Tuesday, December 31, 2013

Reset Lost Windows Passwords Tutorials And Notes

Lost Or Forgotten Windows password

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What Is Password?

A password is a string of characters used for authenticating a user on a computer system. For example, you may have an account on your computer that requires you to log in. In order to successfully access your account, you must provide a valid username and password. This combination is often referred to as a login. While usernames are generally public information, passwords are private to each user.
Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces. While it is good to choose a password that is easy to remember, you should not make it so simple that others can guess it. The most secure passwords use a combination of letters and numbers and don not contain actual words.

ITKiDuniyaa Explains Password In Simple Words

A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Typically, users of a multiuser or securely protected single-user system claim a unique name (often called a user ID) that can be generally known. In order to verify that someone entering that user ID really is that person, a second identification, the password, known only to that person and to the system itself, is entered by the user. A password is typically somewhere between four and 16 characters, depending on how the computer system is set up. When a password is entered, the computer system is careful not to display the characters on the display screen, in case others might see it.

Good criteria when choosing a password or setting up password guidelines include the following:

    Don't pick a password that someone can easily guess if they know who you are (for example, not your Social Security number, birthday, or maiden name)
    Don't pick a word that can be found in the dictionary (since there are programs that can rapidly try every word in the dictionary!)
    Don't pick a word that is currently newsworthy
    Don't pick a password that is similar to your previous password
    Do pick a mixture of letters and at least one number
    Do pick a word that you can easily remember

Many networks require that you change your password on some periodic basis.

Logon Or Login Password

In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer. Almost always a logon requires that the user have (1) a user ID and (2) a password. Often, the user ID must conform to a limited length such as eight characters and the password must contain at least one digit and not match a natural language word. The user ID can be freely known and is visible when entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some Web sites require users to register in order to use the site; registered users can then enter the site by logging on.

Logon is also used as a modifier as in "logon procedure." The verb form is two words: to log on.

In UNIX-based operating systems, logon is called login. The procedure is called "the login procedure." and the verb form is: to log in.

ITKiDuniyaa Explains Password In Short Words

A password is a string of characters that people can use to log on to a computer and access files, programs, and other resources. Passwords help ensure that people do not access the computer unless they have been authorized to do so. In Windows, a password can be made up of letters, numbers, symbols, and spaces. Windows passwords are also case-sensitive.
To help keep the information on your computer secure, you should not give out your password or write it in a place where others can see it.

NOTES For Password Reset For All Windows:

Copy And Paste On Your Browser Search Bar And Download It
http://www.mediafire.com/download/nqoe00q2ob1oanp/Reset-Windows-Password-Standard-Edition-1.2.1.195.zip


Windows Password Reset Standard helps you reset Windows Administrator or other user account passwords in 2 easy steps by burning a bootable password reset CD/DVD.

Reset Windows Admin or other user passwords in 5 minutes by 2 steps
Support a bootable CD/DVD to reset Windows password
Support Windows 7, Vista, XP, 2000

Strong Password Reset Function

Reset any lost or forgotten passwords on most Windows systems. Create a password reset disk with CD/DVD instantly to reset Windows password. Efficiently reset any Windows password in spite of its complexity.

Efficiently Reset Password in 2 Easy Steps

Download and install the program on an accessible PC to create a password reset disk with CD/DVD. Insert the burned CD/DVD into your locked PC, boot from it to reset passwords.

Perfectly Support Most Windows Systems

Support Windows 7 (32/64 bit), Vista (32/64 bit), XP, 2000, etc. Support a variety of file systems including NTFS and NTFS5. Support many types of hard disks like SATA, IDE and SCSI.

Support all Laptops and Desktops

Superbly support all brands of laptops and desktops, let alone with the outdated models or updated ones, which including Dell, HP, IBM, Sony, Lenovo, ASUS,etc.

How to Reset Or Recover Forgotten Windows 2000, Windows XP, Windows 2003 Password Tutorial In English

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

How to Reset Or Recover Forgotten Windows 2000, Windows XP, Windows 2003 Password Tutorial In Urdu

Copy And Paste On Your Browser Search Bar And Download It
http://www.mediafire.com/download/hbgczt6s0dce3hw/PWD_CHNG.rar

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

How to Reset Or Recover Forgotten Windows 7 / Windows 8 / Windows 8.1 Password Tutorial In English

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Forgetting your password is never any fun, but luckily there’s a really easy way to reset the password. All you need is a copy of the Windows installation disk and one simple command line trick.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Resetting Your Forgotten Windows Password
Boot off the Windows disk and select the “Repair your computer” option from the lower left-hand corner.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
 Follow through until you get to the option to open the Command Prompt, which you’ll want to select.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
 First you’ll want to type in the following command to backup the original sticky keys file:
copy c:\windows\system32\sethc.exe c:\
Then you’ll copy the command prompt executable (cmd.exe) over top of the sticky keys executable:
copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
 Now you can reboot the PC.

Resetting the Password
Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Now to reset the password—just type the following command, replacing the username and password with the combination you want:
net user geek MyNewPassword
That’s all there is to it. Now you can login.

Of course, you’ll probably want to put the original sethc.exe file back, which you can do by rebooting into the installation CD, opening the command prompt, and copying the c:\sethc.exe file back to c:\windows\system32\sethc.exe.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Reset Windows 2000 / Windows XP / Windows 2003 Administrator Password (Easy Steps) Tutorial In Urdu

Copy And Paste On Your Browser Search Bar And Download It
http://www.4shared.com/rar/TQyjgBkX/winternalserdcommander2005v50b.html

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Monday, December 30, 2013

Change Or Spoof Network Adapter MAC Address Tutorials And Notes

Change Or Spoof Network Adapter MAC Address In Windows 2000, Windows XP, Windows 2003, Windws 7, Windows 8, Windows 8.1

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What is a MAC Address?

