Google+ Badge

Wednesday, May 01, 2013

Get Connected To Wi-Fi

Wi-Fi, short for wireless fidelity refers to a set of wireless networking technologies more specifically referred to as any type of 802.11 network, 802.11b and 802.11a, dual band. The word Wi-Fi was built by an organization called the Wi-Fi Alliance. They overlook tests that confirm the production.

A product that undergoes the alliance analyses is given the name “Wi-Fi certified”. In earlier times, the term “Wi-Fi” was used only in place of the 2.4 GHz 802.11b.standard. It rapidly gained in fame with access points across the Unites States.

These standards are generally in used around the world, and allow users that have Wifi capable device, like a laptop or PDA to connect anywhere there is available Wi-Fi access point.

There are three standards referred to signify the speed of connection. Both the 802.11a and 802.11b are the ones capable of 54 MBPS with 802.11a additional capabilities.

802.11b are the most common of the three standards because it can transmit at 11 Megabits per Second even though the faster WI-Fi standards are quickly changing it. However, all these Wi-Fi standards are fast enough to generally allow a broadband connection.

Wireless Fidelity is an appearing technology that will probably be as common as electric outlets and phone lines in a few years. It adds great levels of convenience and high level of production for workers whose offices have a Wi-Fi access.

It is intentionally planned to be use for wireless devices but is now often used for Internet access. You can connect computers anywhere, in or out your home or office without needing wires. They are just connected to the network that uses radio signals. Even travelers can progressively equip Wi-Fi in airports, coffee shops, Internet cafes, malls, and hotels around the world.

How does W-Fi work?

Wi-Fi is the wireless way to handle networking. Wi-Fi allocates a worldwide Internet connection to be transmitted through radio waves. Radio waves are the ones that make Wi-Fi run and exist. They permit Wi-Fi networking occurs between many people. These waves are transmitted from antennae and Wi-Fi receivers are picking them up. The moment a device receives signal within the range of a Wi-Fi network, an Internet connection is produced without a chord and with the use of a Wi-Fi card that reads the signal. The user will be incited with login screen and password if needed once the connection is established between the user and the network.

How secure is Wi-Fi?

Wi-Fi maintains and continues to have numerous security issues. Wired Equivalent Privacy (WEP) is used in the physical and data link layers. It was planned to provide wireless security by protecting the data while it travels from one point to the other. Contrasting with the wired LANs, their networks are usually inside the building.

Even if it is protected by wireless LANs, they are more exposed due to the fact that the data travels over radio waves which are much easier to capture. One of the reasons why WEP is vulnerable, some other corporations do not even change their shared keys for a long time. The keys are too long to be used. With that much time, the key can get into other hands and use it in a wrong motive, which could be disastrous for the corporation.

Computer Repair

Owing a computer is almost essential in today’s world. With the introduction of the internet and the convenience of email as a method of communication, it’s easy to see why most people want to have a computer in their home or office.

Computers are like anything else and there are times when they don’t operate as planned. It’s frustrating to be sitting at your desk ready to play a game or work on a document only to find that your computer isn’t being cooperative.

When it comes to computer repair it’s often wise to seek out professional help. A computer technician is specially trained to evaluate the problem and offer the best possible solution.

There are certain types of computer repair that you might want to undertake yourself. These are usually minor fixes that can be handled with a bit of instruction and attention to detail.

A computer repair that you might be able to take care of yourself is the replacement of the computer’s battery or fan. Every desktop computer has a fan inside of it. This fan is used to keep the computer’s components cool. It’s essential that the fan operates efficiently to ensure that the computer doesn’t become overheated.

The first sign that your computer’s fan might not be operating properly is that you’ll notice a different sound when you start or run your computer. Instead of immediately taking it to a computer repair shop, take a moment to test the fan.

Computers typically have two fans. One is used to cool the power supply and the other is used to cool the CPU. Open the cover of the computer and listen. If the sound does appear to be coming from the fan that cools the CPU you’ll want to replace it.

If the computer is still under warranty than this type of computer repair will be done free of charge. Follow the instructions you were given for repairs at the time of purchase. If the warranty period has elapsed you can either take it to a computer repair shop or do it yourself.

The very first and most important step when doing any computer repair is to unplug the computer from the electrical outlet. You’ll then need to examine the fan to see how it’s connected. It will probably be attached by a few small screws. Once these are loosened you’ll need to disconnect the fan from its power supply. This will be one or two small clips. Then take the fan to your computer repair shop and purchase a new one.

After replacing it, reattach the cover and plug the machine in. The fan should operate perfectly now and the noise that you were hearing will have disappeared.

