Friday, February 10, 2012

AdHoc Wireless Network

Wireless networking has facilitated our lives. It all becomes simple. Connections between computers is also getting easier. This time, move files from one computer to another, does not necessarily have to use a cable or flash. We can use the adhoc network to do this.


Here's how to build an adhoc network
1. Open Control Panel , then click Network Connection,
2. Right click on Wireless network adapter, select Properties
3. click on the Wireless Network tab
4. Click the Add Button
5Wireless Network Properties Dialog Box Appears
6. Enter the SSID name
7. Choose the type of security you want to use
8. Make to tick " This is computer to computer (ad hoc) Network" check box
9. Click OK

Adhoc network now has appeared in your preffered network

Here's how to connect to your adhoc network
1. provide IP for your wireless network
2. Right click on your Wireless Network Adapter
3. Select View Available Wireless Network
4. Choose your Adhoc Network
5. Perform steps 1-4 on other computers you want to connect

6. Wait until connected, now Both computers are connected and can exchange data.

Happy Trying.... 

Friday, December 31, 2010

Intel or AMD

Which one is better?
Intel or AMD ?

Parameter :
a. Price
b. Speed
c. Stability
d. Quality

Please comment and give a conclusion. tq

Monday, October 12, 2009

ACER VOLUNTARY SAFETY RECALL

Dear valued Acer Customer,
It has come to our attention that certain Acer Aspire Notebooks may overheat under specific conditions. Acer is therefore voluntarily instituting a safety recall for these products.

The affected units are Acer Aspire models AS3410, AS3810T, AS3810TG, AS3810TZ and AS3810TZG manufactured prior to September 15, 2009. In the affected units the microphone cable may overheat when extreme pressure is applied repeatedly to the left palm rest. As a result, the unit̉³ case may become deformed and the system may malfunction.

Acer has voluntarily instituted a safety recall program to proactively replace the microphone cable in the affected units to eliminate any risk of overheating.

To determine whether your unit is affected and requires to be serviced, enter the Serial Number (22 digits alphanumeric code printed on the white label on the bottom of the product ֠see picture) OR the SNID (11 digits numeric code, also located on the white label) in the appropriate box below:

How to find the 'Serial Number' or 'SNID' of your Acer System?
For Notebooks, the Serial Number is located on the bottom of the unit.
The Serial Number is 22 alphanumerics characters.
The SNID is 11 numeric characters.


click here to submit your S/N and SNID
http://customercare.acer-euro.com/customercare/AcerUpdate.aspx?CID=ID&LID=ENG&IType=JM31

Friday, October 9, 2009

Review for Easy Counter

Page hits is a very useful counter for a website. This counter tell the webmaster how many visitor has visited their website.

Today, there are a lot of Page hits counter provided in internet. Some of them are free when others need to be paid. You can find many Page hits counter by using our lovely search engine, GOOGLE

One of the free Page hits counter I've found from internet is Easy Counter. You can make your own counter from here http://www.easycounter.com. Easy Counter provides a lot of features, it's not only provided how many visitor open our website, but it also provides the statistic of our website. Here are some features provided by Easy Counter:
  • Hits for the last 30 days
  • This month's hits
  • Last year's hits
  • Visitors by country
  • Visitors by browser used
  • Operating system stats
  • Hits versus unique visitors
Hits versus unique visitors is one of my favourite feature. It provide to use how many times people open our website and how many unique people visit our sites. so we can know is there new visitor to our site

So, what to wait...let's try it.

Monday, July 16, 2007

IPv6

IPv6 is stand for "Internet Protocol version 6". It is designed to replace IPv4 which is used for over twenty years. IPv4 will become a problem when IPv4 cannot supply enough IP address for every person arround the world. With 128 bit address, IPv6 will supply more enough ip address for every people around the world. Beside the increment of number of address number, IPv6 also added another improvement to IPv4 like routing and network autoconfiguration. So maybe in this few year there will be a lot of application that apply IPv6.

There are a lot features from IPv6, below is the features from IPv6: (www.wikipedia.com)
-Larger Address Space
IPv6 provide more address than IPv4. It provides 128 bit addresses than IPv4 32 bit addresses

-Stateless autoconfiguration of hosts
IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast (broadcast) request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually.
Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means.

-Multicast
Multicast is the base of IPv6, where in IPv4 it is optional.

-Jumbograms
In IPv4, packets are limited to 64 KiB, but in IPv6 the packets can be as large as 4 GiB

-Network-Layer Security
IPsec, the protocol for IP network-layer encryption and authentication, is an integral part of the base protocol suite in IPv6; this is unlike IPv4, where it is optional (but usually implemented). IPsec, however, is not widely deployed except for securing traffic between IPv6 BGP routers.

-Mobility
Unlike mobile IPv4, Mobile IPv6 (MIPv6) avoids triangular routing and is therefore as efficient as normal IPv6. This advantage is mostly hypothetical, as neither MIP nor MIPv6 are widely deployed today.

Monday, June 18, 2007

Is your company keeping information secure?

Most companies keep sensitive personal information in their files and on their computers—names, Social Security numbers, account data—that identifies customers or employees. You’ll need information like that to fill orders, meet payroll, or perform other necessary business functions. But if sensitive data falls into the wrong hands, it can lead to fraud or identity theft.

Safeguarding sensitive data is just plain good business. Are you taking steps to protect personal information? A sound data security plan is built on five key principles:

  • Take stock. Know what personal information you have in your files and on your computers.
  • Scale down. Keep only what you need for your business.
  • Lock it. Protect the information you keep.
  • Pitch it. Properly dispose of what you no longer need.
  • Plan ahead. Create a plan to respond to security incidents.
more detail at http://www.ftc.gov/infosecurity

Sunday, June 10, 2007

How To Keep Our Computer Secure

As I said at my last post that there are many computer’s users do not care about their computer secure. That’s why their computer become a popular target for intruders. With the high speed internet connected to your computer, intruders can easily steal your private information like password, credit card number, file or another things from your computer then use it in internet.

There are a lot of ways that intruders can use to break into your computer. They can use an email, Trojan, Backdoor, virus and more to get into your computer. So how to keep our computer from intruders? There are a few tips :

1. Keep your system patched
There are many bugs in our system, that’s why the expert always update the system become more and more secure. If we don’t patch our system, intruders can use this bug to get into our computer. So patch your system continuosly

2. Install and use Antivirus Program
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user (http://www.wikipedia.com). Computer virus can damage your file or delete your file. It spread from one computer to anothers when target computer connected to the host computer. If you install antivirus program, it will detect it and prevent the virus infected your computer. There are a lot of antivirus program, like Norton Antivirus, McAffe Anti Virus, Panda Anti Virus, Kapersky and more.

3. Use a firewall program
A firewall is a hardware or software device which is configured to permit, deny or proxy data through a computer network which has different levels of trust (http://www.wikipedia.com). We need to use firewall program to maintain our data transfer through internet cause internet is the zone with no trust.

4. Be careful when reading an email with attachment
Email can become a media to transfer a virus, Trojan, backdoor from one computer to another. So when open an email with attachment please make sure that it comes from trusted person. If no just delete it, there is no advantage to open email from suspicious person.