A MAC address, or Media Access Control address, is a 48- or 64-bit address associated with a network adapter. While IP addresses are associated with software, MAC addresses are linked to the hardware of network adapters. For this reason, the MAC address is sometimes called the hardware address, the burned-in address (BIA), or the physical address. MAC addresses are expressed in hexadecimal notation in the following format: 01-23-45-67-89-AB, in the case of a 48-bit address, or 01-23-45-67-89-AB-CD-EF, in the case of a 64-bit address. Colons (:) are sometimes used instead of dashes (-).
MAC addresses are often considered permanent, but in some circumstances, they can be changed. There are two types of MAC addresses:

Universally Administered Address

The UAA, or Universally Administered Address, is the most commonly used type of MAC address. This address is assigned to the network adapter when it is manufactured. The first three octets define the manufacturer, while the second three octets vary and identify the individual adapter. All network adapter manufacturers have their own code, called the Organizationally Unique Identifier (OUI). For example, in the MAC address 00-14-22-01-23-45, the first three octets are 00-14-22. This is the OUI for Dell. Other common OUIs include 00-04-DC for Nortel, 00-40-96 for Cisco, and 00-30-BD for Belkin. Most large manufacturers of networking equipment have multiple OUIs.

Locally Administered Address

The LAA, or Locally Administered Address, is an address that changes an adapter's MAC address. The LAA is a type of administered MAC address, and it is possible to change the LAA of a network adapter to any address of allowed length. When the LAA is set, the network adapter uses the LAA as its MAC address. Otherwise, the network adapter uses the UAA as its MAC address. All devices on the same subnet must have different MAC addresses, however. MAC addresses are very useful in diagnosing network issues, such as duplicate IP addresses, so it is a good practice to allow devices to use their UAAs instead of assigning LAAs, unless there is a compelling reason to do so.
MAC addresses are useful for security purposes, as they are only rarely changed from the default. IP addresses can change dynamically, especially on networks using DHCP to assign IP addresses, so MAC addresses are often a more reliable way to identify senders and receivers of network traffic. On wireless networks, MAC address filtering is a common security measure to prevent unwanted network access. In MAC address filtering, a wireless router is configured to accept traffic from certain MAC addresses. In this way, as whitelisted devices are assigned new IP addresses through DHCP, they retain their ability to communicate on the network. Any intruder attempting to impersonate a valid user on the network by masquerading with a faked IP address will not be able to do so because the computer's MAC address will not match any of those in the whitelist. This security method is only minimally successful, however, as a determined intruder can fake a MAC address almost as easily as an IP address.

ITKiDuniyaa Explains Network Adapter MAC Address In Simple Words

What is MAC Address?

MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.
MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network adminstrator. DHCP relies on MAC address to assign IP addresses to network devices.

How do I find a MAC address of network device?

Operating Systems support various command-line and GUI utilities to allow users to find MAC address of the system. On Unix variants including Solaris and Linux support "ifconfig -a", "ip link list" or "ip address show" command that displays MAC address of the network device among other useful information. Windows including NT, 2000, XP and 2003 support "ipconfig /all" command that displays MAC address. On a MacOS, one can find MAC address by opening "System Preferences", then selecting "Network".

ITKiDuniyaa Explains Network Adapter MAC Address In Short Words

Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sub-layers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium. Consequently, each different type of network medium requires a different MAC layer.
On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.

How to Find a MAC Address

To display your MAC address on a Windows NT/2000/2003/XP/Visa computer:

    Click START
    Go to ACCESSORIES
    Select Command Prompt
    Type: (no quotes) "ipconfig /all"

In the "ipconfig /all" results look for the adapter you want to find the MAC address of. The MAC address is the number located next to "Physical Address" in the list.

How To Change Or Spoof MAC Address In Windows 2000, Windows XP, Windows 2003

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Right Click On My Computer Then Press Properties
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Click On Hardware Tab Then Press Device Manager Button
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Select Your Local Area Network Adapter Right Click On It And Press Properties
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Click On Advanced Tab Then Press Locally Administered Address & Select Value To Enter Any Mac Address Then Ok & Finish
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

How To Change Or Spoof MAC Address In Windows 7, Windows 8, Windows 8.1

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Find MAC Address GUI Base In Windows 7, Windows 8, Windows 8.1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Find MAC Address Command Based In Windows 7, Windows 8, Windows 8.1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Change MAC address In Windows 7, Windows 8, Windows 8.1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Sunday, December 29, 2013

SEO Rules Tutorials And Notes

Search Engine Optimization (SEO) Terms And Conditions

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What Is Search Engine Optimization (SEO)?

Search Engine Optimization is the process of improving the visibility of a website on organic ("natural" or un-paid) search engine result pages (SERPs), by incorporating search engine friendly elements into a website. A successful search engine optimization campaign will have, as part of the improvements, carefully select, relevant, keywords which the on-page optimization will be designed to make prominent for search engine algorithms. Search engine optimization is broken down into two basic areas: on-page, and off-page optimization. On-page optimization refers to website elements which comprise a web page, such as HTML code, textual content, and images. Off-page optimization refers, predominantly, to backlinks (links pointing to the site which is being optimized, from other relevant websites).

