Monday, September 22, 2008

5 Tips To Keep Hackers From Connecting To Your Wireless Home Network and Stealing Your Identity

Drive up and down any neighborhood with a Laptop and wireless network card and chances are very good there is an unprotected wireless network waiting for anyone to connect. Imagine the hacker or your neighbor who has been using your connection and possibly capturing all data being transmitted over the Network. Your Email, Bank and Credit Card account information vulnerable and out in the open for anyone to steal.

If this sounds like your home wireless network, it's time you put security in place and lock out unwanted guest. Beyond the oblivious security measures, changing and disabling SSID broadcast, turning off your wireless router when not is use, these 5 tips will secure a home wireless network in layers, and give the boot to even the most seasoned professional.

Tip #1 - Do not use DHCP - Using DHCP is very convenient, especially for intruders. DHCP automatically hands out IP addresses to any who successfully connects to your Network. When disabled, every computer or device must be manually assigned an IP address. All computers, printers and devices on your network will need to be manually configured with static IP addresses. The threat of just handing out access is eliminated and you gain more control over who can connect to the network.

Also consider changing the router local IP address to something other than that most wireless routers are configured by default. Use an address of 10.0.0.x for the router and for assigning IP addresses to devices on your network. Changes to the defaults set by the router manufacture will help keep intruders guessing and keep them off the network.

Tip #2 - Change The Router Default Password - While this may seems like the most logical task when setting up a wireless router, many people ignore changing the password. You will be surprised how many people think just using encryption on their wireless network will prevent someone from gaining access to your router.

With router vendors using well known default passwords such as admin for Linksys, Dlink and Netgear, encryption will not stop intruder access to the administration interface and gaining access to more than just your Network.
Best practice is to change your password using a complex password. If your name is Joseph, you can easily mix alpha, numeric, and special characters to make a password you will never forget such as J0s3ph!r0ut3r*

Tip #3 - Implement The Strongest Form Of Encryption - This can potentially be the weak point of your Network, since wireless signals transmit over the airways. A hacker does not need to be connected to the Network to steal data. Use the highest encryption available. such as WPA-Personal or WPA2 with a long pass phrase mixed with alpha,
numeric and special characters. Ignore anyone who advises you to at least use WEP, which is a very weak form of encryption.

WEP (wireless encryption protocol) is one of the earliest form of encryption and the easiest to break. You will be at risk by not upgrading to a better wireless router, that offers newer encryption technology. If you run a home business, or use online banking, there is no excuse to protect your self by making a small investment for security.

Tip #4 Enable MAC Filtering: A MAC (Media Access Control) address is a unique identifier, similar to fingerprints for people. MAC's are assigned during the manufacturing of a network device, such as a network card or Wireless adapter. Enabling MAC Filter allows you to control which wireless-equipped Computers may or may not communicate with the Router depending on their MAC addresses and not allow any Computers that have not been added to the list.

Tip #5 - Secure your Computer - Gaining access to your home network from your router is not the only entry point that exists. The sites you visit and protocols used, if not trusted, can be an invitation to theft of identity.
What do I mean by protocol? An example of a protocol is HTTP, HTTPs, FTP, etc. When creating username and passwords on websites such as financial related sites should always use HTTPS. These sites may need to install Java applets or ActiveX controls which could contain malicious code that can create a backdoor into your network remotely.

Make sure the site is authentic by verifying the certificate used and never respond to emails that claim account information is needed. Avoid being tricked into thinking it is your financial institute or site where you made a credit card purchases. Antivirus and Spyware software should always be up to date as well as making sure your Computer has the latest patches installed.

Protecting your home today involves more than just deadbolts and alarms. With technology creeping into your house in the form of wires, cables and airways, securing your personal data today involves, information, knowledge and good common sense.

Saturday, September 20, 2008

Security: How To Secure Your Wi-Fi Network?

How to secure your Wi-Fi network?

Most wireless router you bought might have an installation CD by vendor, and the CD will walked you through setting up security on your router in a step by step guide or wizard. Probably you will never have to or by the way need to use it.

Actually I never install those CD because I find these programs cumbersome and my main reason is to avoid having multiple management applications which has nothing to do with my network.

So, my suggestion here’s how to set up security on your router without using a custom application.

STEP 1 > Open a new browser.

