How to Secure a Wireless Network from Hackers?
The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:
1. Strategic antenna placement:
The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2. Use WEP:
WEP stands for Wireless encryption protocol. It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3. Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4. Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5. Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6. Utilize access lists:
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
Windows Ten Tips to Keep your Computer Running Smoothly
1. Never, never, turn your computer off with the power switch until Windows has shut down.
The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.
Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.
2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)
3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
4. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.
The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.
6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP
or Vista then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Cleansweep included in Norton Utilities to clean up your drive. If you do use Cleansweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.
7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.
9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.
I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion.
Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.
10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.
Buying a Computer
What To Do And Why
It isn’t fair, but buying a computer is just plain easier for some than it is for others. Those who’ve purchased and used a computer in the past already have an idea of what they need in a new computer. But those who are new to the computer world could get lost in the myriad of choices available.
The short answer to “What should I buy?” is “The best.” Of course that answer is extremely subjective because “the best” to one person is certainly different to another. Our definition of “the best” is the fastest and the biggest, but even that leaves the computer newbie confused. Here’s a quick rundown of what the computer novice should do and why.
Buy a computer that includes basic peripherals. Every computer can be broken down into four major components: CPU unit, monitor, keyboard, and mouse. For the novice, it’s best to buy a computer that has all of these components included so that when it’s taken home, assembling the computer is a simple matter of plugging things in where they belong. Save the individual purchases of these components for those who have more experience.
Decide what you’ll use the computer for. If you want to use your computer for cruising the web, sending email, or performing simple word-processing or spreadsheet tasks, a computer with the basic components that we just described should suffice. If you want to use a computer to help with a career in multimedia however, you’re going to need to accessorize your system with a scanner, printer, digital camera, tablet, or digicam for example. If you want a computer to help with a career in music, you will need a quality microphone and set of speakers.
Create a budget and stick to it. How much can you afford to spend on a new computer? Although the prices of computers are decreasing, they can still create a hefty expense especially if you need additional peripherals described above. In addition, you’ll need to figure in costs for maintenance, servicing, and insuring.
Start comparison shopping and look for the “fastest and biggest.” By “fastest and biggest,” we mean the computer with the fastest processor, the fastest modem, the biggest memory, and the biggest hard drive capacity. Even if you think that you’ll never need the amount of speed or space available on the market today, it’s important to have in the event that you truly do need that much in the future. Having such a large reserve will cut down on costs when the time comes to upgrade for more than what you may settle for in a computer that offers less.
Stick with the better-known brands. Venturing off the beaten path with lessor-known brands is again, an adventure for those who have more experience with computers. Although those better-known brands may be a tad bit more expensive, the computer novice will appreciate the comfort in purchasing a computer from a business that has a long record of building quality products, and that has the funds available for fulfilling returns, trades, servicing, and warranties.
Select a store. Having an idea of what you want in a computer and what kind of computer that you want, your only task left is to select the place in which you want to buy it. There are a number of places available including computer store outlets, online stores, auction sites, used computer stores, or your friendly neighborhood yard sale. For the computer novice, we recommend buying a computer from a physical store. In a physical store, you have the opportunity to see the computer of interest in person and ask questions. New computer buyers also have access to store warranties, returns, trades, and services.
These suggestions should give the computer newbie a great start in selecting a quality computer for the first time and they apply to either Windows computers or Apple Macintosh computers. After making these decisions and finally selecting one that fits your needs, you can then venture into the fascinating world of software – a world that is just as grand as the world of hardware!
(And What They Mean)
Computer errors can pop up when least expected, they can cause the entire system to suddenly shut down, and they can inadvertently corrupt data to the point where it can’t be deciphered. Although they can’t always be avoided, it’s important to remember that computer errors can be corrected. The key is to understand what computer errors are, understand what they mean when they show up, and understand how to minimize their occurrence in the first place.
Basically, computer errors are the result of a number of things that may or may not have anything to do with the way the computer is used. They “operate” whenever there’s a conflict among commands. Remember that computers essentially run off of a series of commands and it’s usually a smooth process. But when one command conflicts with another command – or when one command asks for a process or information that isn’t available, the computer returns results that aren’t useable. That’s an error.
A prime example of this kind of error is when users attempt to use software that isn’t applicable for their system. Almost all software accompanies a list of system requirements which dictates what a computer needs to have in order for the software to work properly. To minimize errors of this sort, always verify that your computer has the required components. A project management program that you’re interested in may require a specific operating system, like Windows XP for example. And although this program may install just fine on a Windows 98 machine, it will generate a multitude of errors once its started.
Insufficient memory will cause errors as well. That’s why software programs include minimum memory requirements. A program that needs 14MB of memory will generate errors on a computer that only has 4MB of memory if it runs at all. The same goes for disk space, monitor color depth and resolution. In these situations, problems occur the moment that a piece of software attempts to access the things (hardware, memory, space, resolution, etc.) that it cannot find.
Because some programs share common files, errors can also occur when these shared files are not up to date. For instance, let’s say that Program A is already installed on a computer and it’s working just fine. Then let’s say that the user of that computer downloads and installs Program B. Program B uses a file that Program A installed much earlier, but when Program B is run, errors popup. Those errors are the result of Program B attempting to use an outdated (shared) file that was installed by Program A. In order to fix that problem, the user would have to download an updated version of the shared file (which to say the least – is not an easy thing to find or do).
Sometimes, errors occur because a system doesn’t have the required drivers or the drivers that are on the system are the incorrect version. Both errors in these cases can be resolved by updating the computer on a regular basis. Microsoft provides a section on its website that can automatically update a computer online and it does this at no cost in an effort to reduce errors like this. Always try to keep your computer updated so that should a program share a file, it will share a file that has been updated on hundreds of thousands of computers, like yours.
This article doesn’t even begin to cover the entire gamut of computer errors – but additional information regarding how to get help with a computer issue (including computer errors) can be found in our article titled, “Computer Help” no matter what the problem is.
______________________________________________________
Earlier computers didn’t have an operating system and if you have experience with the computers of the early eighties, you’ll remember that most to them didn’t even have a hard drive! These old computers booted an MS-DOS type operating system from drivers stored onto a floppy disk, and in order to use a program, users would remove the boot floppy and then insert a new floppy that contained the program. The floppy not only stored the program (word processor, spreadsheet, etc.), it also stored the drivers that the program needed to communicate with the computer’s hardware. As you can imagine, the cumbersome process of switching from floppy to floppy prompted the birth of the operating system.