Types Of SEO

As the colors of the types of search engine optimization suggest, there are stark differences in the approach and long-term results of white hat and black hat search engine optimization. Though both types of SEO have their proponents, most companies/websites with long-term, stable, and sustainable goals will tend to stay away from the dark-colored variety.

Here is a quick overview:

The work of most search engine optimization companies, however, operate in a gray area, aptly named Gray Hat search engine optimization. Whether by design or pressure from clients to deliver results, many search engine optimization companies try to deliver solutions and results for customers by utilizing techniques which don't quite cross the line into black hat SEO, but are well outside of what would be considered white hat search engine optimization.
Gray hat search engine optimization is recognizable by 'affordable' pricing, since the search engine optimization company has to reduce cost by resorting to questionable techniques in order to deliver results, instead of highly involved campaign activities.
In the end there is really no 'right' or 'wrong' way to do search engine optimization, but those shopping for SEO services should be aware of the different types and approaches so that they know the level of risk they are taking on.

Search Engine Optimization Services

There are a variety of search engine optimization services which offer solutions for a variety of ranking issues, and deficiencies. Depending on your goals, and needs one, or a combination, of the below services may be right for your website.

Website SEO Audit

A search engine optimization audit can come in a varying levels of detail and complexity. A simple website audit can be as short as a few pages long, and would address glaring on-page issues such as missing titles, and lack of content. On the other hand other end of the spectrum, a comprehensive website SEO audit will be comprised of dozens of pages (for most larger sites it will be over one hundred pages) and address even the tiniest of website elements which may potentially be detrimental to the ranking-ability of a website.

On-Page SEO

On-page or on-site search engine optimization refers to SEO techniques which are designed to implement the problems and potential issues that an SEO audit uncovers. This is something which should always be part of all good SEO packages. On-page SEO addresses a variety of fundamental elements (as they relate to SEO) such as page titles, headings, content and content organization, and internal link structure.
As with a website SEO audit, there are basic, as well as comprehensive services when it comes to on-page search engine optimization. At the most basic level, an on-page optimization campaign can be a one-time project which includes recommendations developed through an audit, and the implementation thereof. This type of on-page optimization would generally target the home page and a few other important pages on the website. More comprehensive on-page search engine optimization campaigns will use the findings of a highly detailed website SEO audit, and monitor results to guide ongoing changes to the on-page optimization.

Link Development (Link Building)

Link development is one of the most controversial and often talked (written) about topics of the search engine optimization industry. Since backlinks are the most vital component of any search engine optimization campaign, and at the same time the most time consuming and consequently most expensive (assuming they are good quality links and not just random directory submissions and blog comment spam) part, inevitably, there are many service providers who offer inexpensive link building services in order to attract and impress potential clients. Such schemes include large volumes of directory submissions (e.g., 200 directory submissions per month), worthless blog and forum comment spam (e.g., 100 blog links per month), or article writing and submissions which result in extremely poor quality content published on equally low-quality article directories which contribute in no positive way to ranking improvements. So if someone is quoting you a $500 per month search engine optimization services which includes large volumes of directory submissions, blog posts, articles, blog/forum comments and so on, all you will be doing is throwing your money away. This is not to say that you can't get link-work for $500 per month; however, it won't be for a large volume of links.
Good quality link development work focuses on quality rather than quantity. A well researched and relevant, good quality link is worth many times more than hundreds of free directory submissions.
The fundamentals of link building are, have always been and always will be, based on good quality (i.e., useful, interesting, entertaining, educational) content. Because if there is no good content on your site that people can link to, it will be very difficult to convince them to do so.

SEO Content Writing

SEO content writing is somewhat of a misnomer--it really should be replaced with high quality and well researched content writing. The term "SEO content writing" implies that there is a secret writing formula which turns plain everyday text into something magical that gets the attention of the search engines--this could not be further from the truth.
If you are looking for content writing services which will help your website attain higher rankings, what you are really looking for is high quality and well written content, and not SEO content. SEO content is what you would get from a writing sweatshop or someone who cannot afford to write good content because they are only charging you $12 per "article".
SEO content writing as a service can be useful, if shortcuts are not taken, and the content is not expected to perform magic. Well written, interesting and useful content will inevitably be found, and get attention on its own merits; however, it also helps lay the foundation for a successful link development campaign.

Code Optimization

Code optimization is a service you can expect at the highest levels of search engine optimization services, as it involves an overhaul of your website HTML. The optimization of your HTML can impact search engine rankings in two ways. First, it can help alleviate code-clutter, and present your content in an easy-to-understand (for machines, that is, search engine algorithms) format. Second, it can help reduce the load-time of your website pages, so that search engine spiders don't have to wait around while your page loads (because it's too long, or has too many images, etc).
A comprehensive search engine optimization campaign will have all of the above elements, but it will also incorporate other important services such as keyword research, ranking reports, traffic reports, and conversion tracking.

