Showing posts with label Network. Show all posts
Showing posts with label Network. Show all posts

Monday, August 2, 2010

How to access the sharing data offline?

Access the shared data offline allows you to keep using your shared files, folders and software programs when disconnected from the data server. When you reconnect to your data server, all files will be synchronized to the files on the network.

There are two types of configurations required to set the access shared folders offline available, one for data server and other for client computer.

Configuration on Data Server
  • First locate the folders that you would like to share or make new folders then share these folders so they can be accessible to any one on the network.
  • Now right click on that folder and click on the option "Sharing and security".
  • A small dialog box will appear with the title "data properties". Under the "Sharing" tab, select the check box "Share this folder on the network" under the "Network sharing and security".
  • Now set the share level permissions that you want to give the users on every folder. Enable cache of share folders by click on cache button (by default it will be enabled).
Configuration on Client Computer
  • On the client computer, first open My Computer then click on Tools.
  • In Tools menu bar, click on Folder Options, a window will appear with the title Folder Options.
  • Under the Offline File tab, check the option Enable Offline File. Here you can choose the synchronization process "Synchronize all offline files when logging on", "Synchronize all offline files before logging off" and others.
  • Click on Apply button to save the settings and then Ok button to close this window.
  • Now sitting on the client computer, try to access the shared folder from the data server.
  • First Right click on the shared folder and Click on Make available offline.
  • To synchronizing the offline work from client computer to data server, again open My Computer then click on Tools. Click on Synchronize then click on synchronizing button.
After that down to data server and then try to access share folders by give the UNC (Universal Naming Convention) path of data server. But it will be accessible weather the server is down or up.

Wednesday, July 7, 2010

How to Save User name and Password in dial-up connection using Windows 7?

Start by clicking the Start button found at the lower left-hand corner of your screen (in Windows 7, the start button is a circle with the Windows logo on it). Click on Computer and select Network and Internet on the window that appears.

Select Network and Sharing Center. Once done, click on the Set up a new connection or network option to launch a new window and begin creating a new dial-up connection.

Select the Connect to the Internet icon on the options available and click Next. You will then be asked for the internet connection type you want to setup. Select Dial-up.

Type in the details to connect to a dial-up network. You may need to contact your ISP to acquire this information. You will need to key in the dial-up access number as well as your username and password on the available fields. You will also be asked to specify a connection name (this is good if you have more than one dial-up account configured in your computer).

Connect your computer to an available phone line. Your laptop should have a phone jack slot available. Simply plug in any regular phone line to your computer and the other end on a phone wall jack to prepare it for connection.

Click the Connect button on your computer wait for it to establish a connection. You will hear your computer emit a weird sound (this is called the "handshake") indicating that it is trying to establish a connection with your ISP. Once your computer has established connection, you are now ready to use the computer to jump on the internet superhighway.

Thursday, July 1, 2010

How to Block Hackers on Your Wireless Home Network?

Do the terms LAN, Network, Wireless or Security send you running toward the hills? You're not alone. Many people would rather carry on with their carefree web surfing at home than worry about this important aspect of wireless internet. Don't be fooled, hackers are a major threat and can do tremendous damage to your computer or even steal personal information. adding two simple things to your wireless home network can stop virtually all external hackers.

Follow the steps to secure wireless internet from Hackers:
  • A router and home network setup is typically used for directing your DSL internet line to one or more computers in your home. Each computer will need a network adapter with a plug that accepts the network cable. In the case of wireless internet, each computer will need a wireless network adapter with an antenna instead of a cable plug. Follow the equipment instructions for installation and then use the Windows home office network setup wizard.
  • Throw away your WEP router. It is a well-known fact that a router using the older technology called WEP security type can easily be hacked in less than 10 minutes, no matter how strong the password is set. Do not use any router unless it provides the latest WPA security type.
  • Invest in a WPA router and network adapter. Most experts agree that the newer technology called WPA or WPA2 are the optimum choices to ensure the highest level of security for your wireless network. Be sure to get a WPA network adapter for each computer that you are going to have hooked up to the wireless network. Two of the best brands are LinkSys and D-Link.
  • After you have installed your new WPA router and network adapter and performed the Windows home office network setup wizard, you will need to configure your router using the admin tool and instructions provided by the manufacturer. As part of the wireless setup, be sure to select the WPA security type. You will also be asked to set a password or security key.
  • Use a hack-proof password for your wireless security key. This means it must be at least 10-digits, alpha-numeric, and totally random. There are no exceptions to this rule. It is a well-known fact that using this type of password would take 1,000 computers 500 years to break the code and hack into your computer. Use letters and numbers and make sure not to use words in the dictionary or even made up words. Example: dL7k945fjP
  • To recap, use a WPA router and the strongest alpha-numeric password. Finally, wireless home networking is no longer a mystery. If you do these two simple things, you can sleep easy at night knowing that your wireless home network is protected from external intruders. Forget the myths you may have heard about using MAC filtering, blue tooth or positioning your router in the center of your home.
  • This keeps virtually all hackers out of your wireless home network, but does not address internet hackers that can break into your computer while you are browsing the web. Certain websites or emails can infect your computer with a virus, and other spyware can steal your personal information. Therefore, it is imperative that you get a good anti-virus/firewall software to protect your computer while you are using the internet. The top brands include McAfee, Norton, and Panda Security.
Source: ehow.com

