Once, home networks were primarily the realm of technophiles -- most families either didn't need or couldn't afford more than one computer. But now, in addition to using computers for e-mail, people use them for schoolwork, shopping, instant messaging, downloading music and videos, and playing games. For many families, one computer is no longer enough to go around. In a household with multiple computers, a home network often becomes a necessity rather than a technical toy.
A home network is simply a method of allowing computers to communicate with one another. If you have two or more computers in your home, a network can let them share:
* Files and documents
* An Internet connection
* Printers, print servers and scanners
* Stereos, TVs and game systems
* CD burners
The different network types use different hardware, but they all have the same essential components:
* More than one computer
* Hardware (such as a router) and software (either built in to the operating system or as a separate application) to coordinate the exchange of information
* A path for the information to follow from one computer to another
After the computers are connected, you can share files and printers between computers through the home network. To troubleshoot file sharing and printer sharing, follow these steps in the order in which they are provided until you isolate and resolve the issue.
1. Open Control Panel from the Start Menu or Windows desktop.
2. On Windows XP or Windows 2000, open the "Network Connections" Control Panel applet. On Windows 95 | 98 | ME, open the "Network" applet.
3. On Windows XP or Windows 2000, choose the connection on which to enable / disable sharing. View the properties for this connection by right-clicking on the icon and choosing "Properties" from the menu. If the connection is a dial-up connection, click the Networking tab to view its properties.
On Windows 95 | 98 | ME, simply click the "File and Print Sharing" option inside the "Network" window.
4. On Windows XP or Windows 2000, ensure the "File and Printer Sharing for Microsoft Windows" checkbox is checked to enable sharing and unchecked to disable sharing for that connection. Repeat Steps 3 and 4 to check this setting for other connections.
On Windows 95 | 98 | ME, file and printer sharing can be enabled / disabled separately. Ensure the respective checkboxes are set to enable / disable sharing as desired.
5. Close the open properties / Network windows and Control Panel. On Windows 95 | 98 | ME, reboot the computer if prompted to do so.
Tips: Consider disabling Windows File and Printer Sharing when connected to public networks for improved security.
Troubleshoot file sharing and printer sharing:
Step 1: Run the Network Setup Wizard to configure each computer in the network
Step 2: Make sure that file sharing is configured correctly on each computer.
Step 3: Make sure that the Guest account is set up for network access
All network access to either a Windows XP Home Edition-based computer in a workgroup or to a Windows XP Professional-based computer in a workgroup uses the Guest account. Before you continue to troubleshoot, make sure that the Guest account is set up for network access. To do this, follow these steps:
1. Click Start, click Run, type cmd, and then click OK.
2. Type the net user guest, and then press ENTER.
3. If the account is active, a line appears in the output of the command that has the following format:
ACCOUNT ACTIVE YES
4. If the account is not active, type net user guest /active:yes, and then press ENTER to give the Guest account network access. The following text returns after the command:
THE COMMAND COMPLETED SUCCESSFULLY.
If you receive any other response, make sure that you are logged on as an administrator, and then confirm that you typed the command correctly before you try again.
When you are finished setting up the Guest account for network access, go to step 4. If you were unable to set up the Guest account, go to the "Next Steps" section for information about how to contact Support.
Step 4: Make sure that folder for the computer name is shared
Step 5: Test the connection between computers
Step 6: Check the Network Setup Wizard log file for errors
When you are finished checking the Network Setup Wizard log file for errors, you should now have connectivity for file and printer sharing. If you still have problems with your home network, go to the "Next Steps" section for information about how to contact Support.
iGlobalSupport.com offers a wide variety of services in ensuring that your computer is in top shape. This invariably includes printer repair and tune-up, or assistance in printer resolutions and configurations. iGlobalSupport.com is your gateway to maximum computer efficiency; call us if you're seeking professional help regarding your printer.
Sunday, April 25, 2010
Wednesday, April 21, 2010
Wireless Security on Windows Vista/Windows 7
You might be surprised to learn how easy it is for someone to hack into a computer network. The fact is that many computer networks are practically defenseless to intruders. In the early days of home computer networks, the people who put the networks together were experts and enthusiasts. They put their systems together knowing how computers can communicate with each other and built in protective measures to prevent other computer users from snooping.
Today, home computer networks are popular among a broad range of consumers. User knowledge spans from expert to newbie. Some users may be unaware of the dangers they can encounter if they don't properly secure their network. Others may think home network security is too complicated or confusing. But network security is more important than ever and it's worth the effort to learn more about it.
