Category Archives: COMPUTER NETWORK

How to connect from other device to portable Wi Fi hotspot:

Join a personal area network with Windows 8

It is decreasing start up time booting. It starts in a zippy and the waiting time on it fewer and the sleep mode is nice and a good and for those who want to get into the act within a few seconds. In sleep mode, you stop the work as it is and when it awakes, you can work from the stage from where you have left. The networking option this is vast. Do not concentrate only on mobile vendor’s proprietor’s software.

Here, I am talking about Nokia suit or PC Suit and Samsung Kies. From one find numerous links where many personal users are feeling grunt of compatibility issues with their respective personal computers. With this operating system one can connect a mobile device preferably for Internet connectivity by employing Bluetooth and using network and then mobile AP. Then go to your smart phone, here I am talking about Android Smart phones, here unlock the phone and from ribbon bar go to then turn Wi Fi and see the networks and then choose the that is your and connect by giving the code there.

How to connect from other device to portable Wi Fi hotspot:

It should be SSID and security settings security settings could of security In this share connection mobile android phone, menu and Here, you can share your device mobile connection via USB, Bluetooth. 2) click on hotspots. It AndroidAP other Wi Fi on the computer goes to settings, networks and Wi Fi. Search for available networks. Prior to this to determine turn on and available selects connect AP by entering password should there your with a Wi Fi one device is connected enjoy proper web to connect from other internet connection by personal area network: 1) Switch on connection a personal Go to charm right edge of the screen and search for of tooth pair the your phone. 2) from set. Bluetooth make your computer you phrase write that numbers on mobile confirm Bluetooth.

Now go to Bluetooth at your and then reach a personal network, then area your be there it using access now dialogue will Now, your phone connected personal Internet your being done wireless.

Conclusion:

With advent of computing more and more sophisticated methods are one use; wireless Internet connectivity is one of in previous have talked about how to wireless listen music from one smart phone to personal computer, have my best to you connectivity, some preconditions attached with these like that you should a genuine Windows and also it is a smart phone. I prefer to buy the same brand of stylish phone and desktop replacements. Modern desktop replacement does have Bluetooth installed. One should purchase the device that has a portable Wi Fi hotspot modem with it so that you can create networking here.

Kaspersky Security Cloud Free Review

Windows 7 is coming to an end. This means Microsoft Security Essentials the Windows version of Windows 7 also coming to an end. This means I have to find out another alternative to it so that my Windows 7 computer remains intact with security. As I have no plan to update to Windows 8 for the coming year. So, my search for a new free antivirus that is going to supplement the works of Microsoft security Essentials begins.

Before searching for alternative free antivirus there are some precondition to it as that must be full flow antivirus and should be not so intrusive like Microsoft Security essentials. I found the Kaspersky security cloud is one of the best option to start. It comes up with almost full security versions like that of paid antivirus and it has also cloud on access protection and from my experience it does not slows down connection speed at all.

A separate download is needed in order to keep your password safe. It cleans up all the other add ons of internet explorer and for this computer restart is required. It updates automatically when computer connects to internet. It has also VPN service to send and receive data securely but the amount of VPN is very low amount you can browse for some safe work. I found this antivirus is lighter than windows security Essentials.

It does not bother you at all though from time to time some updated news comes but that stays in one app and if you want you can open it as per your wish. It updates automatically whenever new virus definition arrives and this means your device is protected against all invasions. In its dashboard it comes up with scan, database update, password manager requires another download, mobile protection and secure connection.

If you want to hide your network activities and want to become less visible online then use free VPN in order to speed up web browsing process. After downloading free cloud antivirus you need to register it for free and then you can run scan as there are full scan, quick scan, selective scan and external device scan option is there as it scans computer for viruses and other malicious software and it is recommended to run the scan after first installation and first update of antivirus software. You can schedule scan by going to scan schedule so that schedule scan at specific time.

It protects you from file antivirus such as it scans all files that are opened, saved and run during normal computing environment. It scans web antivirus as it scans incoming web traffic and prevents dangerous malicious scripts from running into your computer. It protects computer against dangerous network attack and network activity and attacks to kernel of operating system.