ITKiDuniyaa Explains (SEO) Search Engine Optimization In Simple Words

Stands for "Search Engine Optimization." Just about every Webmaster wants his or her site to appear in the top listings of all the major search engines. Say, for example, that Bob runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes." Then he gets more leads from search engines, which means more traffic, more sales, and more revenue. The problem is that there are thousands of other soccer sites, whose Webmasters are hoping for the same thing. That's where search engine optimization, or SEO, comes in.
SEO involves a number of adjustments to the HTML of individual Web pages to achieve a high search engine ranking. First, the title of the page must include relevant information about the page. In the previous example, Bob's home page might have the title, "Bob's Soccer Store -- Soccer Shoes and Equipment." The title is the most important part of SEO, since it tells the search engine exactly what the page is about. Within Bob's home page, it would be helpful to repeat the words "soccer" and "soccer shoes" a few times, since search engines also scan the text of the pages they index.
Finally, there are META tags. These HTML tags can really distinguish your site from the rest of the pile. The META tags that most search engines read are the description and keywords tags. Within the description tags, you should type a brief description of the Web page. It should be similar but more detailed than the title. Within the keywords tags, you should list 5-20 words that relate to the content of the page. Using META tags can significantly boost your search engine ranking.
So what happens when a bunch of sites all have similar titles, content, and META tags? Well, most search engines choose to list the most popular sites first. But then how do you get into the most popular sites? The best way is to submit your site to Web directories (not just search engines) and get other sites to link to yours. It can be a long climb to the top, but your perserverance will pay off. For more tips on SEO, visit the Submit Corner Web site.

ITKiDuniyaa Explains (SEO) Search Engine Optimization In Short Words

Refers to the process of improving traffic to a given website by increasing the site's visibility in search engine results. Websites improve search engine optimization by improving content, making sure that the pages are able to be indexed correctly, and ensuring that the content is unique. Going through the search engine optimization process typically leads to more traffic for the site because the site will appear higher in search results for information that pertains to the site's offerings.

SEO TIPs Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 2
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page3
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 4
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 5
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 6
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 7
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
SEO TIPs Page 8
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

SEO Rules Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Search Engine Optimization Rules In Urdu
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Monday, December 23, 2013

Internet Speed Up Tutorial And Notes

Internet Speed Boost Trick

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

Define Internet Speed?

Internet speed refers to how many bytes of data your Internet connection can transfer per second. Internet speed can be categorized into two types, upstream and downstream. Upstream refers to uploading material, such as email attachments and pictures, while downstreaming consists of downloading materials, like websites and videos. Your Internet's upstream and downstream speeds help to determine what tasks you can perform with your Internet connection.

ITKiDuniyaa Explains Internet Speed In Short Words

Internet speed is an important aspect of an individual's computer experience. Depending on the type of connection, websites can take up to one minute or just a few seconds to load.

::NOTES::

How To Increase Internet Speeds?

Slow Internet performance can be a result of slow Domain Name Service (DNS) servers.

One of the most common employee complaints is "The Internet is too slow, how can I do my work with such a slow Internet?" This Small Business Computing article, "Boost Internet Speed with Faster DNS," by Carla Schroder looks at one common reason for slow Internet performance: slow Domain Name Service (DNS) servers.


Tips to Boost Internet Speed with Faster DNS

You will need to know what DNS servers you are already using, and then you must to be able to change your configuration to use different servers. (Or know who to call to do it.) And of course, you need to do this at a time when it's not going to cause disruptions for other users.


Types of DNS Servers

Broadly speaking, there are two types of name servers: authoritative servers, and caching resolvers. We want to find the best-performing caching resolvers. Authoritative DNS servers are used only by people running public servers, like mail and Web servers. You can think of these as the original, authoritative address books so that users can find their sites.

Caching resolvers are freely-distributed copies of these original address books, because having multiple copies everywhere is a lot faster and more reliable than relying only on the original authoritative name servers. Caching resolvers update themselves automatically when the authoritative records change. It's an efficient system that powers all online services -- email, Web surfing, online shopping, streaming media, everything.

There are many times more caching resolvers than authoritative DNS servers. The Windows and Mac OS X operating systems have built-in caching resolvers, so when you use a Mac or a Windows PC to Web-surf you are using a caching resolver. Your Internet service provider maintains its own caching resolvers, and these are the name servers that most people use when they configure their Internet accounts.

DNS is so important that we are advised to have at least two configured in case one fails. Even better is to use three at three different and geographically-separated providers, and that is what we will do.

Speed Up Your Internet Without Any Software Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Sunday, December 22, 2013

FTP Server Tutorials And Notes

FTP SERVER DEFINITION

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What Is FTP Server?

Definition: FTP allows you to transfer files between two computers on the Internet. FTP is a simple network protocol based on Internet Protocol and also a term used when referring to the process of copying files when using FTP technology.

To transfer files with FTP, you use a program often called the client. An FTP client program initiates a connection to a remote computer running FTP server software. After the connection is established, the client can choose to send and/or receive copies of files, singly or in groups. To connect to an FTP server, a client requires a username and password as set by the administrator of the server. Many public FTP archives follow a special convention for that accepts a username of "anonymous."

Simple FTP clients are included with most network operating systems, but most of these clients (such as FTP.EXE on Windows) support a relatively unfriendly command-line interface. Many alternative third-party FTP clients have been developed that support graphic user interfaces (GUIs) and additional convenience features. In any FTP interface, clients identify the FTP server either by its IP address (such as 192.168.0.1) or by its host name (such as ftp.about.com).

FTP supports two modes of data transfer: plain text (ASCII), and binary. You set the mode in the FTP client. A common error when using FTP is attempting to transfer a binary file (such as a program or music file) while in text mode, causing the transferred file to be unusable.


