Saturday, February 14, 2009

Broadcast radio ad business


Google Inc has abandoned its efforts to sell advertising for broadcast radio stations, acknowledging that the three-year project has failed.

The leading Web search company said that it plans to sell its Radio Automation business, which created software to automate broadcast radio programming, and phase out its Audio Ads service.

The move will likely result in up to 40 people being laid off, Google said. Google has been re-appraising initiatives intended to expand its income beyond Internet advertising, which accounts for more than 90 per cent of total revenue.

Advertisers will continue to be able to use Audio Ads until May 31, the company said. Google -- which had 20,222 full-time employees as of December 31 -- would instead focus its efforts on placing ads on streaming audio over the Internet, according to company's vice president of product management, Susan Wojcicki.

Google plans to continue investing in its television ad business. It also is seeking ways to sell more advertising on online audio services, which younger audiences are using.

Recession: What all Google killed

Indiatimes Infotech

Google has often been extolled for its product innovations. However, it seems slowdown has cast its shadow on the company's `innovation spirit' too. The search giant, who is taking a harder line on managing expenses as the recession curbs spending on online ads, has been almost on a shutting spree. The past six months witnessed the company pull the plug on as many as nine of its new products.

Several of these causalities include products launched with lot of fanfare like Google Lively, which was widely believed to be the company's answer to Second Life.

Here's looking into the products/services Google has dumped in the last few months.

Article Source:- http://infotech.indiatimes.com/quickiearticleshow/4124313.cms

Google, Yahoo, Microsoft To Clean Up Web Text

In a rare instance of collaboration among otherwise fierce rivals, Google, Yahoo and Microsoft said they would support a new web standard that will allow millions of publishers to remove duplicate pages from their websites. As a result, search engines would be able to make their search results more comprehensive.

"There is a lot of clutter on the web and with this, publishers will be able to clean up a lot of junk," said Matt Cutts, an engineer who heads Google's spam fighting efforts, the New York Times reported.

"I think it is going to gain traction pretty quickly," said Cutts.

The problem is the following: Many web publishers, especially those that have voluminous sites, like e-commerce companies, have multiple URLs that all point to the same page. This confuses search engines, sometimes causing them to index the same page multiple times. As much as 20 percent of URLs on the web may be duplicates, according to some estimates.

Engineers at Google came up with a simple way for web publishers to indicate when a URL is a duplicate, and if so, which is the principal, or "canonical," URL that search engines should be indexing. Yahoo and Microsoft, the no. 2 and no. 3 search engines, have agreed to support the same standard.

"We are happy that everyone is going to support the same implementation," said Nathan Buggia, a lead program manager at Microsoft. "This is a clear benefit for publishers as it gives them an opportunity to get more exposure through search engines."

All search engines have developed technologies to detect duplicates that are more or less effective. The so-called Canonical Link Tag, as the standard is known, should make it easier for both publishers and search engines to address the problem, NYT reported Thursday.

"It is an important step because all the search engines are coming out with it," said Priyank Garg, director of product management for web search at Yahoo.

Article Source:- http://www.in.com/news/readnews-science-technology-news-google-yahoo-microsoft-to-clean-up-web-text-8021035-dde97869a14a4d480337a1157fc387c9e2d990d8-1.html

Tuesday, February 10, 2009

Word processor

Abbreviations such as ibid. op. cit. loc. cit. are discouraged by Wikipedias style guide for footnotes as they are easily broken. Please improve this article by replacing them with named references quick guide or an abbreviated title.Document preparation redirects here. For the service of preparing legal instruments see Legal document assistant.A word processor more formally known as document preparation system is a computer application used for the production including composition editing formatting and possibly printing of any sort of printable material.Word processors are descended from early text formatting tools sometimes called text justification tools from their only real capability.

