Monday, September 28, 2009

How to Lock the folders

Procedure :
1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ’save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ’save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !

Block a website in internet explorer

This summary is not available. Please click here to view the post.

Sunday, September 27, 2009

How to access the sharing data offline?

Access the shared data offline allows you to keep using your shared files, folders and software programs when disconnected from the data server. When you reconnect to your data server, all files will be synchronized to the files on the network.
There are two types of configurations required to set the access shared folders offline available, one for data server and other for client computer.
Configuration on Data Server
First locate the folders that you would like to share or make new folders then share these folders so they can be accessible to any one on the network.
Now right click on that folder and click on the option "Sharing and security".


A small dialog box will appear with the title "data properties". Under the "Sharing" tab, select the check box "Share this folder on the network" under the "Network sharing and security".


Configuration on Client Computer
On the client computer, first open My Computer then click on Tools.


In Tools menu bar, click on Folder Options, a window will appear with the title Folder Options.
Under the Offline File tab, check the option Enable Offline File. Here you can choose the synchronization process "Synchronize all offline files when logging on", "Synchronize all offline files before logging off" and others.


Click on Apply button to save the settings and then Ok button to close this window.
Now sitting on the client computer, try to access the shared folder from the data server.
First Right click on the shared folder and Click on Make available offline.
To synchronizing the offline work from client computer to data server, again open My Computer then click on Tools. Click on Synchronize then click on synchronizing button.


After that down to data server and then try to access share folders by give the UNC (Universal Naming Convention) path of data server. But it will be accessible weather the server is down or up.

Saturday, September 26, 2009

XP expires

XP expires
To reduce instances of "casual copying" (a nice name for software piracy), Microsoft has implemented a two-stage antipiracy scheme in its upcoming OS. The first stage is the installation and registration counter: this lets you install Windows XP only five times on the same system. (Note that you'll be able to install the final version of XP on only one machine, as opposed to the current beta, which can be installed on five machines for testing purposes.) The second stage creates a profile of the system to prevent you from reinstalling or registering the OS on different PCs.
To make this scheme work, you must activate your copy of Windows--over the Internet or by calling for an activation code--within 30 days of installation. Activation differs from a classic registration process in that no personal information is requested by or sent to Microsoft, just a record that a specific copy of Windows XP is installed on your specific PC. If you fail to activate your copy of the OS within 30 days, your login will fail. (Since XP is based on Windows NT-like privilege levels, you can't use your computer until you log on.)
Microsoft says the scheme should not prevent you from reinstalling your copy of XP on your PC as many times as you need to, as long as it's the same PC or close to it, allowing for some hardware changes. It's the "some" that has most folks worried. In theory, you might have to reactivate your OS if you upgrade significantly or swap out a lot of components because XP might think it's running on a new PC. So far, Microsoft isn't saying what system information the OS uses to determine the "same PC or close to it" status. That means we don't know to what degree you can upgrade your hardware before you cross the invisible line. We also don't know how much, if any, personally identifiable data Microsoft is gathering from your PC.
Microsoft says you can, of course, change at least one and possibly several hardware components--RAM, video or sound cards, CPUs, motherboards, and so on--without having to reactivate your OS. But if you try to reinstall your copy of Windows XP on what Microsoft calls a "different or significantly upgraded or changed PC" (again, the company declined to specify how different), the activation will most likely be rejected, requiring you to call Microsoft to explain and get a new (free) activation code.
Microsoft plans to set up a new call center for U.S.-based customers to expedite activation issues. Many non-U.S. customers will likely have to go through the existing, shared Microsoft technical support lines they currently use. Microsoft says it expects only 2 percent of the total installed base of Windows XP to have to reactivate the OS. Whether the anti-piracy initiative will present problems for consumers or result in fewer upgrades to XP remains to be seen. Remember, the final release is at least a few months off.