It watches system files and protect them from ransomware and crypto blockers and if that attack happens then it rolls back system to good state to remove those completely. It scans default mail systems and scans incoming and outgoing messages from mail client and stops them. It scans for instant messaging client and stops malicious and phishing attacks.

If your laptop is in battery state then it disable scheduled scanning task to preserve battery. It also go to gaming mode when you play game with computer and in this way, notifications are suppressed to provide a decent gaming environment for you. The core security functions of this antivirus is released early during computer start up of operating system so that it provides a balanced and sound performance without any delay and abruptions.

In this way, it prevents infections during starting of operating system. When RAM and CPU usages are on high then it stops computer scans in order to run computer in decent speed. It stops rootkits from installing into system by searching for traces of malicious programs in the operating system files.

It scans for weak settings of operating system and then it strengthens it in order to run operating system securely and with fast connectivity. It provides option to run on-screen keyboard in order to stop keyloggers from stealing yours personal and privacy data.
It has a self-defense functionality so that no other malware can disable this protection and can stop attempts to modify or delete kaspersky Security Cloud files, memory processes and its system registry settings. In its network monitoring it safeguard internet traffic processing and stops malicious scripts from injecting scripts into web traffic to interact with website pages.
It monitor ports so that no other network ports remain vulnerable for hackers.

It monitors all network ports so that no port remain vulnerable to hackers. It scans for some encrypted connections so that whether any false network certificate is there or not. By default it block connections over SSL 2.0 protocol as it can defect data transfer security and make your computer vulnerable to data security. It add add on to chrome to scan for search traffic and which website is good then it shows the green icon so that genuine links can be found easily. It secures traffic of Mozila Firefox and its Thunderbird mail program by securing it through its settings.

In the notification settings you can disable notifications such as on-screen notifications, audio notifications, news notifications, promotional materials so that you will not be disturbed by notification. Over all Kaspersky Security Cloud Free is a full potential security suit to provide absolute level of security to your computer. It can be used as an alternative to Windows Security Essential when the support of Windows 7 ends.

Useful Command Prompt Tricks You Might Not Know

Last updated on September 13th, 2019 at 02:48 pm

There are numerous tips about Windows, Android, WordPress written in mohanmekap.com. Some tips are being updated from time to time in accordance with changing circumstances and updates of Windows to later versions. I have always been the big fan of the use of command lines. I have been using since the days of Windows XP.

In Windows XP it comes from Start Menu, then click Run and enter cmd in the Run box and then OK. Alternatively, command prompt can be opened through the start menu and then all programs, and then select accessories and then click on command prompt.
In the later version of windows after Windows XP, such as with Windows 7, open start menu and then ‘search programs and files’leveled in the search bar and then write ‘cmd’ on it and click enter to open ‘command prompt’.

You can pin cmd in start menu by right click on cmd entry in the program list and then select pin to start menu. In Windows 7 additionally, you can pin it to the taskbar. There are commands which require administrative privileges then in Windows 7 you can provide an administrative password to user account control,

Next tip is to check whether the computer is connected to the internet. I remember during the times of Windows XP and my management days ahead during that time we used to get LAN connectivity and system administrator used to make our computer connected to the internet through network settings.

I also remember during the times of dial-up internet the installation of the driver and also waiting for the connection to materialize and opening up of email account takes huge time and use of classic internet explorer. Dialing up connections through dial-up shortcut and connection of port of landline into the port of the computer and waiting for the connection to stay for longer durations.

Essential Windows Tips worth remembering:


When we think about these in the age of Wi-FI and fourth generation of high-speed internet connectivity we do find some sort of solace but during those times even connecting to the internet makes us smile even though most of the times the speed of internet is beyond manageable levels.