Word processor may also refer to an obsolete type of standalone office machine popular in the s and s combining the keyboard textentry and printing functions of an electric typewriter with a dedicated computer for the editing of text. Although features and design varied between manufacturers and models with new features added as technology advanced word processors for several years usually featured a monochrome display and the ability to save documents on memory cards or diskettes. Later models introduced innovations such as spellchecking programs increased formatting options and dotmatrix printing. As the more versatile combination of a personal computer and separate printer became commonplace the word processor disappeared.

Article Source:- http://www.motherboas.webs.com/

Application software

This article does not cite any references or sources. Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed. December OpenOffice.org Writer word processor. OpenOffice.org is a popular example of an open source application software suite Application software is any tool that functions and is operated by means of a computer with the purpose of supporting or improving the software users work. In other words is the subclass of computer software that employs the capabilities of a computer directly and thoroughly to a task that the user wishes to perform. This should be contrasted with system software infrastructure or middleware computer services processes integrators is involved in integrating a computers various capabilities but typically does not directly apply them in the performance of tasks that benefit the

A simple if imperfect analogy in the world of hardware would be the relationship of an electric light bulb an application to an electric power generation plant a system. The power plant merely generates electricity not itself of any real use until harnessed to an application like the electric light that performs a service that benefits the user.Typical examples of software applications are word processors spreadsheets and media players database applications.Multiple applications bundled together as a package are sometimes referred to as an application suite. Microsoft Office OpenOffice.org and iWork which bundle together a word processor a spreadsheet and several other discrete applications are typical examples.

Article Source:- http://www.motherboas.webs.com/

BASIC INPUT OUTPUT SYSTEM

During the late s and s it became economical to move an increasing number of peripheral functions onto the motherboard see above. In the late s motherboards began to include single ICs called Super IO chips capable of supporting a set of lowspeed peripherals keyboard mouse floppy disk drive serial ports and parallel ports. As of the late s many personal computer motherboards support a full range of audio video storage and networking functions without the need for any expansion cards at all higherend systems for D gaming and computer graphics typically retain only the graphics card as a separate component.Popular personal computers such as the Apple II and IBM PC had published schematic diagrams and other documentation which permitted rapid reverseengineering and thirdparty replacement motherboards. The term mainboard is archaicly applied to devices with a single board and no additional expansions or capability. In modern terms this would include embedded systems and controlling boards in telvisions washing machines etc.


Motherboards contain some nonvolatile memory to initialize the system and load an operating system from some external peripheral device. Microcomputers such as the Apple II and IBM PC used readonly memory chips mounted in sockets on the motherboard. At power up the central processor would load its program counter with the address of the boot ROM and start executing ROM instructions displaying system information on the screen and running memory checks which would in turn start loading memory from an external or peripheral device disk drive if one isnt available then the computer can perform tasks from other memory stores or displays an error message depending on the model and design of the computer and version of the bios.

Article Source:- http://www.motherboas.webs.com/

PERSONAL COMPUTER

While most capacitors are rated for hours of operation at °C their expected design life roughly doubles for every °C below this. At °C a lifetime of years can be expected. This appears reasonable for a computer motherboard however many manufacturers have delivered substandard capacitorscitation needed which significantly reduce life expectancy. Inadequate case cooling and elevated temperatures easily exacerbate this problem. It is possible but tedious and timeconsuming to find and replace failed capacitors on PC motherboards it is less expensive to buy a new motherboard than to pay for such a repair.citation neededMotherboards are produced in a variety of sizes and shapes form factors some of which are specific to individual computer manufacturers. However the motherboards used in IBMcompatible commodity computers have been standardized to fit various case sizes.

Laptop computers generally use highly integrated miniaturized and customized motherboards. This is one of the reasons that laptop computers are difficult to upgrade and expensive to repair. Often the failure of one laptop component requires the replacement of the entire motherboard which is usually more expensive than a desktop motherboard due to the large number of integrated components. Almost all medium to high end Nvidia cards and most high end ATI cards support the technology.Prior to the advent of the microprocessor a computer was usually built in a cardcage case or mainframe with components connected by a backplane consisting of a set of slots themselves connected with wires in very old designs the wires were discrete connections between card connector pins but printedcircuit boards soon became the standard practice. The central processing unit memory and peripherals were housed on individual printed circuit boards which plugged into the backplane.

