Saturday, September 24, 2011

Why Do I Get a Dropped or Slow Connection?

Why is my Connection Slow or get Dropped?

There are many reasons, why you may experience a slop or your connection drops.

The stability of a connection is affected by the quality of the communication that occurs between two modems; the clearer the communication, the more stable the connection. Some of the variables that affect the way modems communicate with each other are as follows:
    1. The Clarity of your phone line.
    2. The Signal on a phone line can be degraded as a result of weather
    3. The distance between your home and the phone company's switching equipment
    4. Electrical interference or anything else that affects the transmission of electrical interference
    5. High Voltage copper wires that affects the transmission of data to your PC or network.
    6. Lots of spicing along your phone line or poorly spliced wires. That is why you get a disconnection
        when it rains
A lot of poorly spliced cables along your phone line can be a problem

    7. Defective jack. (RJ11, RJ45)

If  you hear static on the line when you attach a regular phone, it is a sure sign that you have a noicy line, but the lack of static is not a proof that your phone line si clear enough to establish a high speed connection. In Some parts of the country, customers can have the local company "Condition" the line to ensure that the phone line is performing optimally, but even that is guarantee, if your home is a long distance call from the phone company's switching equipment.
The compatibility of the two modems. Despite the fact that modems communicate according to standardized protocols, modem manufacturers implement those protocols
differently. Consequently, a modem manufactured by one company may not communicate well with a modem manufacturer by a competitor. To increase the likelihood that your modem is performing optimally, make sure that you have the latest modem drivers installed and are using the right modem initialization string.
The Configuration of you TCP/IP software. Your TCP/IP software tells you computer how to communicate with your modem. If it is configured incorrectly, it will produce errors that will degrade the stability of you connection.
How well you TCP/IP soffware loaded into the system at start-up. Sometimes the quality of a connection can be improved by restartging you computer. Chronic  problems with your TCP/IP software, however, may be rectiied by unistalling and reinstalling the TCP/IP system software.

Additional telephony devices (fax, phones, answering machines, splitters, etc) may be producing interference on the phone line, even if they're in a different room. Try disconnecting them and trying to establish a connection again.

Sunday, September 18, 2011

Increase Your Wireless Internet Connection Security Tips

 Best7 Tips to Increase Your Wireless Internet Connection Security

Wireless high speed internet connection is the best way of sharing network connection with another device with the help of a wireless router for service (signal) broadcasting, wireless internet connection is also one of the best and fastest and cheapest means of networking because it doesn’t require you to connect cable to the port or connection of one Ethernet cable to the other in order to send out network signal to other computers.

The networking aspect of a wifi internet connection is done as a wire-free method of sharing network access, all the component of the connection has been networked through a wireless device known as wireless router though, you’ll still need to connect your Ethernet cable to the wireless router and then to your computer port in order to get internet access before the router can now broadcast it out to other computer devices within the range but sharing a wifi internet connection can result into some certain dangers that can affect your wireless internet connection and by knowing some of those things, it will become much more easier for you to use your wireless internet connection without any faults and also to increase its speed noticeably.