How to Stop Hackers from Invading your Network?

Unethical hackers are always looking for weaker points in a network system to hack the security system of your company and get hold of confidential and new information. Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organisations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favourite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time.



  • Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organisations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favourite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time.
  • Install proper scanning software programs to identify all entry points from the internet into the internal network of the company. These points have the weakest security controls which a hacker can easily target. Identifying these entry points, however is not at all an easy task. It is better to take the help of skilled ethical hackers who have taken special network security training to perform this task successfully.
  • By running the attack and penetration tests, you can identify those vulnerable points in the network that can be easily accessed from both external and internal users. After identifying these points, you would be able to thwart attacks from external sources and correct the pitfalls that could become the entry points for intruders to hack into your network. The test must be done from both the internal as well as external perspectives to detect all the vulnerable points.
  • All possible steps must be taken to make all the users of the network aware of the pitfalls of security and the necessary security practices to minimise these risks. You can conduct the social-engineering tests to determine the user awareness. Until all the users are aware of certain factors related to the network, protection cannot be carried out in the true sense of the term.
  • A firewall if not configured properly can act like an open door for any intruder. Hence it is vitally important to set the rules to allow traffic through the firewall that is important to the business. A firewall must have its own configurations depending upon the security aspect of your organization. From time to time proper analysis of the composition and nature of the traffic itself is also necessary to maintain security.
  • Use strong password policies by having passwords of seven characters which are of secure length and relatively easy to remember. Passwords must be changed in every 60 days. The password should also be made up of both alpha and numeric characters to make it more unique.
  • Since the comments used in source code contain both usernames and passwords, they must also be removed to make the network safe from attackers. All the comments in source code that look inaccessible to external users should also be removed as there are some techniques with the help of which a hacker can even view the source code of nearly all web applications.
  • Many default, test and example pages are the most targeted pages for a hacker through which the entire network can be hacked. These pages can give an insight into the design of the network system and the vulnerabilities associated with them. Hence it is advisable to remove such pages from the network.
  • The services that are either disabled or removed from the system cannot be used by any hacker to extract information related to the network. Hence, such services must be disabled or removed when not in use.
  • Both intrusion detection systems and anti-virus software must be updated regularly and if possible on a daily basis. The updated version of anti-virus software is necessary as it helps in detecting even the latest virus.
  • Apart from ensuring the internal security of the network, you need to think about the physical security of your organization. Until and unless your organization has full security, any intruder can simply walk in your office premises to gain whatever information he wants. Hence with technical security, you must also ensure that the physical security mechanisms of your organization are fully functional and effective.
Source: ehow.com

Thursday, June 10, 2010

How To Install a Printer on Home Network?

The most common way to install a printer on a home network is to install it as a stand-alone device on the network, and then add a connection to the printer on each computer that is on the network.

If you're not sure what type of network printer to install, decide if you want to:

1. Use a wireless printer. These printers use a built-in wireless card and plug into a power source, not your network or computer. After you turn on the printer, you need to refer to the information that came with the printer to set up a wireless connection to each computer on a home network. Security options for wireless printing are determined by each printer manufacturer.

2. Connect a printer directly to the network. To do this, you need to plug in the printer to your network hub or router. How to install these printers depends on whether the printer and your network device use an Ethernet, universal serial bus (USB), or another type of connection. You also need to refer to any installation information or tools provided by the printer manufacturer.

3. Connect more than one printer directly to the network. To do this, your hub or router must be able to support more than one printer connection.

To install a network printer:

1. To find out how to install a network printer, check the information that came with the printer.

To connect to a network printer :

After you have installed a network printer, you need to add a connection to the printer for each computer on the network.

1. Open Printers by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Hardware and Sound, and then clicking Printers.

2. On the toolbar, click Add a printer.

3. In the Add Printer Wizard, select Add a network, wireless or Bluetooth printer, and then follow the steps in the wizard.