Now, connecting to internet hardly takes time. From Windows 7 onwards we find the presence of easier connectivity such as in the form of tethering, and other wireless connection and this makes the passing of internet connection from android mobile to computers becomes easier.
You can use ping commands to test the status of any website. Suppose you want to check mohanmekap.com is live on your connection and computer or not. Then open cmd and then write down:

ping mohanmekap.com

and then hit enter and during this time your computer should connect to the internet. If all works well this will show you about packets sent, approximate round-trip times, packets received and packets lost. If packets sent and received are same this means that mohanmekap.com is working with your connection. You can test this for any site by replacing mohanmekap.com in this command line.

ping mohanmekap.com
ping mohanmekap.com

Every computer has one local address. In the networking environment or when you are connected to the internet, the server only recognizes the client computer in the name of local addresses. This is known as the local gateway or internet protocol address. In the command line write

Ipconfig

Then hit enter, to find out, subnet mask, which is most of times 255.255.255.0 but there might have been some sort of derivations then check this out too. In case of adjusting or troubleshooting router, this subnet mask information is essential.

ipconfig
ipconfig

Assignment of hotkeys to specific apps to open without moving into its directory is one of most prominent aspect to speed up computing works. By default assignment of the hotkey is “Ctrl+Alt+ key” and in this way, many shortcuts to tasks can be assigned. Then, use of the single key in the form of from F1 to F12 and in some keyboards in order to activate F1 to F12 keys one need to press Fn key simultaneously. This happens mostly in wireless keyboards where the presence of numbers of keys is minimized.

There are ways to assigns shortcut keys to apps. First open Start Menu and then All Programs and then right click on the desired program and then click on properties. Move to text bo that is leveled as the shortcut key. Then put the desired shortcut there, and by default, you will find Cltr+Alt and then you can provide shortcut there and if you want to put direct shortcut without Cltr+Alt then delete those.

Click OK to assign the shortcut to the specific program. In order to use those shortcuts, it is important to keep the desktop empty. If you open Microsoft Word then the shortcut will work with respect to Microsoft Word instead of opening specific program. Windows 7 and onwards will ask for user account control for administrative password and then save OK to assign the hotkey.

After using the computer for sometime from time to time you must be very eager to know what is on your computer, then open the command prompt or use shortcut Winkey+R and then write down msinfo32

msinfo32
msinfo32

Then enter and this will open another window namely, ‘system information ’. This will provide system summary of hardware information, software environment, and components. There is numerous system information software is there but it is inbuilt software and provides detailed and complete listings of hardware, components, and software environments.

There are numerous ways to customize Windows and make it perform easier for you. Windows is a vast software and there are numerous ways you can customize it to run it as per yours easiness to work with the computer. From time to time Windows is updating to different versions but still, if you closely look of all of these updates, then you will find most basic functionalities still remains with most of these popular versions of Windows.

Command line is an interesting tool and from Google, you can find so many interesting shortcut variants and with it, you can easily make your Windows work nicely for you. There are other improvements such as that of the presence of Stereo Mix to record audios as it is in terms of digital output to make listening environment nicer.

What is the most visible aspect is the presence of conveniences while using Windows? By far we do know that Desktop or laptop computers are by far most suitable option to work with serious office works as it not only provides faster work environment but also to provide excellent provisions to do and start multiple works at one time whereas compared to mobile devices this is by far the single most work environment where the size of hard disc is higher as well as the speed and the convenience to work is definitely wonderful.

Windows 7 onwards we do find completely easier work environment and with the advent of 64 but computing the favorite ways to find out easier alternatives for work environment surfaces. With the advent of the faster internet now more and more users have been very much comfortable with the computing environment as the distance between cloud and real computing slowly on the decline.

This leads to the demand for more and more Windows computer which does provide single most work environment to perform tasks with the advent of shortcuts and other multitasking. There is no way mobile devices would stop the emergence and continuation support of Windows computer and for this, it is important to move towards ultimate dynamism towards accomplishing the perfection of computer works to extend these towards most valuable and definite proposition of doing and performing computing works.

