Saturday 28 September 2013

How to Set Up Troubleshoot and Home Computer Network


How to Set Up Troubleshoot and Home Computer Network

Setting up a home computer network may sound daunting, but it’s relatively simple, provided you break everything down into specific steps. Home computer networks are ideal for sharing a wireless connection among multiple computers, especially for those who have a home office, teenagers, or another computer configuration.

Purchasing a Router

Before you begin to worry about software, worry about hardware. A excellent router, like a Cisco router or a Linksys router, will save you from having to endlessly reboot and reprogram while still allowing you to quickly set up a home network. Make sure you buy from a company that has years of experience designing high quality routers that are capable of handling high amounts of traffic (such as data heavy media files). Virtually any home network will run smoothly without irritating slowness or delays.

Wireless Bandwidth

After you’ve purchased a router, the next step is to determine how much bandwidth you are receiving from your wireless connection. This becomes particularly important if you have a household where the network users are habitually downloading movies or other large data files. While a router can rapidly transfer this information, it is constrained by the amount of bandwidth available to the household. A connection that transmits data at 2.4 GHz with a 54 megabit speed is usually adequate to the task. 

If your network feels exceptionally sluggish, check to make sure that you are receiving the wireless by ‘pinging’ the network. Alternatively, if you are receiving the full wireless bandwidth but are still experiencing slow results because of the types of media you are transferring, you may consider paying for a faster service.

Software Drivers

While software drivers for networking are fairly easy to find and download from the Internet, purchasing software directly from a computer retailer is recommended as a way to keep your network free of faulty software. A higher incidence of spyware and viruses makes downloading free software inadvisable, especially for something as sensitive as a computer network.

Purchasing software from one of the major companies, such as McAfee or Symantec, will also provide you with another vital component of wireless home networking: a firewall. Because wireless networks are difficult to secure, the best option is to buy software that not only allows you to network, but is built specifically to keep out uninvited users. Firewalls are designed to protect your valuable information behind a tightly secured ‘wall’ which can’t be accessed unless a very specific encrypted code is used. 

Basic Set-Up

Now that you have all the components, you’ll want to set up the router first. Install the software driver onto each computer that will use the network. Set up a passkey that is fairly hard to break. Avoid simple or obvious terms that an outside user could easily guess. Set up each computer with this information.

The company that is providing your wireless connection will usually assign you a name and a passkey. However, in some configurations, you will be able to reprogram this information.

Troubleshooting

No matter how expertly a system is set up, on occasion a technical problem manifests, resulting in a lack of connectivity for computers. There are a few ways to quickly check what’s working and what’s not.

Usually, problems are caused by one of two things: the software on the computer itself is malfunctioning, and not allowing the computer to connect. You can test this by seeing if any other computers can connect to the network. If they can, the problem is local to that computer. A simple reboot of the software should solve this problem. However, if the software continues to be unable to connect to the internet, you will need to uninstall the software, and then reinstall it. Sometimes, a version can become corrupted. By wiping it clean and starting anew, the problem should resolve itself.

The second most common problem is that the router needs a quick reboot. If you purchase a quality router, you will not have this problem very often, although every now and again even the best routers need a quick reboot. Turn the router off for at least thirty seconds. Switch it back on, and check your connectivity in about ten minutes. This gives the system plenty of time to reset itself.

If this doesn’t work, the wireless provider may temporarily be out. Call your wireless provider to determine if they are experiencing an outage, and when you can expect the resumption of service. If all of these methods don’t resolve your problem, there is a basic flaw in your initial setup. 



How to Protect Your Computer From Viruses


How to Protect Your Computer From Viruses

With millions of computer users browsing the web at any given time, there are plenty of targets for malicious coders. While computer experts don’t always know why coders choose to build harmful computer programs, the fact is that it happens all the time. Computer viruses can steal personal information, interfere with normal operations, attract spam and even shut down your computer’s hard drive. Protecting your computer is critical for browsing success.

