Wednesday, April 22, 2009

Free word processing

Tuesday, April 21, 2009

Pyramid Scams

Saturday, April 18, 2009

Configure a computer network BY Thomas Husnik

Computer Networking

The process of sharing data and resources between two or more computers is called computer networking. Data may be in the form of files, docs, spread sheet documents, web pages databases and resources such as printer, modem, scanner, CDROM etc. A computer network can be configured by different methods, such as Peer to Peer and client/server network, depending on the needs of your organization. If security measures are necessary then you should consider implementing a client/server network. Below I have explained the basic difference in the two types of networking and I also discuss the network configuring methods.


Configuring a Network

Peer to Peer network model

Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.

Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g. if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.

Computer Name IP Address Subnet Mask Workgroup

PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwork

Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.

For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.

In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.

If a computer fails to work then all other computers work normally in peer to peer network.

Client/Server Network Model

In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.

If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.

When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.

Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.

Configuration Steps


Choose a unique name for each client computer

Choose unique IP address for each computer and relevant.

Use the same domain name for all client PCs.


Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\Computer Name\SharedDriveLetter.

Network configurations steps can be implemented by right clicking the My Computer>Properties>

For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.

Tuesday, April 7, 2009

What is data recovery ? By: Bushra Bashir

Over the past few years, hard drives have gotten a lot faster and quieter with the capacity of 350 GB. The downside is that their consistency is far from perfect and they are often burdened with mechanical defects and failures however, this warning has never been mentioned in the vendor’s product specification. From the experience of the past it is shown that the users are divided into the two groups. The first group of the users is well informed about computer, data and may be he/she has experienced the data loss. In this scenario, the user will naturally be very careful to back up information such as files, website, emails, pictures and backup of the financial files on the CD/DVD or other media. In the big companies there must be an IT department or a network administrator who take cares of his backups. In this way digital devices can be protected however still a virus attack, hardware failure or simply human error can destroy this asset.

What is data recovery and why it is important?
Data recovery means retrieving deleted and inaccessible data from the electronic storage media such as hard drives and removable media. There are different causes of the data loss such as Electro-mechanical failure, natural disaster, viruses, sabotage, human error and data corruption.
What data recovery is important?
Over the past few years, hard drives have gotten a lot faster and quieter with the capacity of 350 GB. The downside is that their consistency is far from perfect and they are often burdened with mechanical defects and failures however, this warning has never been mentioned in the vendor’s product specification. From the experience of the past it is shown that the users are divided into the two groups. The first group of the users is well informed about computer, data and may be he/she has experienced the data loss. In this scenario, the user will naturally be very careful to back up information such as files, website, emails, pictures and backup of the financial files on the CD/DVD or other media. In the big companies there must be an IT department or a network administrator who take cares of his backups. In this way digital devices can be protected however still a virus attack, hardware failure or simply human error can destroy this asset.

The other groups of the users live with the risk, either because they are not aware of the possible horror of the data loss due to any unwanted thing, so they don’t take it seriously. It should be clear that a multifaceted component at any day may fail to provide its services. If that scenario occurs one day then all data stored on the hard disks or any other storage devices may be lost. Study shows that 30 percent of the small businesses admit that they have no formal backup and storage procedures implemented in their organizations. The majority of the small and big companies take backup of the critical data on the daily basis. But one out of three small businesses still wait until a problem occur before reviewing and implementing their data storage procedures.
Below is a list in which I have provided the possible methods of recovering the lost data.
Data Recovery Techniques
Some basic questions before the recovery process starts.
1. What is the data, which needs to be recovered?
2. What happened when the hard drive failed?
3. How much data was on the hard drive?
4. What type of hard drive is it?
5. How fast do you need that data?
Recovering the critical data is a specialized process that requires the right software, hardware and the advanced techniques. In many failure-related cases, the chances of recovering the lost data from a damaged hard drive, ranges from 90% to 100%. If the electronic control panel is only damaged then it can be replaced and the hard disk can be reused. If the defect is of the mechanical nature then data recovery will be little bit tough. If the problem is related to the file system, which has caused the inaccessibility of the data then it can be recovered by using the data recovery software.
Data recovery can sometimes be worked out yourself with the help of good software and some tips. This is usually the situation when the drives are not physically damaged. If they are damaged, then you will need to send the drives to a specialist who will be able to recover the data. There is no foolproof method that where you will have 100% of your data recovered or your hard disk will never crash again. If you suspect any data corruption, data loss, drives corruption the possible symptoms can be.
• Previously accessible data is suddenly nowhere to be seen.
• Error messages will inform you that the device is not recognized
• Computer or hard disk will not function and no booting will start.
• There can be scraping or rattling sound in the hard disks.
• Hard drive may not spin and can be still.
All the above symbols indicate that the drive is corrupted.

