luni, 31 decembrie 2012

Enjoy Wireless Connectivity with Wi-Fi Routers - Computers

You have heard the word hot spot but don't know what this exactly is. With the advancement of technology connectivity has now become wireless and networking among computers and compatible devices are now possible without the use of wires. Don't understand? Well, let me explain in a simpler way. There are some designated places where Wi-Fi is in operation and these places are often called hot spots. The places are for public access where the people can connect to the network and surf Internet with a wireless device like laptop, mobile, etc. Some hotspots are exclusively designated for authorized users like hotel guests, coffee shop customers, or library patrons.

To access the network in a hot spot, authentication is required. You may wonder how it is possible. This is made possible by Wi-Fi routers. Now obviously the question arises, how does a wireless router work? You certainly have experience of cordless phones. These phones use radio waves to connect a remote to a base device. A wireless network works almost in the very same way. Instead of a network cable, here data packets are sent to a variety of destinations. For router configuration, you can consult a computer repair service provider.

Before delving deep into discussion, let's have a look at what is Wi-Fi. We are now a days very much familiar with this term but it mainly refers to wirelessRouterwireless devices certified by the Wi-Fi Alliance. You will find the Wi-Fi logo on the Certified Wi-Fi devices. This signifies that it has been tested by the alliance. But now we consider all the wireless routers as Wi-Fi routers, not necessarily whether it is certified by the Wi-Fi Alliance or not.

Have you ever used a wireless router? This is mainly a network router having a built-in access point. Like other routers its job is to exchange data between the Internet and a local area network. In many cases, we use standalone wireless access points where a standard router port is connected on one end while a wireless transceiver on the other. In both of the two cases, the transceiver sends and receives data via antennae. For accessing to a wireless network, it is a must to have a wireless network adapter. Almost all the modern day laptops and mobile phones have this feature inbuilt.

Now, we will discuss on how Wif-Fi operation is done. To access to a wireless network the client device needs to have authorization. There are security feature that block intruders from accessing the facility. Once the connection is allowed to enter, the device can send and receive data from the Internet or from another local networked device.



access point vs router

How to Log Into your Linksys Router - Computers

The final step of setting your Linksys router would be to log into it. To do so, follow the instructions below.

First, the Linksys router login username should be left blank, and then enter the password "admin". This Linksys router login password would be a default one. You will then enter its page, where you will be able to configure the options of the router to suit your usage. However, the router works fine without needing to do any configuration as it is already functional with its default settings, and you are good to go. Yet, if this router is a wireless one, you might want to further set an SSID so that the router will be identified as yours, and then you will be able to use WEP so that you can control who uses your wireless router.

To set up the DSL ISP, key the URL 192.168.1.1 onto your web browser's URL address and you will enter its setup page. At "Local IP Address", which is located under the Setup a Basic Setup, change it to 192.168.2.1. Then, click "Save Settings". You will then be able to change your IP address to make it your unique own.

To change the IP address, enter MS-DOS or Command Prompt. This can be done by clicking the "Start" button on the task bar, and then from its options, click "All programs", then "Accessories", and then "Run command", or you can search for "cmd" and click it. From there, everything else will be done using the keyboard, starting with typing "ipconfig/release", and press Enter. You will see that your IP address is made out of 0's. Then, type "ipconfig/renew", and press Enter. You will then receive your new IP address that consists of a series of different numbers.

Go back to the router's setup page again by keying in 192.168.2.1 on your web browser. When you see at "Status" that the IP address consists of a series of numbers, congratulations, you have changed your IP address.



access point vs router

How to Reset Linksys Router Password - Computers

Linksys router has becomes a useful device for both wired and wireless networking communication. It could be used at home, office, any educational institution or public library. Although it is fairly easy to set up and be used, there will be times you need to know how to reset Linksys router password. It comes handy when you forgot the password or simply want to change it.

In order to know how to reset Linksys router password, you need to set it back and restore it to the factory default configurations. First, you need to hold the reset button on the router for 30 seconds. Then you should remove the plug of the power cord for another 30 seconds. After that, you could plug the power back to its place. You need to wait for a few seconds before releasing the reset button on the router. When this has been done, the next step is to reconfigure the password and IP address. This is essential as resetting it to default will erase all of this information. To continue on, you need to connect a computer to the Ethernet ports and go to URL This will take you to a place where you are required to enter username and password. Different model of Linksys routers may have different default username and password. You will need to check out the router model you are using. Once you enter in, click on the management tab which will allow you to change the adminis trator password. Type your own chosen password. At the same time, you could also reconfigure other areas of the router.

Remember to take note that whenever you plan to reset the router, you will need to know the information on how to restore to original settings and what is required to configure.



access point vs router

How to Boost Your Wireless Router's Internet Security - Computers

With Wireless Routers gaining popularity nowadays, more and more people are finding ways to either use the signals for free or using other people's identity to do things online. These are possible because the router uses radio signals to transmit your information, in which anyone within the signal's range can have access to if it is not secured. Thus, in order to buck up on your Internet security, here are some things you could do.

First, you could make your Wi-fi not visible. This can be done by logging into your base station management Website, and then have the SSID Broadcast disabled. This way, anyone looking for a wireless network will not be able to see your network in the list. By doing this, passers-by and neighbors cannot take advantage of your network, especially since they cannot see or detect it in the first place.

Another thing you can do is to set the range which your wireless network can reach. This means, if your router can reach maybe two block away, set it so that it can only reach the far end of your house or apartment. This can be done by purchasing the right router, in which signal range in limited to the intended space, or you can reduce the transmission strength by removing or readjusting the router's antenna so that it will focus its strength accordingly.

Other than that, you can disable the remote admin. When it in enabled, you will be able to access the router through the means of Internet. Thus, disabling it means you can only access the router from the router itself. The disabling can be done by logging onto your base station Website, and then choosing to disable it.

One of the most obvious and simplest thing to do is o select a password that is difficult to crack. Do not use very common passwords, like your name, birth date, easy string of numbers, or anything extremely common. Try to use a combination of letters, numbers and symbols, which is much harder to figure out. Changing your password can be done by logging onto the base station Website and change the password from the default one.

There are many other ways to boost up Internet security, but here are some of the ones you can do with your wireless router.



access point vs router

CNC Router Bits-What Are CNC Router Bits? - Hobbies

CNC router bits are bits used specifically for CNC machines and other automatic routers. Many different brands of CNC bits are available, including Amana, End Mills, Whiteside, and CNC Robotics.

Amana claims to be the industry leader in CNC router bits, and their line is made from high-grade carbide. Out of all manufacturers, Amana was the first to subscribe to, follow, and meet the standard set by Holz BG German for quality and safety.

The carbon alloy steel used by Amana for its cnc bits contains vanadium particles that improve the quality of the bits, add to their lifespan, and ensure they will be less prone to corrosion, cracking, or any other type of damage.

The leading carbide producers in Europe, Ceratizit, supply the carbide used in all Amana CNC router bits, and the grinding is done via a cnc machine more advanced in its applications than those used by competitors.

For example, the CNC Spiral Flute Plunge 2-Flute U-Cut Solid Carbide Routerbit, 1/4-inch shank combines sheering and augering action into a single bit. The up-cut sheers avoid putting excessive stress on the tool, and it is a common CNC bit used in mortising and other woodworking applications.

This bit is a sufficient tool for creating grooves and dado cuts in a variety of materials from hardwoods, softwoods, plywood, and composite materials. It can be used with a handheld router or other portable routers in addition to CNC machines.

End Mills, another manufacturer offering CNC bits, makes products that are designed exclusively for CNC milling machines. Items such as the End Mills CNC Router Tool 0.05ced, set of 5 are designed for CNC machines, in particular.

This set, just to consider an example, is designed to cut trace isolation patterns not, like most other CNC bits, on wood products exclusively, but also on fiberglass, carbon, metal, plastics, and wood applications.

This set contains five router bits, and, like Amana's CNC bits, is tipped with carbide in order to provide a tool that stands up to the demands of serious projects. CNC bits, as this End Mills set indicates, are useful not only for woodworking applications as they have been traditionally, but can be used to shape and create other industrial products made from various materials.



access point vs router

duminică, 30 decembrie 2012

DLink DSL-2740B Wireless Modem Router - Computers - Hardware

Looking for a modem router to support your new ADSL2 internet connection and also looking for a device that can share that connection over cable and wirelessly? Then have a look at the DLink DSL-2740B wireless modem router. For around $135.00 USD, you get a solid unit that can do both.