Friday, September 25, 2009

"STOP” ERROR MESSAGES AT SHUTDOWN

Some users have gotten an error message similar to the following when attempting either to shutdown or restart Win XP:
STOP 0000009F, DRIVER_POWER_STATE_FAILURESTOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLEDSTOP 0x000000D1: DRIVER_IRQL_NOT_LESS_OR_EQUALSHUTDOWN WORKS,
BUT IT’S REAL SLOW
If it appears that Win XP is not shutting down, give it some time. Some users have reported a minute or longer for shutdown to visibly start. Thus far, it appears that this is a consequence of software that is running when shutdown is attempted, and it also may have something to do with particular hardware. If you are experiencing this problem, be sure to close all running programs before attempting shutdown and see if this solves your problem. If so, then you can determine, by trial and error, which program(s) are involved.One specific solution for this was provided by Microsoft support. ” In Control Panel Administrative Tools Services. (You can also get this by launching SERVICES.MSC from a Run box. This utility is also built into the Computer Management console.) Stop the Nvidia Driver Helper service. Many other friends quickly confirmed that this solved this “extremely slow shutdown” problem for them.
POWERDOWN ISSUES
Powerdown issues” are quite distinctive from “shutdown issues.” I define a shutdown problem as one wherein Windows doesn’t make it at least to the “OK to shut off your computer” screen. If Windows gets that far, or farther, then it has shut down correctly. However, the computer may not powerdown correctly after that. This is a different problem, and I encourage that people reporting these issues to make a very clear distinction in their labeling.When Windows XP won’t powerdown automatically, the APM/NT Legacy Power Node may not be enabled. To enable this, right-click on the My Computer icon, click Properties Hardware Device Manager View. Check the box labeled “Show Hidden Devices.” If it’s available on your computer, there will be a red X on the APM/NT Legacy Node. Try enabling it and see if this resolves the powerdown problem.This should resolve the powerdown issue in most cases. However, other factors can sometimes interfere with correct powerdown functioning. In that case, consider the following tips:· If you are changing the default power settings in the BIOS, it can lead to a powerdown problem. Restoring all BIOS power settings to default will likely fix it. OTHER KNOWN ISSUES & HINTS.
BIOS UPGRADE
As with every new operating system that comes along - especially one that is as much of a “step up” as Windows XP is from Windows 9x - the recommendation is made to be sure your BIOS is updated. Many people have reported that this has solved their shutdown problems (and had other advantages) with Win XP, just as it has in earlier versions of Windows.

Sunday, September 20, 2009

BIOS FLASHING

Flashing the BIOS is one of the most feared topics related to computers. Yes, people should be very cautious because it can be dangerous. This article is going to focus on the basics and explain ways to flash the BIOS, precautions and how to recover in case of a bad flash.
The Basics
First of all, let's get into the basics. What is the BIOS and why should you flash it? Let me explain. It's the acronym for Basic Input/Output System. It's one of the most crucial components on a motherboard. It determines and tells your computer what it can do without accessing any other files or programs from your storage; it acts like simple software. Basically the BIOS contains all the information that's needed for your computer to POST (=Power on Self Test). This includes how to control your keyboard, communicate with your processor, send/receive video signals to/from your monitor, and recognize your components (hard drives , optical drives, USB devices, serial ports and so on). If this makes sense then you understand that without the BIOS a computer would not boot at all (no POST); neither will it boot with a defective/corrupted BIOS.
Why should we flash the BIOS?

It's simple. When manufacturers release a new motherboard, of course, the BIOS on the board is already flashed. Since technology advances in quantum leaps it's very important to realize that in a matter of weeks or months new products are going to be released. So computers should support them, right? That's the bottom line here. Flashing your BIOS to the latest release is crucial because it enhances your system's capabilities, helps it to detect newer devices and components (bigger hard drivers, newer processors, and so forth), and improves stability (very often in the latest BIOS flashes manufacturers apply a series of bug fixes). There is always a "change-log" included with every newer BIOS release that should be your number 1 must-read piece of information; it helps you decide whether or not it's worth it to flash that specific version.
BIOS Chips and Manufacturers
There are quite a few manufacturers that are producing different BIOS chips: Award, AMI, Phoenix, and IBM. Most commonly you can find AMIs, AWARDs and PHOENIXes. The BIOS is stored on a ROM chip.
These ROM BIOS chips can be of different measurements and look different from each other. Check out the following two types of chips. The one on the left is an AWARD (as stated on the sticker), while the one on the right is a Phoenix chip.








