Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Aug 3, 2013

How to speed up your internet connection

Does your broadband seem a bit sluggish? If so, there may just be a simple solution.You'll need:    A computer connected to the internet. Follow these step-by-step instructions to find out how to speed up your internet connectionStep 1: Read our guide on How to check your internet speed and discover what speed your broad connection is actually producing.Step 2: Find out what speed you’re paying your internet provider (ISP) for. You may have to phone them to get the answer to this. If you’ve had your broadband for some time, it may be time to upgrade.Step 3: Check what speed is achievable in your area. This is also covered in our guide on checking your internet speed. A number of ISP’s are starting to use Optical fibres instead...

May 28, 2013

How to Block a Website Using a Firewall

A firewall is a program that can be used to manage incoming and outgoing connections from your computer to a network or the Internet. Though a firewall is mainly used to block (or allow) specific programs from connecting to the Internet, you can also use firewalls to block users from being able to access specific Internet pages. You just have to enter your firewall's "Settings" utility and manually add a rule disabling users from visiting a particular site Instructions Open your firewall's configuration utility. Steps to do this will vary depending on your specific firewall. For example, if you use the Windows Firewall (a permanent fixture of Windows XP, Windows Vista and Windows 7), you would enter the Windows Control Panel and open the "Windows Firewall" icon.  Select...

How to Block Unwanted Site From Your Router

This tutorial takes you step by step on how to block unwanted websites from your family computers. Remember that to block a certain websites from your router, you must be the administrator of or have administrator access to that router. Login to your router by using 192.168.1.1 in the URL address. There are three areas on the homepage. On the left panel there is content filtering. Under the content filter there are, Log, Block sites, Block services, Schedule and Email. We are only interested on the block sites for now. Click on the block site and you should see a list of choices. Under Keyword Blocking, you can either chose: Never, Per schedule or Always, depends on how you want to block the websites. In the type Keyword, Domain Name here: Enter any Web address, or keyword that you...

How to Block Websites By Editing the HOSTS File in Windows

DNS, which stands for Domain Name System, can convert the elusive IPv4 or IPv6 addresses to meaningful names, and then translate the characters back to IP addresses. For example, when you want to visit a website, DNS will tell your web browser the real IP address of it, and then web browser will download the web page directly from that IP address. As you may expect, the process of translating IP addresses to website names will consume some time, which could cause access delay. Particularly, if the DNS servers are down, you will not be able to visit most websites through their URL, which isn’t uncommon. Hence, it is necessary to make a list for mapping hostnames to IP addresses. That is what Windows HOSTS file does. On most Windows systems,...

How to Stop Hackers from Invading Your Network

Unethical hackers (in bad sense of this word) are always looking for weaker points in a network system to hack the security system of your company and get hold of confidential and new information. Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organizations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favorite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time. Follow forums. It is always a good idea to follow ...

How to Prevent DoS Attacks

Denial of Service (DoS) attacks are among the most feared threats in today's cybersecurity landscape. Difficult to defend against and potentially costly, DoS attacks can cause outages of web sites and network services for organizations large and small. DoS attacks can also be lucrative for criminals, some of whom use these attacks to shake down businesses for anywhere from thousands to millions of dollars. Any deliberate effort to cut off your web site or network from its intended users qualifies as a DoS attack. Such attacks have been successfully deployed against major online businesses including Visa and Mastercard, Twitter, and WordPress. DoS attacks effectively knock the services offline, costing lost business and negative publicity. They also force IT staff to expend valuable...

May 4, 2013

How to configure MAC address Filtering on TP-LINK 11G Router

 54Mbps Wireless G Routers If you would like to limit the Internet access on some specified computers through the router, you can set up MAC Filtering to achieve it. Step 1 You should know the MAC addresses of the computers on which you would like to allow them to access the Internet. You can check them on the computers with command prompt. (1)Click Start->Run, type cmd and press Enter. (2) Type ipconfig/all at the prompt window, press Enter, it will show the MAC address and other address information of this computer. Step 2 Open the web browser and type the IP address of the router (default is 192.168.1.1) into the address bar and then Press...

Apr 24, 2013

Chatwing Chat Box an Exciting Communication Tool For Websmasters

hatwing Chat Box an Exciting Communication Tool Offering Many Customization Options The Online realm is really fun to explore and experiment with. I like testing out new things and I always try to incorporate my creativity in everything especially in my blog. My blog is my representation online so I want people to see my personality whenever they visit it. I am, they say, a very bubbly person and creative and I really enjoy interacting with other people so I asked around on what chat tool I can install in my blog. Most of my friends, who are also blogger, recommended Chatwing. What I liked about Chatwing is its high level of modification. I can adjust the widget’s size and color or totally recreate it in my own terms. The chat...