This router supports both ADSL and ADSL2/2+. This will give you download speeds of up to 24 Mbps. If you have a need for a new ADSL router, and you believe you may be able to get ADSL2 or ADSL2+ later then buy one of these. You can easily use this router when the faster connection becomes available.

Wirelessly this router performs very well. The specifications say 802.11n which is technically 4 times faster than 802.11g. It is also backwards compatible with 802.11g and 802.11b devices. Security supports WEP, WPA and WPA2 devices to cater for all user access security and data encryption types.

The built-in firewall uses SPI or Stateful Packet Inspection and also logging to prevent DOS or Denial of Service attacks. The router comes with access control and packet filtering based on port and source/destination MAC/IP addresses. VPN pass through support for mobile user access is also supported.

Like many other routers these days, this unit supports QoS or Quality of Service which allows for lag-free transmission for programs such as streaming multimedia and VOIP over the internet.

Product features include 4 hardware ports supporting 10/100Base-TX, built-in NAT firewall with SPI and DOS protection, 802.11n wireless specification, up to 270 Mbps raw data transfer rate, multiple SSIDs, support for secure WPA and WPA2 wireless data encryption and dynamic DNS.

To access and maintain the unit there is support for a web based GUI for ease of access to all of the features packed into this wireless modem router.



access point vs router

Having A Wireless Router Makes Sharing So Much Simpler - Computers - Hardware

If you have a broadband connection and a wired router then you have most likely begun to experience the limitations of having a wired net connection. Wires are often very cumbersome and running them from one location all throughout your home or office can certainly get really messy. A wired router only has a restricted number of ports to connect your devices to and in a busy home with a multitude of internet ready devices this is very simply just not enough. Many have even attempted to connect multiple internet routers to try and combat the problem but this can become very complicated and unsightly.

A much better way of hooking up all of your household devices to the internet is by using a wireless router. A lot of people assume that going wireless is going to be incredibly pricey but honestly a wireless router only cost a couple of dollars more than a wired one however offers quite a bit more in the way of capacity.

A wireless router sends a signal throughout your business or home and this signal can be picked up by any device which has wireless reception. These devices include your game consoles such as PS, Nintendo Wii and Xbox 360 can also be wireless routed but needs a wireless receptor which you'll need to purchase separately. Other online ready devices such as laptops and desktops might require an additional receptor as well to be able to catch the wireless signal. Of course, a wireless router will still allow you to connect some devices through the router directly using a wire if you desire.

A wireless connection is also very helpful when you have people visiting you because they will be able to hook up their internet ready devices to your wireless connection very simply by providing them with your internet access code. A lot of people fear that having a wireless connection will increase your vulnerability and that others will have the ability to view your online access from even outside your home, however, utilizing a WEP or WPA code will help you prevent having your connection hacked by someone else.

Wireless internet access is the best way to make it possible for internet ready devices to be utilized throughout your home or office place. With very little hassle you can hook up a variety of various devices to just one wireless internet router. This will make it possible for you to have all the advantages of internet in every room without having unsightly wires running throughout your home or work environment.



access point vs router

Why Buy The Netgear WNDR3700 Dual Band Wireless Router? - Shopping - Electronics

Yes it looks cool. Sort of like an alien spacecraft getting ready to launch when resting on is side. True it feels good to own something that others refer to as the "Ultimate Networking Machine". It's easy to fantasize about the 680MHZ processor under the hood like it's a high performance sports car.

But do you really need one? Let's examine this a little closer before running out and purchasing something just because it's the latest and greatest. Then we can talk about getting the best deals.

If you live alone, own a single computer and printer and spend most of your time surfing and downloading files you don't really need one. A simple wireless-G router will do just fine.

If you do a lot of downloading large files from the Internet and do any amount of gaming on the Internet a Wireless-G router simply won't do. Time to move up to one of the faster and more powerful Wireless-N routers.

Some Wireless-N routers are built for gaming and come equipped with a built-in USB port you can use for sharing out music, video and data files out to the other computers on your wireless network. Still you don't really need a dual band wireless router just yet.

So when does a high performance wireless router like the Netgear WNDR3700 cross the line from luxury to necessity? When you and the other members of your household find yourselves doing all the above from multiple computers in all corners of your house it's time to start thinking about a dual-band wireless-N router.

If you have multiple wireless computers, a game console, iPhones, network storage devices, Internet ready flat panel TVs, printers, cameras etc floating around your house it's time to face it. You are truly a member of the digital age and just any old Wireless-N router isn't going to do. In fact you may be in for a lot of frustration if you don't upgrade to dual bands.

Remember what dual bands gives you. The ability to have two high-speed Wireless-N networks share the same space simultaneously without interfering with each other. You can do all your surfing, printing and downloading on one band and all your gaming and video on the other. Two totally separate wireless networks each with their own unique SSID and security running from a single high-powered device! Now you will come to realize why they call it the "Ultimate Networking Machine".

Important Update

Netgear has recently renamed the WNDR3700 to the WNDR37AV. The resulting confusion has caused the Netgear WNDR3700 prices to drop and the WNDR37AV to become scarce even though they are both the same router. Now a good time to take advantage of this!



access point vs router

Why Buy The Netgear WNDR3700 Dual Band Wireless Router? - Shopping - Electronics

Yes it looks cool. Sort of like an alien spacecraft getting ready to launch when resting on is side. True it feels good to own something that others refer to as the "Ultimate Networking Machine". It's easy to fantasize about the 680MHZ processor under the hood like it's a high performance sports car.

But do you really need one? Let's examine this a little closer before running out and purchasing something just because it's the latest and greatest. Then we can talk about getting the best deals.

If you live alone, own a single computer and printer and spend most of your time surfing and downloading files you don't really need one. A simple wireless-G router will do just fine.

If you do a lot of downloading large files from the Internet and do any amount of gaming on the Internet a Wireless-G router simply won't do. Time to move up to one of the faster and more powerful Wireless-N routers.

Some Wireless-N routers are built for gaming and come equipped with a built-in USB port you can use for sharing out music, video and data files out to the other computers on your wireless network. Still you don't really need a dual band wireless router just yet.

So when does a high performance wireless router like the Netgear WNDR3700 cross the line from luxury to necessity? When you and the other members of your household find yourselves doing all the above from multiple computers in all corners of your house it's time to start thinking about a dual-band wireless-N router.

If you have multiple wireless computers, a game console, iPhones, network storage devices, Internet ready flat panel TVs, printers, cameras etc floating around your house it's time to face it. You are truly a member of the digital age and just any old Wireless-N router isn't going to do. In fact you may be in for a lot of frustration if you don't upgrade to dual bands.

Remember what dual bands gives you. The ability to have two high-speed Wireless-N networks share the same space simultaneously without interfering with each other. You can do all your surfing, printing and downloading on one band and all your gaming and video on the other. Two totally separate wireless networks each with their own unique SSID and security running from a single high-powered device! Now you will come to realize why they call it the "Ultimate Networking Machine".

Important Update

Netgear has recently renamed the WNDR3700 to the WNDR37AV. The resulting confusion has caused the Netgear WNDR3700 prices to drop and the WNDR37AV to become scarce even though they are both the same router. Now a good time to take advantage of this!



access point vs router

How to Speed Up Windows Boot Time - Computers - Software

One of the questions I am often asked is how to speed up the time it takes Windows to load or boot. There are a variety of factors (both hardware and software) involved in lowering the amount of time it takes for Windows to load. I will go over most of these ways in this page starting with changes in the system BIOS and moving onward from there.

All of these changes are optional, and do not need to be carried out. Instead, they are offered as suggestions to try to lower the time it takes for Windows to boot. Some of these changes are very advanced and should only be attempted if you are comfortable with making the changes and have your data backed up.System BIOS Changes

One of the first places to help speed boot time in Windows is to make some simple changes to the system BIOS. The BIOS or Basic Input/Output System is a set of instructions and commands built into the motherboard that allows the computer to know what type of hardware is connected and how to communicate with that hardware. You'll first have to gain access to the BIOS setup screen to make any changes. Do not make changes to the system settings in the BIOS lightly, one mistake can render the computer unbootable and cause more problems than its worth. For this reason, do not attempt making changes to the system BIOS unless you are willing to accept the risk along with it. With that said, you'll want to follow the directions below and make some simple changes to speed up the boot process.

1) You must start with the computer completely off, not in sleep or hibernation mode. Then turn the computer on.