An unprotected network could allow malicious hackers -- known as crackers -- access to your data. It might even allow someone to take control of your computers and use them to commit crimes like a distributed denial of service attack (DDoS). Even if no one snoops on your information or controls your computer, someone might use your network to access the Internet. As more ISPs begin to place caps on how much data you can download, it becomes even more important to control your network. You don't want to get slapped with a huge bill for Internet services you didn't even use.
The Set Up a Network wizard will guide you through setting up a security key.
* Open Set Up a Network by clicking the Start button Picture of the Start button, and then clicking Control Panel. In the search box, type network, click Network and Sharing Center, click Set up a new connection or network, and then click Set up a new network.
Note
Note
We don't recommend using Wired Equivalent Privacy (WEP) as your wireless security method. Wi‑Fi Protected Access (WPA or WPA2) is more secure. If you try WPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2. All of your network devices, computers, routers, and access points must also support WPA or WPA2.
Encryption methods for wireless networks
There are currently three types of wireless network encryption: Wi‑Fi Protected Access (WPA and WPA2), Wired Equivalent Privacy (WEP), and 802.1x. The first two are described in more detail in the following sections. 802.1x is typically used for enterprise networks and isn't discussed here.
Wi‑Fi Protected Access (WPA and WPA2)
WPA and WPA2 require users to provide a security key to connect. Once the key has been validated, all data sent between the computer or device and the access point is encrypted.
There are two types of WPA authentication: WPA and WPA2. If possible, use WPA2 because it is the most secure. Almost all new wireless adapters support WPA and WPA2, but some older ones don't. In WPA-Personal and WPA2-Personal, each user is given the same passphrase. This is the recommended mode for home networks. WPA-Enterprise and WPA2-Enterprise are designed to be used with an 802.1x authentication server that distributes different keys to each user. This mode is primarily used in work networks.
Wired Equivalent Privacy (WEP)
WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.
There are two kinds of WEP: open system authentication and shared key authentication. Neither is very secure, but shared key authentication is the least secure of the two. For most wireless computers and wireless access points, the shared key authentication key is the same as the static WEP encryption key—the key that you use to secure your network. A malicious user who captures the messages for a successful shared key authentication can use analysis tools to determine the shared key authentication key, and then determine the static WEP encryption key. After the WEP encryption key has been determined, the malicious user has full access to your network. For this reason, this version of Windows doesn’t support automatically setting up a network using WEP shared key authentication.
If, despite these warnings, you still want to use WEP shared key authentication, you can do so by following these steps:
To manually create a network profile using WEP shared key authentication
1. Open Network and Sharing Center by clicking the Start button Picture of the Start button, and then clicking Control Panel. In the search box, type network, and then click Network and Sharing Center.
2. Click Set up a new connection or network.
3. Click Manually connect to a wireless network, and then click Next.
4. On the Enter information for the wireless network you want to add page, under Security type, select WEP.
5. Complete the rest of the page, and then click Next.
6. Click Change connection settings.
7. Click the Security tab, and then, under Security type, click Shared.
8. Click OK, and then click Close.
We've been treated to some pretty entertaining feats of espionage courtesy of Hollywood. Who can forget the way Tom Cruise dangled from the ceiling as he attempted to crack into a computer security system in "Mission Impossible?" Or how about the mysterious hacker who seems to slip past every security to corrupt the Rossum Corporation's data in the "Dollhouse" television series? Hacking into a network must require superhuman skills and knowledge, right?
Setting up wireless networks is one of the specializations of iGlobalsupport.com. iGlobalSupport.com can help you set up, configure and secure your router. Above everything else, iGlobalSupport.com also offers network installation and internet connectivity as well.
Today, home computer networks are popular among a broad range of consumers. User knowledge spans from expert to newbie. Some users may be unaware of the dangers they can encounter if they don't properly secure their network. Others may think home network security is too complicated or confusing. But network security is more important than ever and it's worth the effort to learn more about it.
An unprotected network could allow malicious hackers -- known as crackers -- access to your data. It might even allow someone to take control of your computers and use them to commit crimes like a distributed denial of service attack (DDoS). Even if no one snoops on your information or controls your computer, someone might use your network to access the Internet. As more ISPs begin to place caps on how much data you can download, it becomes even more important to control your network. You don't want to get slapped with a huge bill for Internet services you didn't even use.
The Set Up a Network wizard will guide you through setting up a security key.
* Open Set Up a Network by clicking the Start button Picture of the Start button, and then clicking Control Panel. In the search box, type network, click Network and Sharing Center, click Set up a new connection or network, and then click Set up a new network.
Note
Note
We don't recommend using Wired Equivalent Privacy (WEP) as your wireless security method. Wi‑Fi Protected Access (WPA or WPA2) is more secure. If you try WPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2. All of your network devices, computers, routers, and access points must also support WPA or WPA2.