Sources & References:

Similar Categories:

Data Dictionary of Oracle Database

Importance of Oracle Database in this age of core-computing is the presence of both logical which is read only and the real databases which is empowered to save working and management of database to work in absolutely perfect manner. Data dictionary is the major part of Oracle database which aims to provide read only access to clients about the part of database and this means these can only be edited while logging into real server.

If you log into artificial server or the client side then some part can be edited but some other parts such as data dictionary provides the read only access which means cannot be edited at any point of times from outside or client side servers. It contains the perfect definitions of schema objects which are the main parts of oracle database.

It has definitions for tables, views, functions and all the other schema objects intended to use with oracle database. It defines what are the storage space in real server of schema objects and what are storage capacity inside logical server so as to provide one of major distinctions for security management to look deeper into work capacity of schema objects to perform in real time.

It provides the names of users who can edit and manage original oracle database as well as it provides the length of tables and the scope of tables to provide in real time management work. It showcase the integrity of oracle users such as those are the clients which can provide information on logical server but cannot edit the real server where the real database are stored inside. Thus it separates organisation workers from clients so that integrity of oracle real server stays alright and thus increases the security prameters of database.

So, this means all parts of data dictionary are stored inside system table space. This means these are stored inside real database not inside logical database and this means that clients and other customers do not have to rectify nd modify tables of data dictionary as it is situated inside system or real database.

This goes on to show data dictionary is not so important for clients and customers as they deal with only logical side of oracle database and there they do not have to worry about the presence of data dictionary. On the other hand when all of these integrity of functions when compared with logical database where inputs are from clients and customers then it is compared with real database with integration of data tables as and when defined and then everything is compare with origin of queries and then compare those queries with data dictionary from system drive and all of these becomes extremely critical while considering the security and management of data integrity.

It also examines the probability of functionalities of base tables, and it is rarely used and only used by Oracle database or real system database and these are well-protected with encryption and most of times in critical inspection of security these base tables are used otherwise there is hardly the use of these base table in normal circumstances.

There are serious caution while using data dictionary inside data tables. If someone altered the codes inside oracle data dictionary then authenticity of each and every part of data dictionary and oracle databases becomes defunct and for this one need not in normal circumstances change the performances of data dictionary of oracle database.

Similar Categories

Symantec Threat Monitor Screensaver (2009)

It was during the heydays of Windows XP when due to present of plenty of vulnerabilities and the absence of clear cut original Windows distribution we find plenty of pirated versions of Windows during these days and that indirectly increases the use of Windows operating system as the number uno operating system.  Due to allow of pirated versions of windows and even allow of downloading of updates from other sources we do find that presence of plenty of viruses and all over internet world is full of too much of viruses.

During those times there were many antiviruses companies in existence and from among all of it Symantec the makers of Norton antivirus is very popular. It has it own set up of security vigilance and many times it uploaded antiviruses prior to the release of Microsoft. It showcase the power and the infrastructure of Norton or Symantec has. During the days of 2009, it has partnership with deep threat monitor company such as Deep Sight and it releases the screen saver of threat monitor in order to let people know what are the current trends in the world of internet about presence of viruses, malwares and so on.

During those days Symantec also opened the special web page to download screensaver for people and it was completely free and it was powered by deep sigh intelligent technology. It had also one disclaimer that the data which you see is deliberately delayed by eight to twelve hours so that the hackers should know that their viruses had been detected and security updates released by Symantec.

It was released for people to understand how much was the current threat level and let them dissect it and find out from where these viruses are reaching to them. There have been some mixed reaction to this even during those times and some of corporates on their system disable it completely through Microsoft and some individual users like it very much. Due to speed of internet connection the data updated within a specified gap and inside screensaver the time of data updates are clearly written.

There has been talk of showing the spams and phishing counts generated from the countries world wide so that people will know where the most common spammers are resides and where phishing sites were created and the list of phishing sites make them realise how important a safe browsing conditions while connecting to internet could possibly have been.