2) Enter the system BIOS screen by the manufacturers suggestion. Depending on the computer, this may involve pressing the DEL key, pressing F1, Pressing F10, holding down CTRL-ALT-S, or a variety of other keystrokes to get to the BIOS screen. For a more complete list of keystrokes to enter the BIOS screen, visit Michael Steven's page on the subject.

3) Once in the BIOS setup, look for a BOOT menu and select it with your keyboard arrow keys, Tab, and Enter.4) In most modern BIOS screens, you'll find an option for Quick Boot. Enable this to skip memory tests and other minor Power On Self Tests (POST).

5) Find an option for Boot Device Priority next, and change the first boot device to be the hard drive. Changing this option will speed up the boot process, but it will also not allow the computer to boot from a floppy disk or CD-ROM. If booting from anything other than the hard drive is important to you, please skip this step. If later on, you need to boot from a CD-ROM, simply re-enter the BIOS setup and make the CD-ROM the first boot device.

6) Choose the option to Exit and Save Changes and the computer will reboot.

There are other options in the BIOS to speed up boot time such as choosing the exact settings for your hard drive, and disabling AUTO DETECT of hard drives and other media. However I am skipping those changes and leaving them for a later discussion.

Changes to Windows Settings

The next group of changes to consider will be to the many Windows settings. We will use a handy tool called the System Configuration Utility to accomplish most of these changes. Follow the steps below to open and use this tool.

Startup Tab Changes

1) Click on Start, Run and type MSCONFIG and press Enter

2) Click on the STARTUP tab in the System Configuration Utility to view all the items that begin on Startup. An example is shown below.

Each item on the Startup tab that is checked loads immediately after Windows starts. If there are lots of items here, this will slow down the boot time for Windows considerably. Each of these items can be toggled on or off simply by using the checkmark box to the left of the item.

The column directly to right of the checkmark is the Name of the program, while the next column over is the location on the hard drive or other device of the file. Finally the last column shows where in the computer the file is started from. This location could be in the registry as is the case with all the locations that begin with HKLM or HKCU, or it could be in the Windows Startup folder found under ALL PROGRAMS in Windows XP.

You can examine each of these startup items and uncheck any that are not necessary. How do you know which ones are not necessary? Well, in most computer configurations, you'll want drivers running for your graphics or video controller and sound card, and most likely an antivirus and firewall running. Other startup items are usually extras that could be eliminated from boot up. To discover what a particular item is used for, jot down the name for the item and go over to a site called Process Library, type in the name of the process and click Find. This is a very handy tool for discovering which startup items are truly needed.

When you are done modifying the checkmarks to the Startup tab, click OK and you'll be asked to reboot the system.

Windows Services Changes

Once the computer is rebooted, click on Start, Run and type MSCONFIG and press Enter again. This will reopen the System Configuration Utility. Click on the Services tab, then click on the option at the bottom called "Hide All Microsoft Services" to see what unnecessary Windows services are running that can be removed. Generally speaking, you want services related to your video/sound cards and antivirus or firewall programs left running. Other services may not be essential and can be removed. Remember to only remove unessential services or you risk experiencing boot problems. Use Google to search for information on unfamiliar services.

Hardware Changes to Increase Boot Time

Adding more Memory (RAM)

Other than upgrading the motherboard and CPU, you can generally increase the amount of RAM in your computer to make it load programs and applications faster and provide a more enjoyable computing experience. You'll want to check your motherboard to make sure you have available slots and the maximum amount of RAM you can add to your particular motherboard.

Replacing your Hard Drive with a Faster RPM Drive

If you have a slower hard drive such as a 5400 RPM or slower, you may want to consider upgrading to a faster 7200 RPMhard drive. The difference in RPM speed will generally be quite noticeable.

Changing to Static IP

If your computer is connected to a local area network that you control and you have a DHCP server enabled on your router, during the boot process the computer queries the network to valid IP address. You can shave seconds off your boot time by assigning a valid IP address to your computer instead of using DHCP to assign it. To setup a Static IP for your computer, follow these directions.

1) Click on Start, Run2) Type NCPA.CPL and press Enter to open the Network Connection Control Panel3) Right-click on the Local Area Connection and choose Properties4) Click on Internet Protocol (TCP/IP) and click Properties5) You should see a screen similar to the one below. Fill in your static IP, subnet, default gateway, and DNS server information and click OK. If you aren't sure of your IP ranges on your router, consult your router manual or a friend that is more knowledgeable in networking terminology. Again, this is an optional item and does not necessarily need to be accomplished. Using DHCP is fine, although you sacrifice a few seconds for an IP to be assigned to from the network.

Switching from Master/Slave to Cable Select

Other Windows Performance Tips

Reduce the Number of Fonts installed

Every font that is installed in Windows has to load when Windows starts. The more fonts you have installed, the slower Windows loads. Although you can safely have around 1000 fonts loaded in Windows, I like to keep my font list closer to 300-500 or fewer if possible. There are certain fonts that are definitely required by Windows, so be careful in removing any fonts from your computer unless you know they are not needed. Fonts such as Verdana,Arial,Trebuchet, Tahoma, Tahoma, Times New Roman, MS Sans Serif, and Courier New should be left on your system. Follow the directions below to remove extra fonts from Windows XP.

1) Open My Computer 2) Double-click on Drive C3) Click on File, New Folder and title it Fonts Backup4) Double-click on the Windows folder to open it5) Double-click on the Fonts folder 6) Highlight the fonts you wish to remove, click on Edit and choose COPY7) Navigate back to the C:Fonts Backup folder and PASTE these fonts into your backup folder8) Return to the Fonts Folder and right-click on any fonts you previously copied to the backup folder, then choose Delete.

If you accidentally removed a font, simply reverse the procedure by copying and pasting the font back into the WindowsFonts folder.

Disk Cleanup, Scandisk, and Defrag

Performing regular hard drive maintenance on your computer every few months will not only catch problems before they cause serious damage but also make your hard drive run at its optimal level. Follow these instructions to clean up the drive and defrag it.

1) Open My Computer2) Right-click on the hard drive usually Drive C3) Click on the Tools tab4) Under Error Checking, click on Check Now. Optionally, you may want to check the boxes to "Automatically Fix File Errors" and "Scan For and Attempt Recovery for Bad Sectors"5) Next, click on the General tab and click on Disk Cleanup. After the computer calculates the amount of files to remove, place a checkmark next to the type of files you wish to remove and click Ok. Read the descriptions for each type of file to determine if you should delete it.6) Finally, click on the Tools tab again and under Defragmentation click Defragment Now7) Click on the hard drive you wish to defrag, click on Analyze and then click on Defragment. This process may take some time to complete.

Virus/Spyware Scans

Finally, you'll want to complete a thorough virus and spyware scan of your system. I recommend running an online virus scan first, then a check for spyware. You can click on the following links to check your system for viruses.

Using a Different Antivirus, Firewall, or AntiSpyware Program

If your computer is still running slow after changing and checking all of these options, it might be time to use a different program for antivirus, firewall, or antispyware security. A blog on the net called The PC Spy has a graph displaying the boot delay time from most of the popular products on the market including Symantec, McAfee, Trend Micro, ZoneAlarm, and more.

Not surprisingly, Symantec's Internet Security products top the list with a 40+ % boot delay, followed by Panda Antivirus, and Zone Alarm. So, while these products may help prevent infections and attacks, they also are contributing greatly to the slowdown your computer is experiencing. Avast, AVG, NOD32, and others perform much better according to this chart.

Tips or Myths

There are other miscellanous tips on the web that may help speed up the Windows boot time, but there are also some very controversial ones.

Emptying the Windows Prefetch Folder

The Prefetch folder found at C:WINDOWSPREFETCH is often a source of controversy concerning its effect on boot time. This folder preloads some applications to enable faster opening of the most used programs. There are tips on the web that point to changing a registry value or emptying the prefetch folder will improve boot time. From my experience, deleting the contents of the prefetch folder DOES NOT improve boot time and only slows the time required to open programs. There is a limit to how many items will be loaded into the folder so it doesn't get overloaded, so why would anyone empty this folder when its purpose is to speed up loading of applications. You can read more about the Prefetch Myth on XP Myths.