Article Source:- http://www.motherboas.webs.com/

CENTRAL PROCESSING UNIT

Motherboards are generally air cooled with heat sinks often mounted on larger chips such as the northbridge in modern motherboards. If the motherboard is not cooled properly then this can cause the motherboard to crash. Passive cooling or a single fan mounted on the power supply was sufficient for many desktop computer CPUs until the late s since then most have required CPU fans mounted on their heatsinks due to rising clock speeds and power consumption. Most motherboards have connectors for additional case fans as well. Newer motherboards have integrated temperature sensors to detect motherboard and CPU temperatures and controllable fan connectors which the BIOS or operating system can use to regulate fan speed. Some higherpowered computers which typically have highperformance processors and large amounts of RAM as well as highperformance video cards use a watercooling system instead of many fans.

Some small form factor computers and home theater PCs designed for quiet and energyefficient operation boast fanless designs. This typically requires the use of a lowpower CPU as well as careful layout of the motherboard and other components to allow for heat sink placement.A study found that some spurious computer crashes and general reliability issues ranging from screen image distortions to IO readwrite errors can be attributed not to software or peripheral hardware but to aging capacitors on PC motherboards. Ultimately this was shown to be the result of a faulty electrolyte formulation. For more information on premature capacitor failure on PC motherboards see capacitor plague.Motherboards use electrolytic capacitors to filter the DC power distributed around the board. These capacitors age at a temperaturedependent rate as their water based electrolytes slowly evaporate. This can lead to loss of capacitance and subsequent motherboard malfunctions due to voltage instabilities.

While most capacitors are rated for hours of operation at °C their expected design life roughly doubles for every °C below this. At °C a lifetime of years can be expected. This appears reasonable for a computer motherboard however many manufacturers have delivered substandard capacitorscitation needed which significantly reduce life expectancy. Inadequate case cooling and elevated temperatures easily exacerbate this problem. It is possible but tedious and timeconsuming to find and replace failed capacitors on PC motherboards it is less expensive to buy a new motherboard than to pay for such a repair.citation neededMotherboards are produced in a variety of sizes and shapes form factors some of which are specific to individual computer manufacturers. However the motherboards used in IBMcompatible commodity computers have been standardized to fit various case sizes.

Laptop computers generally use highly integrated miniaturized and customized motherboards. This is one of the reasons that laptop computers are difficult to upgrade and expensive to repair. Often the failure of one laptop component requires the replacement of the entire motherboard which is usually more expensive than a desktop motherboard due to the large number of integrated components. Almost all medium to high end Nvidia cards and most high end ATI cards support the technology.Prior to the advent of the microprocessor a computer was usually built in a cardcage case or mainframe with components connected by a backplane consisting of a set of slots themselves connected with wires in very old designs the wires were discrete connections between card connector pins but printedcircuit boards soon became the standard practice. The central processing unit memory and peripherals were housed on individual printed circuit boards which plugged into the backplane.

Article Source:- http://www.motherboas.webs.com/

Motherboard

A motherboard is the central printed circuit board PCB in some complex electronic systems such as modern personal computers. The motherboard is sometimes alternatively known as the mainboard system board or on Apple computers the logic board. It is also sometimes casually shortened to moboMost computer motherboards produced today are designed for IBMcompatible computers which currently account for around of global PC salescitation needed. A motherboard like a backplane provides the electrical connections by which the other components of the system communicate but unlike a backplane it also hosts the central processing unit and other subsystems and devicesMotherboards are also used in many other electronics devices.A typical desktop computer has its microprocessor main memory and other essential components on the motherboard.