Tips to Increase Security of Wireless Internet Connection

1. Enable Systems Security Encryption 
            1. All wireless router has the features of enabling encryption, you should check the user manual or the
                imprint page of the   manual to learn how you can enable security encryption on your home wireless
                internet connection.
            2. After learning it, if it happens that your router has WEP and WPA encryption option.
            3. It is advisable to choose WPA instead of WEP because it is exposed to online hacking software
                that usually breaks down your network password within a short seconds to allow unauthorized
                access possible.
2. Turn Off Network Identifier Broadcasting
            1. You also need to turn off your Network identifier, which is also known as Service Set Identifier
                 (SSID).
            2. Once you switch off, your network will automatically stop sending signal to the internet in general
                and  this will keep it to be in hide mode.
            3. This will help you to browse conveniently without anybody interfering into your connection’s ability.
3. Use Good Anti Spyware and Firewall Software Frequently
            1. Having a good and up to date Antivirus and Anti Spyware software installed on your computer has
                proved to be one of the major solutions to virus attack because a good antivirus will help in
                scanning your computer for any deposit of virus so as to fight against them in most cases.
            2. Your antivirus can only work better if you are updating it frequently.
4. Use Strong Password
            1. When you’re trying to increase the performance of your wireless internet connection, one of the
                things you need to take proper care about is the issue of username and password.
            2. If you take the issue levity, things can go out of hands for you but if you use the normal approach by
                changing the default ‘Admin’ name to your desired username which is unique to you and also use a
                password that has  the combination of lower and upper case letters with numeric figures.
            3. With this it will be very difficult for any hacker to jump on your internet connection, although, there
                are many  software programs online that can hack wi-fi connection password and username.
            4. If you don’t want to fall victim of this, you must make it an habit to be changing your password and
                username at least two times in a month.
5. Enable MAC (Media Address Control) Filter Features
            1. There is nothing better for a human being to be able to choose what he/she wants or needs, in
                order to get the very best from your high speed wireless internet connection you should also think
                about using MAC with your wifi net access – this feature helps you to be able to list out in details
                the name of the computer or portable devices that you’ll like to have access to your wireless
                internet connection (think of your child’s computer, daddy’s palmtop or mummy’s smart phones
                etc).
            2. This option works just like a blacklisting option that makes it easier for you to black list any
                connection from  accessing your network and also to add the device that you want to connect to
                your internet connection.
           3. And by defaults, each computer that you add to this features has its own name and address on the
               network and if it happens that a computer that doesn’t have any address and name is trying to
               access the connection.
           4. The network connection will be denied until when you as the admin add the computer to the
               enabled list.
6. Check Your Network Computer Regularly for Abnormal Usage
           1.  If you’re sharing your wireless internet connection among your peers or neighbors, you should
                make sure to check on them at least twice in a week so as to know what and how much they have
                consumed in terms of  bandwidth and speed consumption, know if one of your network user is
               downloading too much applications or  files from the internet and if the person doesn’t change from
               doing so; you can disconnect him/her from your  connection with the example at number one above.

7. Position Your Router to Minimize Signal Strength
            1. Your router positioning can cause a decline in the speed and the amount of service it broadcasts
                and by re-positioning it and putting it near to the centre of your house, will increase its functions
                and you also make sure not to keep it closer to your window.

Friday, April 22, 2011

Data Loss and Storage Devices Damage

The most common used Storage Devices are the CDs, DVDs, memory cards, memory sticks and undoubtedly the hard drives. All these storage devices have on major flaw in common. They are not infallible and this means that the data stored on them can be lost or damaged through a number of unforeseen failures. There are a some Companies that offers Data recovery specialists that can recover your data by using special techniques, software and tools. Data recovery can sometimes be performed by the user of the damaged device by using software but there is a high risk of failure that can result in permanently erased data or damaged storage devices.

Common Causes of Data Loss and Storage Devices Damage.

Vibration
This is one common cause of Hard Drive damage. It is the constant amount of vibration it received that causes it to fail. Since these hard drives are constructed to be incredibly sensitive, large amounts of vibration could offset its internal parts and literally cause a hard disc drive crash. In order to avoid this problem, you should make sure that your computer is set on the ground firmly, so that it won't easily shake and be affected by vibration. If you are using a computer desk, make sure that you put the CPU tower on a stable area so that it won't vibrate if it the desk is bumped or shook. I have seen some clients of mine to used this type of computer table with a top where they place their PRINTER. These type of table are not really stable cause when they start to print something, you can see that the whole table shakes and this is not good for your Hard drives. You can either fasten this type of table on the wall to make it sturdy to avoid this kind of problem in the future.

Heat
Since hard disc drives are made up of delicate, heat sensitive electronics, they could easily fail if there isn't enough ventilation or air conditioning in the room. To avoid this problem, make sure that you have built-in fans for your computer, and that you have ventilation where the computer is situated. Since a computer's exhaust is usually located at the back, make sure that you don't position it too close to a wall or a divider, so that the hot air generated would be effectively removed from your unit. Make sure the computer's fan are working well cause they usually get stuck if it has accumulated lot of dust after a few months without cleaning. Remember, that one cause of heat that is generated inside your CPU is cause by the amout of dust and dirt accumulated inside.


Power Surges
If you are skimping on your computer budget, chances are, you don't have right device to guard against power surges. You need a surge protector, since a power strip is not enough to protect your computer. Hard drives are delicate and sensitive, so a small fluctuation in power could definitely fry it and cause it to fail. So if you really want to save money, you should get a Surge Protector, an Automatic Voltage Regulator (AVR) or else, you'll soon be spending a lot for a new drive.

