Monday, March 17, 2014

3 Ways to Use One UPS on Multiple Computers

ups icon

Most computer users would know that properly shutting down a desktop PC is very important to prevent your files from getting corrupted and it also minimizes the risk of damaging the hard drive. However, there are times when things are just out of your control such as an unexpected power failure or your kid pulling the plug out of the socket which causes a forced shut down. One way to keep your computer running when there is no electricity, giving you enough time to properly shut down your computer, is by using a battery backup known as Uninterruptible Power Supply (UPS).

8 Ways To Remotely Turn On Computer from LAN and WAN

wake on lan icon

Wake-on-LAN (WOL) is an Ethernet computer networking standard that allows a shut-down computer to be turned on remotely. Most recent motherboards that have an integrated Ethernet controller that supports this feature. You can enable the Wake-on-LAN feature in the Power Management section of the motherboard’s BIOS. There are two ways of how Wake-on-LAN can work. The first one is you want to turn on a computer on the same local area network and the second one is you want to turn on a computer in another location through the internet.

5 Methods to Shutdown Remote Computers from LAN or WAN

shutdown-icon

It is possible to turn on a remote computer by using a 3rd party Wake On LAN (WOL) tool that is able to send a magic packet. Logically the computer will have to be plugged in to a power point so that there’s electricity to boot up the computer and keep the computer running. Turning off or shutting down a remote computer is also possible and it is actually much easier since the computer is already booted up and assumed is connected to the network. There are a few different methods to remotely shut down, restart or log off a user from the computer, each with its own pros and cons.

Tuesday, March 4, 2014

12 Softwares to Turn your Computer into Video Surveillance System



Webcams are very common nowadays and most, if not all modern laptops come with one built-in at the top center above the screen. It can be used for a lot of different purposes such as making a video call (chatting, demonstration, conference, webinar), taking pictures of yourself and even logging in to a computer using face recognition. A webcam can also be used as a surveillance camera by installing the correct software and configuring it to automatically record videos, notify you via email and perform custom actions when a motion is detected. This allows you to setup a powerful home based CCTV to monitor a section of your home which is most likely a source of break-ins without spending unnecessary money to install an expensive complete home surveillance system.

Wednesday, February 5, 2014

What’s the Difference Between Ad-Hoc and Infrastructure Mode?




Not all Wi-Fi networks are created equal. Wi-Fi access points can function in either “ad-hoc” or “infrastructure” mode, and many WI-Fi-enabled devices can only connect to infrastructure-mode networks, not ad-hoc ones.
Wi-Fi networks in infrastructure mode are generally created by Wi-Fi routers, while ad-hoc networks are usually short-lived networks created by a laptop or other device. But it isn’t always so simple.

8 WiFi Scanners to Discover Hidden Wireless Networks





 
Most of the wireless routers today comes with some security feature such as security encryption (WEP/WPA), MAC address filtering, lowering transmission power, disabling DHCP & use static IP, and hiding of SSID to help keep your wireless network safe from intruders. Each wireless security mechanism helps to increase the difficulty of unauthorized users from hacking in to your wireless networks but surely does not prevent the determined ones. In this article we will be focusing on one of the option “Broadcast SSID” found in most wireless routers.

3 Free Tools to Restrict or Limit Internet Download and Upload Transfer Speeds


The amount of software on the average computer that wants to access the internet for updates or because it requires internet access to function is growing all the time. Unless you have a super fast internet connection, when you have something that requires a lot of bandwidth, it will often slow other things down that are also using the internet. For instance, downloading files through a web browser and playing an online game at the same time could limit the game’s performance and make it nearly unplayable with high pings because the browser is hogging the bandwidth leaving very little for the game.

Friday, January 24, 2014

What Files Should You Backup On Your Windows PC?


Everybody always tells you to make sure that you are backing up your PC, but what does that really mean? And what files do you actually need to backup? Today we’ll walk you through the basics of backing up your PC, what you should back up, and why.

