Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

.SPEED UP BOOT BY DISABLING UNUSED PORTS


Many computers take a lot of time to boot (or start ).This is due to many reasons.


Some slight changes can do wonders for your system:


1. Press start->run then type msconfig and press enter.


Go to the startup tab. Here you will see a list of startup items. These are all the programs that automatically start when you boot your PC. It is these that slow down the boot up process.
                                 So uncheck all the unwanted items like ms-office, messengers other utilities that u may not need at startup). Don't uncheck your antivirus software.


Restart your Pc to and see for yourself, your pc will now boot faster....  
    
2. A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option is enabled, but on some systems it is not, so below is the information on how to turn it on:


Go to Start Menu and Click Run
Type in regedit then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to Y .
Reboot your Pc and see the change yourself.

3.SPEED UP BOOT BY DISABLING UNUSED PORTS.!!
You may have tried many tweaks like modifying windows XP start-up applications, prefetches, unload DLLs method, etc. And yes those methods do work for me.
 I have just accidentally found out another 
way to give you an extra boost in windows XP's boot performance. 
This is done by disabling your unused devices in Device Manager.
 for example, if you don't have input devices that are connected
 to one of your USB's or COM ports, disabling them will give you 
an extra performance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.

Turn off Computer


Start=>Run


Type Code:        at 11:35 shutdown -s


To cancel or Abort the shutdown:


Type Code:                   shutdown -a


Type  Code:  “shutdown –s –m\\computername –t60”. 
This command will shutdown the computer on network  if you have administrative access.  Here computer name  needs to be replaced by the exact computer name of the computer on the network to work.

Employee Monitoring Software - OsMonitor


Employee Monitoring Software - OsMonitor
OsMonitor Employee Monitoring Software Records internet & computer activity, monitors and restricts computer usage to increase efficiency and ensure the security. It will help you to find out what employees are doing like visiting some websites, chat with friends, send email and the applications used when they are assumed to work. OsMonitor monitoring software is good at helping you control over your employees during the office hours. Easily track their activity, so they will use network for work only.
With today's businesses constantly attempting to increase employee efficiency, employers are becoming more concerned with improving their employees' hourly productivity and are using the most current technology to achieve these goals Employee Monitoring Software is a common software used by many business companies for the goal to monitor their employees' use or misuse of the Internet during working hours. This allows employers to find out the truth about what their employees are doing during the office hours. Employers often benefit from records in case they discover that company confidential information is being leaked or other inappropriate conduct is occurring on company's computers.
OsMonitor Employee Monitoring Software Option
Monitor and record all windows your employees opened, programs they ran, websites they visited .You will control your employee's work state as well as your fingers. All the records can be saved on Server database for your later reviewing at anytime. You can also export the important record and save it in your computer.
Monitor and record users copying, pasting, deleting files and plugging and pulling out flash memory disk. The names of files they copied, deleted pasting and copy to there flash memory disk will be recorded by OsMonitor. You will be able to know what the files they proceed in the work time.
Monitor and record network card flow of every employee's computer in real time. When they downloaded or uploaded something the network card flow must be abnormal, so you can pay attention on this computer at this time.
Screenshot capture. You can view employee's screen (motive picture) on Server at any time. The function of screenshot capture can record almost everything happened in the employees' computers. What the programs they ran, the files they received and sent, the emails they replied and the content they chat with customers or friends.
Monitor application installation. You can view what software are installed on your employee's computer on Server at any time.
Monitor process. You can check what software is running on your employee's computer from Server at any time and you can end process that have nothing to do with work you just need some click.
Monitor chatting conversation. Monitor and record all ICQ conversation, MSN conversation and Yahoo Messenger conversation. You can choose whether monitor the conversation of MSN or ICQ but if you need to monitor, OsMonitor will show every word your employees said from this instant messenger.
Backup files. Backup automatically all increased and modified work files (word document, program code, etc. ) on Server from your employee's computer.
Monitor emails. Monitor and record all emails (and attachment) sent through Outlook Express or Outlook, whatever they said and the attachment will all be recorded by OsMonitor. You can check whether they said something that is related with company secret.
Monitor system information. The hardware information, hard driver usage information and the memory usage information were monitored by OsMonitor, when you get the computer usages you will know which one is being abused.  