You may find other chips that can't be "taken out" with extractors; on older systems quite often the BIOS chip was soldered directly on the board.
Every manufacturer recommends that you use their BIOS flashing utility. Also, don't forget to read the information that's included and related to flashing in your motherboard's manual. Yes, dig that manual out (or if you can't find it then download it from the manufacturer's website; it's usually available) and read it!
Four of the most common flashers are: AWDFLASH, AMIFLASH, UNIFLASH and AFUDOS (only for ASUS boards). Out of these the UNIFLASH (get it here) is the universal flasher that can usually flash every BIOS; it has awesome compatibility capabilities. Keep in mind that BIOS flashing can be (and is) dangerous, because in the case of a bad flash the data ends up corrupted and your computer won't POST anymore. So I'm recommending wholeheartedly that you use the BIOS flasher that's explained in the manual and provided by the manufacturer of your board. Read the manual, do your research and when you're ready, then and only then proceed to follow the instructions.
After you get your flasher you need the latest BIOS flash file. First find out your motherboard manufacturer's name and your board's exact name and specifications. Visit your manufacturer's website and download the latest non-beta version (betas can be risky and I don't suggest you experiment if you can't fix it if a bad flash happens; we'll discuss that a bit later). These files usually have ".ROM" or ".BIN" extensions. Later on I'm going to call the "latest BIOS file" "newbios.bin."
I'm going to give you examples of how to use UNIFLASH, AWDFLASH, AMIFLASH and AFUDOS. Read them strictly as examples and do not proceed to flash your latest BIOS version before you understand what each option gives and how to use these flashers.
Flashing with UNIFLASH:
A:uniflash.exe newbios.bin
Flashing with AWDFLASH:
A:awdflash.exe newbios.bin /py /sn /cc
Flashing with AMIFLASH:
A:amiflash.exe newbios.bin /A+ /-B /-C /-D /E /-G /I /L /N /R /V
Flashing with AFUDOS:
A:afudos.exe /inewbios.bin
Even though the above commands do work it's always crucial that you read what every command does and understand them. First of all, once you're booted into MS-DOS, execute the flashers without commands and options. Just use a simple "awdflash.exe" or "amiflash.exe"-- then a help screen (which explains all of the available commands and options) will appear. Read that thoroughly before proceeding and follow the instructions.
As a side note, UNIFLASH has a UI (user interface) so it definitely helps beginners. Execute the "uniflash.exe" and the UI will appear and guide you through.
I can't stress enough that flashing the BIOS can be dangerous if the flashing process isn't finished successfully or if the newly flashed file doesn't match your system or is incorrect. First of all, be aware of electricity and the chances of a power outage. Never flash if there is bad weather outside; losing electricity while in the middle of flashing can have disastrous effects. It's always advisable to have a USP too. Flashing the BIOS doesn't takes longer than one minute so it's very important to be "safe" while flashing; if you must, borrow a USP from your next door neighbor, if possible.
Before proceeding to flash don't forget to go into your BIOS and write down (or take a photo if you' have a camera) all of your settings. This is crucial because the "default" settings may not be the best option for your system, especially if you've tweaked BIOS and you do not remember anymore what tweaks you've applied.
Do NOT reboot and/or shut down your system while flashing; the reason for that should be self-explanatory. It's also recommended that you set your BIOS options to "default": reboot, go into BIOS and select the option "Load Fail-safe defaults" or something similar. Now all you need to do is to make backup bootable system disk(s), which can save you in case of a bad flash. Let me explain why.
I'm going to introduce and explain a new term in my article: the "boot-block." A boot-block is a small part of the BIOS that helps in case of a bad flash. Let me explain how and why. When flashing the BIOS usually (if you don't use additional commands) the boot-block remains intact, meaning that the "original" boot-block remains safe. The boot-block only contains the data that lets it know how to boot and flash the BIOS from a floppy disk or CD.
Suppose the data on the BIOS is screwed up; no POST will happen, nothing will appear on your monitor but your FDD and optical drives are going to blink like hell. This means that you have a bad flash. Either the wrong version of BIOS was flashed onto the ROM or there was a power outage and the flashing stopped right in the middle of the process. You can save your computer by inserting a bootable MS-DOS floppy disk (or CD) that is going to have following files on it: your flasher, a new BIOS flash file and "autoexec.bat." Autoexec.bat is executed as soon as your system boots up in MS-DOS. You need to include a command to run the flashing utility. Check out the following two examples; the first one is for AMI and the second one for Award.
amiflash.exe newbios.bin /A+ /-B /-C /-D /E /-G /I /L /N /R /V
awdflash.exe newbios.bin /py /sn