Start With the Basics

Most computer systems come with security features already in place. For example, the Windows operating system is packaged with Microsoft Windows Security Center. When you first open, boot up and register a new computer, you should make sure that this program is functioning. It will give basic protection against spyware, viruses and malware. In addition, a basic firewall is built into this program, providing additional protection and stops for potentially harmful programs. Upon activation, don’t be surprised if your security system needs immediate updating. Software that protects your computer needs regular and consistent updating to stay useful. Viruses are constantly being generated and the several-month lag between when your computer was made and when you first started using it can mean that the database the security system is loaded with is severely out-of-date.

Upgrade to Meet Your Needs

Many people operate computers for a long time with only basic protection in place. However, heavy computer users or those who have risky browsing habits can sometimes benefit from upgrading their virus, spyware and malware protection, as well as using a fuller-featured firewall; this is especially important if you use a networked computer system. Basic or free virus protection will still scan and update for viruses. Paid programs, however, offer more features, including ease-of-use and convenience features. The most important thing is to verify the publisher and make sure you are getting what is promised. Most well-known virus protection programs, such as AVG and Norton Security, have reviews available to help you make your choice.

Learn About Spyware Risks

Spyware creates risks that many computer users are not aware of. If you are only protecting against viruses, you could be leaving your computer open to damage. Most people are familiar with spyware that initiates and attracts annoying ad programs. Spyware, however, can be much more malicious as well. Your shopping habits can be tracked by spyware. While not exactly harmful, some people consider this a breach of privacy. The worst spyware programs interfere with normal operations and can even track what you type, sending personal information to people who want to steal your identity. Some spyware redirects your browser to different web addresses, increasing your risks of virus infection and fraud.

How Viruses Work

The main difference between spyware and viruses is how they are spread. A virus reproduces itself and attaches to any document that the computer sends, while spyware can be stored as a cookie or tracking code. A virus is most often found traveling with a piece of computer software, such as a document, picture or piece of music. When dealing with email, it is necessary to open an attachment to become infected, indicating that, in most cases, the computer user must somehow invite the malicious software to replicate on their system. Of course, most people have no idea it is there or what is happening. Some of the sneakiest and most harmful viruses actually masquerade as virus protection software, making them extremely hard to detect. Because of this, it’s crucial to be familiar with your particular virus protection program and know what it looks like and what the normal scripts and prompts are during operation. Viruses do some of the same things that spyware does; they just accomplish it differently. An active virus can steal personal information, generate ads or shut down your system, including the very virus protection programs that can fix the issue.

Take Steps For Protection

Like anything, the best way to protect against viruses is to be educated. Become familiar with what malicious software may look like. If you get an email or are asked to download a file that you don’t recognize or looks suspicious, do your homework. Research virus protection, spyware, malware and firewall programs and use them to their fullest capacity. Set the software to update and scan automatically to make sure that the system is constantly monitored. In addition, regularly check on the databases published by various virus protection services; many will provide lists of symptoms and risks, as well as the standard way the file gains access for no cost to the public.



How to Enable Administrator account in Windows 8


How to Enable Administrator account in Windows 8:

1. Firstly, right click on the screens bottom left corner and from the pop-up menu, choose the Command Prompt (Admin).

2. Choose 'Yes' at the "User Account Control" warning message. (In case if it shows this message only press yes or else leave it).

3. Now, Command Prompt will open. Inside the command prompt, type this command.

" net user adminstrator /active:yes "

and press enter

4. Now, you can see a message that says your command was completely successfully.

5. Now close the command prompt and from now your Adminstrator account is enabled in your PC.

To disable, follow the same process and in command prompt, give this command:

" net user adminstrator /active:no "



How to Improve Your Computer’s Performance



Tips for Speeding Up Your PC

Few things are as frustrating as dealing with a slow, sluggish computer. When a computer is brand new, it works wonderfully well. Over time, though, its performance can slowly begin to worsen. This happens for a number of reasons, but the biggest culprits are things like spyware, adware and other computer threats that are unwittingly downloaded along with other content while online. You don’t have to download thousands of MP3s, movies or other items to experience these problems, either – nobody is immune to them. Instead of accepting the situation, there are plenty of techniques and strategies that you can use to make it better – a few of the best ones are outlined below.

