Custom Search

Friday, October 24, 2008

Configure TCP/IPS


To configure TCP/IP settings
1. Open Network Connections.
2. Click the connection you want to configure, and then, under Network Tasks, click Change settings of this connection.
3. Do one of the following:
- If the connection is a local area connection, on the General tab, under This connection uses the following items, click Internet Protocol (TCP/IP), and then click Properties.
- If this is a dial-up, VPN, or incoming connection, click the Networking tab. In This connection uses the following items, click Internet Protocol (TCP/IP), and then click Properties.
4. Do one of the following:
- If you want IP settings to be assigned automatically, click Obtain an IP address automatically, and then click OK.
- If you want to specify an IP address or a DNS server address, do the following:
- Click Use the following IP address, and in IP address, type the IP address.
- Click Use the following DNS server addresses, and in Preferred DNS server and Alternate DNS server, type the addresses of the primary and secondary DNS servers.
5. To configure DNS, WINS, and IP Settings, click Advanced.


Notes


- To open Network Connections, click Start, click Control Panel, and then double-click Network Connections.
- You should use automated IP settings (DHCP) whenever possible, for the following reasons:
- DHCP is enabled by default.
- If your location changes, you do not have to modify your IP settings.
- Automated IP settings are used for all connections, and they eliminate the need to configure settings such as DNS, WINS, and so on.




Technorati :
Del.icio.us :
Ice Rocket :
Flickr :
Zooomr :
Buzznet :
Riya :
43 Things :

Powered by Zoundry

Read More......

Tuesday, October 7, 2008

Configuring wireless network client computers

Automatic wireless network configuration uses the IEEE 802.11 standard for wireless networks and makes it easy to access those networks. When you enable automatic wireless network configuration on your computer, you can access different wireless networks without reconfiguring the network connection settings on your computer for each location. As you move from one location to another, Windows searches for available wireless networks and notifies you when there are new wireless networks available for you to connect to. After you select a network to connect to, your wireless network adapter is updated to match the settings of the wireless network, and Windows attempts to connect to that wireless network.

With automatic wireless network configuration, you can create a list of preferred wireless networks. You can also specify the order in which to attempt connections to those networks.
To connect to an available wireless network
Open Network Connections.
Click the wireless network connection icon, and then, under Network Tasks, click View available wireless networks.
Choose the wireless network from the list that appears, and then click Connect.
If the network is one that supports Wireless Provisioning Services, such as a public wireless network or a corporate network, you might be asked to download additional files that will allow your computer to connect to the network.
If the Web site listed in the dialog box is one that you trust to provide you with this information, click Download. Otherwise, click Cancel and choose a different network to connect to.
Once the files are downloaded (or if they were previously downloaded), follow the instructions in the Wireless Network Registration Wizard.
If the network you choose is security-enabled, one of the following will occur:
If the network key is automatically provided by your network or system administrator (that is, the network supports IEEE 802.1x), the connection will be made automatically.
If the network key is not automatically provided, in Network key, type the key.
To configure other wireless network connection settings, or if you are having difficulty making a connection to the wireless network that you selected, under Related Tasks, click Change advanced settings, select the wireless network that you want to configure, and then click Properties. If the wireless network is not in the list, click Add.
Notes
To open Network Connections, click Start, click Control Panel, and then double-click Network Connections.
Some wireless networks might not appear on the list. For example, a public Internet service provider (ISP) can be configured to use another provider's wireless network name. In that case, you might see only the public ISP in the list of wireless networks. To show all wireless networks, click Show wireless access point names.

To disable automatic wireless network configuration
Automatic wireless network configuration is enabled by default in Microsoft Windows XP Service Pack 2 (SP2). With this setting, you can connect to an existing wireless network, change wireless network connection settings, set up a new wireless network connection, and specify the wireless network that you prefer to use.
If you are using non-Microsoft wireless configuration software, you should disable automatic wireless network configuration. To configure settings on the Wireless Networks tab, you must be logged on to this computer as an administrator.
Open Network Connections.
Right-click Wireless Network Connection, and then click Properties.
On the Wireless Networks tab, clear the Use Windows to configure my wireless network settings check box.
Notes
To open Network Connections, click Start, click Control Panel, and then double-click Network Connections.
The Use Windows to configure my wireless network settings check box is selected by default. If the Wireless Networks tab does not appear, then automatic wireless network configuration is not available.
You must use a wireless network adapter that supports the automatic wireless configuration service. If you are unsure whether your wireless network adapter supports this service, contact your network administrator or the wireless network adapter manufacturer