The above examples work only for AMI/AWARD chips, obviously. Replace the example with the correct commands, the name of the new flash file and use the appropriate flasher. After you've put everything on the floppy, insert it and reboot.
There is another way to flash AMI BIOS without the need for a bootable floppy disk. Rename your new BIOS flash file to "AMIBOOT.ROM" then copy it to a floppy disk (that will contain only this file). Insert it into your FDD and reboot. Hold down "CTRL"+ "HOME" to launch the flashing process.
You'll notice that the floppy LED (or the light on the optical device) is going to report that it's reading. Your system will boot up in MS-DOS and then the flashing process will start. Don't expect anything to appear on your screen; you need to wait until you figure out yourself that the LED isn't blinking anymore and it completed its task; you can wait up to a few minutes maximum to be sure that the process is finished.
Eject the CD or get the floppy disk out and reboot your system. If everything goes all right it is going to POST correctly and work as usual; what a relief. You've just saved your system from a bad flash.
But what if this doesn't help? Or what if you've flashed corrupt data also on the boot-block? What can you do then? Well, there are a few ways to flash a new and correct version of BIOS onto the chip. The most popular technique is "hot-swapping." You are going to need another ROM chip that is flashed with the correct BIOS, meaning that it's taken out of a working motherboard which is exactly like yours.
You borrow that chip for a half an hour (from a friend, neighbor, etc), install it in your motherboard and boot up; your system will POST if the data on the new chip is correct. As soon as you've booted up into MS-DOS, you take out the BIOS ROM chip on-the-fly and replace it with your chip (which has corrupt data on it). Then you proceed to flash.
As a side note, please be very cautious and aware that fiddling with components without turning the PC off is very dangerous; you can do more harm than good. Then again, this technique is tried and tested; it works but it's recommended only as a last resort when everything else fails. Basically you're taking out a chip that is powered on, so there is a slight chance of screwing up the entire motherboard's circuitry along with the chip.

MOTHERBOARD

Difference between AT and ATX:
AT and ATX are different form factors for Computers. A form factor is the physical layout of the motherboard and its associated case. Changing the design of a motherboard usually means changing the design of the case.
There are different variations on the AT design. There is the original AT, and the Baby AT form factor. The Baby AT design is simply a smaller version of the original AT design. It is therefore less expensive to make. A Baby AT motherboard can usually fit inside either a Baby AT case or a full AT case. However, an AT motherboard is too big to fit in a Baby AT case and it therefore must fit into an AT case only.
The ATX is a newer design for motherboards and cases. The ATX design uses a different power supply connector and the ATX case cools internal components much more efficiently than its predecessor. In addition to ATX, there is also Mini ATX and Micro ATX. These are smaller versions of the ATX motherboards and cases which adhere to the ATX design specifications, but skimp on expandability.

MotherBoard Architecture



1. Slot 1 Connector - this is where your Pentium II or Pentium III processor fits in. If you are using a standard Pentium, AMD K5 or K6, a WinChip or an IBM/Cyrix processor then you will be using a Socket 7 (sometimes called Super 7 for the newer chips) motherboard and the connector will be as shown under the main diagram.
2.ISA (Industry Standard Architecture) Expansion Slots - used to add expansion cards such as sound cards and internal modems. This type of expansion slot has a 16-bit bandwidth with a frequency of 8MHz. They are the older interface and are now being phased out.
3.PCI (Peripheral Component Interface) Slots - these are a newer type of expansion slot than the ISA ones and more components are now making use of them instead of the older slots. They have a 16-bit bandwidth and a frequency of 33MHz.
4. AGP (Accelerated Graphics Port) - these are the newest standard in expansion slots, for use only with graphics boards. The newer model has a 64-bit bandwidth and a frequency of 66MHz.
5. Memory Slots - the ones shown are DIMM (Dual Inline Memory Module) slots. Used to add memory to your computer.
6. Jumpers - these are used to configure the options on your motherboard, such as processor voltages etc. The jumper is placed over two pins to cause an electrical connection. Your motherboard manual should tell you the settings for each jumper.
7.Floppy disk and Primary/Secondary IDE channels - used to interface you hard drives, CD-ROMS and floppy drives to your motherboard. The smaller connector is for the floppy drive, and the two larger ones are for IDE (Integrated Drive Electronics) devices such as hard drives and CD-ROM drives. Up to two devices can be used from one channel, so on this motherboard you could have up to two floppy drives with four IDE devices.
8. Front Panel Connectors - these connect to the lights on the front of your system case to notify you of hard disk access, power etc. If you have an ATX style case then a power connector also fits here. The wires that should be connected to these come from the front of the case.
9. Real-Time Clock battery - allows the computer to retain the time when it is powered down. Also retains configuration data from when you first set up your computer.
10. BIOS EEPROM (Basic Input-Output System Electrically Erasable Programmable Read-Only Memory) - The BIOS configures the system resources on your system, and performs the self-check procedure each time you switch on your PC.
11. Ports - connects external peripherals to the system such as a keyboard, mouse and printer. Most modern systems will have one each of PS/2 keyboard and mouse connectors, two serial ports, one parallel port and two Universal Serial Bus (USB) ports.