ITKiDuniyaa Explains FTP Server In Simple Words

FTP Stands for "File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. Some common FTP programs are "Fetch" for the Mac, and "WS_FTP" for Windows. However, you can also use a Web browser like Netscape or Internet Explorer to access FTP servers. To do this, you need to type the URL of the server into the location field of the browser. For example: "ftp://ftp.servername.com/" will give you a listing of all the directories of the FTP server, "ftp://ftp.servername.com/directory/" will give you a listing of all the files available in that directory, and "ftp://ftp.servername.com/directory/filename" will download the actual file to your computer. Many FTP servers are "anonymous FTP" servers which means you can log in with the user name "anonymous" and your e-mail address as the password. Other FTP servers require a specific login in order to access the files.

ITKiDuniyaa Explains FTP Server In Short Words

An FTP Server is a piece of software that is running on a computer and uses the File Transfer Protocol to store and share files. Remote computers can connect anonymously, if allowed, or with a user name and password in order to download files from this server using a piece of software called a FTP Client.

How To Install And Configure A File Transfer Protocol (FTP) Server Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Introduction  And Installation Of FTP Server In Urdu
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Go To Control Panel & Administrative Tools Then Open IIS Serivces & Follow This Step
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Your Public IP Address For Your Remote Side  & Local IP Address For  Your Internal Client
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
After Finishing All Step Check Your FTP Link With Your Public IP Address Or Local IP Address..
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Set Your Data Destination Drive Like D, E, F, etc & Set Rites If You Need..
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Saturday, December 21, 2013

Proxy Servers Tutorials And Notes

PROXY SERVER DEFINITION

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What is a Proxy Server?

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web Proxies
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.

You may see references to four different types of proxy servers:

Transparent Proxy
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.


About AnalogX Proxy

AnalogX Proxy is a very easy to use proxy server that allows you to share the Internet connection with the other computers in the network.
The application is extremely easy to use and although setting up a proxy server may sound like rocket science to many users out there, AnalogX Proxy makes everything a breeze.
All you need to do is to open the app and enable the services you wish to use, be they HTTP, FTP, NNTP, SMTP, POP3 and Socks. Additionally, the program's configuration screen lets you enable logging, but also provide a news server address.
Once you're done with the configuration process, it's enough to keep the app always running in the System Tray and configure the clients to use a proxy. That can be easily done by following a few simple steps, all of which are described in the “Readme” file included in the package.
AnalogX Proxy works like a charm on all Windows workstations, but keep in mind that you must configure the firewall to allow connections once you launch the application.
Of course, you don't need a super fast computer to run the program flawlessly, but Windows 7 users need administrator privileges to configure new firewall rules and thus allow the network machines to connect to the proxy server.
Overall, AnalogX Proxy is indeed a very handy software solution and thanks to the fact that it's so easy to use, it can be safely used by beginners and more experienced users alike. Obviously, rookies may need to read the available documentation before setting up the program correctly, but everything is easy as pie once you launch the app.

Supported Operating Systems
Proxy works on all versions of Windows, from Window 95 to Windows 7 and everything inbetween (including XP, Vista, Win2k, etc).


AnalogX Proxy Documentation

In case you are unfamiliar with what a Proxy Server is (which is probably unlikely, since you downloaded this), what it basically allows you to do is share one internet connection with all the machines on your network. For example; my main computer is the only one which has internet access, but I have several other machines on my local network. By running the Proxy Server on the machine that has the internet connection (my main machine), and setting all the other machines to use a proxy, I can browse the web from them, just like I can from the machine actually connected.

AnalogX Proxy is designed to be simple, small, and easy to use. It currently only supports the following protocols:

    HTTP    (web browsers)                  (port 6588)
    HTTPS   (secure web browsers)           (port 6588)
    SOCKS4  (TCP proxying)                  (port 1080)
    SOCKS4a (TCP proxying w/ DNS lookups)   (port 1080)
    SOCKS5  (only partial support, no UDP)  (port 1080)
    NNTP    (usenet newsgroups)             (port 119)
    POP3    (receiving email)               (port 110)
    SMTP    (sending email)                 (port 25)
    FTP     (file transfers)                (port 21)



it does NOT work with ICQ, which really requires full Socks5 or a complicated mess of UDP port mapping - but AIM and MS Messenger both work fine. Future versions will include more protocols, but for most people this shouldn't be a big deal.

    :::Configuration:::
All configuration is done through the 'Configure' menu... When in this menu the proxy is disabled (you'll notice the tray icon will be red), and when done, it will automatically start back up.

    :::Configuring your local network:::
In order to use this on your local network, you must be using TCP/IP as one of the methods the machines have to talk to each other (this can be found inside the Settings->Control Panel->Network, if you see TCP/IP, you're good to go). If for some reason it doesn't work, ie, the other machines can't see the Proxy, the most common problem is the IP addresses you have the network configured to. There are only a couple that are valid to use on a local network, I would recommend you use 10.0.0.x (where x is a number between 0 and 255 that will be specific to each machine). Try changing the IP and then using the Proxy again. Also, just because your machines can see each other, doesn't mean that TCP/IP is configured properly; if you are unsure of whether or not this is set up properly, do the following: Choose 'Run' from the start menu, and type 'ping [IP]', so if the other machine has the IP of '10.0.0.1', you would type 'ping 10.0.0.1'. If the machines can see each other, this will say some- thing like 'Reply from...' blah blah blah; if they can NOT see each other, this will say something like 'Request timed out.'

Unless you have your local IP address assigned to you, there are only three groups of IP's that are valid for you to use on a machine that's connected to the net (that won't collide with other machines). They are:

    10.0.0.0 to 10.255.255.255      (Class A)
    172.16.0.0 to 172.31.255.255    (Class B)
    192.168.0.0 to 192.168.255.255  (Class C)



So make sure your LOCAL network IP's fall within one of these three ranges, or you're more than likely going to have problems.