Strategy #1: Clean Your Computer’s Windows Registry

The biggest cause of slow, sluggish PC performance is errors and problems within its Windows registry. Adware, spyware and other threats usually target the registry, damaging or misplacing important files within it. When it comes to PC cleaning, a daily Windows registry cleaning should be at the top of your list of priorities. However, this should never be done manually – there are too many opportunities for major errors that could seriously damage your PC’s operating system. Instead, invest in a high-quality Windows registry cleanup program and configure it to run once per day – you won’t believe the difference that it makes.

Strategy #2: Remove Unneeded Files

Every time you log on to the Internet or otherwise use your computer, temporary files are generated. They are usually only needed once; however, they don’t disappear on their own. Instead, they accumulate over time until they are cluttering up your computer’s file system and affecting its performance. While it’s possible to remove these files one-by-one, it’s much easier and quicker to use a PC cleaning tool that’s designed for the purpose. Try to do so about one time per week to keep your computer humming along with ease.

Strategy #3: Remove Unneeded Programs

Like many people, you probably download and try out many different programs each month. How many of them do you actually end up using on a regular basis? Chances are, not very many of them. By getting into the habit of uninstalling unused and unneeded programs, you can keep your computer’s file system a lot less cluttered. In turn, your PC’s performance will improve dramatically. You can optimize your computer in this way by using its Add/Remove Programs feature. Its location varies by operating system, but you should be able to find it somewhere in the Control Panel.

Strategy #4: Empty the Recycle Bin

When you click “delete” on a file or a program, it doesn’t go away for good – not immediately, anyway. Instead, it sits in a kind of purgatory in your computer’s Recycle Bin. As things pile up in the Recycle Bin, your computer can start exhibiting some very annoying problems. If sluggish startups and frequent crashes are occurring with increasing frequency – and your computer’s recycle bin is very full – go ahead and empty it. From then on, get into the habit of doing so about one time per week. This small but important strategy can make a huge difference.

Strategy #5: Perform a Disk Defragmentation

Windows isn’t very efficient when it comes to storing files. It actually splits them up, depositing them into whatever spaces are available. The more spaced apart the pieces of a file are, the harder your computer has to work to make them run. The Windows disk defragmentation system tune-up utility works to piece all of those files back together again. The process is a long one, though, and only needs to be done about four times per year. Set it up to run automatically once every three months. By doing so, you’ll be able to keep your computer running in tiptop shape.

When it comes to keeping your computer running optimally, small but regular maintenance is the best way to go. Protecting your PC only does so much; even the most careful Internet users in the world unintentionally download malicious software from time to time. By using basic system tune-up tools, cleaning your computer’s Windows registry regularly, performing regular file-cleaning maintenance and otherwise optimizing your PC, you should be able to keep it in like-new condition for a lot longer. Even if your computer has been performing slowly for some time, beginning this regimen is sure to produce results. In the end, you’ll be able to enjoy a computer that flies along – instead of one that spins its wheels.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/


Difference between Viruses, Trojans, Worms and Malware.




I. What is Malware?
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.

II. Viruses --> Wreak Havoc On Your Files The term computer virus is often used interchangeably with malware, though the two don’t actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.You can protect yourself from viruses by making certain your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you’re dealing with a virus.

III. Spyware --> Steals Your Information Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers. Since spyware is primarily meant to make money at your expense, it doesn’t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going to become slow. What many people don’t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application
you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it thoroughly.

IV. Trojan Horses --> Install a Backdoor Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don’t replicate themselves—they must be
installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don’t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that’s one of malware authors’ favorite spots to hide a trojan.

V. Worms --> Infect Through the Network Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/



Hacker VS Programmer




1. A hacker beats the system.A programmer maintains the system.
2. A hacker is trying to get in.A programmer is trying to stop things getting in.
3. A hacker does things because he believes in them.A programmer does what he is supposed to.
4. A hacker changes the way things are.A programmer tries to keep the status quo.
5. A hacker is agile.A programmer is a small cog in a big slow machine.
6. A hacker has many points of attack.A programmer has one job.
7. A hacker has to be fast.A programmer doesn’t.
8. A hacker is self-reliant.A programmer relies on others.
9. A hacker finds paths that don’t exist.A programmer guards the old ones that already do.
10. A hacker is about being interesting.A programmer is about being perfect.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/



what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...