Other components such as external storage controllers for video display and sound and peripheral devices may be attached to the motherboard as plugin cards or via cables although in modern computers it is increasingly common to integrate some of these peripherals into the motherboard itself.An important component of a motherboard is the microprocessors supporting chipset which provides the supporting interfaces between the CPU and the various buses and external components. This chipset determines to an extent the features and capabilities of the motherboard.Additionally nearly all motherboards include logic and connectors to support commonlyused input devices such as PS connectors for a mouse and keyboard. Early personal computers such as the Apple II or IBM PC included only this minimal peripheral support on the motherboard.

Article Source:- http://www.motherboas.webs.com/

Sunday, February 8, 2009

How to Setup an Out-of-Office Auto-Reply Message Without Exchange Server

Microsoft Outlook allows you to set a rule on your account to automatically check incoming messages and reply with a designated email to let your contacts know that you are out of the office. The following are step-by-step instructions on setting up such a rule:

1. Open Microsoft Outlook.
2. Click on "New," to open a new email message.
3. There, type in the subject line and body as you would like the auto-reply message to show. Leave the "To" line blank.
4. Click, "File," and then "Save As" to save the file. In the "Save as Type" box, select "Outlook Template .oft."
Note: If you do not see the "Outlook Template.oft" option here, you must make Outlook the default email editor. To do so, click "Tools," "Options," the "Mail Format" tab, uncheck the box that says "Use Microsoft Word to Edit Email Messages," click "Apply," and then "OK."
5. Close the email message you just created.
6. When Outlook asks you if you want to save the message, select "No."
7. Open the Rules screen by clicking "Tools" and then "Rules and Alerts."
8. Click on "New Rule."
9. Select "Start from a blank rule."
10. Select "Check messages when they arrive."
11. Click "Next."
12. Do not check any of the boxes under "Which condition(s) do you want to check."
13. Click "Next."
14. When the box pops up asking "This rule will be applied to every message you receive. Is this correct?" - Click "Yes."
15. Under "Step 1," click the box next to "reply using a specific template."
16. Under "Step 2," click on the link "a specific template."
17. Click the arrow next to "Look In."
18. Select "User Templates in the File System."
19. Click on the Out of Office Reply you created in step 3. The name will be whatever you wrote as the subject of the email.
20. Click Open.
21. Click "Next" on the Rules Wizard two times (on the "What do you want to do with the message?" and "Are there any exceptions?" screens.
22. If you want to turn on the auto-reply message immediately, click finish. If you would like to wait to turn on the auto-reply later, uncheck the "Turn on this rule" box and click finish.
23. Click "Apply" to save
24. Click "OK" to exit
25. If you left the "Turn on this rule" box checked, your Out of Office Auto-Reply is now working!
26. You can test it's functionality by sending yourself an email doing a send/receive two times. If you receive the test message and the auto-reply, you have completed the steps correctly!
Additional Notes
Make Sure Your Rule Works - Leave Your Computer on!
The out of office auto-reply feature only works if you have your computer on, your Outlook open, and the email account sent to automatically send/receive. Make sure that you are set up to do so under "Tools," "Options," the "Mail Setup" tab, and "Send/Receive" option screen. You can schedule an automatic send/receive at any interval you prefer. Once your computer is set up correctly, you can put it in "Hibernate" mode, where you can continue to receive and reply to messages without leaving the computer in full power. To do so, click "Start," "Shut Down," and change the option box to "Hibernate." Feel free to turn off the monitor while you are gone and just leave the computer to silently check your mail.

Turning the Auto-Reply on at a Later Time
If you unchecked the "Turn on this rule" box during setup, you can turn on the auto reply at a later time by following these easy steps:

1. In Outlook, click "Tools" and then "Rules and Alerts"
2. Click the checkbox next to the rule you created.
3. Click "Apply."
4. Click "OK."
5. Your rule is now turned on!

Turning the Auto Reply Off
When you get back to the office, just follow these simple steps to turn the Auto-Reply off:
1. Click "Tools" and select "Rules and Alerts"
2. Uncheck the box next to the Auto-Reply rule
3. Click "Apply"
4. Click "OK"
5. The rule is now turned off!

Editing the Reply Message
After using the Out-of-Office reply once, you don't need to redo the whole process the next time you are out of the office. Follow the steps on the following slides to change your message:
1. The trickiest part is finding the message again, click in the following order:
Start Bar
"My Computer"
"Local Disk (C:)"
"Documents and Settings"
Your Name (one folder will be the name of the computer)
"Application Data"
"Microsoft"
"Templates"
Finally- The Out of Office Message! 2. First- so you never have to go through that again, right click on the email and select "Desktop (Create Shortcut)." That way, you can just open the file directly from there in the future.
3. Edit the text of the message to read what you would like the Auto-Reply message to say.
4. Click, "File," and then "Save As" to save the file.
5. In the "Save as Type" box, select "Outlook Template .oft."
6. Close the email message you just created.
7. When Outlook asks "The file already exists. Do you want to replace the file?' Select "Yes."
8. Turn on the rule using the directions above.
Ryan Hemphill Want more tutorials like this? Email Me
Article Source: http://EzineArticles.com/?expert=Ryan_Hemph

Watch TV on the Computer - TV Stations You Can Watch on Your Computer

Being able to watch TV on the computer is awesome. Especially when you're able to watch some of your favorite shows and programs. You're probably not sure which ones you can get or where to watch them from. So, what I'm going to do is share with you some TV stations and programs you can watch on your computer.

That way, you'll be able to see your favorite shows on your PC.

The stations and programs you can watch are:

1. Sports. This is great if you are a sports fan or if you enjoy watching a game every now and again. You can watch any sports game on your computer. The cool thing is, you can actually watch some of the games that your cable company doesn't carry.

2. News. If you want to stay up-to-date on what's happening in the world, then you can do this by watching TV on your computer. You can do this from anywhere in the world, which is great. So, if you want to keep up with the current events, be sure to watch TV on the computer.

3. TV Shows. If you have a favorite show that you like to watch, you can do this on your PC. You can do this from anywhere in the world, too. All you will need is your computer and internet.

4. Movies. Watching movies on your computer is fun. If you have a favorite movie channel or if you like watching movies, you can do this on your computer. There are TV channels that will allow you to view all of your favorite movies.

These are some of the programs and stations you can watch on your PC. Actually, there are thousands of channels and stations you can get for your computer. So, if you really want to have fun and see all of your shows, be sure to watch tv on the computer. You will really enjoy it.

To watch thousands of TV channels and programs on your computer, click on the link below:
Watch TV On The Computer

Article Source: http://EzineArticles.com/?expert=Tony_B._Smith

Advantages of Portable MP3 Players

Portable MP3 Players have taken the world by storm primarily owing to its compact size, solid-state technology and large memory capacity. MP3 Players enjoy distinct advantages compared to portable music players chiefly because there is no room for MP3 players missing whether the user is taking a bumpy car ride, having a jog or cycling on an uneven road or path. All your favourite MP3 songs or other audible forms of media can be normally stored in Flash Memory systems that is either built-in on the Sony Memory Stick, Compact Flash cards or SmartMedia - the same type of cards & sticks we use for digital cameras and that can also be operated with the portable MP3 players in the same manner.

The process of preparing MP3 files has become quite simple these days. First, MP3 files are prepared on a PC by either downloading songs form the Internet, compressing music from a CD format or producing its original source on MP3 software. You can then download the files through the computer's USB port or parallel port straight away into the MP3 Player or reader or removable drive that accepts the card/stick of choice. Most portable players nowadays are packed with software programs to facilitate the process of downloading.

Compared to CD Players, Portable MP3 Players have solid state memory that determines the amount of data they can store. You can make use of the compression format for compressing a 32MB stored on a CD to 1.6MB that can be stored on a MP3 Player. Therefore, even a low-cost portable MP3 can hold roughly about 4 hours of quality music.

If you are going to use the portable MP3 Player in moving vehicles or carry it around while you are jogging, cycling or walking - a model that has a microdrive is a welcome option. Microdrives like hardrives are used in PCs but they are much smaller.

Similar to a regular hard drive there is a chance of occurrence of a skip in case the MP3 player is jostled. But compared to flash drive, MIicrodrives have the advantages of both storage capacity and is much economical. Like a Flash drive, Microdrives can carry anywhere from 10 to 15 times media clearly making the portable MP3 Player a musical powerhouse.

MP3 Players are now availlable from 1GB to 160GB. You can read reviews on 2GB MP3 Players, 4gb and 8gb Players to choose the best audio player from Sony, Archos, Sandisk, iRiver and all latest models available in the market.

Article Source: http://EzineArticles.com/?expert=Victor_Thomas

Pairing Your Mac With Your Phone

Most mobile phones are equipped with Bluetooth technology. Did you know that a Mac also has Bluetooth? This article will show you how easy it is to pair your phone with your Mac.

On the Mac at the top of your screen you will see a Bluetooth icon. Click the icon and select "Turn Bluetooth On". Then make sure the "Discoverable" is checked.

On your phone make sure it's Bluetooth is on and also in "Discoverable" mode. On the phone select the option to set up a new Bluetooth device. It should find your Mac and give you a code to pair the two. A pop up window on your Mac will ask you to enter the pass-code you set up on the phone.

Once the Mac and phone are paired click the Bluetooth icon at the top of the Mac's screen. Now select "Browse Device". It will pull up a screen where you can select the phone. Once that is selected you can browse the phone's photos and other files depending on what your phone allows.

I use it mainly to transfer photos from my phone to the Mac. This can be achieved by dragging them to the desktop. You can also on some phones send and receive contacts to and from Apple's address book.

After you have finished turn the Bluetooth off on the Mac and Phone. The next time you wish to pair your Mac should already be saved in the phone.

Bluetooth technology on the Mac also makes it possible to use Apple's wireless keyboard and mouse. It is a great feature to have and is another feature found on most Mac computers. Some PC computers are starting to utilize this as well.

Enjoy geek videos, shopping, news, and helpful information.Visit http://jmdcomputer.blogspot.com

Article Source: http://EzineArticles.com/?expert=Rich_Wheeler

Setting Up a Secure Wireless Network - Part 3

Welcome back! I'm glad to see you are not interested in "just" being secure, but you want to be very secure. There are pros and cons to this. You know the pros. Security! , but first of course is my:

DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.

The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.

OK. Here are the cons:
  • No DHCP (Dynamic Host Configuration Protocal) Server. You will need to set your IP addresses manually on all the wireless and wired clients you want to hook to your network.
  • No viewable SSID. You will have to remember the name of your wireless network, then manually join wireless clients to your network.
  • No standard IP address for your router. You will have to remember what you set that to. (This is easy as you can always check the IP address of a computer connected to your network.)
  • MAC (Media Access Control) will be used. This is like a computers finger print. You will have to remember to allow this computer into your network. Unless they are explicitly allowed to join the network they will not be able to unless this step is complete, even though they know the SSID and Shared Key.
Note: on't make these changes with a wireless client. You will not be connected for very long if you do. Use the computer that is hard wired to the router. PRINT this document or save a copy of it local on your computer. There will be places where you will not be able to get to the Internet to read this until some changes are made. You need this document to make those changes. This documentation has been done with Windows XP. If you have Windows Vista the documentation will not match exactly. The settings are the same, but getting to the place the settings are made will be a little different. Read through this document before making any changes.