Encryption methods for wireless networks
There are currently three types of wireless network encryption: Wi‑Fi Protected Access (WPA and WPA2), Wired Equivalent Privacy (WEP), and 802.1x. The first two are described in more detail in the following sections. 802.1x is typically used for enterprise networks and isn't discussed here.
Wi‑Fi Protected Access (WPA and WPA2)
WPA and WPA2 require users to provide a security key to connect. Once the key has been validated, all data sent between the computer or device and the access point is encrypted.
There are two types of WPA authentication: WPA and WPA2. If possible, use WPA2 because it is the most secure. Almost all new wireless adapters support WPA and WPA2, but some older ones don't. In WPA-Personal and WPA2-Personal, each user is given the same passphrase. This is the recommended mode for home networks. WPA-Enterprise and WPA2-Enterprise are designed to be used with an 802.1x authentication server that distributes different keys to each user. This mode is primarily used in work networks.
Wired Equivalent Privacy (WEP)
WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.
There are two kinds of WEP: open system authentication and shared key authentication. Neither is very secure, but shared key authentication is the least secure of the two. For most wireless computers and wireless access points, the shared key authentication key is the same as the static WEP encryption key—the key that you use to secure your network. A malicious user who captures the messages for a successful shared key authentication can use analysis tools to determine the shared key authentication key, and then determine the static WEP encryption key. After the WEP encryption key has been determined, the malicious user has full access to your network. For this reason, this version of Windows doesn’t support automatically setting up a network using WEP shared key authentication.
If, despite these warnings, you still want to use WEP shared key authentication, you can do so by following these steps:
To manually create a network profile using WEP shared key authentication
1. Open Network and Sharing Center by clicking the Start button Picture of the Start button, and then clicking Control Panel. In the search box, type network, and then click Network and Sharing Center.
2. Click Set up a new connection or network.
3. Click Manually connect to a wireless network, and then click Next.
4. On the Enter information for the wireless network you want to add page, under Security type, select WEP.
5. Complete the rest of the page, and then click Next.
6. Click Change connection settings.
7. Click the Security tab, and then, under Security type, click Shared.
8. Click OK, and then click Close.
We've been treated to some pretty entertaining feats of espionage courtesy of Hollywood. Who can forget the way Tom Cruise dangled from the ceiling as he attempted to crack into a computer security system in "Mission Impossible?" Or how about the mysterious hacker who seems to slip past every security to corrupt the Rossum Corporation's data in the "Dollhouse" television series? Hacking into a network must require superhuman skills and knowledge, right?
Setting up wireless networks is one of the specializations of iGlobalsupport.com. iGlobalSupport.com can help you set up, configure and secure your router. Above everything else, iGlobalSupport.com also offers network installation and internet connectivity as well.
Sunday, April 18, 2010
Remote Access Assistance Service
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need: A way to maintain fast, secure and reliable communications wherever their offices are.
Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). Leased lines, ranging from ISDN (integrated services digital network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases.
As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices.
B¬asically, a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. In this article, you will gain a fundamental understanding of VPNs, and learn about basic VPN components, technologies, tunneling and security.
Virtual private networks help distant colleagues work together, much like remote access. Remote access allows two or more users to work on the same files -- even when they're not in the same location. See more laptop pictures. When's the last time you saw an office desk without a computer? Looked kind of naked, didn't it? That's because computers and the Internet have become crucial tools for doing business.
According to a 2003 study by the Bureau of Labor Statistics, 84 percent of American workers with a college degree use a computer at work. Even back in 1999, a survey by the Energy Information Administration found that the average commercial building had seven computers for every 10 office workers. We increasingly rely on computers to collaborate with coworkers and communicate with clients. However, that no longer means that colleagues are in the same location. More workers are punching in from the road or from home. In 2004, 20.7 million Americans did some or all of their work from home, and the popularity of telecommuting is leading some to predict that the home will become the "office of the future.”
That's why a technology like remote access is so powerful. Remote access uses simple software to share files, presentations and applications over the Internet -- in real time -- with colleagues and clients around the world. Remote access is a central component of Web seminars and Web conferences, enhancing our ability to interact and collaborate over long distances.
Remote access has many applications.
• Remote login allows workers to access their work computers from any Internet-enabled device, including home computers, laptops and even PDAs.
• Desktop sharing allows for interactive, real-time collaboration between global coworkers.
• Presentation sharing turns dry teleconferences into engaging online presentations.
• Application sharing lets you test drive software without buying, downloading or installing anything.