Automatic Voltage Regulator



Water
water damage can occur even if it is turned off. Water is corrosive and will damage the metals found inside the hard drive generating microscopic pitting.
Avoid this to happen too... LoL

----------------------------------------------------------------------------------------------

Friday, April 15, 2011

How to make your PC run fast like the day you bought it

 Speed up your PC  just like the day you bought it
This is one of the many things I'd like to share. The one most frustrating thing when your PC runs so SLOW that you need wait for a few minutes before your PC BOOTS up, open or closing a program. Viewing a file seems to take forever to open it up.

We buy an expensive new PC and love how fast it starts up, runs programs, and loads websites.  Inevitably though, it starts to slow down until eventually we are pulling our hair out waiting for it to do routine tasks.
 What's wrong with your PC? It turns out the answer is actually quite simple and you don't even need to be "technical" to understand the causes and solutions.

Good News, it is not the computer hardware that has problem. In most cases, the hardware you have is perfectly capable of being restored to its original glory and kept in fast running condition with minimal effort.
Rather, the problem lies in the common changes that occurs in the PC Software.

The two most common causes of slowdown

1. The most common problem: Registery Errors
Every time you (or your kids) load a program, game, or file, your PC's software registery is updated with new instructions needed to operate that item.  However, when the item is removed, these instructions usually remain on your PC.  Every time you run your computer it tries to execute these instructions but, because the related program can't be found, it causes a registry error.  Your PC is doing a lot more work than it should be and the result is a significantly slower computer.
Solution:
One of the best way is to solve this is with a neat little tool from TuneUp Corporation. The software's name is TuneUp Utilities 2011 it scans, identifies, and fixes registry errors--resulting in a computer that's a lot more like it was when you first bought it. 
You can download it free here
Features:
-Fix the most common Windows problems, scan your hard disk and restore deleted files.
-Get rid of those PC brakes and drop the dead weight in programs: for maximum speed whether working, surfing, or playing!
-Find and remove large resource hogs and annoying data trash to make your PC run even more efficiently.
-The intuitive Start Center with a fresh look and feel gives you complete control and access to the most important tuning steps at a glance.
-Change the visual appearance of Windows® to match your style and safely modify over 400 Windows® settings.



2. Spyware and Viruses
Spyware and viruses are software programs that are loaded on your computer without your knowledge or permission.  They have various purposes, including:
    * Changing the default search engine in your browser.
    * Tracking your Web surfing habits and showing you targeted advertising.
    * Using your email program to send out spam to other email addresses.
    * Stealing your personal information.
Most spyware and viruses get onto our computers through files that we download from the Internet or as attachments to emails.  They tend to take up a lot of computing power and, as a result, will significantly slow down your computer.
Solution:
If you still haven't installed an anti-virus and spyware removal software you can choose a wide variety of anti-virus and spyware removal tools in the net

For more info about Anti-Virus and Malware/Spyware removal try to visit these links:
Link1
Link2



Monday, March 28, 2011

Sality Virus

Sality Virus (Win32 Sality Virus)(W32.Sality.AO, W32.Sality.Z)

Sality Virus is presently giving a headache to cafe owners today. That is why i wanted to post this information about this type of
bothersome Virus. Sality is a family of file infecting viruses that spread by infecting exe and scr files. The virus also includes an autorun worm component that allows it to spread to any removable or discoverable drive. In addition, Sality includes a downloader trojan component that installs additional malware via the Web.

How would i know if i have this kind of Virus in my Computer or Computers?
As with many other malware, Sality disables antivirus software and prevents access to certain antivirus and security websites. Sality can also prevent booting into Safe Mode and may delete security-related files found on infected systems. To spread via the autorun component, Sality generally drops a .cmd, .pif, and .exe to the root of discoverable drives, along with an autorun.inf file which contains instructions to load the dropped file(s) when the drive is accessed. The Sality virus joins infected machines to its own P2P network. Updates to the malware are fed via decentralized lists of HTTP URLs.

 What to do? How to Remove Sality Virus?
Understanding its characteristics is one helpfull way to remove or prevent your computers from this type of computer headache. You may search the web too for more ways on how to remove Sality Virus from your Pc's.


 1. Scan the system with up-to-date antivirus software. If a file is found to be infected with Sality, allow the antivirus software to clean the file. If other malware is found, allow the antivirus to delete or take the action recommended by the scanner. (For assistance, see Clean, Quarantine, or Delete?). If the malware persists, use a bootable antivirus rescue CD to boot the system cleanly and scan the system again. To prevent re-infection via infected USB drives, disable autorun.



