Friday, February 10, 2012
AdHoc Wireless Network
Here's how to build an adhoc network
1. Open Control Panel , then click Network Connection,
2. Right click on Wireless network adapter, select Properties
3. click on the Wireless Network tab
4. Click the Add Button
5. Wireless Network Properties Dialog Box Appears
6. Enter the SSID name
7. Choose the type of security you want to use
8. Make to tick " This is a computer to computer (ad hoc) Network" check box
9. Click OK
Adhoc network now has appeared in your preffered network
Here's how to connect to your adhoc network
1. provide IP for your wireless network
2. Right click on your Wireless Network Adapter
3. Select View Available Wireless Network
4. Choose your Adhoc Network
5. Perform steps 1-4 on other computers you want to connect
6. Wait until connected, now Both computers are connected and can exchange data.
Happy Trying....
Friday, December 31, 2010
Intel or AMD
Intel or AMD ?
Parameter :
a. Price
b. Speed
c. Stability
d. Quality
Please comment and give a conclusion. tq
Monday, October 12, 2009
ACER VOLUNTARY SAFETY RECALL
It has come to our attention that certain Acer Aspire Notebooks may overheat under specific conditions. Acer is therefore voluntarily instituting a safety recall for these products.
The affected units are Acer Aspire models AS3410, AS3810T, AS3810TG, AS3810TZ and AS3810TZG manufactured prior to September 15, 2009. In the affected units the microphone cable may overheat when extreme pressure is applied repeatedly to the left palm rest. As a result, the unit̉³ case may become deformed and the system may malfunction.
Acer has voluntarily instituted a safety recall program to proactively replace the microphone cable in the affected units to eliminate any risk of overheating.
To determine whether your unit is affected and requires to be serviced, enter the Serial Number (22 digits alphanumeric code printed on the white label on the bottom of the product ֠see picture) OR the SNID (11 digits numeric code, also located on the white label) in the appropriate box below:
How to find the 'Serial Number' or 'SNID' of your Acer System?
For Notebooks, the Serial Number is located on the bottom of the unit.
The Serial Number is 22 alphanumerics characters.
The SNID is 11 numeric characters.
click here to submit your S/N and SNID
http://customercare.acer-euro.com/customercare/AcerUpdate.aspx?CID=ID&LID=ENG&IType=JM31
Friday, October 9, 2009
Review for Easy Counter
Today, there are a lot of Page hits counter provided in internet. Some of them are free when others need to be paid. You can find many Page hits counter by using our lovely search engine, GOOGLE
One of the free Page hits counter I've found from internet is Easy Counter. You can make your own counter from here http://www.easycounter.com. Easy Counter provides a lot of features, it's not only provided how many visitor open our website, but it also provides the statistic of our website. Here are some features provided by Easy Counter:
- Hits for the last 30 days
- This month's hits
- Last year's hits
- Visitors by country
- Visitors by browser used
- Operating system stats
- Hits versus unique visitors
So, what to wait...let's try it.
Monday, July 16, 2007
IPv6
IPv6 is stand for "Internet Protocol version 6". It is designed to replace IPv4 which is used for over twenty years. IPv4 will become a problem when IPv4 cannot supply enough IP address for every person arround the world. With 128 bit address, IPv6 will supply more enough ip address for every people around the world. Beside the increment of number of address number, IPv6 also added another improvement to IPv4 like routing and network autoconfiguration. So maybe in this few year there will be a lot of application that apply IPv6.
There are a lot features from IPv6, below is the features from IPv6: (www.wikipedia.com)
-Larger Address Space
IPv6 provide more address than IPv4. It provides 128 bit addresses than IPv4 32 bit addresses
-Stateless autoconfiguration of hosts
IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast (broadcast) request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually.
Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means.
-Multicast
Multicast is the base of IPv6, where in IPv4 it is optional.
-Jumbograms
In IPv4, packets are limited to 64 KiB, but in IPv6 the packets can be as large as 4 GiB
-Network-Layer Security
IPsec, the protocol for IP network-layer encryption and authentication, is an integral part of the base protocol suite in IPv6; this is unlike IPv4, where it is optional (but usually implemented). IPsec, however, is not widely deployed except for securing traffic between IPv6 BGP routers.
-Mobility
Unlike mobile IPv4, Mobile IPv6 (MIPv6) avoids triangular routing and is therefore as efficient as normal IPv6. This advantage is mostly hypothetical, as neither MIP nor MIPv6 are widely deployed today.
Monday, June 18, 2007
Is your company keeping information secure?
Safeguarding sensitive data is just plain good business. Are you taking steps to protect personal information? A sound data security plan is built on five key principles:
- Take stock. Know what personal information you have in your files and on your computers.
- Scale down. Keep only what you need for your business.
- Lock it. Protect the information you keep.
- Pitch it. Properly dispose of what you no longer need.
- Plan ahead. Create a plan to respond to security incidents.
Sunday, June 10, 2007
How To Keep Our Computer Secure
There are a lot of ways that intruders can use to break into your computer. They can use an email, Trojan, Backdoor, virus and more to get into your computer. So how to keep our computer from intruders? There are a few tips :
1. Keep your system patched
There are many bugs in our system, that’s why the expert always update the system become more and more secure. If we don’t patch our system, intruders can use this bug to get into our computer. So patch your system continuosly
2. Install and use Antivirus Program
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user (http://www.wikipedia.com). Computer virus can damage your file or delete your file. It spread from one computer to anothers when target computer connected to the host computer. If you install antivirus program, it will detect it and prevent the virus infected your computer. There are a lot of antivirus program, like Norton Antivirus, McAffe Anti Virus, Panda Anti Virus, Kapersky and more.
3. Use a firewall program
A firewall is a hardware or software device which is configured to permit, deny or proxy data through a computer network which has different levels of trust (http://www.wikipedia.com). We need to use firewall program to maintain our data transfer through internet cause internet is the zone with no trust.
4. Be careful when reading an email with attachment
Email can become a media to transfer a virus, Trojan, backdoor from one computer to another. So when open an email with attachment please make sure that it comes from trusted person. If no just delete it, there is no advantage to open email from suspicious person.