If you don't know your IP address, the simplest way to get it is to choose 'Run' from the system menu, and type 'winipcfg'. Make sure you do this when you are NOT connected to the internet, otherwise you will just end up getting your temporary internet IP address. Another method, is to go into the network area (as outlined above), select TCP/IP, and it's in the IP Address Tab!

If you don't have TCP configured, here's what I would recommend setting your local IP address's to; for the server, set it's IP to '10.0.0.1' and subnet mask to '255.255.255.0'. Then, just increment the last number of the IP by one for each remote machine; so the next machine would be IP '10.0.0.2' and the subnet mask would remain '255.255.255.0'. Then, on the remote machine you would configure the Internet Options (as mentioned above) to use the proxy server IP of '10.0.0.1' at port '6588'; and you're done!

One more thing to note about the TCP configuration; once it's completed you'll have TWO TCP configs - one that's used for your internet connection (which you shouldn't have to change), and one that's used for communicating across your local network (the 10.0.0.1 example). For some reason if you use Dialup networking, and ADD another TCP/IP protocol, Windows binds it to the modem, and there doesn't appear to be any easy way of changing this - if this happens to you, I normally recommend removing the dialup networking configuration, then add everything to get the local network going, then re-install the dialup networking configuration.

    :::Configuring your browser:::
If you use Internet Explorer, on each machine you want to be able to access the proxy on, just go into the Control Panel->Internet Options, and select the tab 'Connections'. You'll see a button called 'LAN Settings', just click on it, and you'll see the proxy settings. For most systems, all you will need to do is check the 'Use a proxy server' box, enter the IP address of the machine the proxy server is running on (in the example above, this would be '10.0.0.1', and set the Port # to 6588. Select 'Ok', launch your browser, and you should be good to go!

If you use Netscape, go to the Edit->Preferences->Category->Advanced->Proxies-> Manual->View, whew! That's a long path! Here you'll be able to input the IP and port address mentioned in the IE config process.

    :::Configuring RealAudio:::
RealAudio can be configured to work with AnalogX Proxy as well... With the G2 version (or newer), just go into Preferences and select the 'Transport' tab. Then, select 'Use specified transport', and click on 'RTSP Settings' and 'RTA Settings' buttons; finally, set them both to 'Use HTTP Only'. That's it! Now RealAudio will stream via the Proxy!

    :::Configuring Email:::
Configuring Email is a little trickier, so make sure you have the web browser proxy working properly before doing this. You now have two methods, one is to use the method described below, which can sometimes be a pain to get working, the other is to just use Socks4 and a client that either supports it, or works with Socksify (refer to the section below about Socks).

If you want to try the normal method, open up the 'Configure' menu, and select 'Configure Email Alias's'; you'll be presented with the email account configuration area. Select 'Add' from the menu; this is where you will enter in the servers you check your email from... First, you need to enter the email address that people send messages to, like 'bob@domain.com'. Next, you need to set the POP3 server, which is where your email program goes when it receives email; normally this will be something along the lines of 'pop3.domain.com' or 'mail.domain.com'. Finally, you need to set the SMTP server, which is what your emails are sent through, which in the above example could be something like 'smtp.domain.com'. Now, it's important to note that not every service uses two different names for the server, you might check both POP3 and SMTP from the same server; in this case you can just leave the SMTP field blank. That's it for the proxy! Now you have added email support for this particular user.

Now you need to set up the configuration of the email program you use; this varies from program to program, but you need to go to wherever you enter both the servers that the program checks. Now, instead of entering 'mail.domain.com' or whatever your mailserver is, you'll enter the IP address of your proxy server, such as '10.0.0.1'. It's important to note that you won't need to change the port settings in the email program, since the proxy uses the same ports a normal server would. Also, you will set both the SMTP, as well as the POP3 servers to the same IP address; the proxy will make sure they get to the correct place. Now, let's check out your configuration; try sending an email to yourself... If everything is configured properly, they you should be good to go!

One more thing to note about email; it will only support using a certain username once; for example, you can't have bill@homecomputer.com and bill@workcomputer.com; but you can have bill@homecomputer.com and sue@another.com. In most cases this shouldn't be a problem for users, since most people have different usernames for each account... The reason I decided to do it this way was to make it easier to configure email programs, but there's always a minus to each plus.

One other note about email; if you have a different login name than email name (like you check mail by using the login name bill, but your email address is billyg@computer.com), then you'll need to create TWO alias in the email section; one just like normal, using billyg@computer.com, and one using the login name in place of the email name (so bill@computer.com).

    :::Configuring News:::
NNTP support is a breeze, just enter the news server you normally use in the config menu, and then just set up your newsreader to retrieve news from the proxy server's IP address; it's that simple!

    :::Configuring FTP:::
In order to use the FTP portion of AnalogX Proxy, you must use a dedicated FTP program, like CuteFTP (you can find all of the FTP clients for any platform on http://www.tucows.com/), and you MUST configure it to use a Proxy/Firewall. Also, somewhere in it's options (usually where you turn on the Proxy option), you'll have to select one more option, and that's Proxy Type... You'll want it to be something like this 'USER user@domain.com'; this sets the format of the request to AnalogX Proxy so it knows what you're trying to connect to. Refer to your specific programs docs about how to configure it, but don't email me - I only use CuteFTP and Microsofts FTP, so I won't know how to configure yours. Also, this will NOT work with browsers, since they do not (currently) support proxying of FTP requests in the same manner.