STEP 2> you may now type in the IP address of the router in your browser. The step here is where you could access to management system of your router. Due to different vendors, you need to lookup on your router's manual for the IP address (Usually its, or or something similar to those matches) and the default password for the router. Please bear in mind that every brand of router’s management GUI (Graphical User Interface) is different, I can’t show you every brand as I only have one brand here to work with, so I will just direct you towards those areas which you need to configure. Please take it easy and it’s not complicated, however you might need a bit of time to trial and error on your side. Try exploring around and find the appropriate section to manage. It's usually quite simple.

STEP 3> You should never forget this step to set a new administrator password. It’s always a good first step to start with to prevent you from forgotten it later on. The step to set here is often not located in Security section; you will need to take a look at Utilities, System Settings or User Management area. Find it and change the password immediately for any user account which is available.

STEP 4> Enable wireless security. To turn on your encryption, look under Wireless Security or equivalent tagged. The step over here will need you to either use WPA or WPA-PSK, this will only appropriate if devices on your network supported it. Otherwise you will need to use 128-bit WEP (refer to picture above). For WPA or WPA-PSK, you’d have to type in your passphrase/password, else for WEP you’d need to hit the generate key. Please note that you will need to write down your passphrase/password into a piece of paper or copy it to notepad application and transfer to a thumb drive, so that you can type/copy that password into your client machines.

STEP 5> Change your SSID. You shouldn’t make your SSID sound like “hack me”, this will probably be a default SSID, normally those did not configured their SSID will have their router name such as “linksys”, “belkin”, “aztech” or “dlink”. Try changing it to something menacing which will be a threat for them to connect. Example likes “virusgeek”, “iamvirus”, “virusspreader” or “hackingyou”. Probably you can think of something better than this. Remember you'll need this SSID when you browse through available wireless networks from your client machines. You'll find this setting under a menu called Channel or SSID.

STEP 6> Save your configuration by hitting “Apply Changes” or “Save Changes” or “Save Settings”. You will need to save every change you make to the router in order to take effect. Probably you must reboot your router multiple times during this procedure to be safe and secure.

Congratulation! You’ve covered the basics setting for you Wi-Fi network. If you would like to continue advanced up your wireless security, please go ahead and I think they’re more techie. If you are lost or paranoid, you could just turn off your SSID broadcasting. (Disabling SSID broadcasting will need you to manually type in the network name as it won’t show up in windows wireless network scan.) or alternatively you can turn on MAC address filtering which will only allow limits access to your network with a list of clients you specifically approve.

Friday, September 19, 2008

Wireless Network Security

Why Use Security?
If someone is able to wireless connect to your network from the road, near by parking lot, or adjacent house here are some things to consider. If they use your Internet connection for illegal activity, YOU are liable, not them. Also, once they are on your network, they may be able to open, delete, or change every file on your computers. There is also the possibility that the unauthorized user could spread viruses without them even realizing it.

So What Should I Do?
There are many ways to secure your connection. We are focusing on wireless security, so we will make a simple adjustment to your router. The simplest way to secure your connection is by using WEP (Wireless Encryption Protocol). Before I go any further, many hackers can find ways around this protection. It is not the best choice for large businesses (over 100 employees), but for home and small business users, this will work just fine.

Step 1 (Configure router):
Depending on your router, the specifics of this step will differ. You need to log into your router. This is done by opening your Internet Browser (Internet Explorer, FireFox, Safari, etc.) and putting the IP Address of the router in the address bar (the address bar is where you type web sites such as This IP address will either be or; if you are unsure try both. Once you type the correct one in (and press 'Enter'), a pop-up will ask you for your user name and password. If you have never changed your password, then a default was set for you by the manufacturer. This is not the same user name and password as your computer or Internet Service Provider. If you do not know your default password, find it by clicking here.
Once logged in, look for the wireless section. This is often a button or tab found on the main page. For DLink routers there will be a button on the left menu. Now look for wireless security. For DLink routers it will be on this page. You should see a drop-down-menu. Select WEP (you may also see other choices such as WAP). Depending on your router, you will see some or all of these options. Set them as follows:

Authentication: Open WEP Encryption: 64bit Key Type: Hex Key1: PICK A 10 DIGIT NUMBER

The above 'Key' is your wireless network password. Anyone that uses your wireless connection will need to know it. Normally, you are only required to put it in your computer once and then it will remember it.

Step 2 (Computer Setup):
Now go to your wireless computer and try to connect to the network, it will ask you for the key. Enter it just as you did in the router.