Disable the Windows Boot Logo

Many sites recommend disabling the animated Windows boot logo to help speed up the time it takes to boot. Although it may decrease the time by a couple seconds, the anxiety caused by facing a blank screen and wondering if Windows has stalled or froze during bootup outweighs the second or two you may save. Although if you wish to disable the Windows boot logo, follow these steps:

1) Click on Start, Run and type MSCONFIG and press Enter2) Click on the BOOT.INI tab3) Click the NOGUIBOOT checkbox and click OK4) Reboot the computer

Conclusion

Although I tried to include as much information as possible in this article, I have intentionally left some tips, hacks, and changes out. The basic steps in this article should improve your system boot up time considerably which in turn should give you a happier computing experience.



access point vs router

sâmbătă, 29 decembrie 2012

Boost your internet speed - Computers - Software

Although many people think that their slow internet speeds are all down to their provider, your computers settings, the hardware youre using or a really old PC can all slow you down.So if youre frustrated with your slow connection speed, try these tricks to see if you can speed things up before you switch to a faster, more expensive broadband package.

1. Adjust your browser settingsMost people use Internet Explorer, the Microsoft package thats already installed on your PC. Version 6, which many people are still using, downloads all files on a web page in sequential order. This is inefficient and means that a page with lots of pictures will take longer to download.By upgrading to the latest version - or using a different browser, such as Mozilla Firefox - you could reduce the time it takes to download a page. However, you should always be careful when making any changes to the settings on your computer.Use our Broadband Download Monitor to keep track of your downloading.2. Talk to your providerMany people think that by choosing an up to 8Mb package they will get an 8Mb speed, but distance from the exchange, congestion and traffic shaping all slow your connection down and very few people will ever hit their advertised speed.The average speed from 462,000 speed tests on BroadbandChoices.co.uk was 3.59Mb so why not run your own speed test to see how fast your line really is. Install our free Speed Tester software to see how your ISP performs.If the speed is exceptionally slow, you might be able to boost your connection simply by asking your ISP if theres anything they can do to speed things up.If youve been on the same package for a long time, its probably outdated too, so ask your provider if you can be upgraded if you agree to re-contract. You could find yourself moved to a faster package for more or less the same price.3. Tweak your router settingsWith so many different routers available, it would be impossible to tell you how to adjust all of them. However, most routers are like your cars onboard computer and can be tweaked and adjusted to open up ports and increase speeds.Read your routers manual for details on how to improve performance.4. Hate thy neighbourMake sure that youre not sharing your wireless internet connection with other people on your street or in nearby flats. Set up a WPA encryption if your hardware is compatible, but at the very least you should have a WEP password to stop unauthorised users connecting to your internet.Click here to read more on Securing your wireless broadband or use our free Wireless Key Generator to create unique, hard to crack codes.5. Reduce your bandwidth overheadThere are a whole range of applications that will discretely use your internet connection. Most of these are set to automatically start up when you log into your computer, so while you might just be checking your emails, these programs will still be running in the background and slowing you down.Applications such as Windows updates, security suite updates, Real Player pop-ups, MSN, Skype and the BBC iPlayer could all be running at the same time without you even knowing.While some of these are silent, others do ask permission before using up your bandwidth, and almost all can be set so that they dont start up automatically. If you only spend short periods of t ime online, these programs will be opening as you log in and could make a noticeable difference to your speed.To find out which applications are running, go to your task manager (right click on the Task bar). You can see whats running in the Applications tab, and also see if anything is running secretly by clicking on the Processes tab.You should always opt to give permission before an application runs, or set things to run at more convenient times - like only downloading podcasts at night.6. Get an iPlateBT's () new iPlate basically gets rid of the bell wire that was used to make old telephones ring. Now that the bell wire isnt needed, it often just acts as a conductor for electrical interference, so anything from a microwave to a dodgy light fitting can mess with your broadband connection.Recent research showed that the device could boost speeds by up to 60 per cent in some cases, with one user reporting a jump from 1.9Mb to 3.1Mb within a couple of days.Although all users wont necessarily see the same level of improvements, BroadbandBuyer.co.uk, which sells the devices, estimates that around 70 per cent of homes with an ADSL connection could benefit from an iPlate.iPlates are easy to install and cost from around 9.99.7. Get a better routerIf youre using the router that you got free from your ISP, you could benefit from getting a higher range one that will give you a stronger signal if youre connecting wirelessly. A better modem or router will also have better features, such as allowing you to select ports for gaming, or giving you a better firewall.You should also bear in mind that the less things blocking the signal from your router to your computer, such as doors and walls, the better.8. Speed up your wifiIf you use wireless and are having problems with the signal, rather than moving your PC closer to the router, you could just replace the aerial. Standard router aerials are usually 2dBi (indicating how long it is), and logically, the long er the aerial, the better the signal and the further its reach. For around 10 you can buy an aerial of 9dBi, which can increase signal strength by 30-50 per cent.You can also buy a wireless access point, which acts as a second router, sending your signal further. You simply connect the access point to your router using a Wireless Distribution System (WDS), extending the reach of your wireless signal without reducing its strength. Check the specifications of your router to see if it has WDS.9. Ditch your wirelessWhether youre using a wireless router or connecting via a cable will make a difference to your speed too. For people who have generally reliable, fast connections, this shouldnt be a big issue. However, if youre having speed problems and are using a wireless router you should try connecting directly via a cable to see if it speeds things up. Even the type of cable that you use to connect can make a speed difference - connecting to your router via an ethernet cable wil l be more efficient than using a USB cable.10. Get closer to the faceplateThe further your modem is from the faceplate (the socket your modem connects to), the weaker your connection will be. This is because the standard wires used to connect it to the faceplate are usually quite poor.To reduce quality loss, your modem should be as close to the broadband entry point in your home as possible. If you're on an ADSL connection up to 8Mb, moving your modem closer to the faceplate can increase your internet speed by up to 3Mb. Then, if your computer is on another floor or in a different room, you should invest in a good quality ethernet cable to connect your wireless router or PC to the modem.11. Monitor download programmesThe new breed of TV download programmes such as the BBC iPlayer and Channel 4s 4oD continue to run in the background of your PC even after youve closed them. Because they continually upload and download data using a legal peer-to-peer system, they are constantly using your internet connection and will not only slow you down - theyll also use up your download allowance. Make sure you quit them fully when you close them.With programmes like BBC's iPlayer on your computer, remember to check the settings. Make sure that the boxes marked peer-to-peer network participation and run Download Manager on Windows startup are both unchecked so that it doesnt remain on the peer-to-peer network once youve exited the programme and doesnt automatically start up when you turn your PC on.12. SwitchIf you still find that your connection is slow, it might mean that your package just doesnt support your needs. Use our Broadband comparison service to compare prices and to find a more suitable package.



access point vs router

Hack an Ethernet ADSL Router- LEARN ETHICAL HACKING - LEARN TO HACK - ETHICAL HACKING GUIDE - ETHICAL HACKING TOOLS AND TECHNIQUES - - Computers - Security

For more information and to learn other exciting hacking techniques visit

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.

Before you proceed, you need the following tool in the process

Angry IP Scanner

Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to Once the page is loaded you will find your IP address. Note it down.

Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option Hosts with open ports only and click on OK.

I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.

Step-5: Now copy any of the IP from the list, paste it in your browsers address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target users computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.

Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model

Warning!All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

For more information and to learn other exciting hacking techniques visit



access point vs router

Hack an Ethernet ADSL Router- LEARN ETHICAL HACKING - LEARN TO HACK - ETHICAL HACKING GUIDE - ETHICAL HACKING TOOLS AND TECHNIQUES - - Computers - Security

For more information and to learn other exciting hacking techniques visit

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.

Before you proceed, you need the following tool in the process

Angry IP Scanner

Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to Once the page is loaded you will find your IP address. Note it down.

Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option Hosts with open ports only and click on OK.

I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.

Step-5: Now copy any of the IP from the list, paste it in your browsers address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target users computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.

Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model

Warning!All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

For more information and to learn other exciting hacking techniques visit



access point vs router

How to secure your Wireless Network from being hacked? - Computers

Insecure Wireless Netwok:

wirless is very insecure when compared to the classic Wired network. Because the It can accessed from anywhere within the range of its antenna.

In order to protect our wireless from being hacked. We should take some steps to secure ourselves. If you don't secure this from hackers, you might end up without its service

Strategic antenna placement:You must take care about the antenna placement.

* You should not place the antenna near to windows because glass can't obstruct its signals. * place which restricts the range of its signal to go further than the required area. * Place it in a central location of the building so that it can be restricted inside the building.

Use WEP:WEP stands for Wireless Encryption Protocol(don't confuse with WAP-Wireless Application Protocol). It's a customary technique for encrypting traffic . If you didn't use this method ,certainly you will loose your traffic .