Ther¬e are two common types of VPN. Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN will outsource to an enterprise service provider (ESP). The ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network.
A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider.
iGlobalSupport.com offers this type of technology that will be able to make our lives easier. All we could do is just to watch, sit back and relax while our systems are being fixed instantly. Not necessary to follow instructions over the phone or on chat or email that will take us years to fix it especially if we are not much of a tech savvy. iGlobalSupport.com has this sufficient and stress-free support that will make things a lot better when we’re having trouble computers that we can’t surely fix.
Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). Leased lines, ranging from ISDN (integrated services digital network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases.
As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices.
B¬asically, a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. In this article, you will gain a fundamental understanding of VPNs, and learn about basic VPN components, technologies, tunneling and security.
Virtual private networks help distant colleagues work together, much like remote access. Remote access allows two or more users to work on the same files -- even when they're not in the same location. See more laptop pictures. When's the last time you saw an office desk without a computer? Looked kind of naked, didn't it? That's because computers and the Internet have become crucial tools for doing business.
According to a 2003 study by the Bureau of Labor Statistics, 84 percent of American workers with a college degree use a computer at work. Even back in 1999, a survey by the Energy Information Administration found that the average commercial building had seven computers for every 10 office workers. We increasingly rely on computers to collaborate with coworkers and communicate with clients. However, that no longer means that colleagues are in the same location. More workers are punching in from the road or from home. In 2004, 20.7 million Americans did some or all of their work from home, and the popularity of telecommuting is leading some to predict that the home will become the "office of the future.”
That's why a technology like remote access is so powerful. Remote access uses simple software to share files, presentations and applications over the Internet -- in real time -- with colleagues and clients around the world. Remote access is a central component of Web seminars and Web conferences, enhancing our ability to interact and collaborate over long distances.
Remote access has many applications.
• Remote login allows workers to access their work computers from any Internet-enabled device, including home computers, laptops and even PDAs.
• Desktop sharing allows for interactive, real-time collaboration between global coworkers.
• Presentation sharing turns dry teleconferences into engaging online presentations.
• Application sharing lets you test drive software without buying, downloading or installing anything.
Ther¬e are two common types of VPN. Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN will outsource to an enterprise service provider (ESP). The ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network.
A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider.
iGlobalSupport.com offers this type of technology that will be able to make our lives easier. All we could do is just to watch, sit back and relax while our systems are being fixed instantly. Not necessary to follow instructions over the phone or on chat or email that will take us years to fix it especially if we are not much of a tech savvy. iGlobalSupport.com has this sufficient and stress-free support that will make things a lot better when we’re having trouble computers that we can’t surely fix.
Wednesday, April 14, 2010
Email Set-up and Configuration
Email or electronic mail is one of the top most ways of communication worldwide. Yesteryears, this emailing is referred to receiving mails via post offices which will take days, weeks, months or even years before you receive it. Now, with our technology, this type of receiving messages from our family and friends all over the world has been made easy for everyone and this is why Email or Electronic Mail was created in order for you to receive the messages instantly.
The Electronic Mail or email requires a computer and an Internet connection. Now, in order for you to send and receive emails from your family and friends, you must have an email account. You can make a free email account through Yahoo! Mail, Google Mail, Hotmail and etc. Some email accounts are being paid and those are the ones that came with your Internet Service Providers. Like from AT&T – Bellsouth, Sprint, Comcast and etc. Ones you have created an email account, you will then have a mailbox where in you can use it to send and receive your emails. The ones that are from Yahoo! Mail, Google Mail and Hotmail uses a web based mailbox and the ones that has an email account from their ISP’s or even a work email uses an email client. It is a computer program that will enable you to send and receive emails. Examples are Outlook Express, Microsoft Outlook, Mozilla Thunderbird, Mac Mail, etc. These programs installed on your computer needs particular settings so that you will be able to send and receive the email messages. And the most important settings would be the Incoming and Outgoing Mail Servers or the POP3 and SMTP Servers from your ISP or from your work settings so that you can use these email clients on your computer.
Here are the details needed when you set-up an email client:
1. Display Name e.g. Jane Doe
2. Email Address e.g. janedoe@iglobalsupport.com
3. My Incoming Mail Server: POP3
4. Incoming Mail Server: pop.iglobalsupport.com/mail.iglobalsupport.com
5. Outgoing Mail Server: smtp.isp.com/mail.isp.com
6. Username: janedoe
7. Password
This is really exciting since you are communicating with the people you love and you care about easily through emailing and by using an email client, you can also forward a message, view photos and videos but things are not made perfectly. There will be times that your email client won’t work since it’s giving you an error. You’re having trouble in sending or receiving emails due to error codes and error messages. Most of the time these errors come up when you first set-up the email client with your email account and you might have typed the settings incorrectly or your email server may not be responding and this is the reason why you look for computer support through hotline numbers asking them for an assistance saying “fix my computer” or “my email is not working.”
