WAN Tips

|

Ten Steps to a Healthy and Easily Maintainable Wide Area Network

1. Have a working modem attached to the maintenance port or console of your
networking equipment, so your maintenance provider can quickly diagnose
problems.

2. Maintain an up-to-date cable diagram and label all cables, wall jacks, etc.,
so that problems can be quickly isolated and cables can be quickly identified
and reconnected should they ever be disconnected.

3. Have WAN circuit info documented and readily available (i.e. circuit id, vendor, contact, phone numbers) for sales and trouble calls.

4. Mount equipment so it is easily accessible, front and rear.

5. Have good power. Have your electrician put in ample outlets on a dedicated circuit. Consider a UPS or surge suppressor. Always provision additional power outlets for test equipment and for ease of expansion.

6. Don't skimp on cables. Ensure that the cables and connectors you utilize
meet the specifications for the application they are being used in. Never use a cable that does not meet the specification, even if it works in the short run. In the long run , you may very well have all kinds of problems. You may save
money in the short run, but lose a lot of time later trying to isolate a intermittent cable fault.

7. Take anti-static precautions. If the floor in your comm. area is carpeted, install an anti-static mat.

8. Have a telephone within easy reach of your equipment - this can be a big
time saver in the event of a problem. Testing of WAN circuits often involves end-to-end tests, and point-to-network tests with the local RBOC and Common Carriers. These tests require a telephone near the equipment.

9. Try to have your equipment in a dry, temperature-controlled, and well-lighted area.

10. Have all cables and power cords firmly attached and/or tied down. Use plastic cable tie wraps to secure cables, and to ensure that the strain on the
cable ends is minimized. Always keep cables from areas where they might be walked on, stepped on, or otherwise damaged. Improper cable strain relief and installation procedures are a common cause of network failures.

Wireless Security Tips

|

Wireless Security: Encryption

Encryption is widely used for security of data, including wireless network security. Encryption is where data is translated into code for transmission via the radio waves. An encryption key, similar to a password, is needed to encrypt the code for transfer. If you are only minimally concerned with security, such as in wireless home network security, you may consider WEP encryption, which some find easier to configure with their current equipment.


Wireless Security: Protecting your password

Your passwords are crucial to your wireless network security and should not be revealed to unauthorized individuals. Do not leave your password lying around or written in an obvious location. When entering your username and/or password, make sure people are not milling around and looking over your shoulder. Be very careful of responding to emails asking for passwords. Most legitimate companies do not ask for passwords via email due to the lack of security. These tips are useful for both wireless security and wired security.


Wireless Security: File Sharing

Wireless network security is important. Always make sure to require a password from users connecting to your computer. Be careful about what folders you allow others to have access to. You can also set passwords on specific folders to further increase security.


Deciding on a Firewall

The firewall you choose should be based primarily on the level of needed security, budget, reliability and the potential need to expand the wireless network. The most basic firewall, with minimal security is one that is part of a basic wireless router. The next level up is a dedicated firewall. After that comes a dedicated firewall device with a gateway. Finally, the highest level of wireless security is a dedicated firewall device (such as a computer) with a combination of proxy firewall and full packet filtering.


Wireless Security Encryption:

WEP, wired equivalent privacy, is the standard encryption security that is built into all Wi-Fi devices. WEP does not provide as good of wireless security as WPA does, but is adequate for minimal security purposes.


Wireless Security: MAC filtering

All devices on a wireless network have a MAC (media access control) address. This is a unique identification number that is part of the individual hardware. MAC filtering is where the access points on a wireless network will only speak with devices that you specify. MAC filtering is an excellent tool to use to enhance wireless security. This works great for wireless home network security, because the number of wireless devices will be manageable to work with.


Wireless Security: Firewall

A firewall is either a piece of hardware or software which is used to block outsiders from accessing a network. Firewalls are an essential part of wireless network security. It works by controlling traffic between given zones of trust. A user has the ability to determine what is trustworthy and what is not. If you are running a wireless network, you may want to consider using a firewall which is built into a wireless router.


Wireless Security: Securing your laptop

One of the benefits of a wireless network is the portability of computers. However, this can also lead to a serious wireless security risk and theft of computer. If you are traveling and using your computer in a hot spot area, do not leave it lying around outside of your eyesight. Consider investing in a cable lock, which will secure your laptop (or desktop) to a stationary object. There are higher levels of security you can look into, such as cards that sound an alarm with unauthorized movement.


Using more then one firewall

You should only run one firewall on your network. This is true for both office and wireless home network security. If you run additional firewalls, you run the risk of conflicts. However, for wireless security, you can run one hardware firewall and one software firewall. For example, you can use a wireless router for the hardware firewall and firewall software on the computer.


Wireless Security: Setting Password

Remember that your wireless home network is broadcast via radio waves, and can be accessible to anyone with range. If you do not set a password on your ad hoc network, then anyone within range can access the network. For this reason, it is crucial to set a password to protect your systems and to increase your wireless network security.