Change the SSID, disable the broadcast of SSID:SSID stands for Service Set Identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won appear in the listing of offered networks, while being able to provide services as usual.

Disable DHCP:By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack .

Disable or modify SNMP settings:Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

Utilize access lists:

For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.



access point vs router

Google service convenience brought security hidden danger - Business

This article will express is about the author in the use of the system with two asus Eee Pad login Google service process found some questions. These problems can let us to this new product produce some new feelings and views.

When the author attempts to use Google account login, but found no connection to the web. The author's first reaction is to be linked to the public the wireless network, but found department just changed office area, and forget the new WPA2 password. Then, the author opened his Virgin Mobile Mi-Fi 2200 personal access equipment. Then the author in the Eee Pad for hot list, but to the surprise of the author, Eee Pad have found the Virgin hot spots, and has successfully access. The author has chosen just now is hot and enter the code? The answer must be wrong.

The authors of the study show the author noticed more problems, Eee Pad can not only be found and connection of the Virgin Hotspot hot spots, and even the authors of the other lists commonly used hot name, including the author in camping sites (45 minutes drive from distance office) the use of WiFi Hotspot, are found in the Eee Pad hot list. This phenomenon is the only explanation, Google not only stores we once visited the hot spot of the name, will also access password also were stored.

In addition to the obvious about personal privacy issues outside, still a potential problems. Some may think of, if you use the andros application, and also used Google services, then you may be not the knowledge of the state of the accepted andros system hidden function. But we actually use, many WiFi hotspot and we did not build, among them were some when use may need additional special conditions, so we are not generally will WiFi access point password told the third party. This is a very easy to understand is also widespread security strategy, but like Google to not pay any attention.

According to understand, for most andros system users, not quite clear how to ban andros operating system will WiFi access point name and password sent to the Google server to back up, and in the user use any other system based on the equipment and two login Google account to be automatic synchronous these data. If it is really so, then Google to the way users have only two: either don't use login encrypted andros equipment wireless network, or in violation of the agreement of the encrypted network, will share with Google password. And for those who wireless access points for managers, the most direct reaction may be banned those who adopt the equipment access network andros system. Such as the company USES is with a password protection of the wireless network, if any staff use andros equipment can send your password to the wireless networks will Google, it is the company network managers situation that is not acceptable. If want to make refused to login strategy, and so o n is not limited to the external personnel, but most of the company include his staff.

Recently on some blog we can see, many Internet users think that future life is built on Facebook, Google and Apple company developed under the various rules, and that will only make originally in Microsoft empire period the darkest days look also appears kind and not so dark, because such as Facebook, Google and other companies in the treat individual privacy exposed more than Microsoft more serious problem. We think these fears are valid, and the concern if not solved, there will be serious security problems. Just think, if has the unlawful molecules through the equipment to be automatic access the andros we the company network, and the damage is immeasurable. From this problem can also see that Google's engineers and programmers and project director in processing enterprise sensitive information and the protection of data privacy lack of basic cognition. In fairness, if can choose only one data don't be harvested, backup or in different between equipment synchronous, th at this kind of data should be password. For this, we have to wonder, Google also collected exactly what type of data, to help us better experience Google services "value-added".

Because, this is Google's a "function", and this function really is very convenient, especially for those who don't know the protection of privacy or are willing to sacrifice part of privacy for the convenience of the customer is higher. And this is what we worry about the most. But many users do not know the convenience brought about by the potential risk.

For Google's this way everybody should be how to treat? This is a careless up like that? Google will really heartfelt consider for the customer? Are we too indulgence Google's behavior, or Google themselves across the our bottom line? If readers found that is not like this article that said in the article comments can also give your opinion.

Although, at present, we have found the problem only appear in the purchase the asus Eee Pad Transformer, and in other before andros equipment, still did not pay attention to this problem. Therefore, we can also suspected that this was the Honeycomb zhuo the new functions of the system is the result of.



access point vs router

vineri, 28 decembrie 2012

Cisco CCNA Certification: Error Detection vs. Error Restoration - Computers

Passing the CCNA, Intro, and ICND exam is all about knowing and noticing the details. (Which makes good sense, since turning into a master networking administrator or engineer can also be about noticing the main points!) One such detail knows the difference between error detection and error recovery. Whereas the terms are generally used interchangeably, they are not the same thing. Error detection is just that - error detection only. Two common error detection methods are discovered at the Knowledge Link layer of the OSI mannequin, the FCS (Body Test Sequence) and CRC (Cyclical Redundancy Examine). A mathematical equation is run in opposition to the information within the frame, and the result is sent together with the data. The receiver runs the equation once more, but this time. If the end result is the same, the body is considered valid; if the result's different, the frame is taken into account corrupt and is discarded.

Observe that the FCS and CRC do nothing with regard to retransmission. They're strictly error detection schemes.

For an instance of error restoration, we look to the Transport layer, where TCP runs. TCP performs reliable delivery, and the reason we call it "dependable" is that TCP makes use of sequence numbers to detect lacking segments. If the sender determines from the sequence numbers that the distant host did not receive transmitted segments, the sender will retransmit the missing segments.

The important thing to retaining the phrases straight in your head is to do not forget that whereas each error detection and error restoration both detect problems, solely error recovery does anything about it. It is also worth reading an examination question twice once you see either term!

While you start finding out in your CCNA and CCNP exams, many books will current you with an enormous listing of keystroke shortcuts to be used on Cisco routers. While the 640-801, 811, and 821 exams may ask you about one or two of these, you actually must get hands-on expertise with these commands to grasp them. Even higher, there are some key combinations that Cisco routers mention, however then don't tell you what they are! Let's take a look at just a few of the extra useful key combos, and conclude with the "secret" way to stop a ping or traceroute.

The up arrow in your keyboard is nice for repeating the last command you typed. As an example you mis-enter an entry-list. As a substitute of typing it from the start, just hit your up arrow to repeat it, then repair the problem.

CTRL-A takes the cursor to the beginning of a typed line. In case you've written an extended ACL, you know that may be a really long command, and one you most likely do not want to retype. If you get a carat indicating there's a problem with the road, use your up arrow to repeat the command. In the event you see the error is near the beginning, use CTRL-A to move the cursor instantly to the beginning of the line. CTRL-E takes the cursor to the tip of a typed line.

To move the cursor by means of a typed line without erasing characters, you have got a few options. I personally like to use the left and proper arrows, but you can also use CTRL-B to move back and CTRL-F to move forward.

Lastly, there's the mix that Cisco mentions to you when you run ping or traceroute, but they don't inform you what it's! For those who send an extended ping or a traceroute, you could be looking at asterisks for a very long time if you do not know this one. Within the following example, a traceroute is obviously failing:

R2traceroute 10.1.1.1

Type escape sequence to abort.

Tracing the route to 10.1.1.1

1 * * *

2 *

The problem is that you will get 30 rows of these asterisks, which is frustrating and time-consuming at the identical time. Be aware the router console message "Type escape sequence to abort". That's helpful - however what is it?

Right here it's: Just type CTRL-SHIFT-6 twice, as soon as right after the other. You won't see something on the router console, but the traceroute will terminate.

R2traceroute 10.1.1.1

Sort escape sequence to abort.

Tracing the route to 10.1.1.1

1 * * *

2 * * *

3

R2The traceroute was efficiently terminated. This mixture works for pings as properly, each prolonged and regular. Of all the keystrokes you possibly can learn, this one is essentially the most valuable



access point vs router

IBM LOT-980 Free Dumps - Education - Special Education

IBM Lotus Notes Domino 8.5 Sys Admin Operating Fundamentals LOT-980 Test

LOT-980

QUESTION: 1Susan has created a list of IP Addresses for the web server that are allowed accessand a list of IP Addresses that are denied access. Both are placed in the appropriatefields.Which field takes precedence BY DEFAULT when the same IP address isfound in both lists?

A. The Allow Access fieldB. The Deny Access fieldC. The Substitution Access fieldD. An error will be presented stating an address may not be in both fields

Answer: A

QUESTION: 2Where does the Domino Server Setup program store the certifier ID file by default?

A. In the Domino Name and Address BookB. In any network drive location that you specify during installationC. In the directory you specify as the Domino data directory during installationD. On the Domino Administrator's local machine in My DocumentsLotusCertifiersdirectory

Answer: C

QUESTION: 3You have the ability to set different levels of administration access to users. Whichof the following represents the hierarchy order for privileges from greatest to leastaccess?