OsMonitor Employee monitoring software helps and allows company administrators to monitor and supervise all their employee computers from a central location server with a secret mode. It is normally deployed over a business network in seconds and allows for easy centralized log viewing via one central networked Personal Computer. The people will never find that they are being monitored and you can get some information that you can never get from an ordinary way.

OsMonitor Employee monitoring software is used for the real time monitoring and continuous tracking of users' activities on network connected computers. Remotely and in real time you get: screens of the remote computers, visited Internet sites history, used applications etc. By this software you are able to record all activity to the log file and do much more with this powerful and easy to use program.


Difference Between x86 and x64


Difference Between x86 and x64

• Categorized under Technology
Computer technologies are constantly evolving, and if we base our predictions to Moore’s law, it would keep going for decades to come. The fast paced development of computer hardware is largely due to the voracious appetite of the consumers for better and faster components. Whenever developers hit a roadblock that limits the further advancement of the current standard, we see a sudden shift to a new standard. This is what is happening between x86 and x64.

x86 is a very old technology that started with the 8086 family of processors. It has now evolved into the x86-32 version which is the most common version and its successor the x86-64 or more commonly known as x64. The move gradual shift to x64 has started quite early while there were still no major drawbacks seen in the pc market. This is because the first market to experience the problems related to x86 was those who run high end servers.

Running a system that has 32bit architecture means that you are always limited to what 32bits can point to. In this case, the problem stemmed from memory. A 32bit long pointer could only point to a maximum of 4.2billion addresses which is just about 4GB of memory. As such, it can only allocate up to 4GB of memory to a certain program even if it has 16GB of memory available. This limitation may never be a problem for a home setup but in a server environment, it presents a huge problem. That’s why x64 processors appeared very early for the consumers.

The x64 architecture still follows what x86 has but it improves on it by having 64bits in every address. This means that the memory capacity of the x64 architecture is the square of 4.2billion, which for now is an unimaginable amount of memory. That coupled with certain enhancements makes the x64 architecture a certainly great processor to replace its predecessor.

The problem with x64 is that the software for it isn’t really there yet. Although there are already operating systems that try to take advantage of the x64 architecture, most do not and there are even some that won’t run on an x64 OS. Eventually, the software meant for x64 architecture would arrive and all the 32bit hardware and software would become obsolete. But for now, the x64 architecture is still haunted by software incompatibilities that limit its appeal to the general public.

The last feature of the x64 architecture is its absolute backwards compatibility with the x86. So that even if your processor is x64, the user wouldn’t notice any difference as long as your OS is 32bit. This could be good since once the software arrives, you would only need to update your OS and software since the hardware is already there.





Configuring mksysb image on system backup tapes


Configuring mksysb image on system backup tapes
Use the mksysb command to ensure that the boot image, BOS Installation/Maintenance image, and the table of contents image are created with a tape block_size value of 512.
Bootable mksysb tapes comprise the following images:
·         Boot image
·         BOS Installation/Maintenance image
·         Table of contents image
·         System backup image
The system backup image is the actual backup of the files in the rootvg in all JFS-mounted file systems.
The boot image, BOS Installation/Maintenance image, and the table of contents image must be created with a tape block_size value of 512. The mksysb command ensures that the block size is 512 when these images are created. There are no restrictions on the block size used for the fourth (system backup image) on the tape. The block size of the system, before it was temporarily set to 512, is used for the fourth image on the tape.
The value of the block size must be saved in the /tapeblksz file in the second image on the tape. The second and fourth images are stored in backup/restore format. Again, mksysb ensures the correctness of the tapes created by using the mksysb command.
If there are problems with the bosinst.data file, the image.data file, or the tapeblksz file, these files can be restored from the second image on the tape and checked. These files, as well as commands necessary for execution in the RAM file system (when running in maintenance mode after booting from the tape), are stored in the second image.
Restoring a file from the second image or tape

Connection of internet through mobile


Connection of internet through mobile

Wireless routers with built-in switches are everywhere. Although there are differences between the routers, they have largely the same features. This guide provides a summary of the common aspects of the routers currently on the market. Reading your router manual is still necessary to know exactly what features your router has and where they are located, but reading this will give you an idea of what to expect before diving into the manual.