Well, each error codes and each error messages has its own description and advisable fix but you can’t find the description and the advisable fix immediately. Some are located on the Help and Support section on your email client and I don’t think that it’s so easy to find it. That’s why iGlobalSupport.com has the answers to most of your questions and to most of the issues that you have with your email clients. You will have your own personal technician to have it fixed then up and running again in no time.
The Electronic Mail or email requires a computer and an Internet connection. Now, in order for you to send and receive emails from your family and friends, you must have an email account. You can make a free email account through Yahoo! Mail, Google Mail, Hotmail and etc. Some email accounts are being paid and those are the ones that came with your Internet Service Providers. Like from AT&T – Bellsouth, Sprint, Comcast and etc. Ones you have created an email account, you will then have a mailbox where in you can use it to send and receive your emails. The ones that are from Yahoo! Mail, Google Mail and Hotmail uses a web based mailbox and the ones that has an email account from their ISP’s or even a work email uses an email client. It is a computer program that will enable you to send and receive emails. Examples are Outlook Express, Microsoft Outlook, Mozilla Thunderbird, Mac Mail, etc. These programs installed on your computer needs particular settings so that you will be able to send and receive the email messages. And the most important settings would be the Incoming and Outgoing Mail Servers or the POP3 and SMTP Servers from your ISP or from your work settings so that you can use these email clients on your computer.
Here are the details needed when you set-up an email client:
1. Display Name e.g. Jane Doe
2. Email Address e.g. janedoe@iglobalsupport.com
3. My Incoming Mail Server: POP3
4. Incoming Mail Server: pop.iglobalsupport.com/mail.iglobalsupport.com
5. Outgoing Mail Server: smtp.isp.com/mail.isp.com
6. Username: janedoe
7. Password
This is really exciting since you are communicating with the people you love and you care about easily through emailing and by using an email client, you can also forward a message, view photos and videos but things are not made perfectly. There will be times that your email client won’t work since it’s giving you an error. You’re having trouble in sending or receiving emails due to error codes and error messages. Most of the time these errors come up when you first set-up the email client with your email account and you might have typed the settings incorrectly or your email server may not be responding and this is the reason why you look for computer support through hotline numbers asking them for an assistance saying “fix my computer” or “my email is not working.”
Well, each error codes and each error messages has its own description and advisable fix but you can’t find the description and the advisable fix immediately. Some are located on the Help and Support section on your email client and I don’t think that it’s so easy to find it. That’s why iGlobalSupport.com has the answers to most of your questions and to most of the issues that you have with your email clients. You will have your own personal technician to have it fixed then up and running again in no time.
Monday, April 12, 2010
Wireless Connection on Windows Vista and Windows 7
Once you have identified the hardware needed like Hi-Fi Wireless networking card, and Wireless Router/ Access Point you are almost ready to connect to the network. If you are using a laptop which comes with an in-built wireless card, it may have a special function key or a button mostly in the front of the laptop to turn it on and off.
Of all the Windows Operating Systems that have been released, setting up a wireless network in Vista or Windows 7 is much more intuitive to manage. Vista or Win 7 includes many improvements for connecting to wireless networks starting with support for non-broadcasting wireless networks and new dialog boxes to easily configure connections to wireless networks.
This following guide will step you through setting up and connecting to a wireless network on Vista and get you on your way to surfing the Net.
Two methods exist for setting up a wireless connection on Vista/Win 7. This guide assumes your Wi-Fi router or access point is already setup and running on the Network and your PC or Laptop wireless card has been installed.
Before you can get started with setting up a Wi-Fi connection, the following information will be needed from your wireless router or access point:
• Wireless Network Name (SSID)
• Security Mode or Type (WEP, WPA, WPA2, etc…)
• Encryption Type if using WPA or WPA2 (AES, TKIP)
• Security Key or PassPhrase
Automatic Setup For Wireless Connection
1. Click on the Start button and select Connect To from the menu on the right to display the Connect to a network dialog box.
2. The list of available networks will depend on the types of wireless networks detected, such as infrastructure mode or ad hoc mode networks. If you see the name of your Network, double click it to proceed to the next screen. If you see other Networks in the list, they are probably your neighbors…hopefully they are all secured just like yours!
3. Enter Security Key or PassPhrase (from the information found from your router or access point). Check Display Characters to view characters/numbers being typed. Click Connect.
