Tuesday, August 29, 2006

Ip Troubleshoot

If your computer is not connecting to the internet, these six easy steps will get your internet up and running.

1.Go to your Start Menu.

2.Click on Run.

3.Type CMD then click enter.

4.At the C: prompt type IPCONFIG.

5.Look to see if your IP: is connected. It should say something like:192.168.17.4.

6.Type IPCONFIG/ RENEW.

Monday, August 28, 2006

Preparing for a computer crashes

For many of us losing all of our information due to a computer crash would be the worst and devastating thing that could ever happen, not to mention if this would happen to any business owner. But the good news is that preventing the potential disasters of unexpected data loss is as easy as storing important information in multiple areas.

To help you not to lose your important data, we'll:

Show you the different options you have at your disposal to back-up your data.

Issue a list of tips to help keep your data continuously safe and sound.

Most of us don't realize how vulnerable our data -- or our midterm thesis, for example -- is until we lose it. But if you keep a backup copy of your work, you'll be able to stop losing sleep over the fear of hardware failure. Backing up data on a regular basis ensures that personal documents, photos of "Kodak moments" and other important files are secure in the event of a technology crash. Follow these quick back up tips and you'll be able to rest easily.

Backup Methods

The most basic method of backup uses software that will copy requested information to a different part of the hard drive for safe-keeping. Unfortunately, when this hard drive fails, both instances of the data may be lost. More advanced software will transfer requested data to a separate type of media (ex. CD/DVD, external hard drive, USB flash drive, Mirra). For even greater security, store this backup media in a different room or building. Online backup, also known as "cloud" backup, securely copies data through the Internet, to be kept on secure storage areas. With authentication (username and password), this data can be retrieved through the web at any time.

Backup Recommendations Create a checklist

Determine which files and folders should be saved. Ensure that the most important files are backed up first. The My Documents folder, commonly found on the Windows desktop, usually contains personal photos, music, videos and office documents. You can also locate My Documents by clicking on the Start button.

Create a schedule

Depending on how often your information is modified or added to, repetition is important. Consumers may want to backup important information once a week. Small businesses may require daily backups. Most software backup solutions can be programmed with a consistent backup calendar.

Friday, August 18, 2006

Network Troubleshoot

If you experience any trouble with your wireless network, please read and follow these instructions. Many times following this advice can solve your problems:

Problem: Cannot access network/internet from any computer on the network? Solution: Power down all computers on the network. Unplug both the cable modem and router. Wait a few minutes. Plug in the cable modem. Wait until the lights on the cable modem stop flashing. This could take up to a minute. After the lights stop flashing on the cable modem, plug the router back in. Again, wait until the lights stop flashing on the router. Power on any computer on the network. This is known as power cycling your modem and this can often restore connectivity.

Problem: Cannot access network from one computer when all other computers work fine? Solution: Try shutting down the computer and restarting. If the computer is a Laptop try moving it closer to the Access Point. If this solves the problem you are having signal interference, which can be caused, by many things including leaded glass and metal reinforced concrete walls or floors or simply your computer is to far away from the Access Point.

Problem: How do I boost my wireless signal to a weak area of the house? Solution: Buy a wireless repeater. These devices allow you to extend the wireless networking signal much farther from the original base station. Best Buy sells them for less than $100.

Problem: I have a 2.4 GHz wireless telephone; will it interfere with my wireless system? Solution: 2 .4 GHz wireless phones can cause interference, with your wireless network. Normally symptoms will be sudden loss of wireless connectivity when the phone is in use or drastically reduced speeds. If any of these things occur you can try changing the channel on your phone.

Hang up the phone and pick it up again. This will usually force the phone to use a different channel. Some phones have a "CHANNEL" button near the keypad, allowing you to reset the channel used by the phone.

Monday, August 14, 2006

Computer Viruses, Worms And Trojans Explained

Fighting viruses and getting rid of them is big business right now. The first step is knowing just what the enemy is.

THE ENEMY - Hackers and Crackers

Computer geeks say that there is a difference between hackers and crackers. Crackers do damage to systems they break into while hackers just want to see how everything works. We'll use the more common term of hacker. Originally the term hacker was someone who made furniture with the use of an axe.

A virus is "malware" for your computer. This is a term that covers all kinds of software that is malicious. The most common types of malware are Trojans, worms, and viruses.

VIRUSES

Viruses are often hidden inside of other programs, for example installation programs that arrive to you through email attachments. When you run this host program the virus is executed. When the virus is in your computer memory it will be able to do a lot of damage such as infecting other computer programs.

Once the infection phase of the virus is complete the next stage begins: the destructive phase. Viruses will wait for a certain trigger, such as a date or the number of times that the virus has been copied, before the payload is delivered. The payload can be as simple as messages all the way to the deletion of files to the destruction of your operating system.

When viruses were first created they were often distributed on a floppy disk. As the Internet has grown, email and file downloads are the best way for viruses to be passed. Email can have attachments that can contain any type of computer file. Executable files can be loaded with viruses and therefore you shouldn't run them unless you're sure that they are virus free.

