+44(0) 1234 567 890 info@domainname.com

Saturday 30 July 2011

How VPN Works





VPN ( Virtual Private Network ) using for security in internet networks. It will provide long distance connectivity, between multiple offices of a company by providing secure data transfer and encryption.It can provide security in your video conferencing, as well as
data transfer. It reduces the costs for establishment and maintaining long distance networks. Totally VPN service containing more advantages than normal networks.

What is VPN ?

 

A virtual private network ( VPN )is a special type of wide area network (WAN), which establish connectivity without using leased private lines and makes use of the Internet. It uses the established Internet network, for remote connectivity between long distance offices, workstations or networks. VPN has its own set of softwares, protocols and security constructs which make secure connectivity possible.

How VPN Work ?

 

Normally user double clicks on a software shortcut and the VPN connection window appears. Then user enters a username and password and press connect, the VPN connection is immediately established. Once users are connected to the office network over VPN, they can access files and other resources. After their work press ” Disconnect ” button for disconnect PC from VPN network.
In order to use VPN, your Internet connection should have a static IP address. For establishing of a VPN connection, a secure tunnel is established between VPN server and client. A VPN tunnel is known as a special type of link between a VPN server and a client. The datas transported through the VPN network follows different protocol rules that encrypt the datas over its journey to the VPN server. In the time of reception at the VPN server, the data is again decrypted. Tunnel is a dedicated and secure connection maintained between the VPN server and remote computer. A VPN tunnel may be voluntary or compulsory. Protocols used for VPN tunneling are Layer Two Tunneling Protocol (L2TP), Point-to-Point Tunneling Protocol (PPTP) and Internet Protocol Security (Ipsec).



Advantages of VPN

  • VPN network providing secure data transfer and encryption.
  • It reduces the costs involved in maintaining long distance networks.
  • VPN is useful for remote access.
  • VPN allow Access to Mobile Users.
  • Several ports for VPN connection (ports: 1194, 53, 5190)

Some VPN Service Providers

No comments

Monday 25 July 2011

How to Enable IPv6 On Windows XP




IP, the Internet Protocol, is one of the pillars which supports the Internet. Almost 20 years old, first specified in a
remarkably concise 45 pages in RFC 791, IP is the network-layer protocol for the Internet.
In 1991, the IETF decided that the current version of IP, called IPv4, had outlived its design. The new version of IP, called either IPng (Next Generation) or IPv6 (version 6), was the result of a long and tumultuous process which came to a head in 1994, when the IETF gave a clear direction for IPv6.
IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6. The differences between IPv6 and IPv4 are in five major areas: addressing and routing, security, network address translation, administrative workload, and support for mobile devices. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4.
Since 1994, over 30 IPv6 RFCs have been published. Changing IP means changing dozens of Internet protocols and conventions, ranging from how IP addresses are stored in DNS (domain name system) and applications, to how datagrams are sent and routed over Ethernet, PPP, Token Ring, FDDI, and every other medium, to how programmers call network functions.
The IETF, though, is not so insane as to assume that everyone is going to change everything overnight. So there are also standards and protocols and procedures for the coexistence of IPv4 and IPv6: tunneling IPv6 in IPv4, tunneling IPv4 in IPv6, running IPv4 and IPv6 on the same system (dual stack) for an extended period of time, and mixing and matching the two protocols in a variety of environments.



We can Enable This Facility in 2 Methods

Type 1


1) Go to ” Run” and type ” CMD ” then press enter
2) Type following commands  separately and press ” Enther ” after each of them
  • netsh
  • interface
  • ipv6
  • install
3) Now you can access the IPv6 properties from the Network Connections windows for a particular network card.




OR

Type 2

1) Open a Run dialog by pressing Windows Key + R.
2) Type cmd in the Run dialog and press Enter.
3) In the command prompt window, type ipv6 install and press Enter. You would see that IPv6 is being installed.
4)You can check the IPv6 properties from the Network Connections windows for a particular network card.



1 comment

Common Linux Commands




Open-source Linux is a popular alternative to Microsoft Windows, and if you choose to use this low-cost or free operating system, you need to know some basic Linux commands to make your system smoothly. The most common Linux commands are shown in this table.





