Basic Wireless Network Security

There are several basic steps that everyone should do to help ensure wireless network security. When configuring your network, change the default names on the computers and set the SSID not to broadcast. Use wired equivalent privacy (WEP) encryption at a minimum. Change all default passwords for software and hardware. Finally, make sure to run antivirus software and antispyware software on all your computers.


Choosing a good password for wireless security

There are several tips to keep in mind when choosing a good password for wireless security. Do not use your name, initials or easy to guess numbers, such as address, birthday, etc. Any password based on personal information is a poor choice. Passwords should be at least eight characters long, and includes both numbers and characters. And remember, no matter how clever your password is, if you write it down where it is easily found, it won't be very secure.


Wireless Security Encryption: WPA

WPA, Wi-Fi protected access, is an upgraded version of WEP. This newer protocol is more secure then WEP and, if you use a good password, is much tougher to crack. WPA devices are backwards compatible with WEP; however, in order to use WPA for wireless network security, all devices need to have WPA.


Wireless Security Tips

|

Wireless Security: Encryption

Encryption is widely used for security of data, including wireless network security. Encryption is where data is translated into code for transmission via the radio waves. An encryption key, similar to a password, is needed to encrypt the code for transfer. If you are only minimally concerned with security, such as in wireless home network security, you may consider WEP encryption, which some find easier to configure with their current equipment.


Wireless Security: Protecting your password

Your passwords are crucial to your wireless network security and should not be revealed to unauthorized individuals. Do not leave your password lying around or written in an obvious location. When entering your username and/or password, make sure people are not milling around and looking over your shoulder. Be very careful of responding to emails asking for passwords. Most legitimate companies do not ask for passwords via email due to the lack of security. These tips are useful for both wireless security and wired security.


Wireless Security: File Sharing

Wireless network security is important. Always make sure to require a password from users connecting to your computer. Be careful about what folders you allow others to have access to. You can also set passwords on specific folders to further increase security.


Deciding on a Firewall

The firewall you choose should be based primarily on the level of needed security, budget, reliability and the potential need to expand the wireless network. The most basic firewall, with minimal security is one that is part of a basic wireless router. The next level up is a dedicated firewall. After that comes a dedicated firewall device with a gateway. Finally, the highest level of wireless security is a dedicated firewall device (such as a computer) with a combination of proxy firewall and full packet filtering.


Wireless Security Encryption:

WEP, wired equivalent privacy, is the standard encryption security that is built into all Wi-Fi devices. WEP does not provide as good of wireless security as WPA does, but is adequate for minimal security purposes.


Wireless Security: MAC filtering

All devices on a wireless network have a MAC (media access control) address. This is a unique identification number that is part of the individual hardware. MAC filtering is where the access points on a wireless network will only speak with devices that you specify. MAC filtering is an excellent tool to use to enhance wireless security. This works great for wireless home network security, because the number of wireless devices will be manageable to work with.


Wireless Security: Firewall

A firewall is either a piece of hardware or software which is used to block outsiders from accessing a network. Firewalls are an essential part of wireless network security. It works by controlling traffic between given zones of trust. A user has the ability to determine what is trustworthy and what is not. If you are running a wireless network, you may want to consider using a firewall which is built into a wireless router.


Wireless Security: Securing your laptop

One of the benefits of a wireless network is the portability of computers. However, this can also lead to a serious wireless security risk and theft of computer. If you are traveling and using your computer in a hot spot area, do not leave it lying around outside of your eyesight. Consider investing in a cable lock, which will secure your laptop (or desktop) to a stationary object. There are higher levels of security you can look into, such as cards that sound an alarm with unauthorized movement.


Using more then one firewall

You should only run one firewall on your network. This is true for both office and wireless home network security. If you run additional firewalls, you run the risk of conflicts. However, for wireless security, you can run one hardware firewall and one software firewall. For example, you can use a wireless router for the hardware firewall and firewall software on the computer.


Wireless Security: Setting Password

Remember that your wireless home network is broadcast via radio waves, and can be accessible to anyone with range. If you do not set a password on your ad hoc network, then anyone within range can access the network. For this reason, it is crucial to set a password to protect your systems and to increase your wireless network security.


Basic Wireless Network Security

There are several basic steps that everyone should do to help ensure wireless network security. When configuring your network, change the default names on the computers and set the SSID not to broadcast. Use wired equivalent privacy (WEP) encryption at a minimum. Change all default passwords for software and hardware. Finally, make sure to run antivirus software and antispyware software on all your computers.


Choosing a good password for wireless security

There are several tips to keep in mind when choosing a good password for wireless security. Do not use your name, initials or easy to guess numbers, such as address, birthday, etc. Any password based on personal information is a poor choice. Passwords should be at least eight characters long, and includes both numbers and characters. And remember, no matter how clever your password is, if you write it down where it is easily found, it won't be very secure.


Wireless Security Encryption: WPA

WPA, Wi-Fi protected access, is an upgraded version of WEP. This newer protocol is more secure then WEP and, if you use a good password, is much tougher to crack. WPA devices are backwards compatible with WEP; however, in order to use WPA for wireless network security, all devices need to have WPA.


