Tuesday 27 November 2012

Bluetooth vs Wifi

 

                                         

                                        Comparison chart

                                        

BluetoothWifi
Frequency:
 
2.4 GHz
 
2.4, 3.6, 5 GHz
 
Security:
 
It is less secure
 
It is more secure
 
standard:
 
IEEE802.15
 
IEEE802.11
 
Cost:
 
Low
 
High
 
Hardware requirement:
 
Bluetooth adaptor on all the devices connecting with each other
 
Wireless adaptors on all the devices of the network, a wireless router and/or wireless access points
 
Bandwidth:

 
Low ( 800 Kbps

 
High (11 Mbps )
 
Specifications authority:
 
Bluetooth SIG

 
IEEE, WECA

 
Year of development:
 
1994
 
1991
 
Primary Devices:

 
Mobile phones, mouse, keyboards, office and industrial automation devices

 
Notebook computers, desktop computers, servers, TV, Latest mobiles.

 
Ease of Use:


 
Fairly simple to use. Can be used to connect upto seven devices at a time. It is easy to switch between devices or find and connect to any device.

 
It is more complex and requires configuration of hardware and software.

 
Range:

 
10 meters

 
100 meters

 
Power Consumption:

 
Low

 
High

 
Latency:

 
200ms

 
150ms

 
Bit-rate:2.1Mbps600Mbps
 

Sunday 25 November 2012

Trouble shooting Cookies related issue



Trouble shooting Cookies related issue_

What are cookies? A "cookie" is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information.

If the cookies are blocked, Internet explorer will show the following message when log on to your gmail account.



Now we can learn how to troubleshoot this issue in simple steps.



Step:1
go to tools and Internet Options



Step:2

Go to privacy options and see that the highest security "Block all Cookies" has enabled.



Step:3


Set the privacy option to "Medium" as seen on the image above and click Apply then OK.  Refresh the page by pressing F5.

                                                                
                                                                     Click Here to visit our facebook page and like.












Monday 19 November 2012

Net share command: List / create / delete network shares from command line





We can use net share command to create, configure and delete network shares from command line .


1. List the shared created on the local computer



   net share


2. Create a network share from command line.



The syntax for creating a share is as follows.


net share sharename=folderpath /grant:username,permissions

For example to share the folder E:\Games with everyone in the domain and to give full permissions.

 net share games=E:\games /grant:everyone,full


3. Delete network share(i.e to disable sharing of the folder) from command line




net share sharename /delete

For example, to delete the share created above, the command would be as below.

net share games /delete


                                                                               Click Here to visit our facebook page and like.



Friday 16 November 2012

Adobe CreatePDF / Word to PDF Converter

Convert Word docs to PDF without downloading new software.


The CreatePDF online service is the only Word to PDF converter that lets you turn Microsoft Word documents into Adobe PDF files by working with virtually any web browser or free Adobe Reader® software*.



Why choose Adobe CreatePDF online?

  • Upload a Word doc using your web browser and get a PDF file in just a few moments.
  • Or, convert to PDF while working in free Adobe Reader®, using CreatePDF from the Tools pane
  • Reliably convert a wide range of document and image formats to PDF, including .doc and .docx files
  • Automatically store your PDF files online

Get more...
  • Quickly merge multiple documents into one PDF file
  • Convert existing PDF files to editable Microsoft Word or Excel formats

How to convert Word docs to PDF files

Work in a web browser
  1. Sign in to your CreatePDF account online
  2. Click on Convert a File to PDF
  3. Select a Word document, and then click Open
  4. When the conversion is complete, click Download

Work in Adobe Reader
  1. Open Adobe Reader
  2. Choose Tools > Create PDF Files
  3. Click on Select File to Convert to PDF
  4. Click Convert, signing into your CreatePDF account if needed
  5. Click View PDF file in Reader
                                                                   Click HERE to do it.

                                                Click Here to visit our facebook page and like.



















Wednesday 7 November 2012

How to Remove Genuine Notification on Windows XP




Have you ever seen the above notification in Windows XP? This is Windows Genuine Notification from Microsoft


Here is a trick on how to remove Genuine Notification from Microsoft.Just follow this procedures:

 1. Lauch Windows Task Manager.
 2. End wgatray.exe process in Task Manager.
 3. Restart Windows XP in Safe Mode.
 4. Delete WgaTray.exe from c:\Windows\System32.
 5. Delete WgaTray.exe from c:\Windows\System32\dllcache.
 6. Lauch RegEdit.
 7. Browse to the following location:
     HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
     Windows NT\CurrentVersion\Winlogon\Notify
 8. Delete the folder ‘WgaLogon’ and all its contents
 9. Reboot Windows XP.


                                           Click Here to visit our facebook page and like.


Monday 5 November 2012

Understand DNS record types and functions



DNS records are used to direct traffic to and from your domain. These records associate a domain name with a specific IP address. The following table describes frequently used DNS records and their functions.

1. Name server record

Identifies which name servers are the authoritative name servers for a specific domain. DNS information can be cached in several name servers for a period of time, but when the cache expires, non-authoritative name servers contact the authoritative name server for updated information about a domain.

2. A record (address record)

Associates a domain name with an IP address.

3. CNAME (Alias or canonical name) record

Specifies that the domain name is an alias of another canonical domain name. When a name server looks up a domain and finds a CNAME record, it replaces the first domain name with the CNAME and then looks up the new name.

4. MX (mail exchanger) record

Identifies the server to which email is directed. It also contains a priority field so that mail can be directed to multiple servers in a prescribed order.

 

5. SPF (sender policy framework)

An email validation system designed to help prevent email spoofing and phishing.

6. SRV (service record)

Specifies information about available services. SRV records are used by Lync Online and Exchange Online to coordinate the flow of information between Office 365 services.

7. TTL (time-to-live)

The amount of time that a DNS record is retained or cached by a name server or other servers before the server does another lookup on the authoritative name server. You use this to control the number of queries made to a given name server.
                                        Click Here to visit our facebook page and like.

Thursday 1 November 2012

How to Import from the Personal Folders (PST) File in One Profile to the Personal Folders (PST) File in a Second Profile


How to Import from the Personal Folders (PST) File in One Profile to the Personal Folders (PST) File in a Second Profile

To import from the .pst file in one profile to the .pst file in a separate profile: 

From Outlook 2010:
On the File Menu, click Info, and then click Account settings. 
1) Select Account Settings from the drop-down list. 
2) Click the Data files tab. 
3) Select Personal Folders (If you renamed your personal folder to a different name, click that name), and then click Settings. Note the path of the .pst file. 
4) Click OK, and then click Close. 
5) On the file Menu, click Open, and then click Import. 
6) In the Choose an Action to Perform list in the Import and Export Wizard dialog box, click Import From Another Program or File, and then click Next. 
7) In the Select File Type to Import From list, click Personal Folder (.pst), and then click Next. 
8) In the File to Import dialog list, type the path, or click Browse to find the .pst file that you identified in steps 1 through 4. Select the option that you want, and then click Next. 
9) In the Select the Folder to Import From list, click the Contacts folder that you want to import. Make sure that you click to select the Include Subfolders check box if it is necessary. 
10) Click Import Items Into the Current Folder, and then click Finish.
Outlook 2010 imports the Contact items to the target folder.