Wireless network types
You can choose from the following wireless network types:
Access point (infrastructure)
In access point wireless networks, wireless stations (devices with radio network cards, such as a portable computer or personal digital assistant) connect to wireless access points. These access points function as bridges between wireless stations and the existing network distribution system (network backbone). As you move from one location to another, and the signal for one wireless access point weakens or the access point becomes too busy, you can connect to a new access point. For example, if you work in a large corporation, your wireless device can connect to several different access points as you move between different floors of a building or different buildings in a campus. As a result, you maintain uninterrupted access to network resources.
Computer-to-computer (ad hoc)
In computer-to-computer wireless networks, wireless stations connect to each other directly, rather than through wireless access points. For example, if you are in a meeting with co-workers, your wireless device can connect to the wireless devices of your co-workers, and you can form a temporary network.
Any available network (access point preferred)
In any available network wireless networks, a connection to an access point wireless network is always attempted first. If an access point network is not available, a connection to a computer-to-computer wireless network is attempted. For example, if you use your laptop at work in an access point wireless network, and then take your laptop home to use in your computer-to-computer home network, automatic wireless network configuration will change your wireless network settings so that you can connect to your home network.
802.11 security
Security options for 802.11 include authentication and encryption services based on the Wired Equivalent Privacy (WEP) security services used to protect 802.11 networks from unauthorized access, such as eavesdropping. With automatic wireless network configuration, you can specify that a network key be used to verify access to the network. You can also specify that a network key be used to encrypt your data as it is transmitted over the network.
The wireless network adapter in your computer might support the Wi-Fi Protected Access (WPA) security protocol. WPA provides stronger encryption than WEP. With WPA, the network keys on networked computers and devices are automatically changed and then authenticated regularly, which provides greater security than WEP.
To use WPA, your wireless network adapter must support it. To find out if you can use WPA on your wireless network, check the manufacturer's Web site for information about your device. The manufacturer might have software or a driver that you can download and install.
Network keys
When you enable WEP, you can specify that a network key be used for encryption. A network key might be provided for you automatically (for example, it might be provided on your wireless network adapter), or you can specify the key by typing it yourself. If you specify the key, you can also specify the key length (40 bits or 104 bits), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The longer the key length, the more secure the key. Every time the length of a key is increased by one bit, the number of possible keys doubles.
Under 802.11, a wireless station can be configured with up to four keys (the key index values are 0, 1, 2, and 3). When an access point or a wireless station transmits an encrypted message using a key that is stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body.
802.1x authentication
For enhanced security, you can enable IEEE 802.1x authentication, which provides authenticated access to 802.11 wireless networks and to wired Ethernet networks. IEEE 802.1x authentication minimizes wireless network security risks, such as unauthorized access to network resources and eavesdropping. It provides user and computer identification, centralized authentication, and dynamic key management. The support that IEEE 802.1x provides for Extensible Authentication Protocol (EAP) security types allows you to use authentication methods such as smart cards and certificates. EAP security types include EAP-TLS, Protected EAP (PEAP) with EAP-TLS, and Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2).
With IEEE 802.1x authentication, you can specify whether the computer attempts authentication to the network if the computer requires access to network resources whether a user is logged on or not. For example, data center operators who manage remotely administered servers can specify that the servers should attempt authentication to access the network resources. You can also specify whether the computer attempts authentication to the network if user or computer information is not available. For example, Internet service providers (ISPs) can use this authentication option to allow users access to free Internet services, or to Internet services that can be purchased. A corporation can grant visitors limited guest access, so that those visitors can access the Internet, and not confidential network resources.
Read More......

Troubleshooting network and dial-up connections

What problem are you having?

The modem does not work.
Cause: The modem is incompatible.
Solution: If you have access to another computer with an Internet connection, check the list of compatible modems. To find hardware that is supported by Windows operating systems, visit the Windows Catalog on the Microsoft Web site.
Cause: The modem is not connected properly or is turned off.
Solution: Verify that the modem is connected properly to the correct port on your computer. If the modem is external, verify that the power is on.

Unable to connect to my Internet service provider (ISP).
Cause: The ISP's server is not running.
Solution: Ask your ISP to verify that the remote access server is running.
Cause: You do not have a valid user account, or you do not have remote access permission.
Solution: Verify with your ISP that your user account has been established, and that you have remote access permission.
Cause: You dialed the wrong number, or you dialed the correct number but forgot to dial an external line-access number, such as 9.
Solution: Verify that the number is correct as dialed.
Cause: Your modem cannot negotiate with the modem of the server.
Solution: Try using the same type of modem as the server.
Cause: The modem cabling is faulty.
Solution: Do not use the 9-to-25-pin converters that are included with most mouse hardware because some of them do not carry modem signals. To be safe, you should use a converter made especially for this purpose.
Cause: The telephone line (for example, in your hotel room) does not accommodate your modem speed.
Solution: Select a lower bits-per-second (bps) rate (or call the hotel manager to request a direct line).
Cause: The line you are trying to use is digital.
Solution: Most modems work only with analog phone lines. Verify that you have analog phone lines installed or, if you have digital phone lines installed, verify that the servers and clients have digital modems.

When trying to connect, a message is received that says the ISP server is not responding.
Cause:
At higher bits-per-second (bps) rates, your modem is incompatible with the modem of the server.
There is a lot of static on the phone line, which prevents a modem from connecting at a higher bps rate.
There is some kind of switching equipment between the client and server that prevents the two modems from negotiating at a higher bps rate.
Solution: Adjust the speed of your modem to a lower bitbits-per-secondps) rate.
Cause: The ISP server is not running.
Solution: Ask your ISP to verify that the server is running.

The modem always connect at a lower bits-per-second (bps) rate than specified.
Cause: The modem and telephone line are not operating correctly. Excessive static on the telephone line causes sessions to be dropped.
Solution: You can use modem diagnostics to confirm correct modem operation.
Cause: The destination server is not running properly.
Solution:Ask your ISP to verify that the destination server is running properly. Try connecting to the same server from another workstation. If other workstations are having the same problem, there may be problems with with server applications or hardware. If not, the problem is specific to your workstation.
Cause: The quality of your line is insufficient.
Solution: Contact your telephone company to verify the quality of your line.
Cause: The line you are dialing is affecting the speed.
Solution: If you can connect to your ISP by using more than one number, try another number and see if the speed improves.
Cause: Your modem software needs to be updated.
Solution: Check with your modem manufacturer for modem software updates.