General Packet Radio Service (GPRS)

|

GPRS protocol is a packet-switch protocol; define for web applications in GSM network. In other words Internet on GSM network is standardized as GPRS network. GPRS has digital structure and this structure based on Time Division Multiple Access (TDMA) technique. One TDMA frame has 8 time slots (TSs). These TSs can be allocated to users, and single TS can be shared by several active users for uplink and downlink purposes. Different coding schemes are used to enhance data rate from 9Kbps to 150 Kbps per user, and it takes 0.5 to 1 second. Security features in GPRS is provided by GSM network.

GPRS Architecture

Global System for Mobile Communication (GSM) circuit-switch architecture does not support the GPRS packet-switch architecture. Thus, GPRS requires its own network architecture. Several networks and databases e.g. Mobile Station (MS), Base Station Subsystem (BSS), Home Location Register (HLR), Visitor Location Register (VLR) in existing GSM network are modified in GPRS network.

GPRS architecture introduces the following network nodes to GSM architecture.

  • Serving GPRS Support Node (SGSN)

  • Gateway GPRS Support Node (GGSN)

  • Mobile Station (MS)

  • Base Station System (BSS)

  • Home Location Register (HLR)

  • Visitor Location Register (VLR)

1.Serving GPRS Support Node (SGSN): In GPRS network SGSN is equivalent to MSC. Packets of data between MSC and Public Switch Data Network (PSDN) are transferred and received by SGSN.

2.Gateway GPRS Support Node (GGSN): GSM databases e.g. HLR and VLR are supported by GGSN. It also interacts with external packet-switch networks.

3.Mobile Station (MS): In GPRS network MS consists of Mobile Terminal (MT) and Terminal Equipment (TE). A computer attached to MT is called a ME. Through air, MT communicates with the BSS.

4.Base Station System (BSS): In BSS, Base Transceiver Station (BTS) and Base Station Controller (BSC) are modified to support GPRS channel coding schemes BTS is modified while to forward calls to Mobile Switching Centre (MSC) and data to SGSN through Packet Control Unit (PCU), is supported by BSC. One SGSN is served by one BSC.

5.Home Location Register (HLR): In GPRS, HLR contains information about routing. To map an MS to one or more GGSNs, update the SGSN and to store the Internet Protocol (IP) address, this information is accessed by both SGSN and GGSN.

6.Visitor Location Register (VLR): In GPRS. VLR contains the SGSN number and this number indicates the MS currently served by the SGSN.

GPRS Interfaces

Different interfaces are used for routing between network nodes in GPRS.

  • Um interface provides communication between MS and BSS.

  • Gb interface provides connection between BSS and SGSN.

  • Gn interface provides connection between SGSN and GGSN within the same GPRS network.

  • Gp interface provides connection between SGSN and GGSN when they are in different GPRS network.

  • Gi interface provides connection between GGSN and external networks.

  • Gs interface provides communication between MSC and SGSN.

GPRS functional Groups

The functions which are defined in GPRS are following.

  • Network access function: Point to point data transfer, registration of MS with packet data protocols, radio resources for MS communication and charging information about packet transmission, is provided by this function.

  • Packet routing and transfer function: Routing of data between an MS and destination, conversion of GPRS address to external address and forwarding of packets between an MS and GGSN, is provided by this function.

  • Logical link management function: The communication between an MS and the GSM network is maintained by it.

  • Radio resources management function: Radio communication paths are allocated by it.

  • Mobility management function: Current location of an MS is kept by it. When an MS is entered to a new area, all routing and location in formations are also updated by it.

  • Network management function: If provides mechanisms to support network functions related to GPRS.

Advantages

The major advantage of GPRS is that, to access data no dial-up connection is required. It is an inexpensive mobile data service as compared to Short Message Service (SMS) in GSM.

General Packet Radio Service (GPRS)

|

GPRS protocol is a packet-switch protocol; define for web applications in GSM network. In other words Internet on GSM network is standardized as GPRS network. GPRS has digital structure and this structure based on Time Division Multiple Access (TDMA) technique. One TDMA frame has 8 time slots (TSs). These TSs can be allocated to users, and single TS can be shared by several active users for uplink and downlink purposes. Different coding schemes are used to enhance data rate from 9Kbps to 150 Kbps per user, and it takes 0.5 to 1 second. Security features in GPRS is provided by GSM network.

GPRS Architecture

Global System for Mobile Communication (GSM) circuit-switch architecture does not support the GPRS packet-switch architecture. Thus, GPRS requires its own network architecture. Several networks and databases e.g. Mobile Station (MS), Base Station Subsystem (BSS), Home Location Register (HLR), Visitor Location Register (VLR) in existing GSM network are modified in GPRS network.

GPRS architecture introduces the following network nodes to GSM architecture.

  • Serving GPRS Support Node (SGSN)

  • Gateway GPRS Support Node (GGSN)

  • Mobile Station (MS)

  • