well initially, the work may turn out to be relatively uninteresting, and it is very likely one will not be able to finish any substantial project during the limited time there. However, the most important factor to consider is the training and hands-on experience such a job offers. The mere fact a person invests their time in this way, demonstrates the dedication and interest employers like to see.

The better the position, the more likely multiple candidates will apply for it, even if the job entails only part-time work. A good way to "stand out" from the competition is to demonstrate prior work and accomplishments, even if these involve projects done on one's own time. A person can start with a class project, for example, and extend it in some way. Or they can create their own personal projects, experimenting with networking administration tools and scripts, for example.
Explaining Experience

One of the most overlooked skills in computer networking is the ability to explain technical information. Whether verbally, through email, or in formal writing, networkers that communicate well gain a significant advantage in building their careers.

For the beginning networker, the most obvious benefit of good communications skills is realized in job interviews. Being able to talk with people about technical subjects can be hard to do, but as one gains skill in answering impromptu questions, one builds confidence and relaxes, making one that much better prepared for career advancement. It is a good idea to periodically engage in job interviews for this reason, even if the position involved does not seem particularly appealing. Likewise one should also consider visiting local job fairs occasionally.
Technologies

One of the most common questions asked by beginning networkers is "Which technology should I focus on first? Microsoft? UNIX? Cisco? Novell?" As with certifications, preferences vary from company to company and person to person.

One way for a person to answer this question is to start with the technology that appears most interesting to them personally. Researching a company that one plans to interview with, and choosing a technology that the company deems important, is another way. Ultimately it probably matters little which networking technology one learns first. More importantly, one should acknowledge that technology changes rapidly, and that the person who can enjoy a successful career by learning about only one technology is rare indeed.
Focus on the Basics

Computer networking involves a certain number of fundamental technologies. These technologies form the basis of many networking courses. Regardless of the form of education one chooses to invest in, one's career will always benefit from deeper study of technologies like IP and TCP/IP, the OSI model, Ethernet, internetworking, and others listed on this site, whether through formal coursework or through self-study.
Conclusion

Some people have asserted that networking (and IT generally) is a "young person's game," and that companies generally prefer to turn over their employee base periodically, to bring in younger, more affordable workers. This concept might sound appealing to some, but if it were true, it would make networking careers less inviting to most people.

Realistically, the field of computer networking presents so much complexity, and involves such a wide range of technologies, that most serious companies should value both experienced employees and ambitious new employees highly. In fact, an effective career strategy involves seeking out more experienced people in one's field, and learning new skills from these mentors.

Many firms view four-years degrees as a sign of commitment to the field. Network technology changes very fast, so employers care both about a person's current knowledge and also their ability to learn and adapt for the future. Certifications effectively prove current knowledge, but college degrees best demonstrate one's general learning ability.

Self-study in networking is always effective and underrated by many. By making contacts with those in networking careers, either people in one's local area, or individuals or sites on the Internet, one can quickly acquire a wealth of information ranging from technical details, to advice on writing a resume, to advice on specific hiring companies, schools, and so on.

Best wishes for a successful career in networking, or whatever other field you may choose!

How to Become a Networker

Starting or building a career in computer networking
Many view computer networking as one of the best and "hottest" career fields available today. Some claim that a serious shortage of qualified people to fill these networking jobs exists, and these claims may lure some people into the fray hoping for an easy position with a fast-growing company.
Don't be fooled! Debates over the actual extent of any "shortages" aside, networking involves mostly hard work, and competition for the high-quality positions will always be strong. Continue reading to learn more about beginning or expanding a career in networking, and pick up some valuable job-hunting tips that also apply to many other types of technical careers.
Job Titles
Several types of positions exist in networking, each with different average salaries and long-term potential, and one should possess a clear understanding of these. Unfortunately, job titles in networking, and in Information Technology (IT) generally, often lead to confusion among beginners and experienced folks alike. Bland, vague or overly bombastic titles often fail to describe the actual work assignments of a person in this field.
The basic job titles one sees for computer networking and networking-related positions include


  • Network Administrator
  • Network (Systems) Engineer
  • Network (Service) Technician
  • Network Programmer/Analyst
  • Network/Information Systems Manager

The Network Administrator

In general, network administrators configure and manage LANs and sometimes WANs. The job descriptions for administrators can be detailed and sometimes downright intimidating! Consider the following description that, although fictitious, represents a fairly typical posting:

NETWORK ADMINISTRATOR - HOBO COMPUTING
"Candidate will be responsible for analysis, installation and configuration of company networks. Daily activities include monitoring network performance, troubleshooting problems and maintaining network security. Other activities include assisting customers with operating systems and network adapters, configuring routers, switches, and firewalls, and evaluating third-party tools."

Needless to say, a person early in their career often lacks experience in a majority of these categories. Most employers do not expect candidates to possess in-depth knowledge of all areas listed in the job posting, though, so a person should remain undeterred by the long, sweeping job descriptions they will inevitably encounter.

Comparing Roles and Responsibilities

The job function of a Network Engineer differs little from that of a Network Administrator. Company A may use one title while Company B uses the other to refer to essentially the same position. Some companies even use the two titles interchangeably. Firms making a distinction between the two often stipulate that administrators focus on the day-to-day management of networks, whereas network engineers focus primarily on system upgrades, evaluating vendor products, security testing, and so on.

A Network Technician tends to focus more on the setup, troubleshooting, and repair of specific hardware and software products. Service Technicians in particular often must travel to remote customer sites to perform "field" upgrades and support. Again, though, some firms blur the line between technicians and engineers or administrators.

Network Programmer/Analysts generally write software programs or scripts that aid in network analysis, such as diagnostics or monitoring utilities. They also specialize in evaluating third-party products and integrating new software technologies into an existing network environment or to build a new environment.

Managers supervise the work of adminstrators, engineers, technicians, and/or programmers. Network / Information Systems Managers also focus on longer-range planning and strategy considerations.

Salaries for networking positions depend on many factors such as the hiring organization, local market conditions, a person's experience and skill level, and so on.



Thursday, August 7, 2008

Wireless LAN Technology Overview

A Wireless Local Area Network (WLAN) is a network infrastructure that transmits and receives data with radio signals instead of wires.WLANs are used increasingly in both home and office environments, and public areas such as airports, coffee shops and universities. Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently.Increased mobility and the absence of cabling and other fixed infrastructure have proven to bebeneficial for many users. Wireless users can use the same applications they use on a wired network. Wireless adapter cards used on laptop and desktop systems support the same protocols as Ethernet adapter cards.

Advantages that people can get by implementing WLAN technology are as below:

Mobility - Productivity increases when people have access to data in any location within the operating range of the WLAN. Management decisions based on real-time information can significantly improve worker efficiency.

Low Implementation Costs and inexpensive solution - WLANs are easy to set up, manage,change and relocate. Networks that frequently change can benefit from WLANs ease of implementation. WLANs can operate in locations where installation of wiring may be impractical. Besides, wireless network devices are also as competitively priced as conventional Ethernet network devices.

Installation and Network Expansion - Installing a WLAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. Wireless technology allows the network to go where wires cannot go - even outside the home or office.

Scalability - WLANs can be configured in a variety of ways to meet the needs of specific applications and installations. Configurations are easily changed and range from Peer-to-Peer networks suitable for a small number of users to larger Infrastructure networks to accommodate hundreds or thousands of users, depending on the number of wireless devices deployed.