The sessions with my ISP on the network keep getting dropped.
Cause: Call waiting is disrupting your connection.
Solution: Verify that the phone has call waiting. If so, disable call waiting and try calling again.
Cause: The ISP disconnected you because of inactivity.
Solution: Try calling again.
Cause: Someone picked up the phone. Picking up the phone automatically disconnects you.
Solution: Try calling again.
Cause: Your modem cable is disconnected.
Solution: Verify that the modem cable is connected properly.
Cause: Your modem software needs to be updated.
Solution: Check with your modem manufacturer for modem software updates.
Cause: Your modem settings need to be changed because the ISP changed settings on their server.
Solution: Verify the modem settings with your ISP's system administrator.

Connections are disconnecting abnormally.
Cause: The ISP server is not running.
Solution: Ask your ISP system administrator to verify that the server is running.
Cause:
Your modem is unable to negotiate correctly with the modem of the ISP server.
The serial port of the computer cannot keep up with the speed you have selected.
Solution: Try to connect at a lower initial port speed.
Cause: Your modem software needs to be updated.
Solution: Check with your modem manufacturer for modem software updates.

When trying to connect, a hardware error is received.
Cause: The modem is turned off.
Solution: Verify that the modem is turned on. If the modem is turned off, turn it on and redial.
Cause: Your modem is not functioning properly.
Solution: Enable modem logging to test the connection.
Cause: Your cable is incompatible.
Solution: If your modem communicates through Terminal, but not through Network Connections, the cable that attaches your modem to the computer is probably incompatible. You need to install a compatible cable.

Conflicts between serial ports are causing connection problems.
Cause: The serial ports are conflicting.
Solution: Com1 and Com3 share interrupt request (IRQ) 4. Com2 and Com4 share IRQ 3. As a result, for serial communications, you cannot use COM1 and COM3 simultaneously, or COM2 and COM4 simultaneously. For example, you cannot use Network Connections on COM1 and Terminal on COM3.
This rule applies if you are using the mouse in addition to other serial communications programs such as Network Connections or the Terminal program. The rule does not apply if you are using an intelligent serial adapter such as a DigiBoard serial card

When trying to connect by using ISDN, a "No Answer" message is received.
Cause: The ISP server did not answer because it is turned off or the modem is not connected.
Solution: Contact your system administrator.
Cause: The line is busy.
Solution: Try calling later, or contact your system administrator.
Cause: There is a problem with the hardware.
Solution: Verify that the ISDN adapters are installed and configured correctly.
Cause: Your phone number is not configured correctly.
Solution: In some cases, each B channel on an ISDN line has its own number, while in other cases both B channels share a single number. Your telephone company can tell you how many numbers your ISDN line has.
Cause: If you are located in the United States or Canada, your Service Profile Identifier (SPID) is configured incorrectly. The SPID normally consists of the phone number with additional digits added to the beginning, the end, or both. The SPID helps the switch understand what type of equipment is attached to the line and routes calls to appropriate devices on the line. If an ISDN channel requires a SPID, but it is not entered correctly, then the device cannot place or accept calls.
Solution: Verify that the SPID is entered correctly.
Cause: A poor line condition (for example, too much static) interrupted your connection.
Solution: Wait a few minutes and try dialing again.
Cause: You did not enable line-type negotiation, or a connection cannot be made with the line type you selected.
Solution: Enable line-type negotiation.
Cause: Your ISDN switching facility is busy.
Solution: Try again later.
Cause: Your DigiBoard card is too old.
Solution: If you do not have the latest PCIMAC-ISA DigiBoard card, serial number A14308 or greater, contact DigiBoard for a replacement

Connections made by using X.25 fail.
Cause: The dial-up PAD is configured with the wrong X.3 parameters or serial settings.
Solution: If the remote access server is running and you cannot connect to it directly through an X.25 smart card or an external PAD, modify the dial-up PAD X.3 parameters or serial settings. Ask your system administrator for the correct settings.
See also: To configure a connection.
Cause: New Pad.inf entries are incorrect.
Solution: You can check other Pad.inf entries for direct connections and external PADs, and view the comments that go with them. You may need a line analyzer or a terminal program to see the response for the PAD. For dial-up PAD entries, you can use an entry in Pad.inf as an example, paying attention to the comments that go with the example.
Cause: Your modem is incompatible.
Solution: If the modem that connects to a dial-up PAD connects at a lower speed than it should, replace the modem with a compatible one.
See also: The modem does not work with Network Connections
Cause: The line for the remote access server is congested. If a connection has been established, but the network drives are disconnecting, and you are dropping sessions or getting network errors, the cause may be congestion on the leased line for the remote access server.
For example, four clients connecting at 9600 bps (through dial-up PADs) require a 38,400-bps (four times 9600) leased line on the server end. If the leased line does not have adequate bandwidth, it can cause time-outs and degrade performance for connected clients. This example assumes that Routing and Remote Access is using all the bandwidth. If Routing and Remote Access is sharing the bandwidth, fewer connections can be made.
Solution: Your system administrator needs to verify that the speed of the leased line can support all the COM ports at all speeds clients use to dial in

Connections through PPTP fail.
Cause: TCP/IP connectivity problems are keeping you from connecting to the PPTP server.
Solution: You or your system administrator can use the ipconfig and ping commands to verify a connection to your server.
Cause: A Winsock Proxy client is active.
Solution: A VPN connection cannot operate with an active Winsock Proxy client. Winsock Proxy immediately redirects packets to the proxy server before they can be processed by a virtual network connection for encapsulation. Ask your system administrator to disable the Winsock Proxy client.
Cause: You do not have the appropriate connection and domain permissions on the remote access server.
Solution: Contact your system administrator.
Cause: If you are using the TCP/IP protocol, you do not have a unique TCP/IP address.
Solution: Contact your system administrator.
Cause: Name resolution problems are keeping you from resolving names to IP addresses.
Solution: Specify fully qualified domain names and IP addresses in your connection.

Connections made by using PPP or TCP/IP utilities are failing.
Cause: The server does not support LCP extensions.
Solution: If you cannot connect to a server by using PPP, or the remote computer terminates your connection, the server may not support LCP extensions. In Network Connections, clear the Enable LCP extensions check box.
Cause: IP header compression is keeping TCP/IP utilities from running. If you successfully connect to a remote server by using PPP, but TCP/IP utilities do not work, the problem may be IP header compression.
Solution: Try to reconnect after turning off IP header compression.

A specific program experiences Internet connectivity issues and Internet Connection Sharing, Windows Firewall, or both are enabled.
Cause: Windows Firewall, Internet Connection Sharing, or both are obstructing the program or prohibiting the program from successfully establishing full, two-way communications across the Internet.
Solution: Obtain an Internet Connection Sharing and Windows Firewall Plug-in from the program manufacturer. Internet Connection Sharing and Windows Firewall Plug-ins are designed to fix any Internet connectivity problems that you may encounter with specific programs when either Internet Connection Sharing (ICS) or Windows Firewall are enabled. The plug-ins are provided on disk or over the Internet as an executable file. Because Internet Connection Sharing and Windows Firewall Plug-ins can potentially open your network to security risks, you should only install them when they are from a trusted source.

Connections made by using Internet Connection Sharing are failing.
Cause: The wrong LAN network adapter is shared.
Solution: A computer with Internet Connection Sharing needs two connections. One connection, typically a network adapter, connects to the computers on the home or small office network and the other connection connects the home or small office network to the Internet. You need to ensure that Internet Connection Sharing is enabled on the connection that connects your home or small office network to the Internet.
Cause: TCP/IP is not installed on home or small office network computers.
Solution: By default, the TCP/IP protocol is installed on computers running Windows XP, Windows 2000, Windows Millennium Edition, Windows 98, and Windows NT version 4.0. If users on your home or small office network are running operating systems other than these, verify that TCP/IP is installed on their computers.
Cause: If users on your home or small office network cannot reach the Internet, TCP/IP is incorrectly configured on their computers.
Solution: Verify that the following TCP/IP settings are established on home network local area connections:
•IP Address: Obtain an IP address automatically (through DHCP)
•DNS server: Obtain DNS server address automatically
•Default gateways: None specified
For computers running Windows 95, Windows 98, Windows Millennium Edition, or Windows NT version 4.0, you can find the TCP/IP settings in Network in Control Panel.
Cause: If users on your home or small office network cannot reach the Internet, their Internet options need to be modified.
Solution: Internet options must be modified for Internet Connection Sharing. Cause: The Internet Connection Sharing service is not started.
Solution: Use Event Viewer to verify that the Internet Connection Sharing service is started.
Cause: The Internet Connection Sharing computer is not properly configured for name resolution.
Solution: You may need to configure the WINS or DNS name resolution services on the computer. If computers on the home or small office network cannot resolve names to IP addresses, you can check the name resolution configuration of the Internet Connection Sharing computer by using the ipconfig command. There are two ways that your ISP can configure name resolution:
•Statically assigned name servers
You must manually configure the TCP/IP protocol with the IP address (or addresses) of the name servers provided by the ISP. If you have statically assigned name servers, you can use the ipconfig command at any time to get the IP addresses of your configured name servers.
•Dynamically assigned name servers
Manual configuration is not required. The IP addresses of the name servers provided by the ISP are dynamically assigned whenever you dial the ISP. If you have dynamically assigned name servers, you must run the ipconfig command after a connection to the ISP has been made.
Cause: If you cannot play a game across the Internet, the protocol used by the application is not translatable.
Solution: Try running the program from the Internet Connection Sharing computer. If the program works there but not at a computer on the home or small office network, then the program may not be translatable.
Cause: If you cannot play a game across the Internet, the program is not configured on the computer running Internet Connection Sharing.
Solution: Verify that the program, including port numbers, is configured correctly.
Cause: If Internet users cannot see services on your home or small office network, such as a Web server, the service is not configured correctly.
Solution: Verify that the service, including port numbers and TCP/IP addresses, is configured correctly.
Cause: If users on your home or small office network cannot reach the Internet sites by using friendly names, there is a DNS resolution problem.
Solution: Have users on your home or small office network use fully qualified domain names or IP addresses when accessing Internet resources.

When using a local area network connection, there is no response.
Cause: There may be problems with your network adapter.
Solution: Try the following:
•Check the appearance of the local area connection icon. Depending on the status of the local area connection, the icon appears in different ways in the Network Connections folder. Also, if the local area connection media is disconnected (for example, the cable is unplugged), a status icon is displayed in the notification area..
•Use Device Manager to verify that your network adapter is working correctly.
Cause: The local area connection cable may not be plugged into the network adapter.
Solution: Check to make sure the local area connection cable is inserted into the network adapter.

When using a laptop to connect to an ISP, some or all of the programs do not run properly.
Cause: The WinSock Proxy Client may be preventing your programs from running properly when you use the ISP connection.
Solution: If you are a mobile user and use your laptop in your corporate environment, you may need to disable the Microsoft WinSock Proxy Client (WSP Client in Control Panel) when you use the same computer to dial to an ISP or other network. For example, if you use a laptop in your office and use the same computer to connect to an ISP or other network from your home, you may have problems running all of your programs when you use the ISP connection. (For example, your programs may not be able to find the resources or servers they need.) If this is the case, you should disable the Microsoft WinSock Proxy Client (WSP Client in Control Panel) to run the programs that you typically run when you use your laptop in the corporate office.

Incoming connection clients cannot see resources beyond the incoming connection computer.
Cause: If the addresses that are being allocated to incoming clients are not a subset of the network to which the incoming connection computer is attached, you must create a route to the incoming client computers on the intranet computers.
Solution: Reconfigure your range of IP addresses that are being allocated to incoming clients so that it is a subset of the network to which the incoming connections computer is attached. If you cannot do this, then configure your intranet hosts with the IP address of the incoming connections computer as a default gateway.
•If your intranet hosts are configured to obtain an IP address automatically and a Dynamic Host Configuration Protocol (DHCP) server is present, you can configure your DHCP server to assign the default gateway.
•If your intranet hosts are configured to obtain an IP address automatically and a DHCP server is not present (you are using the Automatic Private IP Addressing feature), then you must manually configure all of your intranet hosts with an IP address, subnet mask, and default gateway.
Cause: The calculated range of addresses allocated to connecting clients is larger than the range that you configured.
Solution: Most TCP/IP networks use subnets in order to effectively manage routed IP addresses. The closest matching subnet is calculated for the range that you specified in From and To. The range of addresses in the closest matching subnet may exceed the range that you specified. Unless the addresses specified in From and To are subnet boundaries, the range based on the calculated subnet will be larger than the range that you specified. To avoid this, specify a range that falls on subnet boundaries. For example, if you are using the 10.0.0.0 private network ID for your intranet, a range that falls on subnet boundaries is 10.0.1.168 to 10.0.1.175. Or, if you are using the 192.168.0.0 private network ID for your intranet, a range that falls on subnet boundaries is 192.168.1.0 to 192.168.1.255.
Read More......

Maintain Computer

Saturday, 07 October 2008

A computer, like any other machine, needs maintenance. Regular maintenance enhances a computer's performance and ultimately its user's performance. At the office, individual users should not assume that the network administrator is taking care of each office computer. Rather, a discussion with the administrator can produce a plan to keep the user's computer in shape without creating problems on the network. At home or at the office, on a network or not, fifteen minutes each week spent running a few daily and weekly tests and maintenance procedures can avert crashes and time-wasting sluggish performance.


Listless performance can include slow saves, programs and documents that open slowly, the inability to run a spell checker, and even the inability to scroll down a large document. What causes sluggishness? Leaky memory, a fragmented hard drive, and insufficient hard disk space are three major culprits.1

Leaky memory inevitably occurs as a part of a computer's operation. Such commonplace tasks as opening programs, saving work, and closing programs all day long cause the computer's memory to leak, because when these tasks are completed the memory that was allocated to perform them is not completely reallocated to Windows.

This causes the computer to begin running inefficiently, because computers run on their memory. A simple diagnostic test can determine if a computer is leaking memory. Users with Windows 95 or a later operating system can perform the test by using the mouse to left click on Start, Settings, Control Panel, System (double click), and Performance. The higher the percentage indicated in System Resources, the faster and more efficiently the computer is running.

This simple test can offer surprises. For example, a diagnostic on one computer tallied a mere 69 percent. If the percentage is low, it is time for one of the easiest and most overlooked daily maintenance steps: just restart the computer! (There is no need to shut down. Simply click on Start, Shut Down, and then click on Restart.) After this procedure, the computer that was running at 69 percent efficiency improved to 86 percent. Depending upon the system and software add-ons, a normal starting level is between 80 and 95 percent. If the computer is running at low efficiency, leaky memory may be at fault and a restart can help. Get in the habit of restarting before going to lunch, a meeting, or court. Remember to save all work and exit all programs beforehand.

A fragmented hard drive is another common problem. A computer's hard drive is like a jigsaw puzzle, and as more information is added, changed, or deleted from files over time, pieces of the files, like pieces of a puzzle, become separated. A computer, like a person, tends to scatter its files around as it uses them, and from time to time needs to reorganize them. Fragmentation forces the computer to work harder (and thus slower) as it strives to reassemble the pieces. Users can counteract this tendency by running a defragment utility once a week. The utility reassembles the separated pieces into an organized state in advance of opening programs, allowing the hard drive to work more efficiently and consequently start programs more quickly. There is no diagnostic test for fragmentation, but when Word, WordPerfect, Excel, or other programs open slowly, it can be a sign of a fragmented hard drive.