Step 3 (Advanced Security):
If you would like more security then you can change some of the other options in the router. For example, instead of 64bit choose 128bit. Or instead of HEX choose ASCII. All routers are different and offer different levels of security. Basically, going to 128bit requires a longer password so it is harder for others to guess and going to ASCII requires a password with letters, not just numbers, so there are more possible passwords. You can change this around as much as you like and I do suggest changing to either 128bit or ASCII.

Note: For more information contact the manufacturer of the router. They often have a toll free number and will walk you through exactly how to do what you want. I suggest a DLink router because they have 24/7 support and are very helpful.

Thursday, September 18, 2008

Setting Up Your D-Link Wireless Network - Simple Steps to Follow

The Dlink wireless network setup is quite easy. All you need is a Dlink wireless router or a Wireless Access Point (WAP) and then you need the Dlink wireless adapter, one for each computer, which will connect to the router or the WAP. There are many components to a wireless network and it may include a broadband internet connection through a cable modem or DSL, an internet security option, wireless printers and faxes, wireless music and video players, wireless game consoles and controllers, and so on.

Dlink wireless network setup is easiest when all components are from Dlink because it ensures maximum hardware compatibility. All Dlink products come with a quick installation manual that makes it a snap to follow step-by-step instructions to get the network ready to go. There are also detailed user manuals that cover all the technical aspects of the router and adapter.

Wireless networks are quite convenient and neat because there is no mess of power wires and connecting cables but there are some things you proceed with the Dlink wireless network setup.

First thing to keep in mind is that no outsiders are able to connect to your network because by default the Dlink wireless network setup is open to everyone. You must replace all the default passwords with those of your own choice because the factory defaults are known to hackers. Default settings include the access point and adapters and passwords. There are many similar Dlink networks in the world and it must be expected that there is a high probability of your network being close to some adapter that is not part of your network. Hackers are constantly on the prowl looking for networks running on default settings because they are so easy to crack. All you need to do is create a new password and you are several times safer. Hackers are a constant threat to wireless networks so you must change the password before you open your network to the world.

During the first run of the Dlink wireless network setup you will be assisted by setup wizards. When you are answering the questions that will help you to configure the network you must make sure you change all the default values to customized ones. Just make sure that you don’t go overboard in choosing something so complicated that you yourself cannot remember it. As long as you go in for a reasonably complicated personalized setup you will be fine. Just do not choose common information like your family name, kids' names, date of birth and so on.

If you have more than one computer you wish to include in your wireless network then make sure the WAP or router is located central to all computers.

Tuesday, September 16, 2008

How to Improve the Speed of Windows Vista?

It seems the days of Windows XP are numbered, and soon people are getting accustomed to use Windows Vista on their computers. However, many users complain about the low speed of Vista. This is natural for people to look for a super fast speed, but a lot depends on your PC. So if you have a slow computer, you may find Vista a slower operating system than XP. But, if you follow some of the tips described hereunder, you may do a lot to optimize your PC and make Windows Vista work faster on it:

Increase your RAM
Before you go for Window Vista, it's a good idea to increase your RAM. You can increase it to 2GB of RAM to get your computer work faster.

Regularly Clean Registry
Just like Windows XP, your Vista registry can also be overloaded with unwanted entries, which can significantly hamper the speed of your computer. Therefore, it is highly recommended to run this registry scan regularly to improve Vista's speed.

Use ReadyBoost feature of Windows Vista
You can also use ReadyBoost, which is a new feature on Vista. If you want to run ReadyBoost, you need to insert a flash drive, and then select ReadyBoost.

Remove Spyware and Adware from your PC
Spyware and adware can prove fatal for Windows Vista, so you need to be very cautious! If the Windows Vista comes with enhanced safety feature, the adware has also improved. Therefore, you must get a Spyware and Adware scanner and use it regularly to prevent them attacking your system.

Upgrade Your Drivers
When you upgrade your computer to Vista from XP, you should also update all your drivers.

Monday, September 15, 2008

How To Backup Registry Files

Windows configuration information is in the registry. Here's a look at what's stored in the registry:

-Windows system configuration
-Hardware configuration
-Installed programs
-Types of documents each program can create
-User preferences

Registry files contain data in keys, subkeys, and named values. If the registry is not edited correctly, your system could sustain severe damage. Microsoft says you should backup registry files before editing the registry.