A. Server administrator > View Console administrator > Administrator > UseradministratorB. Full access administrator > Administrator > Full console administrator > SystemadministratorC. Full Console administrator > System Administrator > Full Access administrator >AdministratorD. Full server access administrator > Console rights administrator > Useradministrator > View access only administrator LOT-980

Answer: B

QUESTION: 4While you used the Domino Administrator client, what two subtabs may be foundunder the Messaging tab?

A. Router and MailboxesB. Mail andTracking CenterC. Mail Users and SMTP ConfigurationD. Mail Statistics and Mail Analysis

Answer: B

QUESTION: 5In which of the following databases may you view all the database ACLs on a serverby user name, access level, or by database?

A. LogB. NamesC. CatalogD. Certlog

Answer: C

QUESTION: 6Ben attempts to send Jerry a Notes mail message. Both users are on the same mailserver. Which of the following paths will the message take?

A. The Router will receive the message from Ben and deliver it immediately toJerry's mailfile via SMTPB. The Router will receive the message from Ben and deliver it immediately toJerry's mailfile via NRPCC. The server will receive the message from Ben and send it to the mail hub fordistribution back to the mail server and then delivery to Jerry'smailfile LOT-980

D. The SMTP task will receive the message from Ben and immediately send it toJerry after following the SMTP to Notes path defined in the configuration settingsdocuments for the mail server

Answer: B

QUESTION: 7The server Web1/XYZ defaults to Server document settings to obtain configurationinformation for Internet protocols when which of the following features is notenabled?

A. Internet Site documentsB. Global Domain documentsC. Single Sign-on documentsD. Web Configuration documents

Answer: A

QUESTION: 8You are building Domino Domain Monitoring probes in Domino 8.5 and wish tocreate a standard Possible Solution for all of them. Which of the followingdocument types allow this capability?

A. ModularB. EmbeddedC. ComponentD. Corrective

Answer: A

QUESTION: 9OCSP on the Domino server is enabled through which of the following?

A. Server documentB. Security policyC. Server configuration document

Original Resource :

Visit LOT-980 Link : LOT-980 Download PDF Link : LOT-980



access point vs router

Why Buy The Netgear WNDR3700 Dual Band Wireless Router? - Shopping - Electronics

Yes it looks cool. Sort of like an alien spacecraft getting ready to launch when resting on is side. True it feels good to own something that others refer to as the "Ultimate Networking Machine". It's easy to fantasize about the 680MHZ processor under the hood like it's a high performance sports car.

But do you really need one? Let's examine this a little closer before running out and purchasing something just because it's the latest and greatest. Then we can talk about getting the best deals.

If you live alone, own a single computer and printer and spend most of your time surfing and downloading files you don't really need one. A simple wireless-G router will do just fine.

If you do a lot of downloading large files from the Internet and do any amount of gaming on the Internet a Wireless-G router simply won't do. Time to move up to one of the faster and more powerful Wireless-N routers.

Some Wireless-N routers are built for gaming and come equipped with a built-in USB port you can use for sharing out music, video and data files out to the other computers on your wireless network. Still you don't really need a dual band wireless router just yet.

So when does a high performance wireless router like the Netgear WNDR3700 cross the line from luxury to necessity? When you and the other members of your household find yourselves doing all the above from multiple computers in all corners of your house it's time to start thinking about a dual-band wireless-N router.

If you have multiple wireless computers, a game console, iPhones, network storage devices, Internet ready flat panel TVs, printers, cameras etc floating around your house it's time to face it. You are truly a member of the digital age and just any old Wireless-N router isn't going to do. In fact you may be in for a lot of frustration if you don't upgrade to dual bands.

Remember what dual bands gives you. The ability to have two high-speed Wireless-N networks share the same space simultaneously without interfering with each other. You can do all your surfing, printing and downloading on one band and all your gaming and video on the other. Two totally separate wireless networks each with their own unique SSID and security running from a single high-powered device! Now you will come to realize why they call it the "Ultimate Networking Machine".

Important Update

Netgear has recently renamed the WNDR3700 to the WNDR37AV. The resulting confusion has caused the Netgear WNDR3700 prices to drop and the WNDR37AV to become scarce even though they are both the same router. Now a good time to take advantage of this!



access point vs router

Router Troubleshooting Commands - Computers - Mobile Computing

Router is an important part of network because it is the job and basic responsibility of router to act as the path finder. If i say path finder by this i mean that router functions as the tool that determines where and through which path the data must be transferred to other computer in the network. The important terms and facts that help router in finding its path and doing its job in an efficient matter it needs to know the sub net mask and IP address of the machine.

It is perhaps the most critical job of the network administrator to maintain its network and router trouble free and always look for and stay up to dated to troubleshoot its network. When it comes to mal functioning ones machine and network can malfunction due to variety of reasons such as behaving in an abnormal manner due to being infected with virus, spy ware, ad ware or data is accessed or hacked by unwanted user or connectivity issues due to wrong configurations and faulty devices. Below we will be discussing some basic troubleshooting commands that are quite often built in in both UNIX and Microsoft operating systems and if proper trouble shooting commands are given the network and router are easy to maintain. A few noteworthy tips are

Ping is considered to be most famous command as it is an authenticated way to check the connectivity of the network. The systems IP address and the networks IP address cross check each other for availability but you have to follow the format as to how to PING

You have to open the run menu from the start menu. Once the run window is open type cmd and gives the IP address and presses enter.

If the server returns the answer it means that connection is established and server and the system are coordinated for data exchange with each other. If it do not run it often returns with a command server time out.

IP Config is another command considered as important in the realm of network and router trouble shooting. This config is used to know the IP address, domain name system and Dynamic Host Configuration Protocol. It helps you to know about the subnet mask to properly configure the router. Open the DOS and give the command ipconfig and it will display the IP address of the computer.

For detailed Information you have to type ipconfig/all and it will return with the desired results.NSLOOKUP is a command that uses Transmission Control Protocol / Internet Protocol command and is used for the verification of name aliases, domain name system records and even the information regarding configuration with the operating system by sending request to the Internet Domain Name Server.The errors can also be determined with the domain name system of your server. If you deploy the host name command you are able to see the name of the computer. By following these simple commands you can easily pull out and trouble shoot the router and the operating system.



access point vs router

Simple Plans for Router Table Project - Home - DIY

Do you have plans to add a router table to your wood workshop? Well, whether you are buying or building your own, there are some things you should certainly keep in mind when taking on a venture like this.

It is important to recognize that this spacific type of table is one of the most handy tools a woodworker could own. That's why certain characteristics are required in order to benefit the woodworker with projects. Features such as a fence, tabletop, plates, inserts and all the things that go into building the router table a valued piece of equipment. With good building plans you will be able to use it to cut a number of parts very quickly and with flawless accuracy saving time and money on errors.

Every table needs a top and a router tabletop is probably the most important part. That's where you will do most of you cutting so it is important to pay close attention when buying or reading building plans for your table. The quality of the tabletop can literally affect the quality of your work. Router table plans should suggest the tabletop be smooth and flat. Any type of warp or inconsistency will change your cut considerably.

The next feature we want to look at is the fence. The fence is what guides your cut, giving you that steady, strait and accurate line. You can easily purchase an aluminum guide fence from most hardware stores or if you plan to make your own guide fence just bear in mind that it is a relatively high-precision tool, and must meet to some pretty demanding specifications. The guide fence support system is also where we would mount a saw dust vac or trap to keep your working area dust free.

The insert plate is what keeps the router in place and gives you easy reach to removing the router from the table when swapping bits or making changes. The insert plate should fit perfectly snug in your tabletop so careful measuring is essential if you plan on making a router table insert plate.

These are just a few of the features and functions of a router table, some ideas on what to look out for if you are planning on buying one and also some information and encouragement if you have plans for making a router table. Good luck and happy woodworking!



access point vs router

joi, 27 decembrie 2012

Bosch 1617EVSPK - 3 Reasons This Is A Great Router - Home - DIY

If you're in the market for a quality router, then it's worth taking a solid look at the Bosch 1617EVSPK. All 2-1/4-horsepower routers are trying to catch up to this model. I'd suggest when you buy yours to get the combination kit which includes both fixed and plunge bases This router is small and easy enough to maneuver so that you can use it as a hand-held, but also has enough robustness to be placed in a table so that you can spin the larger bits and do some work designed for the larger 3-1/4-horsepower routers.