2. Download the latest Panda AV software and after downloading, remove any antivirus sofware installed in your  computer   then run the installation setup of Panda AV and connect it for the latest updates. Then run for a Full Scan.Note do not run any programs and applications while having the full scan.After finishing scan.
 Restart your computer and you are almost done. Your computer is now safe in W32.Sality virus!

3. Download and install Kasperzky or NOD32 and update into the latest virus definition. Run a Full Scan immediately. After scanning has completed, restart you PC and you are done. Your PC is safe now.

Wednesday, March 23, 2011

Factors to consider when choosing Laptop Coolers

Laptop cooler’s sole purpose is to do one thing and one thing only, to cool down your laptop so that it doesn’t overheat and break down. Laptop coolers were designed with the purpose of blowing cool air towards your laptop to reduce the heat emitted from the internal system.


5 Factor to consider when choosing Laptop Coolers

Price - Choosing the best laptop cooler is not based on its price, there are good laptop coolers that can perform well as expensive ones. Since most of them can function equally. So you should pick one that is affordable and yet possesses a heigh quality.

Durability - You should choose the laptop cooler which are durable if possible with  a design that wont easily clogged up and is easy to clean, in such way you can get the most value of your money. 

Quietness - a noisy laptop cooler fan can be irritating. It is better that you should try to test it out before you buy it.

Portability and Size - The best laptop cooler should be very light in weight and can be powered through a USB port for energy.
When ever you are going to buy a laptop cooler, choose the appropriate size.

Cooling Power and Design - Some laptop coolers have multiple fans that make it more powerful than one with just a single fan. The positioning of the fans are important as well. Is it directly positioned where your laptop gets hot? How well does it keep your laptop cool? Two other key factors to examine are angle of the laptop cooler and the material of its surface. Is the laptop cooler angled to allow air to pass between the laptop and the laptop cooler? Is the laptop cooler made of plastic, metal or aluminum? This can greatly affect the cooling power of the laptop as well.

Sunday, March 20, 2011

Electrical Storm & your Computer

Electrical Storm can damage your Computers and your Electronic gadgets.


I had a clients who complained that she can not connect to the internet after a bright flash of lightning struck outside their house that night, another one said the same thing though he wasn't using it and his computer was turned off when that happen.   
When i inspected their computers, both clients have the same problem. A damaged LAN card.
Somehow that lightning traveled through the telephone lines and damaged their LAN card even though the other one was turned off.

My advice is, during Electrical Storm you should unplug your LAN cables from your modem to avoid this kind of problem. If you are going out for a trip or vacation, before leaving your homes or offices take time to unplug your cables. Who knows, an Electrical Storm might take place while you are away.

Additional tips when a strom is Approaching:
- Unplug your appliance power cords and cables from outlets
- Lightning can travel through wiring and water pipes, so unplug appliances
- Turn off the air conditioner
- Draw blinds and shades over windows. If windows break due to the wind, the shades will   prevent glass
   from shattering into your home    
- Avoid taking a bath or shower

Friday, March 18, 2011

BIOS Access




How to Access Motherboard BIOS

The following information below are a list of way on how to access BIOS for all the major BIOS chips and Computer Manufacturers.

During the computer initial boot the BIOS the BIOS supplier will be displayed. If the Original Equipment Manufacturer (OEM) logo splash screen is displayed, press the ESC key to see the boot up information. For some cases if the text displays to fast, you
may press Pause/Break.

 Bios Suppliers                                                      Keyboard Commands    

ALR (Advanced Logic Reserach, Inc.)                   F2
ALR PC non / PCI                                                  CTRL+ALT+ECS
AMD (Advanced Micro Devices, Inc.)                     F1
AMI  (American Megatrends, Inc.)                          DEL
AWARD                                                                 CTRL+ALT+ECS, DEL
DTK  (Datatech Enterprises Co.)                          ESC
PHOENIX                                                               CTRL+ALT+ESC, CTRL+ALT+S, CTRL+ALT+INS

Computer Vendor                                                Keyboard Commands
ACER                                                                     F1, F2, CTRL+ALT+ESC
ARI                                                                         CTRL+ALT+ESC, CTRL+ALT+DEL
AST                                                                        CTRL+ALT+ESC, CTRL+ALT+DEL
COMPAQ                                                               F10
COMP USA                                                             DEL
CYBERMAX                                                           ESC