4. At the next screen, Vista will attempt to connect to your wireless router or access point. Once the connection is established, you will be prompted to save your connection by checking the Save this network and Start this connection automatically boxes.
Click Close. You will now be connected to the wireless network.
Manually Setup A Wireless Connection
1. Click on the Start button and select Connect To from the menu on the right to display the Connect to a network dialog box.
2. The list of available networks will depend on the types of wireless networks detected, such as infrastructure mode or ad hoc mode networks. If you do not see your network in the list, or if no networks can be found, Vista displays Windows cannot find any networks, then your Wi-Fi router may be set for non-broadcast mode. If this is the case, select Setup a connection or network.
3. On the Choose a connection option page, six options are available. Select the Manually connect to a wireless network option, then click Next.
4. Follow the Set-Up Wizard.
In the Enter information for the wireless network you want to add … page, configure the following using the above information you obtain from your wireless network or access point:
A) Network name (SSID)
B) Security type (used to authenticate a connection to a wireless network). Choices are dependent on the capabilities of your wireless network adapter:
• No authentication (Open) Open system authentication with no encryption
• WEP Open system authentication with Wired Equivalent Privacy (WEP)
• WPA-Personal Wi-Fi Protected Access (WPA) with a preshared key (also known as a passphrase)
• WPA-Enterprise WPA with IEEE 802.1X authentication
• WPA2-Personal WPA2 with a preshared key
• WPA2-Enterprise WPA with IEEE 802.1X authentication
• 802.1x IEEE 802.1X authentication with WEP (also known as dynamic WEP)
NOTE: The shared key authentication method is not listed. Microsoft strongly discourages its use since it provides weak security for your wireless network. To configure shared key authentication, select No authentication (Open) below in step C.
C) Encryption Type (enabled if using WPA or WPA2, select either AES or TKIP).
• When the No authentication (Open) security type is selected, None is selected.
• When the WEP security type is selected, WEP is selected.
• When the WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise security type is selected, choose either TKIP or AES
• When the WEP (802.1x) security type is selected, WEP is selected.
D) Security Key/Passphrase (check Display Characters to view characters/numbers being typed)
E) Check Start this connection automatically (tells Vista to automatically connect to this wireless network)
F) Check Connect even if this network is not broadcasting
Click Next
5. At the next screen click on Connect to…
You should see your connection in the System Tray (double monitor icon). When you mouse over the connection, it will display your current connection. Right clicking the connection and selecting properties will allow you to select different options such as the Network and Sharing Center.
The Network and Sharing Center is the nerve center for you networking tasks. From here you can view all network connection information and make any changes when needed. On the left pane, selecting Manage wireless networks will allow you to make any changes to the connection you just set up above (after clicking Manage wireless networks, right click the connection and select properties).
Selecting Manage network connections will display all network adapters installed on your System. Double clicking on any adapters will display the properties window allowing you to fully manage the adapter and the network connection.
Select Diagnose and repair if you experience problems with your adapter or network connection.
iGlobalSupport.com provides you all the information that you may need if ever you will be having trouble with setting up the wireless on Windows Vista and Windows 7. You may have set-up the wireless connection properly but we can’t deny the fact that errors would really appear. That’s why iGlobalSupport.com is here to help you and will provide you information and support that you can’t imagine.
Of all the Windows Operating Systems that have been released, setting up a wireless network in Vista or Windows 7 is much more intuitive to manage. Vista or Win 7 includes many improvements for connecting to wireless networks starting with support for non-broadcasting wireless networks and new dialog boxes to easily configure connections to wireless networks.
This following guide will step you through setting up and connecting to a wireless network on Vista and get you on your way to surfing the Net.
Two methods exist for setting up a wireless connection on Vista/Win 7. This guide assumes your Wi-Fi router or access point is already setup and running on the Network and your PC or Laptop wireless card has been installed.
Before you can get started with setting up a Wi-Fi connection, the following information will be needed from your wireless router or access point:
• Wireless Network Name (SSID)
• Security Mode or Type (WEP, WPA, WPA2, etc…)
• Encryption Type if using WPA or WPA2 (AES, TKIP)
• Security Key or PassPhrase
Automatic Setup For Wireless Connection
1. Click on the Start button and select Connect To from the menu on the right to display the Connect to a network dialog box.
2. The list of available networks will depend on the types of wireless networks detected, such as infrastructure mode or ad hoc mode networks. If you see the name of your Network, double click it to proceed to the next screen. If you see other Networks in the list, they are probably your neighbors…hopefully they are all secured just like yours!