Repair Fragmented Files

Before running the defragment program, first save all work and exit all programs. Then, to ensure that the defragment utility itself runs quickly, disable the screen saver. Using the mouse, right click on any part of the desktop that is not an icon or a tool bar, left click on Properties, the Screen Saver Tab, the arrow in the box under screen saver, scroll to None and click on Apply, then OK. Failure to disable the screen saver causes the defragment utility to start again each time the screen saver appears, prolonging the procedure.

To run the Defragment utility, left click on Start, Programs, Accessories, System Tools, and Disk Defragmenter. When asked which drive to defragment, select All Hard Drives if the computer has more than one. If the computer only has one drive, select C. In Windows 95, click OK. Windows will examine the hard drive to determine what percent is defragmented. Even if told, "You don't need to defragment this drive now," continue anyway. A drive that is fragmented only 1 percent can slow the system. Click on Advanced and make sure that there is no checkmark in the box labeled Check Drive for Errors, then click OK and Start. For Windows 98 and Windows ME, click on Settings (again, make sure there is no check in the box labeled Check Drive for Errors), then click OK.

Even if the screen saver has been disabled, there is still a chance that the defragmentation process will reset itself and begin from zero. This is indicated when the message "Drive's Contents Changed" appears before the fragmentation is complete. If this happens, take a break and let the utility program run again. Eventually it will run all the way through. After the defragmenting utility runs, return the screen saver to its original settings.

A third culprit behind a computer's sluggish performance is insufficient hard disk space. To diagnose this, check the hard disk space by double clicking on My Computer (the icon on the desktop), right click on C, and left click on Properties. Note the percentages identifying used and free space. With more free disk space, the computer's performance is enhanced because files can be moved around more easily and more files and programs can be kept open. The more disk space is kept free, the better. Generally, if the free space amounts to 25 percent or less, it is time to create some hard disk space.

Restoring Hard Disk Space

First, delete unnecessary files. Click on My Computer on the desktop and highlight any unnecessary folders or files and press the Delete button. This sends the folder or file to the Recycle Bin but does not actually delete the file from the hard drive (and thus does not make room) until the bin is emptied. Double click on Recycle Bin (an icon on the desktop), review the files previously deleted to be sure they are no longer needed, and click on Empty Recycle Bin. To restore a single file, click on it, click File, and click Restore.

The second way to recover disk space is to delete unneeded e-mail messages and empty the Internet disk caches from the browsers (Netscape Navigator and Internet Explorer). Deleting e-mail will also improve the e-mail system's speed. In some cases, e-mail folders can be so bloated that new messages cannot even be received. Deleting mail will permit receipt of new messages.

Instead of deleting one message at a time, click on the first one to be deleted, then hold down the shift key and click on the last one to be deleted. Each message between these two will be highlighted, allowing for a wholesale deletion by clicking Delete once. If a user has multiple e-mail folders, each folder should be reviewed to identify candidates for deletion. Remember to delete both received and sent messages. Just as deleted files are routed to the Recycle Bin but do not actually get deleted until the Recycle Bin itself is emptied, deleted e-mails are routed to an e-mail trash folder and are not deleted until the trash folder is emptied. To empty trash from Netscape Communicator, go to the e-mail program, click on File (on the tool bar at the top of the screen), and click on Empty Trash on Local Mail. For MS Outlook, click on Tools, Options, Maintenance, and check the box next to Empty Messages from Deleted Items Folder on Exit.

The third way to free hard drive space (and improve Internet speed) is to clear the Internet disk cache in the Netscape Navigator browser and the Temporary Internet Files folder in the Microsoft Internet Explorer browser. Cache or temporary Internet files appear when a user uses the back or forward arrow. After a time, however, cache files begin to clutter the system and slow the browser to a crawl. The temporary files can be cleared without connecting the computer to the Internet. It is preferable that they be cleared after each Internet session or even during a long session. To clear the Netscape Navigator disk cache, click on Edit (on top bar on the screen), Preferences, Advanced (double click), Cache, and Clear Disk Cache. To clear the Internet Explorer cache, click on Tools, Internet Options, General Tab, Temporary Internet Files, Delete Files, and OK.

Windows 98 offers a maintenance wizard, but manual maintenance is still recommended. The wizard occasionally does not complete its tasks, and proper configuration of the wizard can be elusive. In an office with a computer network, consult the network manager before performing maintenance tasks-some may already be part of the maintenance schedule. And unless your network manager makes house calls, perform regular maintenance on the computer at home.

Read More......

How to decide if you can trust a Web site

Web sites can bring you a wealth of information and convenience. However, some Web sites can request personal information that you would rather keep private, display advertisements you do not want to see, or expose your computer to software that contains viruses or other security threats. How do you know which Web sites you can trust? It’s difficult to be completely certain, but there are a few key things to look for.