Please be aware that these are no rock solid guarantees to keep people out of your network. These following steps are simply deterrents, and can be gotten around if the intruder wants in bad enough. If you have gotten to this point I need to make something perfectly clear. The encryption you are using is your number one defense. Don't do these steps if you have set a key like "mynetwork", or used WEP for your security. Use the strongest security available (WPA-AES) and have at least a 20 character key with numbers and upper/lower case characters. There should be no words in there that can be found in the dictionary. That being said let's get on with the deterrents.

Go into the local LAN settings and change the IP address of your router. If the default IP address of your router is 192.168.1.1 change it to something like 192.168.112.86. You can use 10.x.x.x or 172.16.x.x. Replace the "x" with any number under 255. Remember the number you used as it will become the default gateway and the DNS server for your network and you will have to set it in the client since we are going to disable DHCP. Make the changes and apply them. This makes guessing your IP range harder for the intruder. Leaving it set to the default just makes it easier to get into your network.

The computer hard wired to your network should still be able to connect to the network since it is using DHCP to get an IP address. You will have to change the address in your browser to the new IP address to get back into the router settings. That will change with this next step. You will have to hard code the IP address in the client to be able to get back on the network.

Go into the web interface and to the LAN settings. Find the DHPC server and disable it, or uncheck enabled. Save the settings. At this point you will not be able to get into your network. You have just told your router not to give any computer an IP address. If they want in they need to know an IP address that fits the network. To get back into your network we need to do this.
  • Right click on My Network Places and choose Properties.
  • Right click on the Local Area Connection that matches your Ethernet adapter. If you have a wireless adapter you will see two. Choose the LAN connection, or the one that is hard wired to your network. Choose properties.
  • In the box labeled This connection uses the following items:
  • scroll down to Internet Protocol (TCP/IP).Click on it then click on the Properties button.
Click the Use the following IP address and Use the following DNS server addresses radio buttons. The boxes will become white and you can enter data into them. Enter the following data: This is what you would enter if your routers IP address is 192.168.89.1
  • IP address: 192.168.89.2
  • Subnet mask: 255.255.255.0
  • Default gateway: 192.168.89.1
  • Preferred DNS server: 192.168.89.1
Click the OK button and you should be able to get back in to your network from a hard wired computer. If you have a wireless adapter you will have to follow these steps in your wireless clients to allow them back into the network.

Note: ***You cannot have any clients with the same IP address***. Increment the last number by 1. Example, the wireless client would have an IP address of 192.168.89.3. The Subnet mask, default gateway, and DNS server address will not change. Keep then the same on all clients.

Your wireless client should not be able to access the network. Let's make a few more changes before we join it to the network.

Next we are going to enable MAC filtering. This will only affect wireless clients. What you are doing is telling the router that only the specified MAC addresses are allowed in the network, even if they know the encryption and key. To do this go to Wireless Settings and find a box labeled Enforce MAC Filtering, or something similar to it. Check it an apply it. When the router reboots you should see the MAC address of your wireless client in the list. You can find the MAC address of your client by opening a DOS box like we did earlier and enter "ipconfig /all" without the quotes. You will see the information about your wireless adapter.

If you want to allow other wireless clients into your network you will have to edit the list and allow them. MAC addresses can be spoofed, but this is another layer of security that you can implement.

So far we have changed the IP address of your router, disabled DHCP and set MAC filtering. I will take it for granted you had, or have changed, your encryption to be as strong as possible. The last thing we will do is not broadcast your SSID. What this means is where you look for Available Wireless Networks you will not see yours.

To disable the broadcasting of your SSID from the web interface for you router go to Wireless Security and uncheck Broadcast SSID and apply it. Your router will reboot.

Now, on to the wireless clients. You will have to assign your wireless client a static IP address. Do the exact same steps as above to do this, but choose the wireless adapter. Once you have a valid IP address you should be on the network. Your wireless client already knows of the SSID and the settings. If you View Available Wireless Networks your SSID will be there.