Apr 2, 2013

Connecting an access point to a wired router

Connecting an access point to an existing wired router will turn your home network into a wireless hotspot.  This allows your wireless computers and devices to connect to the network securely. NOTE:  Images may vary depending on the router and model number of the access point you are using.  In this example, the Linksys WAP54G Access Point is used. The diagram below shows how your network should be connected at the end of the configuration process.   Setting up the wireless settings on an access point Identify the IP address of the wired router In this example, the router being used is the Linksys BEFSR41 with the default IP address of 192.168.1.1.  When you are certain about the IP address of your router,...

Setting-Up 128-Bit WEP Wireless Security on a Access Point

Wired Equivalent Privacy (WEP) is a security protocol designed for Wireless Local Area Networks (WLAN).  It can either be a 64-bit key with 10 hexadecimal digits, a 128-bit WEP key with 26 hexadecimal digits.  This encryption will prevent other users from connecting to your wireless network and protect your wireless transmissions/communications from being accessed or received by other users. To setup WEP Wireless Security on your Linksys Access Point, perform the following steps: Setting-Up the Linksys Access Point to use WEP Step 1:Go to the access point’s web-based setup page.  For instructions. NOTE:  If you are using a Mac computer to access the access point’s web-based setup page. Step 2: In...

Setting-Up 64-Bit WEP Wireless Security on a Access Point

Wired Equivalent Privacy (WEP) is either a 64-bit key with 10 hexadecimal digits or a 128-bit WEP key with 26 hexadecimal digits. This will prevent other users from connecting to your wireless network.  It will also protect your wireless transmissions/communications from being accessed or received by other users. To setup 64- bit WEP Wireless Security on your Linksys Access Point follow the steps below. Setting-Up the Linksys Access Point to use WEP Step 1: Access the access point’s web-based setup page.  For instructions. NOTE:  If you are using a Mac computer to access the access point’s web-based setup page. Step 2: On the web-based setup page, click the Wireless then click the Wireless Security sub-tab. Step 3: Click...

Setting up wireless MAC Filtering to permit users to connect to the wireless network on your Linksys access point

Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your network’s radius.  You can either permit or prevent specific wireless computers access to your wireless network. This article will guide you on how to set up Wireless MAC Filter to permit users to connect to your wireless network.  To learn how to prevent users from connecting to your wireless network. IMPORTANT:  Before setting up MAC filtering, you need to ensure the following: Make sure you’ve identified all MAC addresses you wish to filter.  To learn how to find the MAC address of your wireless device. Make sure the wireless devices you want to allow are currently wirelessly connected...

Configuring an Access Point as an Access Point

The Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater, and Wireless Bridge.  Wireless-G Access Points by default are set to Access Point Mode. NOTE:  The AP Mode options on the access point depend on its version number.  Checking if the WAP54G v1.1 is set to Access Point Mode  Step 1: Log on to the access point's web-based setup page.  For instructions, click here. NOTE:  If you are using Mac to access the access point’s web-based setup page, click here. Step 2: When the access point’s web-based setup page opens, click AP Mode and make sure Access Point (default) is selected.                   NOTE:...

Configuring an Access Point as a Wireless Bridge

Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater, and Wireless Bridge. The Wireless Bridge mode will turn the access point into a wireless bridge. Wireless clients will not be able to connect to the access point in this mode. NOTE: When an access point is configured as a wireless bridge, it will link a wireless network to a wired network allowing you to bridge two networks with different infrastructure. NOTE: When the WAP54G access point is set to wireless bridge mode, it will only communicate with another Linksys Wireless-G Access Point (WAP54G).  To configure an access point as a wireless bridge, you need to perform three steps: Checking the Wireless MAC...

Configuring an Access Point in Access Point Client Mode

Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater and Wireless Bridge. The Access Point Client mode allows the WAP54G to act as a wireless client.  NOTE: The WAP54G will only communicate with another WAP54G when set to Access Point Client. To configure the access point as an access point client, you need to perform three steps: Checking the Wireless MAC Address of an Access Point Setting-Up Access Point Client Mode on the WAP54G Changing the LAN IP Address of the Access Point Client   Checking the Wireless MAC Address of an Access Point NOTE: The following steps will be performed on the main access point using a wired computer. Step 1:Connect a...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Computer Tricks and Tips