3. Enter Security Key or PassPhrase (from the information found from your router or access point). Check Display Characters to view characters/numbers being typed. Click Connect.
4. At the next screen, Vista will attempt to connect to your wireless router or access point. Once the connection is established, you will be prompted to save your connection by checking the Save this network and Start this connection automatically boxes.
Click Close. You will now be connected to the wireless network.
Manually Setup A Wireless Connection
1. Click on the Start button and select Connect To from the menu on the right to display the Connect to a network dialog box.
2. The list of available networks will depend on the types of wireless networks detected, such as infrastructure mode or ad hoc mode networks. If you do not see your network in the list, or if no networks can be found, Vista displays Windows cannot find any networks, then your Wi-Fi router may be set for non-broadcast mode. If this is the case, select Setup a connection or network.
3. On the Choose a connection option page, six options are available. Select the Manually connect to a wireless network option, then click Next.
4. Follow the Set-Up Wizard.
In the Enter information for the wireless network you want to add … page, configure the following using the above information you obtain from your wireless network or access point:
A) Network name (SSID)
B) Security type (used to authenticate a connection to a wireless network). Choices are dependent on the capabilities of your wireless network adapter:
• No authentication (Open) Open system authentication with no encryption
• WEP Open system authentication with Wired Equivalent Privacy (WEP)
• WPA-Personal Wi-Fi Protected Access (WPA) with a preshared key (also known as a passphrase)
• WPA-Enterprise WPA with IEEE 802.1X authentication
• WPA2-Personal WPA2 with a preshared key
• WPA2-Enterprise WPA with IEEE 802.1X authentication
• 802.1x IEEE 802.1X authentication with WEP (also known as dynamic WEP)
NOTE: The shared key authentication method is not listed. Microsoft strongly discourages its use since it provides weak security for your wireless network. To configure shared key authentication, select No authentication (Open) below in step C.
C) Encryption Type (enabled if using WPA or WPA2, select either AES or TKIP).
• When the No authentication (Open) security type is selected, None is selected.
• When the WEP security type is selected, WEP is selected.
• When the WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise security type is selected, choose either TKIP or AES
• When the WEP (802.1x) security type is selected, WEP is selected.
D) Security Key/Passphrase (check Display Characters to view characters/numbers being typed)
E) Check Start this connection automatically (tells Vista to automatically connect to this wireless network)
F) Check Connect even if this network is not broadcasting
Click Next
5. At the next screen click on Connect to…
You should see your connection in the System Tray (double monitor icon). When you mouse over the connection, it will display your current connection. Right clicking the connection and selecting properties will allow you to select different options such as the Network and Sharing Center.
The Network and Sharing Center is the nerve center for you networking tasks. From here you can view all network connection information and make any changes when needed. On the left pane, selecting Manage wireless networks will allow you to make any changes to the connection you just set up above (after clicking Manage wireless networks, right click the connection and select properties).
Selecting Manage network connections will display all network adapters installed on your System. Double clicking on any adapters will display the properties window allowing you to fully manage the adapter and the network connection.
Select Diagnose and repair if you experience problems with your adapter or network connection.
iGlobalSupport.com provides you all the information that you may need if ever you will be having trouble with setting up the wireless on Windows Vista and Windows 7. You may have set-up the wireless connection properly but we can’t deny the fact that errors would really appear. That’s why iGlobalSupport.com is here to help you and will provide you information and support that you can’t imagine.
Wednesday, April 7, 2010
Computer Set-Up and Computer Configuration
When you mention the word "technology," most people think about computers. Virtually every facet of our lives has some computerized component.
The appliances in our homes have microprocessors built into them, as do our televisions. Even our cars have computers. But the computer that everyone thinks of first is typically the personal computer, or PC.
A PC is a general-purpose tool built around a microprocessor. It has lots of different parts -- including memory, a hard disk, a modem, and more -- that work together. "General purpose" means that you can do many different things with a PC. You can use it to type documents, send e-mail, browse the Internet and play games.
Today, when someone says PC, chances are they mean a machine running on the Microsoft Windows operating system with an x86-compatible microprocessor. While Apple Macintosh computers are technically personal computers, most people wouldn't call them PCs.
Now, not all people are given chances of learning all about computers easily. Some would really need computer support. The fact that the technology changes to an advanced level every minute of everyday, some people would be really having a hard time on configuring their PC's or setting it up since it's not easy for them to do it. Most would call technical support hotlines asking them to fix their computers if it's not working because they are not computer savvy.
iGlobalSupport.com employs a pack of driven and competent individuals who possess extensive experiences in the field of IT solutions. We know how to get your computers running smoothly. For specialized services that guarantee proficiency, trust one name only – iGlobalSupport.com.