Sometimes a computer will make noises because a piece of hardware isn’t attached properly. One of the likely culprits is the CD-Rom or DVD drive. Again for this type of computer repair, you’ll want to carefully remove the cover and listen for the source of the noise. After tightening the screws that hold the hardware in place and reattaching the cover, plug the machine in and listen if the offending noise is gone.

When it comes to computer repair it’s important to be safe and thorough. Computers are an expensive investment and keeping them running efficiently is crucial. If you are comfortable handling a small computer repair yourself, give it a try. If you’re not comfortable, take the machine to a local computer repair shop and allow the experts to do their job.

Best Passwords

No sane person would ever like someone else reading her email. Or for that matter some other person using her password and breaking into a financial institution. You should, therefore, choose a strong, secure password in such a manner that would be a hard nut to crack for others and easy for you to remember. The more random and mixed-up you make it, the harder it is for others to crack. Mind you, if your password is compromised, the password crackers will even take over your identity.

A password, if too short, is vulnerable to attack if an attacker gets hold of the cryptographic hash of the password. Present-day computers are fast enough to try all alphabetic passwords shorter than seven characters. We can call a password weak if it is short or is a default, or which can be rapidly guessed by searching a subset of all possible passwords such as words in the dictionary, proper names, words based on the user name or common variations on these themes.

On the other hand, a strong password would be sufficiently long, random, or which can be produced only by the user who chose it, so that 'guessing' for it will require too long a time.

For maximum security, the user should follow some simple guidelines:

1) Passwords should preferably be at least 8 characters long and not more than 14.

2) Passwords should contain a mix of numbers, letters, and special characters (%&3ac_ht4@m7).

3) Passwords should not contain a dictionary word from any dictionary, be it French, Spanish, medical, etc.

4) Each password should be different from the user's User-ID and any permutation of that User-ID.

5) New passwords and old passwords should differ by at least 3 characters.

6) Avoid picking names or nicknames of people, pets, or places, or personal information that can be easily found out, such as your birthday, address etc.

7) It’s wise to stay away from common keyboard sequences, such as dfgh678 or abc345 .

8) Never form a password by appending a digit to a word. That can be easily guessed.

9) Avoid writing your password down or storing it on your computer.

10) Never share your password with anyone else.

Basics Of A Router

Router is a computer device that receives or forwards data packets to and from the Internet towards a destination in the process called routing. Router is the essential component of the computer networking that enables any sent data to arrive at the right destination.

As an illustration, imagine that the Internet is the world and one computer is one household. Other computers connected through the Internet are households around the world. Say one household will send a letter to another household in any part of the world. The letter has an address right? And that address would determine the destination of the letter. But without one reading the address, the letter would not arrive to the right receiver. The letter also would not be able to reach the intended receiver if there is not medium. This medium would be the courier. And the courier of the computer data is the router.

A router (broadband router) is also a device that enables two or more computer to receive data packets from the Internet under one IP address at the same time.

Remember that to be able to connect to the Internet, a computer must have an IP address unique from the rest of the computers. Therefore, every computer connected to the Internet has it own IP address. It is like having a fingerprint or ID as an access pass to be able to enter the web. With the presence of the router, this “fingerprint” or “ID” could be shared by two or more computer at the same time.

In simplest form, a router makes two or more computer use the Internet at the same with one access pass.

One more thing: a computer with cable modem could also be considered as a router. In this, the computer would do the process of routing like normal routers do. Other computers are then connected to the computer with Internet connection that would give it with the Internet connection. The computer with cable modem has the direct contact with the Internet and the ones connected to it are sharing the connection.

Why would anyone need a router?

For households with two or more computers who would want to have Internet connection to every computers they have, taking subscription for each would be too much. The solution is to buy a router that would enable every computer in the house to have an Internet connection. In the definition above, the broadband router would act as a hub to the existing Internet connection.

If the router is comparable to a hub, would it affect the Internet speed?

It should be taken into consideration that once a single Internet connection is divided, the connection speed is affected. But there are some broadband routers that would bring minimal slowdown to the Internet speed and the effect might not even be big.

Internet speed would also depend on the type of application used in a router. While some would inflict little effect on the speed like online games, others would terribly slowdown your connection and even hinder you to use the Internet at all.

Usually, offices use a more sophisticated router to redirect Internet connections to the large number of computers. These routers would give better data packeting compared to a typical router used at home that results to faster Internet speed.