Command Description
cat [filename] Display file’s contents to the standard output device (usually your monitor).
cd /directorypath Change to directory.
chmod [options] mode filename Change a file’s permissions.
chown [options] filename Change who owns a file.
clear Clear a command line screen/window for a fresh start.
cp [options] source destination Copy files and directories.
date [options] Display or set the system date and time.
df [options] Display used and available disk space.
du [options] Show how much space each file takes up.
file [options] filename Determine what type of data is within a file.
find [pathname] [expression] Search for files matching a provided pattern.
grep [options] pattern [filesname] Search files or output for a particular pattern.
kill [options] pid Stop a process. If the process refuses to stop, use kill -9 pid.
less [options] [filename] View the contents of a file one page at a time.
ln [options] source [destination] Create a shortcut.
locate filename Search a copy of your filesystem for the specified filename.
lpr [options] Send a print job.
ls [options] List directory contents.
man [command] Display the help information for the specified command.
mkdir [options] directory Create a new directory.
mv [options] source destination Rename or move file(s) or directories.
passwd [name [password]] Change the password or allow (for the system administrator) to change any password.
ps [options] Display a snapshot of the currently running processes.
pwd Display the pathname for the current directory.
rm [options] directory Remove (delete) file(s) and/or directories.
rmdir [options] directory Delete empty directories.
ssh [options] user@machine Remotely log in to another Linux machine, over the network. Leave an ssh session by typing exit.
su [options] [user [arguments]] Switch to another user account.
tail [options] [filename] Display the last n lines of a file (the default is 10).
tar [options] filename Store and extract files from a tarfile (.tar) or tarball (.tar.gz or .tgz).
top Displays the resources being used on your system. Press q to exit.
touch filename Create an empty file with the specified name.
who [options] Display who is logged on.



Related:
Commands- Windows Vs Linux

No comments

Thursday 14 July 2011

Lock Your USB Drive



The main purpose of using a USB pen drive is that you can bring your data with you wherever you go. But if you lose your USB pen drive your data also lose. It becomes more dangerous if you have confidential files stored in it. So we need some protection software for
encryption and password protection. Only few pen drives manufactures giving software for protection. So we need a program for protecting data in pen drive. USB Safeguard is a Freeware Encryption tool for Flash Drives. It can be used to password protect any files inside your USB Flash Drive. Simply create a password and then drag and drop files from your Flash Drive into the Window. To access the encrypted files, simply re-enter your password.



 
Choose a password and confirm it. Screen keyboard also available for enter password. It is useful if you suspect that there is any key logger installed on the computer.

To encrypt the files in USB drive drags and drops the files to above window. To decrypt the files user need to select any file and clicking decrypt or Decrypt all button will bring back files to USB drive. User need to enter password each time to access encrypted files or to decrypt files

 
Features:
·         Runs with Any USB Drives
·         No Installation Requires
·         Simple Steps to Configure
·         Easy Drag & Drop File Adding
·         Built in the Shredder
·         Secure Your Data if Drive is Lost
·         Supports FAT16, FAT32, & NTFS File Systems
There is a chance to Lose Your Data in First Time Use
For Download  Click Me
3 comments

Tuesday 5 July 2011

Data Recovery Softwares




Have you ever accidentally deleted any files very important for you ? Do you want to recover that deleted file? Then we will recommend you 5 Free Data Recovery Software Programs.


1. Pandora Recovery
Pandora Recovery is a data recovery program that supports the FAT 12/16/32 and NTFS file systems. You can recover files with the original time and date stamp. Once the scanning is complete you have full control over which files to recover and what destination to recover them to.


2. Glary Undelete
Glary Undelete is file recovery software for NTFS, FAT, NTFS +EFS file systems. It is a powerful solution to recover compressed or fragmented or encrypted files. Recover recover files emptied from the Recycle Bin, in a Dos. window, Windows Explorer and even recover files that have been deleted by bugs, crashes and viruses etc.


3. FreeUndelete
FreeUndelete restores deleted files, including those removed from Windows Recycle Bin. In case of accidental removal of files on a NTFS for Windows Vista, XP, 2000 and NT, FAT32, FAT16 or FAT12 file systems. It is easy to use, no special user skills required.


4. DiskDigger
DiskDigger is a program that undelete and recovers lost files from your hard drive, memory cards, USB flash drives. If you accidentally deleted some documents or photos from your computer, reformatted your camera’s memory card, or want to see what files are lurking on an old USB drive then use this tool for recover it




5. Recover My Files

Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.You can recover all files located on hard drives, external drives, memory cards, ZIP drives etc.


No comments

Common Hardware Errors & Solutions

Common hardware problems
  •  Computer will not start (boot up)
  •  Monitor problems
  • Hard drive problems
  • Modem connection difficulties
  • Broadband connection problems
1. Will not Start 

Unfortunately, there are many reasons why your computer will not start.  Lets start with the really simple (and don’t be insulted, these are actually quite common):

Not plugged in or switched on at the socket,
the power lead has come loose at the back of the computer,
the trip switch / fuse on the house fuse board has gone
Somewhat more serious and complicated are when the power light comes on but the computer does not get past its start up checks called the POST checks.

If the machine produces a series of beeps rather than the usual single beep it could mean that the motherboard, the processor or the RAM memory has failed.
You may get a three figure error code on the screen.
These can be interpreted although it depends on the make of the machine or its setting.  For these sort of problems you need specialist help.  Call me!
 