Is the Web site certified by an Internet trust organization such as BBBonline, TRUSTe, or WebTrust? Sites that display these logos have agreed to follow certain practices like providing a comprehensive privacy statement. If you read these statements, you should be able to determine what data the site collects and what the site does with that data (for example, you can find out whether they share your data with a third party or use it to display personalized advertisements). This logo does not mean that the site collects no data. It means that the privacy statement will tell you what data the site collects so you can decide if you want to use that Web site.
Is the site from an organization you know and already trust (for example, a vendor you have a positive ongoing relationship with) or from a widely recognized brand or institution? The site should provide a privacy statement or a Terms of Use statement. Reading these statements should make it clear what will happen when you use the site. If you are not comfortable with the terms or behaviors (for example, if you would prefer not to be tracked or have advertisements presented and the organization indicates that it does either of those things), do not use the site.
If you do not recognize the Web site and it does not have a trust logo, you should be cautious and thoroughly research the site before using its services. Research can include reading the site’s disclosures, asking friends and colleagues you trust, and searching the Web for positive or negative articles about the site.
If you are asked to provide sensitive personal data (such as your password, social security number, credit card number, or bank information), only do so if there is a valid reason and if the site uses a secure method to collect this data. Look for a statement indicating this information will be encrypted or look for the golden padlock symbol in your browser status area to indicate that the information will be transferred using secure methods.
When making a purchase on a Web site, verify that the site has a posted return policy and that the terms are acceptable to you.
Be cautious of a Web site if…

You were referred to the site by e-mail from someone you don’t know.
The site contains objectionable material such as pornography.
The site makes offers that seem too good to be true. Are they just trying to lure you to their site?
You are asked to provide a credit card number but there is no indication that the Web site ensures the transaction is secure.
The site offers free membership but asks you to provide extensive personal information that does not seem necessary or that you do not want to provide
Read More......

Internet Connection Sharing

Internet Connection Sharing overviewWith Internet Connection Sharing (ICS), you can connect computers on your home or small office network to the Internet using just one connection. For example, you have one computer that connects to the Internet using a dial-up connection. When ICS is enabled on this computer, called the ICS host, other computers on the network connect to the Internet through this dial-up connection.

When you are setting up a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to share one Internet connection with all the computers in your network.
Note
To start the Network Setup Wizard, click Start, click Control Panel, and then double-click Network Setup Wizard.
After ICS is enabled, and you make sure that all of your computers can communicate with each other and they have Internet access, you can use programs such as Internet Explorer and Outlook Express as if they were directly connected to the Internet service provider (ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download e-mail. To test your network and Internet connection, see if you can share files between computers and that each computer can get to a Web address.
Internet Connection Sharing is intended for use in a network where the ICS host computer directs network communication between computers and the Internet. It is assumed that in a home or small office network, the ICS host computer has the only Internet connection. While other computers on the network may have modems to access the Internet, their primary connection is through the ICS host computer.
You might need to configure the Internet Connection Sharing computer to work properly across the Internet. Services that you provide must be configured so that Internet users can access them. For example, if you are hosting a Web server on your home or small office network, and want Internet users to be able to connect to it, you must configure the Web server service on the ICS host computer
You must enable ICS on the public connection of your home or small office network. If you have more than one network adapter installed on your computer, you need to choose the local area connection that communicates with the rest of the computers on your home or small office network. This is also called the private network connection. If there are two or more local area connections, when you enable ICS, you must do one of the following:
Select one connection to connect to the rest of the computers on your network
If you have two or more local area connections, and all of them connect to the rest of the computers on your network, you need to bridge the local area connections before you can select the connection to your home or small office network. If you choose to create a network bridge that includes all of the local area connections to your network, the bridge is automatically selected when you enable ICS. If you create a network bridge that does not include all of the local area connections to your network, you can still select the bridge as your private connection
Important
The ICS host computer needs two network connections. The local area network connection, automatically created by installing a network adapter, connects to the computers on the home or small office network. The other connection, using a 56k modem, ISDN, DSL, or cable modem, connects the home or small office network to the Internet. You need to ensure that ICS is enabled on the connection that has the Internet connection. By doing this, the shared connection can connect your home or small office network to the Internet.
When you enable Internet Connection Sharing, the local area network connection to the home or small office network is given a new static IP address and configuration. Consequently, TCP/IP connections established between any home or small office computer and the ICS host computer at the time of enabling ICS are lost and need to be reestablished.
Notes
You must be logged on to this computer as an administrator to complete this procedure.
If a VPN connection is created on the ICS host computer, and ICS is enabled on this connection, then all Internet traffic is routed to the corporate network and all of the computers in your home or small office network can access the corporate network. If ICS is not enabled on the VPN connection, other computers will not have access to the Internet or corporate network while a VPN connection is active on the ICS host computer
Read More......

How To Connect Internet

Before you can connect to the Internet and access the World Wide Web, you need to have certain equipment. In brief, you must have a computer (preferably running an up-to-date operating system); a modem and access to a telephone line or a local area network (LAN) that is in turn connected to the Internet; and connection software that will allow you to establish an account with a service provider and access the Internet.
A modem is not needed when accessing the Internet through a LAN.

operate most of the current Web browsers and on-line services, you should have an IBM PC/PC equivalent, UNIX workstation, or Apple Macintosh computer with at least 8 megabytes (MB) of random access memory (RAM) and 10 MB of free disk space. If you are unsure of how much RAM and disk space your computer has, consult your user's manual.
NOTE: Although the capacities of both are measured in megabytes, RAM and disk space are NOT the same thing! RAM refers to the electronic microchips in your computer that store data for relatively brief periods, and that give your computer the active capacity to run programs and access data. Disk space refers to space on the magnetic hard disk inside (or connected to) your computer that stores data over the long term.