12. Voltage Regulation - these components help to regulate the power supply to prevent 'spikes' when the power is switched on.
13. Power Supply Connector - this is where the power arrives from your case's PSU (Power Supply Unit). The one shown on this board is an ATX style connector and supports extra features such as auto shut-down and energy saving compatibility. The older AT style connectors have only a single row of pins and don't support these extra features.

Friday, September 11, 2009

Internet Fax Services


Here you will learn internet fax server overview and general introduction to the online faxing methods, how to send a fax and online services. A fax server consists of these things a PC, which is connected to the LAN, Fax server software installed on the PC and a Fax modem or a Fax board. Fax messages can be stored as printable documents, spread sheet, database or graphics. When someone wants to fax the documents, they can print the document to the fax printer then put the recipient information such as name and fax number, select the cover letter, type your message and then send the fax through the faxing software installed on your PC.
Alternatively, you can send the fax to the email messages and can take the fax number from the outlook express contact’s list. Sending fax through PC typically takes less than 30 seconds.
Alternatively, fax server can also be setup to receive the faxes and after receiving the faxes, these can be sent to the printer machine or can be sent to the specific recipient’s email address to notify them that he/she has received a fax.
There are certain advantages of the PC fax server, which I have discussed as follows.
1. The main feature of the Fax server is that it saves your time and cost and you can send the fax in the same way as you send emails and attached the fax to send to the recipients. 2. Invoicing, purchase orders and requested information can be scheduled to be faxed to the intended recipients.
3. Fax server will also retry if the recipient number is busy or if there is any error in the number.
4. You can also save the fax numbers of the frequent users.
5. Fax books also make it easy to send the faxes to the groups of people and at the scheduled times.
6. The faxes that are sent directly through the PC are looks better in terms of the resolution.
7. You can also manage the fax server to redirect the receiving faxes to the appropriate recipient so ensuring the security and timely receiving of the faxes.
8. The administrators can automate many functions of the fax server. A fax server can be configured to automatically send the invoices, purchase orders and the promotional newsletters. Additionally, a fax server can work without papers and reduces the overhead of putting and checking the papers again and again. Fax messages can be stored in your PC.

What is a Internet Fax
Internet fax is a device that uses IP networks to transmit the faxes instead of the PSTN. Internet fax uses e-mails as the medium for sending the faxes. Internet fax services include email to fax, fax to email and PC to fax (sending faxes from your computer). Internet fax is type of service, which enables you to send and receive the faxes in a timely manner without a fax machine. Only an email accounts is required to setup your Internet fax account.
Subscribers have to monthly fees to the internet fax service providers. Internet fax service providers usually works in a way that when a fax is sent to the subscriber’s number, the fax service receives the fax and send it to the recipient’s email address as an attachment.
All you need is to have the registered email address with the internet fax service providers. You have to write the fax content in the body of the email and type the fax number in the “To” field with a @ sign and a internet fax service name e.g 14545668999@efax.com. In the subject field sender can write the name of the recipient.
There is a small tool bar in the system tray for sending and receiving the faxes and it comes after installing the fax software. Upon receiving the email to the Internet fax service providers the automated programs convert the email messages to the fax format and send the fax to the recipient fax number. On the other, hand the recipient receives the fax on their fax machine normally.
The Internet fax services provide very ease and you assigned a fax number, which has to be active 24 hours so that you account can accept the faxes. On the other hand, the working of the regular fax machine is typically depends on your telephone line, which should be free while sending and receiving the fax. Internet fax service also saves your papers and the need of the fax machine.
Internet fax service is very familiar to the sending and receiving the email messages and it also saves the cost and time so many people are likely to use this service. Another big advantage is given by the Internet service providers is that it offers the toll free numbers to its subscribers in USA and Canada. So the people from USA and Canada can send faxes for free. Most internet fax services costs $10-20 per month. The communication charges are greatly reduced as opposed to the conventional fax machines, which costs a user per page.