2.  Monitor Problem


Again, if the monitor does not come on, check the simple things first

plugged in to the power at the socket or at the back of the monitor
Signal lead is attached correctly to the computer. If the computer does not start properly and continues to beep at start up it could mean that the monitor is not properly plugged in or the graphics / video card has malfunctioned.
If you have recently plugged the monitor signal lead in have you bent one of the connection pins in the lead plug as I found recently on a friend’s computer!
check that the monitor brightness or contrast has not been turned right down
In a situation where the monitor comes on but the image is poor or strange

Is the monitor close to a strong external magnetic field?  This could, for example come from speakers or equipment that contains a transformer that is close to the monitor.
The refresh rate for the screen is inappropriately set.  Access the monitor settings either via the control panel or by right-clicking on the desktop … but be careful.
If you seem to get images repeated over the screen it could be that you have the screen resolution set incorrectly.  Again, you may try to adjust this via the monitor settings.
Top of page

 3. Mouse problems


 If your mouse pointer does not move smoothly across the screen but jerks or seems to hit an invisible barrier, its probably dirty. To clean a mouse:

Turn the mouse over and twist the retaining ring anticlockwise and then tip the ball out into your hand
If the ball is messy, you can clean it with soapy water
Look inside the mouse and you should see some rollers, usually two long back ones and one small metallic one.
Gently scrape any dirt stuck to the rollers using a finger nail. Do not apply too much pressure
If the rollers are sticky try using a cotton bud dipped in cleaning fluid (isopropyl alcohol usually obtainable from computer or camera shops)
Once all that is done reassemble your mouse
If the mouse pointer does not move at all it could be:

A PS2 mouse (type with the small round plug) could have a conflict with another device using the same COM port.  Have you recently added some new hardware that could be causing this?
The mouse itself has failed and needs replacing
If its a USB mouse just simply try unplugging and replugging it. If its a PS2 mouse, turn the computer off, take the plug out and put it back in again.
Top of page

 4. Hard drive problems


 As the hard drive carries all of the files that make the computer work as well as the applications you use, problems with the drive can be serious.  There are numerous things that can go wrong.  Here are a few:

If the computer will not boot up it could be that the power supply to the hard drive or its ribbon connector that carries the data are not properly attached
If, during the POST start up checks you get an error message with a code16**, it means that the computer is not communicating with the hard drive. You can still start the computer with a boot floppy disk or a boot CD. You could enter the CMOS settings as you power on to check that the correct hard drive details are present.  If they are correct again, check the connectors to the hard drive.  If you are not sure about how you do this, call us.
If after the POST start up checks you get a message saying that there is no operating system it could mean that some files have become corrupted and/or the drive is damaged. You may get a message saying that certain files are either corrupt or missing.   If this is the case, you will probably need to reload the operating system.  It would be worth running Scandisk to check the condition of the hard drive. If it is beginning to fail, it would be worth replacing the drive. It may be possible to rescue your important data files from the drive.
Top of page
 5. Modem connection difficulties
 Modems can often be quite problematic although some connection difficulties are easier to sort out than others.

If the computer tells you that there is no modem present it may be due to:

The external modem id not switched on
The external modem is not correctly connected to the COM port
The internal modem is not properly seated in its slot on the motherboard
The modem has been assigned the correct COM port resources eg its IRQ or DMA settings and that these settings are not conflicting with another piece of hardware.  Check the settings in the Device Manager
The dial-up properties are incorrectly configured
If you get a “No dial tone” message:

Is the modem connected all right to the phone socket?
If it is, try unplugging the connector and putting it back again in the phone socket
Has the phone cable been damaged?
Is there someone else in the house using the phone on another extension?
Check that you can get a dial tone with a phone
Your modem dials up alright but cannot make the connection

Have you entered your username and password correctly? Passwords are case sensitive.  Is the Caps Lock on?
If you are using a toll free connection, they often use your phone number as a way of checking that its you connecting.  You haven’t entered the BT code that blocks caller recognition?  Or you are not using a laptop computer from a different phone?
Modem randomly drops the connection:

If you have call waiting, it must be disabled
If someone else in the house picks up the phone while you are using the internet, you modem may hang up
You seem to receive garbage:

This could be that your phone line is picking up a lot of static or electromagnetic interference.
Is the line too near power cables, fluorescent lights, the monitor, speakers?
Top of page

6. Broadband connection problems

 Is the broadband connection device (USB modem or router) synchronising with the phone line alright?  Are the correct lights coming on?
Check the broadband filters. All phone devices in the house on the same number MUST have a filter.  This includes phones, faxes, extension bells, Sky TV boxes etc.
Is the connection username and password correct?
1 comment

Saturday 2 July 2011

Convert FAT to NTFS

To convert a FAT partition to NTFS, perform the following steps.

Start ---> RUN ----->. Type  CMD



At the command prompt, type,

CONVERT [driveletter]: /FS:NTFS

Convert.exe will attempt to convert the partition to NTFS.


NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).
1 comment