Here are some of the good tips on how to recover the lost data.
1. Recovery through software: First try to find some data recovery software from your technically inclined friends. They may have some good data recovery software.
2. Hardware Crash: If you have detected that your hard drive is crashed then tries the normal shutting down procedures. Just pull out the plug and do not wait. Never try to save or recover the data at this time as you may lose the other saved data as well.
3. Pinpoint the trouble in the hard disk: If you are not sure of the problem listen to your hard disk for any rattling or unusual sounds. If this is the case then you will need recovery service.
4. Determine the health of the drive: If you have determined that the drive is healthy, then you may still be able to recover the data by yourself, try using the data recovery software.
5. Slave disks: Try to connect the drive as a slave to another computer. In this way, you might be able to recover all the data. I have practically used this technique and I was successful in recovering the data.
6. Locate the corruption: You should locate the corrupted partition and this can easily be done by booting the system from the floppy drive or using the F disk command.
7. Shop for recovery software: Do an online research in Google for the data recovery software and see what software is ranked best and suits you. Usually the data recovery software is not free so you will have to buy it and it will surely recover your lost data if the problem is not severely mechanical.
8. Server Crash: If you are working on a server and it has been crashed then never try data recovery on the same server.
9. RAID Drive Crash: Replace the RAID data drive that fails and never ever use it again.
10. RAID Drives: Label the multiple drives in the RAID array.
11. Database files: In case of Microsoft Exchange or SQL failure, never try the direct recovery operations on the corrupted database file instead make a copy of the database files and then start recovery on these files.
12. Utilities: Do not try to run the system utilities such as Defragmenters and volume repair utilities.
13. Other utilities: Also avoid using Volume Repair utilities if there has been power outage or if the files system is corrupted.
14. Keep information: Always keep the following information handy.

- The size of the drive
- Operating system (i.e. Windows 98, Windows 2000 or Windows XP, etc.)
- Situation of failure (you must know that what happened just before the drive stopped working)
- Is the drive still recognized by the computer or not
15. Boot drive malfunction: If the corrupted drives also have the Operating systems then things are tricky and you can boot the system from the recovery software and in this way you can find you corrupted data and you can recover it to some safe place.
16. Avoid physical cleaning of drives: Never attempt to shake or clean the data drive at your own this can do harm to your hard drive physically.
17. Do not remove drive covers: Never try to remove the hard drive covers because they have to be used by the specialists for getting the configurations and features of the hard drive.
18. Dropping the hard disks: The hard disks should not be unstuck.
19. Exposure to water: Never try to expose the hard drive to water because there is not dryer to dry the hard disks.
20. Scrutinize the workplace: Pay full attention to the places where you have placed your computer because humid environment, warm places and shaky desk can do harm and can become the cause of the hard drive failure.
21. Firewalls: Make sure that you are well protected from the viruses, adware, malware, Trojan horses. An up to date anti virus and anti spyware should be installed on your computer and you should guard your PC with by putting it behind a firewall.
22. Physically damaged drives: If the drives have been corrupted physically they must be sent to a good data recovery Lab.
If you have tried all the normal methods and still have a problem with your data then its best thing that you hunt a good data recovery company. You can find their websites and see the technical data recovery features, which they are providing.



Recovering the critical data is a specialized process that requires the right software, hardware and the advanced techniques. In many failure-related cases, the chances of recovering the lost data from a damaged hard drive, ranges from 90% to 100%. If the electronic control panel is only damaged then it can be replaced and the hard disk can be reused. If the defect is of the mechanical nature then data recovery will be little bit tough. If the problem is related to the file system, which has caused the inaccessibility of the data then it can be recovered by using the data recovery software. Data recovery can sometimes be worked out yourself with the help of good software and some tips. This is usually the situation when the drives are not physically damaged. If they are damaged, then you will need to send the drives to a specialist who will be able to recover the data. There is no foolproof method that where you will have 100% of your data recovered or your hard disk will never crash again. If you suspect any data corruption, data loss, drives corruption the possible symptoms can be.
Article Source: http://www.diyarticlelibrary.com
Fiza Ali www.theitlibrary.com

Friday, April 3, 2009

AVG Anti Virus Options By Thomas Husnik

Out of all of the different antivirus software manufacturing companies in the world, in my opinion AVG is by far one of the best. They are one of the most longstanding, reputable, and one that offers an incredibly large and varied selection of products and services for consumers to choose from. Their main focus is on the development of software solutions that help to provide protection from computer viruses, and also to deliver the most comprehensive and proactive protection available on the market today. Their product line supports all major operating systems and platforms and more than 50 million users around the world use these products to help protect and safeguard themselves and their computer systems.
Products And Services
There are quite a few different AVG antivirus products to choose from, one of the most popular being one of the most basic. The AVG Internet Security software which is complete security protection against all of the most Internet threats including everything from viruses, worms, Trojans, spyware, and adware to hackers, spam and more.
It features all in one easy to use protection that is great for the whole family and which you can install and forget about, new program versions and updates for free throughout the license duration time, improved virus detection based on better heuristics and NTFS data streams scanning, unique automatic threat-removal anti spyware engine, and automatic firewall profile switching for improved security and usability.
Another of the most widely used AVG antivirus tools is the AVG Anti Virus Professional Edition, which is specifically designed for use in the professional world. It features quality proven by all major antivirus certifications, 24/7 technical support provided free of charge is included with the package, smaller installation and update files, and a greatly improved user interface.
With this product you receive full on access products as the powerful AVG Resident Shield is able to include and exclude files from being scanned based on individual file extensions and it is also able to handle exceptions for potentially unwanted programs such as adware. The program is also able to automatically heal or remove infected files and other threats, including Trojans and worms, in order to resume your computer to its previous state.
Choosing the right AVG antivirus tool is important but the biggest thing is that you are going with a respected and reputable name that you know you can trust to take care of your biggest computer problems and threats.http://free.avg.com/

Understanding NTFS

Posted by Computer Tips at 9:19 PM 0 comments DIY Build your own Home Theater PC Computer

One thing they don't tell you in the video is to make sure that the components are compatible.By that I mean the CPU is for the motherboard that you picked out, and that the memory will also work on that motherboard.Here is another tip if you have a old PC case that's running XP you can put all or some new components in and save your self the cost of a new system.Here is a helpful link