What is a router?
A router is any device that acts as a gateway between 2 or more separate networks. In our case, that means that the local network is connected to the Internet, and vice versa. The router ignores traffic local traffic or traffic it is not configured to handle, but when Internet access is attempted from within the local network, it springs into action. With NAT (Network Address Translation), the router shares the Internet connection to all the computers connected to the local network. The router keeps track of the originating local computer and manages the connection with the outside Internet server. If a computer on the Internet attempts a connection with the router or to a local computer past the router, the router denies the connection unless the router was specially configured to allow that connection.

Many routers can treat the wireless LAN (WLAN) as a separate network from the wired LAN. This is often done because wireless networks are easy to break into. The idea is that people can keep their wired computers away from the untrusted wireless network. The router will still share the Internet connection (WAN) to both the wireless and wired LANs, regardless of this configuration.

WAN connection

WAN stands for Wide Area Network. With a wireless router, it is used for the Internet connection. All of the WAN settings are the settings for the Internet-facing side of the router.

Router MAC Address (Clone MAC address)

A MAC address is a hardware identifier that is roughly unique. Many companies, especially cable ISPs, must store the MAC address of the router or Internet-facing computer, and they are configured to only allow that MAC address to connect to their network. If that is the case, your two options are to notify your ISP of the new MAC address or set the router’s MAC address to the MAC address of the previously Internet-facing router/computer.

Routers will show the router’s current MAC address and offer a form to change the MAC address. Enter the MAC address if needed.

DHCP client

All routers have a DHCP client (also called “Dynamic IP address”). DHCP is the protocol that automatically configures an IP address, netmask, gateway, and DNS addresses. The DHCP client gets the router’s IP address and other network info. Usually, this is just a radio button to select if this is how your ISP offers connection info. Most cable ISPs use this method.

Static IP

If your ISP provides a static IP, then fill in the IP information they provided you with when you signed up. This includes the IP address, netmask, gateway, and DNS addresses. Most T1/T3-type connections and business DSL services provide static IPs and use this method.

PPPoE

PPPoE stands for Point-to-Point Protocol over Ethernet. PPP is the technology used for dialup Internet access. PPPoE works similarly except it works over a network connection. Most DSL ISPs now use PPPoE. You’ll need to enter your PPPoE username and password. Some ISPs also require a service name to be entered. Usually, you do not need to enter the IP/DNS addresses. However, if you have a static IP through PPPoE, then you will need to enter your IP and DNS addresses your ISP provides.

PPTP

Not every router supports PPTP connections, but many do. PPTP stands for Point-to-Point Tunneling Protocol. PPTP is used to join 2 networks using the Internet as an intermediary network. It allows your home computers to connect to your work network over the Internet. It is also commonly used by xDSL ISPs in Europe. The key is to enter the PPPTP userID, password, and PPTP Gateway IP address. The IP addresses, subnet mask, and default gateway may or may not be required.

DNS

Some routers break the DNS addresses into their own setup. Just enter the IPs for the DNS servers your ISP provides. There are also many DNS servers that can be used from any connection. You can search for those DNS servers with Google.

LAN

The LAN settings are for your Local Area Network. This is the settings section for the local computers connected to the router. This includes setting up the local IP for your router and configuring the DHCP server so your computers can be automatically configured via DHCP, rather than requiring manual static configuration.

Set router IP

This IP is the IP your local computers see the router as. Generally, you’ll want to use an IP inside one of the reserved IP address ranges. Router IPs typically end in .1 or .254. The most common home router IP is 192.168.2.1.

DHCP server

A DHCP server provides automatic configuration to computers that are connected to it. It assigns an IP address to the computer, and gives it the network netmask, gateway IP, and DNS IPs. If you choose to disable the DHCP server, you can configure your computers manually to use the router. That is generally more complicated, so I generally recommend enabling the DHCP server.

The starting and ending IP addresses determine what the range of IP addresses will be assigned to the local computers. It is a good idea to give a larger range than the computers you have. Doing that means you won’t have to worry about running out of IP addresses.

The lease time determines how long a specific computer will be assigned a specific IP. This can be as short as a few minutes or as long as months. If you want to make sure that your computers keep the same IPs for a long time, then set a long lease time.

startMiner - free and simple next generation Bitcoin mining software
BitMiner - free and simple next generation Bitcoin mining software