Thursday, September 10, 2009

WiFi Network- Setup a WiFi Network


An Introduction to the Wi-Fi (Wireless Fidelity)
Here you will learn how to setup wifi network, how wireless fidelity works, hotspot security, vpn servers. Wi-Fi or wireless fidelity is meant for to be used when referring any type of 802.11 network, whether 802.11, 802.11a and dual band. Any products tested and approved as Wi-Fi certified by the Wi-Fi alliance are interoperable with each other.
Typically, any Wi-Fi product using the same radio frequency will work with each other even if not Wi-Fi certified. Formerly the term Wi-Fi was used only in the place of the 2.4 GHz 802.11b standard in the same way Ethernet was used.
Wi-fi short for wireless fidelity refers to a set of wireless networking technologies and more specifically referred to as any type of 802.11 network, 802.11b and 802.11a and dual band. The word Wi-Fi was built by an organization named as Wi-Fi alliance. A product that undergoes the Wi-Fi alliance analyses is given the name Wi-Fi certified.
Wi-Fi rapidly gained the fame in the United States with the access point. These devices tested by the “Wi-Fi alliance” are used around the world and allow users to have Wi-Fi capable device like a PDA or Laptop to connect anywhere there is availability of Wi-Fi access point. There are currently three standards that are used to signify the speed of the connection. Both the 802.11a and 802.11b are the capable of 54 Mbps with 802.11a additional features. The most common standard is 802.11b/second because it can transmit the data at 11 Mbps.
All these Wi-Fi connections are fast enough to allow the broadband internet connection. Wireless Fidelity is a fastest growing wireless technology that will probably be as common as phone lines and electric devices. Wi-Fi adds great levels of convenience and high level of production.
Wireless fidelity is planned to be used with the wireless devices but it is most commonly used for internet access. With Wi-Fi you can connect computers in your home, office or anywhere without the need of wires. The computers can just connect to the network that uses radio waves.
How does W-Fi work?
Wi-Fi is the wireless technology to handle the networking/communication. Wi-Fi allocates internet connection globally and to be transmitted by the radio waves. Radio waves are the main cause of Wi-Fi. Radio waves are transmitted from antenna and Wi-Fi receivers pick them up. When a user receives the Wi-Fi signals, a wireless internet connection is produced and a user is prompted to provide the user name and password if required to establish a wireless connection.
What is Wi-Fi Security?
Wi-Fi maintains certain security issues. WEP or Wired Equivalent Privacy is used in the physical and data link layers. It was planned to provide the wireless security by protecting the data, while it transmits from one point to another. Wi-Fi networking usually maintained inside a building premises. The data transmission in the Wi-Fi is protected by Wireless LANs but due to the fact that data travels over the radio waves so there are chance that data can be exposed and capture.
How to secure your WiFi network?
When you buy a wireless router you might find an Installation CD by vendor that CD with guide you through a wizard on setting up router. Here are some suggestions that how can you setup security on the router without using the application software.
1. Open a new browser.
2. You may now type IP address of the router in your browser. The step here is where you can get the management system of the router. Due to different vendors, you need to lookup on your router’s manual for the IP address usually it may be 10.10.10.01, 196.168.1.1 or 192.168.0.1, 100.100.100.1 or something similar to those matches and the default password of the router. Every router management console is different from each other. Try exploring around and find the appropriate section to manage.
3. You should never forget this step to setup an administrative password. The step to set here is often not located in Security section; you will need to take a look at the utilities, user management or system settings. Find it and change the password immediately for any user account.
4. Enable Wireless security. To turn on your encryption look under the wireless security tab. The step over here will need you to either use WPA or WPA-PSK and this will only appropriate if the devices on your network supported it. Otherwise you will need 128-bit WEP. For WPA or WPA-PSK, you would have to type pass phrase/password into a piece of paper and transfer to thumb drive so that you can set the password in the client’s machines.
5. Change your SSID. You should not make your SSID this will be probably a default SSID, normally those who do not configure their SSID will have their router name such as “linksys”, “belkin”, “dlink” etc. Try changing it with someone menacing, which will be threat for them to connect. Like virus geek, virus spreader. Remember that you will need this SSID when you browse through the network from your client machines. You can find these settings in the section of Channel or SSID.
6. Save your configurations and settings by pressing the save changes or save settings button. You will need to save every change that you will make to the router in order to it can take effect and probably you will have to reboot your router multiple times. Congratulations, finally you have covered the basic settings for your Wi-Fi network
Wi-Fi Hotspot Security: Using VPNs
There are numerous security issues regarding the use of the public wireless networks but all of which can be overcome. One of the solutions for users, as brought up in Wi-Fi Hotspot security, is to use the VPN (Virtual Private Network) to secure the real time traffic of the Wi-Fi hot spot users. Many small to large businesses provide their employees with the VPN access.
Although this access is typically put in place for employees to have the remote access to the corporate network in order to access the files and documents remotely. If you don’t have access to any VPN servers, create your own. By doing this you can remotely access the files from your office as well as other devices such as Wi-Fi video camera to keep an eye on the things while away.
When using the software-based VPN server features in Windows XP Pro, the PC running the server has to be powered-on to access the home network from the Wi-Fi hotspot. VPN routers can cost as low as $70 to $130 and the popular models are Linksys, WRV200 and WRV5G.