Antivirus Software - Protecting Your Computer's Data

When you buy a new computer you must protect your investment from malicious software programs such as viruses, worms, spyware, and trojans.  These programs can cause serious damage to your computer system by erasing data or providing your sensitive data to criminals. You can help protect your personal computer by installing antivirus software to remove and prevent nasty viruses and spyware.

There are various antivirus programs available on the market and while they all do the same job, there are several things to keep in mind when choosing a program.

First you will want to consider the ease of use of the software.  The average computer user is not tech savvy so you will want your antivirus software to be very user friendly.  Look for features such as easy configuration as well as scanning your system on demand.  The software should also automatically check for updates.

A good antivirus program will also be able to remove dangerous viruses, trojans, and worms and prevent new ones from infecting your computer.  If the program cannot completely remove these viruses, it should at the minimum be able to keep the virus from spreading.

It is also important to ask if the software is a system hog.  Many antivirus programs can use up a lot of your computer's resources slowing down your system.  This can cause problems if you plan on running your antivirus software in the background while you continue to work.  There are many good programs available that use resources more effectively.  They run unnoticed in the background while you continue to work normally.

Some antivirus programs do include spyware prevention but in order to be fully protected, you may opt for purchasing separate spyware software as well.  A separate spyware program can help ensure that your computer is safe from spyware issues that a combo program may not be equipped to catch.

A Computer And Internet Glossary

When you use computers and the Internet in your business, it's all too easy to start feeling like you're drowning in a sea of nonsense. Computer-related things tend to have a language all their own, and while you don't need to know all of it, there are many confusing words and phrases that you're going to come across sooner or later. Here's a quick primer.

Bandwidth. Bandwidth is the amount of data that your website can send each second, as well as the amount of data that the visitor to your website can receive. If either one doesn't have enough bandwidth, then the website will appear slowly. For this reason, you should choose a host with plenty of bandwidth, as well as testing that your site doesn't take too long to download on slow connections.

Browser. A browser is the software (see below) that visitors to your site use to view it. The most popular browser is Microsoft's Internet Explorer, which comes with Windows.

Cookie. Cookies are data files that your site can save on the computer of someone who visits that site, to allow it to remember who they are if they return. You will find that problems people have in ordering from you will almost inevitably be related to cookies -- they will need to have them turned on.

Download. Transferring data from a website to a computer.

Favourite. A favourite is a website that a user has stored to look at again, by choosing 'Add to Favourites' in their browser's menu.

FTP. File Transfer Protocol. This is a common method of uploading (see below) files to your website.

Javascript. A common language for writing 'scripts' on websites, which are small programs that make the site more interactive. Another common cause of problems for visitors.

JPEG. Joint Photographic Experts Group. This is the name of the most popular format for pictures on the web, named after the group that came up with it. If you want to put pictures on your website, you should save them as JPEGs.

Hardware. Hardware is computer equipment that physically exists. It is the opposite of software.

Hosting. If you've got a website out there on the Internet, then you'll be paying someone for hosting. It is the service of making your site available for people to see.

HTML. HyperText Markup Language. A kind of code used to indicate how web pages should be displayed, using a system of small 'tags'. The 'b' tag, for example, causes text to appear in bold, and the 'img' tag displays a picture.

Hyperlink. A hyperlink is when a piece of text on a website can be clicked to take you to another site, or another page on the same site. For example, if clicking your email address on your website allows someone to email you, then your email address is a hyperlink.

Programming. This is when the computer is given instructions to tell it what to do, using one of many 'programming languages'. Programming languages for the web include PHP and Perl.

Server. The server is where your website is stored, and it is the server that people are connecting to when they visit the site. If someone tells you, for example, that your server is 'down', it means that your website is inaccessible. Note that server refers both to the hardware and software of this system.

Software. Programs that run on the computer, or that make your website work. Microsoft Word is software, for example, as is Apache (the most popular web server software). Opposite of hardware.

Spider. Don't be scared if a spider visits your website! Spiders are simply programs used by search engines to scan your site and help them decide where it should appear when people search. It is good to be visited by spiders, as it means you should start appearing in search engines soon.

Upload. Uploading is when you transfer data from your own computer to your website. For example, you might upload your logo, or an article you've written. Opposite of download.

URL. Uniform Resource Locator. This is just a short way of saying 'web address', meaning what you have to type in to get to your website. Sometimes pronounced as 'Earl'.