Check out a few of the features of this unit:

1.Advanced Speed Control Technology

2.Soft Start Feature

3.Microfine Bit Depth Adjustment

Advanced Speed Control Technology

This feature is awesome because it gives you the ability to adjust your bit spinning speed to what material you're working on. The Bosch 1617EVSPK has a speed range of 8,000 to 25,000 RPM. Something like this would be helpful in the instance that you were to find that you were burning your material, you'd just slow it down. And on the other hand, when you see that you're getting chip out from not enough speed, you can select a higher RPM.

Soft Start Feature

This feature has two benefits: It's a safety feature as well as a luxury. This feature makes the router slowly rev up to top speed. This is helpful because if you have any maladjustments, you'll be able to catch them before it gets into full swing. This keeps the router from giving that annoying "kick" when turning it on. The nice thing about this is that it makes it so you don't have to worry about your router being torqued out of your hands when starting it while doing hand-held work.

Microfine Bit Depth Adjustment

This feature gives you the ability to easily make bit depth adjustments. It's very accurate, giving you the ability to make adjustments from " to 1/64th". Also, as you transition between bases, the adjustments that you made will remain, which is nice. This will help you save time between moves. Something I think you'll appreciate if you've ever had to deal with it is that with this feature, you'll never have to worry about working with the cord sticking out of the front of your machine.

this router is quite the value when you look at all of the benefits that have been mentioned. this router is very affordable when you look at the ratio of price to value that you get. I'd say that compared to the value that you're getting here, the price is pretty cheap.



access point vs router

What To Look For When Buying A Wireless Router - Technology

A wireless router is a great device that gives a lot of help. Through this, you can connect to an internet connection without having to use a wire. It also allows you to connect different computers in an internet connection without the need to have a separate connection. By just opening the wireless router, connecting it to the internet, and then connect different computers in it with the use of a signal, you can now have a computer network system instantly.

Wireless routers can bought in any computer devices and electronic shops near you. They come in different sizes and features that you can choose from. With all of these great varieties, you can choose the right wireless router that you need.

On the other hand, there are certain things that you need to consider when buying a wireless router. One of this is its capacity. There are some wireless routers available that only allows you to connect three computers while there are some that can allow you to have as much as six computers all in one. If you only have three or two computers to connect in the internet, then the first one is just right for you. It is much cheaper and you can save more from it. On the other hand, if you have lots of computer to connect to, such as in cases that you have a computer network or a computer shop wherein you need to connect all of it in the internet, then a wireless router with more capacity is just right for you. On the other hand, this kind of router is much expensive than the others but if you look at it closely, you can really save money from it because you dont need to install an internet network to each of it.

The other thing that you must look for is the feature that you can get from it. Make sure that it is easy to use and you can quickly install it in your computer. Look for a wireless router that has an installation CD on it so that it will not be hard for you to install it and that you can install it easily in many computers by just inserting the installation CD. Also make sure that you can put a password on your wireless connection to ensure that there are not other computers that can connect in it and have access on your system.

This article is for informational purposes and is the opinion of the author which may not be the opinion of the site that this article links to.



access point vs router

Improve Network System Efficiency With the Simple Addition of Cisco Wireless Routers - Computers - Hardware

The objective of a network router is to transfer info in between company systems. Additionally, it regulates other styles of access such as the internet. Companies of all sizes utilize wireless routers to enhance productivity. These advantages are attainable while still sustaining a secure environment. Frequently wireless devices handle high-speed connections much better and provide more network abilities.

Equipment created for wireless use, reduces cabling costs in addition to expenses associated with unnecessary local equipment. Significantly less gear removes the number of steps required to get data from the source to the desired location.

Benefits are obtained by using components such as Cisco cellular routers, such as a more productive as well as reliable network. They can transfer visual, voice, and other information kinds effortlessly. Security can be enforced without the need for multiple devices. Newer manufacturer models offer the capability of supporting complex network programs. They make it feasible for remote office connections with increased central administration.

Proper router positioning can assist in running, regulating, and controlling wi-fi all through one or numerous places. The Cisco brand name itself is well known for dependability, endurance, as well as excellent security. Devices protect relevant data throughout many business enterprise systems. They filter fire walls to avoid unauthorized user entry in addition to supply effective protection from viruses. Newer products also identify intruders when an attack is happening to better protect against them accessing the whole system.

Cisco Routers: How Can They Improve System Operations?

Cisco routers have many productivity enhancement advantages. They have three huge characteristics that set them aside from a few of their competitors. Products are of high quality, are user friendly, and much more reliable. They offer constant network performance throughout program use. Of course, a company in need of a trusted system must rely on pertinent factors apart from reputation.

What are the most important considerations when choosing a routing component to put into action? Cost, expansion capabilities, reduced upkeep, as well as trustworthiness. While price is regularly a determining factor, do not forget that the lowest priced component might not provide the same trustworthiness or performance as ones inside a comparable price range. Components which allow for later expansion cut costs as technology requirements evolve. Any component made to incorporate simple updates, installs, as well as upkeep may involve less long term expenses.

Products utilized on the network have to be suitable to lessen problems including connections, entry, setup, as well as functionality. Problems like these occupy valuable business time and resources. Top quality products drastically lessen the chances of incorrect performance, protection breaches, as well as an inoperative system.

Cisco routers include these benefits. They may be a rewarding answer for a lot of businesses. Wireless choices end up being advantageous to companies with multiple locations or buildings not made to accommodate excessive amounts of wiring. Execution of less wired components cuts down on the overall infrastructure of every office location.

Opportunities for enhanced technology such as virtualization or remote group collaboration are also present. The benefits of wireless devices constantly increase as improvements are created to these components. They can be a sufficient option when modifications are essential with this important bit of business technology.

Cisco wireless routers decrease infrastructure requirements as well as expenses. Cisco routers created for expansion, easy policy administration, and decreased maintenance provide more rewards.



access point vs router

Step by Step Instructions for PPPOE Configuration on a Belkin Router - Computers - Networks

The article intends to explain the procedure of configuring PPPoE on a Belkin router. The method described here is simple and can be self-performed without the help of expert Belkin router support services. It is however recommended that users follow the instructions carefully to avoid facing problems and eventually contacting Belkin technical support to fix them.

A Belkin router can be configured to use the PPPoE connection with the DSL modem. Not all but some ISPs (internet service providers) require their DSL customers to go online using PPPoE. The below mentioned guide will help you configure the PPPoE connection on your Belkin router.

Instructions:

Before you begin with the configuration process, you would require the DSL account username and password provided by your ISP. The information will be required you to connect to the internet using PPPoE.

Make your computer a wired connection if it is a wireless one. Connect an Ethernet cable to the computer and run its other end into the one of the 4 LAN ports of the router.

When done, go online (connect to the internet). Open Internet explorer or Firefox etc., any web browser that you have. Type '192.168.2.1' (without quotes and as it is) and hit the Enter key on the keyboard.

When prompted for a username and password, enter it in the box and click on the Submit button and then on the Login button at the top right hand corner. You can leave the password field blank if you never changed your password. It will also be indicated on the screen Default = leave blank. Simply click on the Submit button and then Login to continue to the Setup screen.

When the Belkin Setup screen appears, click on Connection Type under the Internet / WAN heading on the left hand side pane. Browse to the PPPoE option, click to select it and then hit the Next button.

In the PPPoE screen, fill in all the information correctly like username and password etc. in the relevant fields. Confirm the password by retyping it in the Retype Password box. The username and password will be provided by your ISP. You can give a name to the service (any name of your choice) if you want. This is an optional field, you can leave it blank if you want. The box next to MTU should be left as default. The last option saying Disconnect after minutes of the activity should be left unselected in most of the cases.

Review your settings. Recheck that you have entered all the information correctly. When done, click on the Apply Changes button to close the PPPoE screen. Exit out the router Setup screen.

Additional Tips:

It is must to check with your ISP whether it supports PPPoE connection or not.

belkin router, belkin router support, expert belkin router, pppoe connection, pppoe configuration



access point vs router

5 Point Capital Writer Explains How to Manage Stress in the Business World - Business - Business Ideas

As 5 Point Capital writer Ronnie Wright recently explained in an online article, one of the keys to managing a business is managing your stress. Matters of personal growth may not seem like they have a place in business, but as Wright explains, it is all interwoven so tightly that business owners may not even realize how their stress is affecting their enterprise. So from a business standpoint, managing stress just makes sense. The benefits will also stretch into your personal life. Who doesn't want that?