Wednesday, September 9, 2009

Not a valid Win32 application

This issue can be caused by any of the below possibilities.
File is corrupt, bad, or missing.
File is not designed for your version of Windows.
File is a virus, worm, or other malware file.
Hardware incompatibility.
File is corrupt, bad, or missing
If the file or program you're attempting to run is corrupt or missing, Windows will be unable to execute the file properly and sometimes generate this error message.
Download files
If you downloaded this file and verified it is complete and compatible with your version of Windows, delete the file and try downloading and running it again. It's possible during the download that the file became corrupted.
Finally, if the second download does not work, try downloading the file from a different webpage. It is possible that the person or company maintaining the website mistakenly uploaded a corrupt version of the file you're attempting download.
Installing a program from a CD or other disk
If you're attempting to install a program and are getting this error, verify that the CD is clean. If the CD is dirty or bad, you could get this error during the install and/or get this error after the program has been installed because it was not copied properly onto the computer.
Running a program from the computer
If you're running the program from a shortcut on the computer, verify that the program is still on the computer. In some cases if the program is no longer installed on the computer you may get this error.
If the hard disk drive is corrupted or bad it can also cause working programs to fail either because not all the data can be read from the hard disk drive or because the program has become corrupted while on the drive. Run scandisk and defrag on the hard disk drive to check for any potential errors.
Long file name issue
Make sure the program or file you're attempting to run does not contain the same name as the long file name directory it is contained in. For example, executing a file named "program" in the "program files" directory can cause errors in some versions of Windows.
Additionally, if you're attempting to install a program and after the install the program does not work, you may also want to try installing the program in a different directory.
Bad file
Any file can be changed or renamed to be a .exe file. If you're downloading the file, make sure the file is supposed to be a .exe file and that it's not being changed. If you're attempting to create a .exe, file make sure you're compiling the file for Windows and never just rename a file to a .exe file. For example, renaming a .bat file to a .exe file will not make the file an executable file. For a file to become an executable file it needs to either be compiled or converted through a software program designed to convert the file.
File is not designed for your version of Windows
If you're trying to run a program that is not designed for your version of Windows you may get this error. Although many older programs designed to work in older versions of Windows will work with new versions of Windows, unfortunately, not all programs will work.
· If the program is an older MS-DOS program or early Windows program you may get this error.
· If the program is designed for a 64-bit version of Windows and you're running it in a 32-bit version of Windows, it will not work and generate this error.
File is a virus, worm, or other malware file
This error can be generated by a file that is a virus, worm, Trojan, or other type of malware file. Often, this will be caused because the virus scanner installed in the computer will not allow the file to be installed or run. Try scanning the file to verify it is not a virus and/or infected.
If the file has been checked and is clean, it is still possible that the virus protection program and/or another program installed on the computer is causing issues during the install or execution of the program. Boot the computer into Safe Mode and try running the program; booting the computer into Safe Mode will make sure nothing is running in the background that could be causing this issue.
Hardware incompatibility
If you're getting this error during the installation of a program it's also possible that the CD-ROM drive or the drive you're installing the program from is not compatible with Windows or has drivers that are not compatible with Windows.