WORMS

Worms are much like viruses because they are self-copying. They can reproduce across multiple networks without human aid, such as through the sending of emails. Worms, however, don't need an executable program in order to be passed along.

A worm can affect a computer network more than it can infect computers that are on that network. Because they self-copy they can overload the resources on a network. This can cause slow downs in the speed of data transfers by using a large amount of bandwidth...more bandwidth than is needed for normal network traffic. Any network that routes traffic on the Internet is simply known as software and hardware that is specialized. Both software and hardware can be bothered by malware.

A worm can be created to carry payloads by using an installation program through the backdoor. A backdoor is an access point into the computer that is hidden. The worm uses the backdoor and ignores the usual procedure for login. Backdoors are often used by spammers so that they can send junk email.

TROJAN HORSES

A Trojan horse is another kind of malware. A Trojan horse is a computer program that acts as though it will do one thing when it will actually do something different. This term comes from the story of Troy, a city which was deceived by the Greeks to get into the inner city undetected. A Trojan horse can't replicate itself the way viruses and worms can.

A Trojan horse can be hidden in software that is otherwise useful. When a Trojan horse starts it can do such things as corrupt files, install backdoors, erase data, and keep track of keystrokes. This information will enable hackers to steal your personal information such as passwords and credit card numbers.

COMBATING MALWARE

In this series we will talk about what you can do to fight malware. Until then it's important to just be passive and not expect that your computer problems will be taken care of by someone else. Combating viruses needs the involvement of users, webmasters, and software vendors.

Thursday, August 10, 2006

You Don’t Need To Pay For IT!

IT Support has never been such a minefield. With new technologies always entering the marketplace it is now possible to have a corporate-standard IT system without having the financial headache of purchasing a server or even software such as Microsoft Office. For one small monthly payment, companies with 1-50 users can have their whole IT infrastructure based in a secure location, safe in the knowledge that should their office be burgled, damaged or even burned down, the only thing required to be reconnected to your office system and data is a new PC, Laptop, Thin Client or any internet-connected terminal such as in Internet Cafes. This is perfect for disaster recovery.

As your IT system is centrally managed in a safe and secure hosting environment, your IT support requirements are minimal or non-existent due to the power of remote IT support where an IT engineer or technician can actually “take over” control of your mouse and keyboard actions from anywhere in the world. This is a very crucial factor as you can even be taught and shown how to perform a particular task and it also removes the usual time-delay involved when requiring “hands-on” IT support. With a remote desktop your life will be much easier.

There are a great many advantages with remotely-hosted IT & network systems and another great benefit is the fact that you can literally work from anywhere in the world as long as you have an internet connection. You could be working on a train via wireless or 3G, sending and retrieving documents via Blackberry devices or PDAs, catching up with work on the beach, the list is just endless. As access to your data is mobile, you do not have to worry about synchronising data and carrying data on USB flash drives etc, this all saves you time and ultimately money and the freedom and mobility you will gain from such a system will only benefit your company and it’s staff, allowing for home-working and emergency access 24 hours a day.

Microsoft licensing is a major change that has occurred over the past 18 months and it is no longer necessary for companies to spend vast sums of money on hardware, software and server-related network support. In fact, companies no longer have to pay large sums of money for Microsoft Office, Adobe, Kaspersky and a growing list of software suppliers thanks to a change in the way licensing can be paid for. A great benefit of this is that you can pay monthly for a software product and receive free upgrades when new releases or patches become available.

Thursday, August 03, 2006

Cableorganizer.com First To Carry Platinum Tool's Next-Generation Hand Tool The EZ-E Punchdown

CABLEORGANIZER.COM FIRST TO CARRY PLATINUM TOOL’S
NEXT-GENERATION ELECTRONIC HAND TOOL, THE EZ-E PUNCHDOWN
Advanced hand tool’s electronics offer audible and visual feedback

Deerfield Beach, Fla. – Cableorganizer.com, the leader online retailer for cable management and hand tool solutions, recently announced that it will be the first retailer to carry the next generation of hand tool: Platinum Tool’s new EZ-E Punchdown. The EZ-E Punchdown is the first punch down hand tool to incorporate an electronics package into the unit, allowing for audible and visual confirmation of a successful termination.

The EZ-E Punchdown hand tool also features an adjustable force thumb wheel for selecting the optimal punch down force for Insulation Displacement Contacts (IDC). The new features make termination simple: turn the thumb wheel to the desired force setting, seat wire in IDC block, listen and look for sound and light. Once sound and light are activated, the correct force has been achieved and the wire is terminated correctly.

This next-generation punch down tool is powered with a single 9V battery. The industrial-strength housing protects the unit from physical damage and vibration. It’s the ultimate hand tool for all your electrical, networking, cabling, and telecommunications needs.

In addition to the Platinum Tools EZ-E Punchdown tool, Cableorganizer.com offers a wide range of hand tools, including models from Klein, Greenlee and HellermanTyton, as well as hand tool kits, benders, installation and termination tools, hole cutters, toolboxes, and more. Cableorganizer.com is the premier online store for cable management systems and hand tools, increasing safety, performance and protection of cables, and offers tips and “how-to” guides to get the most out of your hand tools.