DELL BIOS                                                          Models Listed Below
DELL 400                                                               F3, F1
DELL 4400                                                             F12
DELL Dimension                                                    F2 or DEL
DELL Inspiron                                                        F2
DELL Latitude                                                        Fn+F1(while booted), F2 (on boot)
DELL Optiplex                                                       DEL, F2
DELL Pricision                                                       F2

eMachine                                                              DEL, F2
FUJITSU                                                               Manuals & BIOS Download
GATEWAY                                                            F1, F2
IBM                                                                        F1
IBM PS/2                                                               CTRL+ALT+INS after CTRL+ALT+DEL
INTEL                                                                    DEL
LENOVO(formerly IBM)                                        Lenovo BIOS Access page
MICRON                                                               F1, F2 or DEL
PACKARD BELL                                                  F1, F2, DEL
SEANIX                                                                 DEL
SONY VIAO                                                          F2
TIGER                                                                   DEL
TOSHIBA                                                              ESC, F1, ECS then F1 or F2

TOSHIBA Notebook (newer models)               
1. Turn on computer by Holding down while pressing down ESC key.
    The machine will beep, then display:  Check System, then press [F1] key.
2. Release ESC key
3. Press F1 key
                                                                                                      
                                                                                


Warning: 
Computer vendor and Mother
Board manufacturers customize their BIOS to
the individual specifications of the mother
board. Care must be taken when applying a
BIOS update. A BIOS update should be applied
to the exact make; model; version; etc.
specified in the update description.

Applying the BIOS update to the wrong BIOS
chip can render the system unbootable and
could necessitate a Mother Board or BIOS chip
replacement.                

For Computer POST or Beep codes you may visit this Link.

Thursday, March 10, 2011

PC MEMORY TYPES

RDRAM -- Rambus DRAM
 If you are using RDRAM, make sure that all memory sockets of a channel are filled with either a memory chip or a continuity module. RDRAM often has to be installed in pairs of the same type of memory chips.

RDRAM devices may be configured into single-, dual- or quad-channel RIMM modules. For dual-channel or quad-channel (4-channel) RDRAM chipsets and motherboards, memory module upgrades should be in matched pairs. For instance, to add 512 MByte of memory into a dual or 4-channel system, two matched 256 MByte modules should be inserted.
 Example of RDRAM speeds include PC 800 (PC-800 or PC800) and PC 1066 (PC-1006 or PC1066).

SDRAM -- Synchronous DRAM (JEDEC SDRAM)

SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for. This tends to increase the number of instructions that the processor can perform in a given time. The speed of SDRAM is rated in MHz rather than in nanoseconds (ns). This makes it easier to compare the bus speed and the RAM chip speed. You can convert the RAM clock speed to nanoseconds by dividing the chip speed into 1 billion ns (which is one second). For example, an 83 MHz RAM would be equivalent to 12 ns.


Example: PC-133 CL2 SDRAM = 133MHz (SDRAM, PC133 • CL=2 • Unbuffered • Non-parity • 133MHz • 3.3V )

DDR SDRAM -- Double Data Rate SDRAM


DDR SDRAM is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*. It activates output on both the rising and falling edge of the system clock rather than on just the rising edge, potentially doubling output. It's expected that a number of Socket 7 chipset makers will support this form of SDRAM.
Synchronous DRAM speed is measured in MHz rather than nanoseconds (ns). You can convert the RAM clock speed to nanoseconds by dividing the chip speed into 1 billion ns (which is one second). For example, an 83 MHz RAM would be equivalent to 12 ns. 
Example:
PC 66
PC100 = PC-100 DDR RAM was sometimes called PC-1600 SDRAM because of its data bandwidth (transfer capacity) of 1.6GB per second.
*comes in 184-pin DIMM and 200-pin SODIMM formats
PC133
PC2100 (DDR266)
PC2700 (DDR333)
PC3200 (DDR400)

DDR2 SDRAM -- Double Data  Rate  SDRAM 
Example:
PC2 3200 (DDR2 400)
PC2 4200 (DDR2 533)
PC2 5300 (DDR2 667)
PC2 6400 (DDR2 800)

DDR3  
Example:
PC3 8500  (DDR3 1066)
PC3 10600(DDR3 1333)
PC3 12800(DDR3 1600)