If you bring in another wireless client it will know nothing about your network. You will have to do the following to get it into your network.
  • Set your IP address, Default gateway, etc... on the new wireless clint
  • From the Available Wireless Networks dialog choose Set up a wireless network for home or small office.
  • Select Create a new connection.
  • The Welcome to the Wireless Network Connection Setup Wizard will start. Click Next.
  • Enter your Network name (SSID): "your network name"
  • Select Manually assign a network key
  • Check Use WPA encryption instead of WEP (WPA is stonger than WEP but not all devices are compatible with WPA).Click Next
  • Enter your key twice. Click Next
  • Choose Setup a network manually
  • Click Finish

You should now be connected to the wireless network.


This concludes PART3 if you would like to get things even stronger please review the final chapter PART4


A direct link to this article, complete with images can be found at TechAlternatives


Helping you Discover Your Choices


Article Source: http://EzineArticles.com/?expert=Keith_Hagans

Setting Up a Secure Wireless Network (PART 4)

DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.


The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.


Welcome back to the final steps. These steps have nothing to do with wireless security. What they have to do with is protecting private date in your network should your wireless network be compromised. If you have followed parts two and three your wireless network is as secure as it can be. What if someone does get in? What I want to discuss now is what you can do to protect yourself should that happen. This is just an overview and not a step-by-step. This is food for thought. If you would like help doing this please come to my site and ask in the forum. I would be more than happy to go into detail on this.


Once an intruder is in your network they have access to all the resources in your network. I highly doubt you have a domain, but a workgroup network. This means the security has to be done on each individual workstation for them to be able to transfer data to each other. I don't know for a fact, buy I suspect this is why Microsoft made the security so wide open in Windows. If you had to set everything manually out of the box it would be extremely hard to get the computer to communicate with each other.


By setting default workgroup names, no passwords on administrative accounts and wide open shares people can network their computers together with ease. There is a big problem with this. Once someone is in your network they can get to your stuff with the default settings, There are two default settings to be concerned with the most. The default workgroup name, which has been the same for years, has been either "workgroup" or "MSHOME".


The default administrative password has been blank. With these two settings not changed, the intruder has absolute power over your network. They can steal data, lock you out of your network so you cannot get to your data, install whatever they want and do any damage imaginable. Here is a scenario of an intruder getting into the network and just how easy it is. I have done this with clients to show them and they take a whole new look on security after it has been showed to them.


The intruder cracks the security of your wireless network. He now has an IP address in your network. DNS does not matter at this point for the damage can be done with the IP address alone. He runs a ping sweep on your network. This is simply a script that pings every address in your IP address range and any computer that is on the network will respond. Once he gets a response from the computer(s) he knows which computer to attack. He sets the workgroup name on his computer to workgroup and reboots. He will then go to the IP address he found and try to access the default administrative share.


Here is what that would look like \\192.168.89.2\C$. He could not make a connection so he sets the workgroup name to MSHOME and tries again. He takes for granted the default password has not been changed so he leaves his password blank. This matches the administrator account on both computers. This time he has access to your C:\ drive. The $ symbol is just a share that is hidden and the default administrative share is on the root of C and shared as C$. He is in and has control. How can you prevent this?


Set a strong password on the administrator account and don't use it unless you need to make administrative changes. See PART1 for a tool to check the strength of passwords. Create an everyday user account with user privileges and set a password on that. You will have to create the same account with the same password on all the computers you want to share data with. The administrator account does not have to match, but they will not be able to administer the other computers. Next, change the workgroup name. Change it to anything, but not something easy like you last name.


This is the final steps you can take to secure your data. You can go as far as data encryption, but there is a lot of overhead in it and not as easy as it sounds. You do stand a chance of loosing date if something goes wrong.


Thank you for taking the time to read these articles and if you have any questions or comments please go to TechAlternatives and let me know.


To Discover Your Choices go to TechAlternatives
Article Source: http://EzineArticles.com/?expert=Keith_Hagans

 
Design and Bloggerized by JMD Computer