Registry files can be found in the following places:

Windows 2000, XP, Vista- C:\Documents and Settings\User Name\

Windows 2000, XP, Vista- C:\Windows\System32\Config\

Windows 95, 98, ME- C:\Windows\

Windows 95, 98, ME- C:\Windows\Profiles\

You can find registry files here:

Windows 95, 98 and ME- System.dat, User.dat, and Policy.pol

Windows NT, 2000, XP, Vista- Security, System.alt, Default, Sam, Software, System, Ntuser.dat

How to back up Windows registry files?

You are not allowed to back up registry files under Windows NT, 2000, XP, and Vista, while the system is running. Registry files are locked, so there is no way to reach these registry files. But, you can use an integrated Windows XP's System Restore option to backup your registry files.

1. Go to Start, and then go to Run.

2. In Open, type regedit, and then hit OK.

3. Locate and then hit the root subkey that contains all the child subkeys and values that will be backed up

4. On the File menu, hit Export.

5. In Save, select a location where you want to save the Registration Entries (.reg) file, type a file name in the File name box, and then hit Save.

Backing up registry files in Windows 95, 98, and ME is pretty easy. For Windows NT, 2000, XP, and Vista, it's much more difficult. A registry repair program will find the correct locations and back up all of your registry data in an automatic, quick and safe manner

Benefits of Microsoft Certification

Information Technology is a rapidly changing industry with constant changes in software technology. The IT industry is very volatile and demands very high quality of professionals. Preferably those who are internationally certified by I.T. Giants like, Microsoft Corp.

The adoption and use of new technology by the industry has led to continous change in manpower requirements. As a result, a professional needs to update regularly, to keep their skill sets industry-relevant. To keep up with the changing requirements of the Software Development Industry, an IT professionals/job-seeker should not only be aware of and gain knowledge of new products, but should also get Certified by the Industry Leaders on their products.

Some employers require or prefer certain MCP, MCTS, MCPD, MCITP certifications for specific jobs that involve Microsoft products and technologies. Other vendors have their own certification programs.

Microsoft Certified Professional- MCP refers to the broad certification program for Microsoft, although in previous generations it also referred to an individual candidate who had completed any one exam within the program (subject to some exclusions).

The MCP program offers multiple certifications, based on different areas of technical expertise. To attain these certifications, a candidate must pass a series of exams within the program. Some of the current certifications are Microsoft Certified Technology Specialist -MCTS (.Net 2.0), Microsoft Certified Professional Developer- MCPD (.Net 2.0), Microsoft Certified I T Professiol - MCITP (MS SQL 2005).

The Benefits of Microsoft Certification Courses

1. Industry recognition of your knowledge and proficiency

2. Logos and certificates to identify your MCP, MCTS, MCPD, MCITP status

3. Access to an exclusive MCP, MCTS, MCPD, MCITP member Web site

4. Exclusive discounts on products and services

5. Access to career-related tools

6. Invitations to conferences, training sessions, and special events

Sunday, September 14, 2008

MCSE 2003 Courses - An Overview

Microsoft Certified Systems Engineer (MCSE) certification requires you to clear all its exams to get Microsoft certified. MCSE 2003 courses cover the content of the Windows Server 2003 track of the MCSE certification exams.

As of July 2007, there are two types of MCSE certifications, MCSE on Windows Server 2003 or MCSE 2003 in short and MCSE on Windows 2000.

Here we will discuss about MCSE 2003 courses. MCSE on Windows Server 2003 certification requirements include six core exams and one elective exam to be passed by the candidate.

Out of the total six core exams there are four networking system exams, one client operating system exam, and one design exam. Exam 70-290, exam 70-291, exam 70-293 and exam 70-294 are the four networking system exam codes.

The sole client operating system exam you can choose any one out of exam code 70-620, exam code 70-270, and exam code 70-210. For the design exam too, you can choose any one out of exam code 70-297 and exam code 70-298. You can select any one of the large number of elective exam options available to you. You need to appear in and clear a different set of exams, if you wish to upgrade you MCSE 2000 certification to MCSE 2003.

Now comes the point of getting trained for these exams. Microsoft has divided each examination into different courses. This has enabled students and teachers to understand the demands of these exams. Overall, these MCSE 2003 courses can be pursued through mainly three means, namely classroom training, distance learning, and boot camps.

Different course sets of each exam provide an easy and systematic method to approach every exam. This results in better and deep knowledge of the subject.