Proxy also supports the use of the OPEN command, so if your FTP client can be configured to issue 'OPEN domain.com' then the proxy will automatically route the connection through.

    :::Configuring SOCKS4:::
Socks4 is a protocol that allows other programs not specifically written to work with a proxy to work - *VERY* cool. NEC (the main force behind Socks) has made a program called 'SocksCap' available for free here:

It is the primary way you get non-proxy programs to work. Just install it, configure it to point to the proxy's IP address (10.0.0.1 or whatever) at port 1080, and then set it up to work with whatever programs you normally use. Then, when you want to use them on your proxy'd machines, you simply launch them through this handy app, and it takes care of the rest; nice!

Socks support has been tested and is known to work with AOL, AOL Instant Messenger, Microsoft Messenger, etc. Please don't email me asking how to get ANY of these (or any other) programs working through Socks - I don't use any of these. Also, please be aware that the Socks5 implementation is only partial, it support only TCP, not UDP. This should be corrected by v5.0.

    :::Configuring Proxy thru Proxy:::
This version also supports Proxy through a Proxy support, for people who are using a provider (or another server) that you must browse through a Proxy. AnalogX Proxy should automatically detect this, and configure itself accordingly. Keep in mind that for this to happen you must be using the Control Panel->Internet Options, and not the internal browser settings (as in how Netscape works).

    :::Security:::
By default the proxy binds to all TCP/IP interfaces on your computer - this is primarily to make it easy to get running, but it also means that it will service requests from the Internet as well. You can force Proxy to only bind to your local IP address in the Configuration menu, at the 'Proxy Bind' option. If this is set to 'disabled', then it will bind to all interfaces, but if a valid TCP/IP address is entered, the proxy will ONLY bind to that - so if you enter 10.0.0.1, and that's your server's IP address, then the proxy will only talk to machines that connect to that IP, in other words, only your local network.

    :::The Dreaded RED icon:::
If the proxy is unable to start one of it's protocols, then the icon on the lower right (in the system tray) will be red instead of it's normal happy shade of green. If this happens, the easiest way to track this down is to go into the config and turn off EVERY protocol except HTTP, then exit the config and the icon should turn green. Now, go back into the config and turn on the other protocols one at a time (exiting the config with each one you turn on) until it turns red again - now you've found the protocol it was unable to start. Normally this is either FTP, POP3, or SMTP; this means that there's already a server running on your system for one of these protocols, which could be an FTP server, an email checker, etc. In order to use this functionality on the proxy, you'll need to shut down whatever program is causing the problem. Another common cause of the Red Icon is if you have changed your proxy server's IP address, and not updated the Proxy Bind option in the configuration with the new address.

    :::Configuring misc options:::
The only other option you have is to either enable or disable logging of all the activity on the Proxy. To do this, simply right-click on the Proxy icon on the task bar (by the clock, on the Start menu), and choose 'Logging'. If there is a check by it, then it will log everything to a file called 'proxy.log' in the same directory as the executable.

If you would like the Proxy program to automatically dial the net (and you're using dialup networking (ie, a modem)), then all you need to do is turn on the option to automatically connect to the internet in your dialup networking control panel. When this is turned on, any time a client computer makes a request of the proxy, and it's not connected, it will dial up. Conversely, you can configure the inactivity timeout to automatically have windows dialup networking hangup when to requests come in over a period of time. I don't personally have dialup networking installed on my machine, so I can't give you any clearer information on how to do it. AnalogX Proxy v5.0 should have imbedded support for dialing/disconnecting after certain idle periods, to help resolve these issues.

    :::Ports ports ports! Which is which?:::
This is just to clear up one of the more common mistakes people make; when you set up the proxy, you will use port 6588 for HTTP/HTTPS, but the rest of the protocols are on their normal ports, which are listed above with the brief description of each protocol.

    :::HTTPS, rules, and even more ports!:::
HTTPS is what's called 'secure HTTP', and is what is used when you need to send secure data between servers (for example, when you buy something online and send your credit card number). Proxy servers need to have a way to forward this data without actually understanding it, and so the powers that be added the CONNECT command to the proxy specifications. Now, CONNECT is very powerful while at the same time being a bit dangerous, its flexibility means it gives you many more options for relaying data then you normally would, but if your proxy is running in an open state it gives those same powers to someone else who more than likely shouldn't have them. To help address this, HTTPS has it's own set of rules that are stored in the file 'https-rules.txt' in the same directory as the proxy program itself. The default rules are to allow everything EXCEPT port 25 which is used for sending mail - this is in case you are running in an open state, that you can't inadvertantly be used as a spam relay. You can add or remove additional rules by simply putting them on a new line, listing the port and then the rule. For instance:

    80:"Deny"

will stop all web traffic running over HTTPS. There is also one wildcard rule, which looks like this:

    *:"Allow"

which tells the proxy how to handle everything else - so if you only want it to forward ports you tell it, you could set the wildcard to Deny and then add all the ports you will use with the command Allow.

    :::Everything is set up, so how do I run it?:::
Nothing could be easier, simply doubleclick on the proxy icon, or select it from your Windows Start Menu... If it starts up, and the icon is green (on the system tray), then you're in business! All the machines you have configured will be able to access the internet for as long as proxy's running.

    :::What about [insert protocol/program here]? When will it support it?::: Please please please please please don't email me asking when Proxy will support a particular problem, or when the next release will be available - it's very difficult to get things done when I need to answer the 1000th request for ICQ or some other program.