The Debilitations of Stress

According to Wright's 5 Point Capital article, stress can cause a number of debilitating effects on your business over time, including the following:

Bad decision making Blocked access to your natural insights Careless mistakes Decreased ingenuity and intuition Lack of wisdom and better judgment

When business owners let anxiety get the best of them, they begin to lose the ability to access nd utilize the most creative parts of their brains. When worrying goes overboard, it keeps you rom performing well under pressure, and eventually it keeps you from performing well even in ow-pressure situatioms. You simply can't be as productive or creative as you should be when ou're stressed and anxious.

Keeping the Right Attitude

It isn't always easy for business owners to keep their attitudes positive and spirits high, but if you want to be a success in the long term, you must remember to roll with the punches and get back up quickly when you're knocked down. It doesn't have to be a difficult task to manage stress, either. Just remember - it's good for your business to keep a positive attitude. The simplest cures are often the best when it comes to managing stress. It shouldn't cause more stress to manage your stress, after all.

The key to keeping the right attitude is to simply think about your reactions to situations before you fly off the handle. Our biological response is fight or flight, but in our modern lives we aren't actually faced with life or death situations, so this kind of response isn't necessary. When we are faced with perceived threats, whether they are simple arguments or something more serious like financial troubles, we must not let our reaction make matters worse.

We can't help getting a little stressed at times, but we can change the way we react to this stress,and that makes all the difference.



access point vs router

miercuri, 26 decembrie 2012

Useful Beat Maker Points - Computers

Sound creation software DubTurbo is merely among the best extremely versatile and relatively easy to make use of beat makers I've ever implemented, and I've truly applied several preferred music generation software program accessible! ! ! This certain ground-breaking beat maker makes it possible for the person to generate music that's equal together with great audio designers. The beat maker download will guide you uncover the keys to production your own special addictive beats in no time. It merely requires the required time, exertion together with eagerness to produce it meet your needs. It comes with an hard to beat price and and the greatest top quality characteristics and controls capabilities. To come up with confirmation of these, search for a evaluation between DubTurbo and all the other low value equipment you happen to be ready to find out inside the current market. Almost all of the beat makers in the cost range of DubTurbo beat maker make Mp3s, while this softw are program program utilizes top top quality "wave" electronically and skillfully acquired samples. Virtually all of the low end gear that you simply simply uncover inside the market place today, enables accessibility solely on-line whilst DubTurbo is attainable both from your pc and over the internet. Various other software programs commonly make use of single screen, while DubTurbo consists of 3 numerous screens to be able to supply you total mobility. Amongst the primary qualities of DubTurbo is that it really is in fact user friendly. This means that you will not should invest two months only on browsing by means of the instructions while attempting to identify how every little thing runs. All of the adjustments are effortless to abide by and you'll find as easy as step bystep techniques to use the software program program and produce the very best out of its variations. Following all, you'd like to develop top quality music speedily. ! . ! DubTurbo employs routing short cuts, keyboard triggers, and several tap features , whilst other software application has a single screen and not too numerous manage alternatives. Other software offers you having a number of the old beats that everybody is really acquainted with. DubTurbo beat maker comes with a array of custom mastered sound libraries where the offers are really diverse. When you would like one thing fresh and clean, a software program software that will offer you with entry to a huge quantity of beat styles, then DubTurbo is your option. Perhaps you may have thought of creating cash together together with your music? Together with other software program you absolutely aren't on offer just about any facilitate. Even so DubTurbo beat maker helps you get publicity and promote your music. You'll be constantly linked to a excellent local community of beat makers, together with marketing your music will possibly be so a great deal easier ! You are likely to not get abundant instantly, but afte r you devote sufficient hard work and you strive sufficient, you will by no indicates know where a very easy software program tools may possibly take you. Along with DubTurbo you will obtain video instruction, to guarantee that you are ready to start effortlessly. The majority of of the additional software program software do not give you with this function, because they don't care to provide you with, they only desire to provide their products and solutions. Start to look at the difference? Then, that you're ready to openly import your personal sounds. Maybe you happen to be brooding about developing something unique, a music or maybe a beat that's in contrast to other things. You've an concept? DubTurbo beat maker allows you to modify your personal software tools by allowing you to undoubtedly import your very own sounds and generate your mix the technique you like. Along with zero reloading time, you happen to be ready to create, move, copy, change, erase, and additional elements. With low-end products , you'd have to wait for many moments until you may execute that. This is another attractive element of this amazing beat maker device. You happen to be ready to change drum products as well as sounds easily together with fast, plus, you'll get 4 bonus offer kits, this way, you will by no indicates get bored along with DubTurbo beat maker software!



access point vs router

Necessary Points To Consider Beginner Drumming Courses - Entertainment

Newbie drummer classes will be an essential part of learning the essentials of trying to play this particular percussion piece of equipment. As part of your coaching, you will master necessary areas such as the different terminology employed in relation to the piece of equipment, the way to grasp the drumsticks, correct stance, strategies pertaining to the bass drum, in addition to the suitable warm up motions you could use inside your practice.

In relation to drumming training, there are lots of solutions accessible to you personally. The 1st may be to employ a drums music teacher to offer you newbie drum classes. This method means that you can study with the convenience of your own dwelling and in your own time frame. You'll have immediate discussion with your music teacher, which will offer one-on-one hands-on tuition to help you to master the drums alot more efficiently as opposed to what you'd within a class room style. The one down side to employing a teacher for your personal training lessons will be the expense, and that is in excess of a thousand dollars per annum. If you can afford to pay for them, these kinds of beginner drums training lessons tend to be the most efficient.

For substantially less money, you might also find drums coaching on line. A lot of internet resources distributing streaming video tutorials for drumming. Before you decide to dash out there and subscribe to the first site you run into, be informed that not most of them are everything these companies assert to be. Many of these novice drumming tuition comprise instructions from a number of teachers in a variety of video lessons. Their classes will not be always constant, and often be unclear. As a result, you should definitely verify any drums playing tutoring web page conscientiously before you start to participate in their basic drumming programmes.

Your other option for novice drum lessons necessitates the purchase of some DVD instructional presentations. Just like the previous solutions, these video recordings enable you to educate yourself at your personal rate in your home. Additionally, there are a wide variety of training DVDs available, helping you to customize your rookie drummer training lessons to your aspirations. The drawbacks tend to be the decreased immediate interaction with a coach in addition to the irregular quality of the information.

That harsh truth on any kind of educational resource is basically that you should always understand what you are obtaining when you decide on any program. There are fantastic coaches and undesirable tutors in the same way you will find great sites and informative clips as well as bad ones. By taking the time to thoroughly examine your option just before investing in it, you'll have little problems seeking the best resource that facilitates anyone to learn to play the drums.



access point vs router

5 Point Capital Writer Explains How to Manage Stress in the Business World - Business - Business Ideas

As 5 Point Capital writer Ronnie Wright recently explained in an online article, one of the keys to managing a business is managing your stress. Matters of personal growth may not seem like they have a place in business, but as Wright explains, it is all interwoven so tightly that business owners may not even realize how their stress is affecting their enterprise. So from a business standpoint, managing stress just makes sense. The benefits will also stretch into your personal life. Who doesn't want that?

The Debilitations of Stress

According to Wright's 5 Point Capital article, stress can cause a number of debilitating effects on your business over time, including the following:

Bad decision making Blocked access to your natural insights Careless mistakes Decreased ingenuity and intuition Lack of wisdom and better judgment

When business owners let anxiety get the best of them, they begin to lose the ability to access nd utilize the most creative parts of their brains. When worrying goes overboard, it keeps you rom performing well under pressure, and eventually it keeps you from performing well even in ow-pressure situatioms. You simply can't be as productive or creative as you should be when ou're stressed and anxious.

Keeping the Right Attitude

It isn't always easy for business owners to keep their attitudes positive and spirits high, but if you want to be a success in the long term, you must remember to roll with the punches and get back up quickly when you're knocked down. It doesn't have to be a difficult task to manage stress, either. Just remember - it's good for your business to keep a positive attitude. The simplest cures are often the best when it comes to managing stress. It shouldn't cause more stress to manage your stress, after all.

The key to keeping the right attitude is to simply think about your reactions to situations before you fly off the handle. Our biological response is fight or flight, but in our modern lives we aren't actually faced with life or death situations, so this kind of response isn't necessary. When we are faced with perceived threats, whether they are simple arguments or something more serious like financial troubles, we must not let our reaction make matters worse.

We can't help getting a little stressed at times, but we can change the way we react to this stress,and that makes all the difference.



access point vs router