Let us discuss the methods by which you can pursue the various MCSE 2003 courses.

If you have the time, regular classroom training is the best way to learn thtough all the MCSE 2003 courses. It will give you hands-on training and will refresh you with real-life experiences. Also, you will be able to interact with the teacher face-to-face. This will boost your confidence and resolve your queries.

But not everyone is able to enroll in a regular course. For such individuals, online courses are the best option. There is no restriction to attend classes at a specific time. You need not travel to reach the classroom location. Just sit at home comfortably and attend online classes at your own convenience.

All study materials are distributed electronically during online training. Chat rooms, discussion forums, one-on-one interaction with the instructor are some of the unique benefits of online MCSE 2003 courses.

Not even one out of the several MCSE 2003 courses is to be taken lightly. Study hard, achieve the MCSE 2003 certification, and advance in your career.

Friday, September 12, 2008

How to Create an XP Bootable USB Flash Drive

An XP bootable flash drive is a flash memory device that has been configured to allow you to boot up Windows XP on a computer by plugging in your flash drive device into the USB port. An XP bootable flash drive is highly useful for two purposes:

  1. Booting up XP to troubleshoot on any computer that permits the boot.
  2. Transporting Windows applications between different physical locations such as home and the office.

To create an XP bootable flash drive, you first need a computer that has BIOS that will permit you to configure its USB port as a configurable device. Then you need a flash memory drive that is set up to be able to act as a booting device. It might not be readily known at first if you have a flash memory drive that is going to boot; one thing to look for when you access a computer's BIOS is whether or not the plugged-in flash drive appears in the listed items on the setup screen. Hopefully this happens, and you can then select this as the first device to check during your boot sequence. Some computers might require that you hit F10 to select your flash memory device.

Assuming that you have the computer and the drive that you need, now you need to get the software that will permit you to condense Windows XP onto your flash memory device. This includes: PE Builder, which is easy to install just by following the directions; you need to install it into your root directory and make a folder in C:PEBUILDER3110a called SRSP1. This will enable you to download Windows Server 2003 Service Pack One to this place. There are only two files you need from it: setupldr.bin and ramdisk.sys. Don't extract anything else, because you may totally corrupt your current version of Windows if you do. Specifically, never run the Windows Server 2003 SP1 executable file.

Once you have these files, run your PE Builder CD (Windows XP Professional CD). Make sure you hold down the [Shift] key to prevent Autostart from launching the CD. Launch PE Builder manually. When the Source field on the main PE Builder screen, enter the letter of the drive in which you put the CD. Check to see that the Output box contains BartPE and that the "None" option is selected in the Media Output panel. Once you have all this squared away, click Build. You can watch the progress of the compression.

When it's complete you're prepared to format and copy the Windows XP Professional bootable image to the UFD with the BartPE USB Installer. Open a Command Prompt window and use the CD command to switch to the pebuilder3110a folder. Next, insert the UFD into a USB port; note the drive letter to which it is assigned, as you'll need to enter it into your next command prompt that you type.

Let's imagine that it was assigned to drive E. You will now type the following command (take note of the last letter in the command). pe2usb -f e:

When Bart is all done, you just hit any key to exit the program, and you have your XP bootable flash drive.

How to Get Rid of Spyware Completely

It's a fact that many hundreds of computer users search the web every day for guides which can show them how to get rid of spyware infections. The reality though is that no matter how much you search for ways that can how you how to get rid of spyware the only successful method is to use spyware removal tools. Now most of us don't know exactly what infections can do to a computer system and the fact remains that you will never be able to simply delete an individual file and relieve your computer of an infection. Want to find out why?

Many infections like spyware, adware, trojans and viruses have the ability to spread within a systems environment and this results in other system files and properties undergoing harmful modifications or changes. So the bottom line is that you need a PC security application which can detect the different individual signature patterns which are located within the various files on your system. If you are not willing to pay for a quality spyware removal tool then you must face the consequences because even if you can uninstall or delete an infectious program it does not mean the problem will be eliminated completely.

Infections like spyware and viruses can modify registry keys and this once again illustrates the need to use a tool which can remove these malicious entries. The symptoms one can experience with spyware infections include loss of performance or speed, program instability, frequent internet explorer crashes, pop up advertisements, new or removed desktop shortcuts as well as changed security settings. Once this malicious software is on your system it can capture personal information and send it to others around the internet so even though it might not destroy hard disk contents it is still a dangerous threat.