A Brief Introduction To Fiber Optics Technology

Understanding how fiber optics are made and function for uses in everyday life is an intriguing work of art combined with science. Fiber optics has been fabricated from materials that transmit light and are made from a bundle of very thin glass or plastic fibers enclosed in a tube. One end is at a source of light and the other end is a camera lens, used to channel light and images around the bends and corners. Fiber optics have a highly transparent core of glass, or plastic encircled by a covering called "cladding". Light is stimulated through a source on one end of the fiber optic and as the light travels through the tube, the cladding is there to keep it all inside. A bundle of fiber optics may be bent or twisted without distorting the image, as the cladding is designed to reflect these lighting images from inside the surface. This fiber optic light source can carry light over mass distances, ranging from a few inches to over 100 miles.

There are two kinds of fiber optics. The single-mode fiber optic is used for high speed and long distance transmissions because they have extremely tiny cores and they accept light only along the axis of the fibers. Tiny lasers send light directly into the fiber optic where there are low-loss connectors used to join the fibers within the system without substantially degrading the light signal. Then there are multi-mode which have much larger cores and accept light from a variety of angles and can use more types of light sources. Multi-mode fiber optics also use less expensive connectors, but they cannot be used over long distances as with the single-mode fiber optics.

Fiber optics have a large variety of uses. Most common and widely used in communication systems, fiber optic communication systems have a variety of features that make it superior to the systems that use the traditional copper cables. The use of fiber optics with these systems use a larger information-carrying capacity where they are not hassled with electrical interference and require fewer amplifiers then the copper cable systems. Fiber optic communication systems are installed in large networks of fiber optic bundles all around the world and even under the oceans. Many fiber optic testers are available to provide you with the best fiber optic equipment.

In fiber optic communication systems, lasers are used to transmit messages in numeric code by flashing on and off at high speeds. This code can constitute a voice or an electronic file containing, text, numbers, or illustrations, all by using fiber optics. The light from many lasers are added together onto a single fiber optic enabling thousands of currents of data to pass through a single fiber optic cable at one time. This data will travel through the fiber optics and into interpreting devices to convert the messages back into the form of its original signals. Industries also use fiber optics to measure temperatures, pressure, acceleration and voltage, among an assortment of other uses.

Cell phones, do you really want to be available all the time?

Do you really want to be available for anyone and everyone on a 24/7 basis?  What do I mean?  A famous person once said that the more available you make yourself; the more available everyone will expect you to be. People will actually be annoyed if you are not instantly and constantly available rather than being pleased when you do call. People expecting you to be available all the time may be annoying.  Cell phone calls follow you everywhere you are including your bathroom.  Even during nighttime when you want to rest, cell phones continue to ring and annoy you.  If it is important, no problem but if it is very menial, why you need to be bothered so late.

Today in this modern society, we live in and the proliferation of cell phones we see people talking anywhere and everywhere.  If used for business, this may prove to be very effective and worthy.  However, for very menial issues being bothered in your sleep and even during your bathroom time may be quite annoying if not outright disgusting.  However, if you make yourself available all the time, you created your own nightmare.

Cell phone etiquette is getting to be a forgotten concept.  You will see people talking on the phone loudly and disturbs people nearby in restaurants and even in offices.  I am sure by now, once or twice in a meeting you will notice that when a cell phone rings, almost everyone around will immediately look for their cell phones.  If you were the one talking, and then the person in front of you talks on his phone, how would you feel?  I am sure you will feel belittled and ignored.  Rude practice, and should be changed.

It may help people who use cell phones to follow certain degree of etiquette with respect to the use of cell phones specially in places where you may seem rude if you use or even when your cell phone rings.

When you are in a place of worship, it may be necessary to leave your cell phone in the house or at least turn it off if you do not want to be away with it.  This is because ringing cell phone will not just disturb you while you pray it will also disturb others.  You do not need to show off your expensive gadget in a place of worship. 

During meetings, please turn off your cell phone; it is rude to have your phone ringing while somebody speaks.  Disruption may cause problems especially when the meeting tackles extremely important issues.  However, if you are waiting for terribly important call, you may use the vibrate mode of your cell phone to alert you when a call is in-coming and leave the meeting if you need to answer the call.  You may also inform the possible caller that you are in a meeting and that you cannot be disturbed.

When traveling and if you are on-board an aircraft, you will be required to turn off your phone.  This is because electronics devices may interfere with the aircraft’s avionics.  Thus, it is a requirement to turn of your phone for safety reasons.  However, for extremely long flights, airline companies allow cell phone usage at a certain time, if you really need to make a phone call, use this time allotted if necessary.

Cell phone have become to be a necessity nowadays, that is why most people use it and cell phone manufacturers have continuously develop different usage and functions for this very small gadget. Be globally competitive, but you should understand that being rude is not part of modernity.  Follow certain degree of etiquette; this will be very helpful to you and your business.