People during that times are using Windows Vista and where the use of gadgets or desktop gadgets are pretty much popular and people love to have this screens save gadgets so that even while using desktop or laptop they would see the real-time statistics so that they would always be alerted of it. In this age of fast-paced computing the real-time data that is delayed by eight to twelve hours does not have any significance but during the times of dial-up internet connectivity we could see these data have pretty much importance so much so that one cold find exact details of how much dee virus problems we are facing currently.

Theses data have pretty much significance during those days for organisations and corporates as it provides deeper integration and management of data analysis and provide the virus threats which could be imprended to organisation. During those time safe of data had always been a privilege and organisations try hard to make these data safer and more convenient to use so that they an keep sae informations of customers and make them feel secure to interact and work within their organisational standards.

Related Posts:

What is the best Printer for Home use?

For homes or for self office and home office choosing a best printer means affordability as well as the imminent cost factor involved with it. For scope within small hemisphere the determinant of determining a good printer means a printer must be for all times and it should have reliable functionality as well as does not depend upon too many of after sales service held within it.

Why a personal printer at home is a recommended option?

Before seven to eight years when daddy bought me a desktop with comes the smaller printer that is attached with it and that has limited functionality as well as the cost of that printer is on higher side. In this way the print ink cost becomes absolutely unbearable as that costs many.

With little bit of knowledge it is easier to create anything on desktop or laptop or be it android devices but the aftermath is that if you do not have a printer attached with it then you will find that you have to copy everything on a USB drive and then go to a nearby printer shop and paid money for it and most of the time especially during the times of examination these shops are full of students and that can buy huge time.

There are some privacy concerns with it too. If you want to keep it private but you cannot as in every computer be it at home or at a shop everything needs to be copied within that device and then print it. So, choosing a printer is absolutely essential if you have desire and essential to do it too.

Scope for inkjet printer:

If you want to print out very basic word files and some small resolutions images for day-to-day activities then inkjet printer is good for home or SoHo. In this case the cost of inkjet printer is on lower side and the expenditure output is on lower side.

Scope for Laser Printer:

If you want to print large number of papers and then you will have better to choose laser printer. It costs higher than inkjet printer but you will find have to change lesser cartridges and the use of cartridges goes on for long and that ultimately reduces the cost incurred with cartridges. This is absolutely similar to that of xerox machines and the cost of printing of paper in average is absolutely lesser than inkjet printer performances.

If yours small office and home office have several rooms and want to connect each computer to a printer and that networks with each other then you can buy all in one comprehensive printing solution such as that includes a printer, photocopier and fax machine or scanner. This provides cheaper solutions that connecting each computer with a inkjet or laser printer.

Scope for All in one printing solution:

After deciding which one to choose such as these from three choices such as inkjet printer, laser printer and all one printing solution you can then choose either wired networking or wireless networking computing solutions. Wired networking such as with computer and printer is on lesser cost but it can have a good option if you have one computer and one printer and is walking on a room but what if you have five computers that is connected with all in one computing networks of printer then you will have to think about wireless computing.

Wireless networking of printers comes with higher cost but it is convenient and lesser use of electricity and it does not provide strings of many wires into it. Many a time it makes the office environment very difficult to work on and if at any point of time due to whatever reasons, any wire loosens then entire process of printing stops abruptly and you have to check all of these over and over again and the calling of mechanic from time to time incur heavier costs from time to time and all the time.

With wireless networking of printers the after sales services comes in lower amount as there is hardly any chances of loosening of wires as all of these depends upon the internet connectivity and in these times faster internet comes with very little and this means all of these should with due course of time provide better amount of sustainability of costs to the user.

Some suggestions:

Ultimately, if you want to have one computer and a printer and have very small minute work to perform then you can go for wired networking inkjet printers. If yours workload of printing is on higher side then you can go for laser printer as ultimately the changes to catridge interval is higher and that means the cost factor is on lower side.

If you one computer and one printer and work load of printing is on higher side then should for laser printer. It is mostly one time cost and then the cost of buying laser come to the lower side. Then, if you have multiple computer and wants to connect all with one printer then you can go for all in one printer solution and the detail is written above with complete detail within it.

Related Posts:

1 2 3