After having reviewed and test a number of anti spyware tools I highly recommend Xoftspyse which continues to receive much praise on the web for its solid infection removal abilities. If you want to scan your computer with the latest version you can download it directly at the link below.

Download Xoftspyse Here

Tuesday, September 9, 2008

IPv6 (Cisco) Training - Using the "ipv6 Access-class" Command

In a nutshell, the Cisco IOS "Line configuration" command named "ipv6 access-class" performs the same function as its predecessor the "access-class" command; except that it is IPv6-specific.

In other words, the "ipv6 access-class" Line configuration command is used to filter incoming and outgoing connections to and from a router based on an IPv6 access list.

Below is the proper syntax and example of using the command:

Syntax: ipv6 access-class ipv6-access-list-name {in | out}

ipv6-access-list-name - Is the argument that represents the name of an IPv6 access list. Names cannot contain a space or quotation mark, or begin with a numeric.

in - Is the keyword that means filtering will occur on incoming IPv6 connections.

out - Is the keyword that means filtering will occur on outgoing IPv6 connections.


router#configure terminal
router(config)#ipv6 access-list ittechtips
router(config-ipv6-acl)#permit ipv6 host 2001:0DC8:0:4::2/128 any
router(config)#line vty 0 4
router(config-line)#ipv6 access-class ittechtips in
router#copy run start

In the example above, notice that the router's prompt is in "Line configuration" mode when the "ipv6 access-class" command is being used; and filtering is occurring on incoming connections on virtual terminal lines 0 to 4 of the router based on the IPv6 access list named ittechtips.

Now, to disable the filtering of incoming and outgoing connections to a router, use the word "no" in front of the command like you see below:

router(config-line)#no ipv6 access-class

I hope this article was very informative and helped you quickly understand the usage of the "ipv6 access-class" Line configuration command. If you need to learn more; I suggest you visit my website, were you'll find the latest information regarding Cisco IPv6 Design and Implementation Techniques.

To your success,

Charles Ross, CCNP #CSCO10444244 is the owner of; where you'll find free comprehensive information and videos about IPv6 technology and how it works with Cisco Systems technology.

Sign-Up for "18 Free Videos" that will teach you IPv6 Address Representation In Under 10 Minutes! And, also learn more about the new "Cisco IPv6 Video Accelerated Training Course" at his website.

4 Fast Ways to Speed Up Your Computer

#1) Registry Cleaning

You may not know it, but a leading cause of computer sluggishness is excess "baggage" and other errors in the Windows registry. The registry stores data and information on all of your software and settings. Over time, the registry can become cluttered with broken links and other errors all of which will slow down your computer.

Using a registry repair software to clean your registry is the recommended course of action, and it's fast and easy. Registry repair tools are not standard software, but you can download many registry scanners for free. In fact, I've linked to the free downloads of my top choice registry cleaners in the link below.

#2) Disk Cleanup

Using the Disk Cleanup function is another way to help your computer run a little faster. The Disk Cleanup function removes temporary internet files and other program files that you may have downloaded. When you consider how much time you are on your computer and how many files we open and access each day, these internet files and program files can amount to an incredible amount of space over time. Disk cleanup can be run by launching it from your Windows system tools menu.

#3) Dish Defragmenting

Another easy way to speed up your computer is to use the Disk defragmenter. Generally, when the files on your computer are fragmented it takes more time for the computer to search and find and try to piece the files back together. The process is similar to the disk cleanup and can also be run from the Windows system tools menu. One thing to remember is as hard disks are very large these days, this option can take some time. If you are going to do it plan to let it run overnight.

#4) Uninstall Unwanted Programs

If there are programs installed on your computer that you are not using you may want to uninstall them from the computer. Depending on what the programs are, some of them can take up a lot of space and really impact the speed of your computer. If you delete one of the programs you are using in error, they can generally be re installed pretty easily, so not to worry. Getting rid of unwanted software can give you more space on your hard drive and speed up your computer.

As you can see, with a little bit of time and effort, you can speed up your computer and work more efficiently. Computers, like all machines require regular maintenance to run smoothly. These basic maintenance tasks will ensure that your PC is always running well and you are not delayed by frustrating problems.

Sunday, September 7, 2008

How to retrieve lost password on Windows XP

The following is the tutorial on how to retrieve lost or forgotten password in Windows XP. I'm not sure whether the commands used will work on any other Windows platforms, but it does in Windows XP.