How to Use the New Task Manager in Windows 8

The Task Manager in Windows 8 has been completely overhauled. It’s easier-to-use, slicker, and more feature-packed than ever. Windows 8 may be all about Metro, but the Task Manager and Windows Explorer are better than ever.

How to Test Your Internet Speed from the Command Line


Anybody who wants to test their connection speed can easily do so from a speed test web site — but that isn’t very geeky. Here’s how to do a test from the terminal prompt instead.
Note: If you are using Windows, you’ll want to either have Cygwin installed, or have a copy of curl or wget installed. On the Mac you can use curl, but if you prefer wget, you’ll need to install that.

Monday, January 20, 2014

How to Connect a Laptop to a Television

Hooking up a desktop computer to a monitor is simple, you just plug it in and it works.  Connecting a laptop to a television should be just as easy, right?  Well, not always.  Read on as we explain several ways to hook up a laptop to your TV.

5 Ways to Bypass Internet Censorship and Filtering

rusty-broken-lock
More and more Internet connections are being filtered, from public Wi-Fi and workplace connection filtering to ISP and country-level censorship. However, there are still ways to get around this filtering and view blocked websites.

How to Encrypt Files and Folders in Windows 8.1 Using EFS

 
Windows 8 contains a built-in file encryption feature, called BitLocker, but only in the Pro or Enterprise versions. In addition, if your system does not have a Trusted Platform Module (TPM), you must use an external USB flash drive with BitLocker for it to work.

Saturday, January 18, 2014

How to Force Your PC to Keep Its Private IP Address



 

There may be times when you need your PC to retain the same local IP address every time it boots up.  Forwarding ports, sharing content on your network, and other things can all be made easier when your computer’s IP address never changes.

Wednesday, November 20, 2013

How to Enable and Secure Remote Desktop on Windows


While there are many alternatives, Microsoft’s Remote Desktop is a perfectly viable option for accessing other computers, but it has to be properly secured.  After recommended security measures are in place, Remote Desktop is a powerful tool for geeks to use and lets you avoid installing third party apps for this type of functionality.

Wednesday, November 6, 2013

How to Recover From a Virus Infection: 3 Things You Need to Do

If your computer becomes infected with a virus or another piece of malware, removing the malware from your computer is only the first step. There’s more you need to do to ensure you’re secure.
Note that not every antivirus alert is an actual infection. If your antivirus program catches a virus before it ever gets a chance to run on your computer, you’re safe. If it catches the malware later, you have a bigger problem.

Not All “Viruses” Are Viruses: 10 Malware Terms Explained

 
Most people seem to call every type of malware a “virus”, but that isn’t technically accurate. You’ve probably heard of many more terms beyond virus: malware, worm, Trojan, rootkit, keylogger, spyware, and more. But what do all these terms mean?
These terms aren’t just used by geeks. They make their way into even mainstream news stories about the latest web security problems and tech scares. Understanding them will help you understand the dangers you’ve heard about.

How to Speed Up Any Android Phone By Disabling Animations

Android phones — and tablets, too — display animations when moving between apps and screens. These animations look very slick, but they waste time — especially on fast phones, which could switch between apps instantly if not for the animations.
Disabling these animations will speed up navigating between different apps and interface screens on your phone, saving you time. You can also speed up the animations if you’d rather see them.

Tuesday, October 22, 2013

8 Clever Uses for Your Smartphone’s Camera (Aside From Taking Pictures)

uses-for-smartphone-camera
Sure, your smartphone’s camera can be used for photos and video chats, but it can do much more than that. Your phone’s camera is a powerful tool you can use for everything from finding better prices to navigation and translation.
Your smartphone’s camera is a full-fledged input device that makes all sorts of creative apps possible. The apps mentioned below are just examples — there are a variety of different apps that do all of these things.

How Can I Find Out Where an Email Really Came From?

Just because an email shows up in your inbox labeled Bill.Smally@somehost.com, doesn’t mean that Smally actually had anything to do with it. Read on as we explore how to dig in and see where a suspicious email actually came from.

Someone once said, "I wants to know how to figure out where emails actually originate from:."