For best results with thw right Hardware, use a PC with a 486 or Pentium microprocessor; or a Macintosh with an 030, 040 or PowerPC microprocessor.
It is possible to connect to the Internet using a computer other than an IBM PC, Macintosh or UNIX workstation, though the access software available for such machines is limited.
if you are accessing the Internet outside of a LAN environment, you will need a modem that will connect you with other computers and interpret the data being sent back and forth. Most any modem that is compatible with your computer will do, though the higher the kilobits per second (kbps) rate of your modem, the faster it will transmit data. Modem speed is an important consideration when accessing sites on the Web that contain lots of digitized data. In general, your modem should transmit data at 14.4 kbps or faster to give you optimum performance on the Web. If you are looking to purchase a modem, buy the fastest model you can afford.
You must also have access to a live telephone line. Most modems accept the same jacks as do ordinary household telephones, allowing you to connect your modem to a wall jack using standard phone cord. Some cable TV providers have begun offering Internet connections via cable. Such connections provide much faster transmission speeds than standard phone lines, though you will need a special modem that allows you to link your computer with the cable. If you are interested in a cable Internet connection, contact your local cable operator to see if the service is available in your area.
You can also connect to the Internet through a LAN with Internet access. If you are unsure as to the capacities of your LAN to do this, contact your site's systems administrator.

For best results with the right Software, make sure that your computer is running the most up-to-date operating system that it can handle. If you have an IBM PC/PC compatible computer, it should be running Microsoft Windows version 3.1, Windows NT, Windows 95 or OS/2. If you have a Macintosh, it should be running System 7 or higher.
To make your connection complete, you will need connection software that allows your computer to dial into an Internet access provider, establish an account, and work with the data in a straightforward manner. Many access providers will give you software that will allow you to access their systems using an all-in-one custom interface. Others may give you a collection of separate software packages that can be used together. But whatever software they provide, be sure that it is compatible with your computer and operating system before attempting to use it.
Some Internet access providers may allow you to establish a serial line interface protocol (SLIP) or point-to-point protocol (PPP) connection, either of which essentially makes your computer a part of the Internet. Unlike many standard dial-up software packages, a SLIP/PPP connection allows you to run independent software packages such as Web browsers, either one at a time or simultaneously.

Browser
As you surf the Web, you will come across sites that state, "This site is best viewed with…" and then name a particular browser. Many will even provide a link to a site where you can download the specified browser.
Sites make these recommendations because some browsers use special protocols, allowing site creators to offer extra features beyond the standard capabilities of hypertext markup language (HTML). Chief among these browsers are Netscape Navigator and Microsoft Internet Explorer.
Your Internet service provider will most likely give you a choice of browsers (if you have a SLIP/PPP account, you may use any browser you wish), so try out a couple, and use the browser that best suits your needs.

Extras
The Netscape Navigator and Microsoft Internet Explorer browsers allow for the use of plug-ins, or extra software applications that run as if they were an integral part of the browser. To see which plug-ins are currently available for Netscape, go to: http://home.netscape.com/comprod/mirror/index.html To see the plug-ins for Internet Explorer, go to: http://www.microsoft.com/ie/download/
Browsers also use helper applications that, while not as integral as plug-ins, enhance the browser's capabilities by launching when needed. Helper applications allow your browser to play sound and video files, display animation and other graphic formats, or access special Internet features such as TELNET. Most Web sites that require the use of helper applications will provide links to sites where you can download the necessary software.

Connection Option
Until recently, the two primary methods of accessing the Internet were through a network connection, allowing users of local area networks (LANs) to go online through their school or workplace systems, and dial-up connections through a modem and phone line. However, new connection options allow for greater speeds and flexibility, while keeping costs to a minimum.
The following are some of the newer connection options that you might want to investigate:

  • Cable Internet—These systems allow your computer to connect to the Internet through the same cable that carries your TV signal. Monthly service charges are usually not much more than standard modem connection costs, but you have to rent or purchase a "cable modem." Additionally, your computer will need an Ethernet card (a special circuit board that allows for network connections). Not all cable service operators offer this service; call your local operator for more information.

  • Satellite connections—DirecPC (http://www.direcpc.com/) allows you to download Internet files via a satellite connection. This is an efficient method for receiving large Web graphics and other items, but you still need a modem connection for other features. You must purchase the connection hardware as well as subscribe to the service.

  • Integrated Services Digital Network (ISDN)—An ISDN line is a type of digital phone line that can transmit data many times faster than a conventional modem and phone line. To learn more about ISDN, go to http://www.isdn.ocn.com/index.shtml

  • Wireless connections—Pagers, cellular phones and personal digital assistants (PDAs) now allow varying levels of Internet access, from notification of E-mail to limited Web connections. Many of these services remain in the experimental stage.

  • WebTV—Introduced in late 1996, WebTV (http://www.webtv.net/) provides Web and E-mail access through ordinary television sets. The connection is made through a custom high-speed modem. You must purchase a special set-top unit for your TV, plus subscribe to the connection service. Recently, similar systems by other manufacturers have appeared on the market to compete with WebTV


That'S all ahead for the first shares
Useful Hopefully
Read More......