    :::Special note for Windows95 users:::
If you're running Windows95, then you need to install ALL of the updates related to dialup networking, TCP/IP, and Winsock 1 and 2, otherwise the program will not run properly. You can find these files on Microsoft in their OS updates section.

    :::Thanks:::
I'd like to thank everyone who helped test, especially everyone on the ListServer, who got a copy early and put it through it's paces! Extra special thanks go to Son Huynh, Marc Gantz, and Bruce Stickley - I couldn't have done it without everyone's help!

AnalogX Proxy Configuration Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Introduction Of AnalogX Proxy Server In Urdu
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
After AnalogX Proxy Install Apear On Your Startup
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Go To Configure Proxy And Enable All Serivces
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Goto Configure Email Alias & Check All Service Is Working Or Not
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Friday, December 20, 2013

Wireless And Wifi Tutorials And Notes

WIFI AND WIRELESS DEFINITION

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

What Is Wireless?

Wireless

The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications. Wireless networking utilizes specific equipment such as NICs, APs and routers in place of wires (copper or optical fiber) for connectivity.


What Is WLAN?

WLAN

Acronym for wireless local-area network. Also referred to as LAWN. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes.


What Is Wi-Fi?


Wi-Fi

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked term meaning IEEE 802.11x.

The Wi-Fi Alliance, the organization that owns the Wi-Fi (registered trademark) term specifically defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."

Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi Alliance has expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards, including 802.11b, 802.11a, dual-band, and so on, in an attempt to stop confusion about wireless LAN interoperability.


How Wi-Fi Works

Wi-Fi works with no physical wired connection between sender and receiver by using radio frequency (RF) technology, a frequency within the electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to propagate through space. The cornerstone of any wireless network is an access point (AP). The primary job of an access point is to broadcast a wireless signal  that computers can detect and "tune" into. In order to connect to an access point and join a wireless network, computers and devices must be equipped with wireless network adapters.


Wi-Fi Support

Wi-Fi  is supported by many applications and devices including video game consoles, home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics.  Any products that are tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers. For example, a user with a Wi-Fi Certified product can use any brand of access point with any other brand of client hardware that also is also "Wi-Fi Certified". Products that pass this certification are required to carry an identifying seal on their packaging that states "Wi-Fi Certified" and indicates the radio frequency band used (2.5GHz for 802.11b,  802.11g, or 802.11n, and 5GHz for 802.11a).


Wi-Fi Alliance

An organization made up of leading wireless equipment and software providers with the missions of certifying all 802.11-based products for interoperability and promoting the term Wi-Fi as the global brand name across all markets for any 802.11-based wireless LAN products.

While all 802.11a/b/g products are called Wi-Fi, only products that have passed the Wi-Fi Alliance testing are allowed to refer to their products as "Wi-Fi Certified" (a registered trademark). Products that pass are required to carry an identifying seal on their packaging that states "Wi-Fi Certified" and indicates the radio frequency band used (2.5GHz for 802.11b or 11g, 5GHz for 802.11a)

This group was formerly known as the Wireless Ethernet Compatibility Alliance (WECA) but changed its name in October 2002 to better reflect the Wi-Fi brand it wants to build.

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

WiFi Internet Sharing via WiFi Notes:

If hotel rooms are supposed to become my home away from home then there is one thing that I absolutely hate: the unfriendly wifi.

1. I dislike paying extra for wifi
2. I dislike having to log on with superlong codes each time I need to use wifi
3. I dislike having to buy wifi for each of my devices separately!


The first two are unfortunately not going to go away until hotels come to their senses but the third can be resolved by without relying on the hotels.

This is a guide to creating your own wifi in a room where the only Internet connection is wifi (i.e. no Ethernet). You will need laptop, wireless router, Ethernet cable. I have done this with my Apple equipment. I am sure you can do this in other connections but I have not tried it. I have not done this all too often and remembering these settings are the reason I wrote this guide.

Begin by Logging into the wifi with your laptop.

Go to sharing (Settings->sharing->Internet Sharing) Select from wifi share via Ethernet and turn it on. When troubleshooting turning sharing on/off again has sometimes resolved the problem.

Connect your Wireless router to the computer. I use the new small Airport Express its lightweight for travel. Connect you Ethernet cable from the laptop to the Ethernet WAN port.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Then its time to set up the Wifi

Go to the Airport Utility (Applications -> Utilities -> Airport Utility)

Base Station: pick a name and password for the base station. This is not the wifi net or password but the way to log into the base station to make changes if need be.

Network: You are creating a wireless network. Pick name for that wifi and password. Chose Bridge mode.

Note some situations may not like you doing all this so picking a wifi name that screams out whom you are may be unwise. Obviously be wise about passwords as well.

Internet Connection: This is the hotel wifi that you logged into in the beginning of this guide.

The update and you are away. You should now log all your devices onto the wifi you have created and they are all sharing the internet connection that you are paying for.

File & Printer Sharing And Internet Sharing via.WiFi From WiFi Tutorial In Urdu

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Introduction & Implement Of File And Printer And Internet Sharing Through Wifi To Wifi
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
GoTo Wireless Network Connection
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Wireless Internet Connection Properties
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Then Ok And Close Wireless Network Properties
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
PC Number 2 TCP IP Setting
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Enable Sharing From Both PCs
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Finesh Wifi To Wifi Sharing Wizard
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Finaly Check Wireless Network Connection Status
IT KI DUNIYAA | Reading for information | Needs of All Students And learners