The appliances in our homes have microprocessors built into them, as do our televisions. Even our cars have computers. But the computer that everyone thinks of first is typically the personal computer, or PC.
A PC is a general-purpose tool built around a microprocessor. It has lots of different parts -- including memory, a hard disk, a modem, and more -- that work together. "General purpose" means that you can do many different things with a PC. You can use it to type documents, send e-mail, browse the Internet and play games.
Today, when someone says PC, chances are they mean a machine running on the Microsoft Windows operating system with an x86-compatible microprocessor. While Apple Macintosh computers are technically personal computers, most people wouldn't call them PCs.
Now, not all people are given chances of learning all about computers easily. Some would really need computer support. The fact that the technology changes to an advanced level every minute of everyday, some people would be really having a hard time on configuring their PC's or setting it up since it's not easy for them to do it. Most would call technical support hotlines asking them to fix their computers if it's not working because they are not computer savvy.
iGlobalSupport.com employs a pack of driven and competent individuals who possess extensive experiences in the field of IT solutions. We know how to get your computers running smoothly. For specialized services that guarantee proficiency, trust one name only – iGlobalSupport.com.
Virus and Spyware Removal
Spyware is a type of a malicious that is installed in the computer without the knowledge of the user. It collects collections information from the
computer time after time. Typically, spyware is secretly installed on the user's personal computer. Sometimes, spywares are installed by the owner of a
shared, corporate, or public computers on purpose in order to secretly monitor others. This is called the Keylogger.
However, spyware programs can collect various types of personal information. It is also know to change computer settings, resulting to slow connection
speeds, opening a different home page or website, loss of Internet or functionality of other programs. Spyware is simply known for hijacking your computer.
How spyware ends up on your computer machine because of something the users do. Like clicking on a pop-up window, installing a software package or
agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to
buttons that say "cancel" when they really install spyware.
Here are some of the general ways in which spyware finds its way into your computer:
Piggybacked software installation
Some applications will install spyware as a part of their standard installation procedure. If you don't read the installation list closely, you might not
notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as alternatives
to software you have to buy. As the old saying goes, there's no such thing as a free lunch.
Drive-by download
This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would
be your browser's standard message telling you the name of the software and asking if it's okay to install it. If your security settings are set low enough,
you won't even get the warning.
Browser add-ons
These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really
do what they say they'll do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware
themselves. Particularly nasty add-ons are considered browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work
to get rid of.
This is what iGlobalSupport is here for. We are here because we are made to fix computer's that are infected with these kinds of malicious software. We are
here and we provide the excellent customer and technical support assistance you can get. It's like having a personal technician that will help you all
through out the process. We also protect the important files and documents that you have on your computer. Most would likely be able to fix this easily,
the same thing as we do but then the effect of this would be, all your personal and important files are gone and there's no other way to retrieve them.
But we at iGlobalSupport assures you that you will have the best technical support assistance you can ever imagine.
computer time after time. Typically, spyware is secretly installed on the user's personal computer. Sometimes, spywares are installed by the owner of a
shared, corporate, or public computers on purpose in order to secretly monitor others. This is called the Keylogger.
However, spyware programs can collect various types of personal information. It is also know to change computer settings, resulting to slow connection
speeds, opening a different home page or website, loss of Internet or functionality of other programs. Spyware is simply known for hijacking your computer.
How spyware ends up on your computer machine because of something the users do. Like clicking on a pop-up window, installing a software package or
agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to
buttons that say "cancel" when they really install spyware.
Here are some of the general ways in which spyware finds its way into your computer:
Piggybacked software installation
Some applications will install spyware as a part of their standard installation procedure. If you don't read the installation list closely, you might not
notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as alternatives
to software you have to buy. As the old saying goes, there's no such thing as a free lunch.
Drive-by download
This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would
be your browser's standard message telling you the name of the software and asking if it's okay to install it. If your security settings are set low enough,
you won't even get the warning.
Browser add-ons
These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really
do what they say they'll do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware
themselves. Particularly nasty add-ons are considered browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work
to get rid of.
This is what iGlobalSupport is here for. We are here because we are made to fix computer's that are infected with these kinds of malicious software. We are
here and we provide the excellent customer and technical support assistance you can get. It's like having a personal technician that will help you all
through out the process. We also protect the important files and documents that you have on your computer. Most would likely be able to fix this easily,
the same thing as we do but then the effect of this would be, all your personal and important files are gone and there's no other way to retrieve them.
But we at iGlobalSupport assures you that you will have the best technical support assistance you can ever imagine.
Subscribe to:
Posts (Atom)