An operating system is a software program that controls how the computer’s hardware (and installed software) works. It manages the activity of every component and then displays that activity as a user-friendly interface (GUI). It keeps track of where things exist on a computer’s hard drive as well. But perhaps most importantly for the end-user, the operating system is responsible for translating commands issued with a keyboard and mouse into binary code (010110101 stuff) that can communicate with a set of speakers, a printer, a scanner, and more.

With an operating system installed onto a computer’s hard drive, users no longer need to boot a computer with a floppy disk, nor do they need to run programs from a floppy disk. All the drivers of a program are stored onto the computer and used whenever a program is started.
Apple’s Macintosh computer was among the first of a couple systems to establish a user-to-hardware relationship through a user-friendly interface. Today, we have quite a few operating systems. Some of the more popular ones are Windows Vista, Mac OS X, ZETA, IBM, Unix, and Linux. But even still, operating systems have extended onto to non-computer devices such as game consoles, portable music players, and PDAs. Regardless of the device, the operating system installed onto it serves the same purpose across the board: to enable user-to-hardware communication.

When you think about upgrading your computer to a new operating system, be careful to make sure that you have the necessary hardware components. We tried to upgrade one of our Windows 98 machines to Windows XP, but we were cautioned that the former may not be hardware compatible with XP technology. Apparently, the Windows XP operating system requires components that weren’t developed at the time Windows 98 was distributed and if we were to install Windows XP on this machine anyway, the new operating system would look for hardware that the computer didn’t have. And that would be an instant recipe for failure.

Also be careful about installing operating systems that are incompatible with existing hardware. The hardware of Macintosh computers is extremely different from the hardware of Windows computers and under no circumstances will a Windows operating system work on a Macintosh machine!