1. Bofore restarting your computer and pressing F8 to get into Windows with "safe mode" environment, make sure you jot down all the information here.
2. You will notice there's Administrator account appears on the user menu. Logon to Windows through the administrator account. It won't request you for a password.
3. Go to Start menu and click on "run.." (Start>Run..) and type CMD.
4. At command prompt type in cd C:\Windows\System32 (assuming C is your drive where all Windows and system files reside).
5. Make a backup of your Logon.Scr file for safety purpose by typing in copy logon.scr Logon.bak.
6. After that type copy CMD.EXE logon.scr and choose Yes.
7. Finally type this following command to reset the password, net user administrator YourNewPass (assuming YourNewPass is your new password you want to change it to)
8. Restart your computer and logon with your new password.

“Forgot your password” links: Backdoor for Hackers

"Forgot your password?" features provide businesses and site owners a simple way to reset a forgotten password, provided he can verify his credentials by asking a few personal questions that should only be known to the rightful user. For years the typical question was, of course, the "Mother's maiden name" challenge. In recent years, additional challenges have emerged, such as asking the street you grew up on, your favorite pet, and grandparents' first names.

The question is whether are they all really secured? They were safe decades ago but not in this internet era, where abundant of information keep pouring in, your personal information drawn from your past is now widely available for public consumption. There's no statistical data to support this but there are isolated cases reported and even Paris Hilton is said to have fallen prey to the "what is your dog's name?" password reset hack. You may visit this great article on how it's done if you seek more proof.

The solution is clear; don't use data that can be easily guessed or easily discovered. You may twist the data a little (example: 1Hannah1 is the answer for "your mother's maiden name" question though the real one is Hannah or use completely different set of answers for those questions). Make sure to keep them written down and put in the safe place.

Friday, September 5, 2008

Windows Seven Pictures

Windows 7 will be released in 2010,probably Microsoft will postpone the release date of Windows 7.I hope Microsoft will give up copying Mac OS , and produce their OWN operating system.If you compare windows vista and Mac OS Tiger you will see lots of similarities.Anyway these pictures are REAL not fake.For more windows 7 pictures you check this windows 7 blog.

And everybody ,please give up using microsoft products since they are not safe .For the future of internet,please use Mozilla Firefox , and prefer Open Source operating systems.Really linux is 10000 times better than windows.And you pay nothing.And safe.Watch the video below to see what Bill Gates is planning to do with his new file called OOXML!

Tuesday, September 2, 2008

Telephone bill - this is a classic !!!

The phone bill was exceptionally high and the man of the house called a family meeting... On a Saturday morning... after breakfast...

People this is unacceptable.
You have to limit the use of the phone.
I do not use this phone, I use the one at the office.

Same here,
I hardly use this home telephone as I use my work telephone.

Me too,
I never use the home phone.
I always use my company mobile.

So - what is the problem?
We all use our work telephones !!!!!

What is 3G?

Know the technology

Everyone may be knowing that the Apple's iPhone 3G has been launched in India . But many of us are not aware what is 3G. so let's have a brief look into it.

What is 3G?

3G is the next generation of wireless network technology that provides high speed bandwidth (high data transfer rates) to handheld devices. The high data transfer rates will allow 3G networks to offer multimedia services combining voice and data.

Additional features also include HSPA(High-Speed packet Access) data transmission capabilities able to deliver speeds up to 14.4Mbit/s on the downlink and 5.8Mbit/s on the uplink.

3G wireless networks have the bandwidth to provide converged voice and data services. 3G services will seamlessly combine superior voice quality telephony, high-speed mobile IP services, information technology, rich media, and offer diverse content.

What are the Advantages of 3G?

3G networks offer users advantages such as:

· New radio spectrum to relieve overcrowding in existing systems.

· More bandwidth, security, and reliability.

· Interoperability between service providers.

· Fixed and variable data rates.

· Always-online devices. 3G will use IP connectivity, IP is packet based (not circuit based).

· Rich multimedia services.

Apple's iPhone 3G

What are Some Disadvantages of 3G?

There are some issues in deploying 3G:

· The cost of upgrading base stations and cellular infrastructure to 3G is very high.

· Requires different handsets and there is the issue of handset availability.

· Base stations need to be closer to each other (more cost).

· Tremendous spectrum-license costs, network deployment costs, handset subsidies to subscribers, etc.

· High power requirements.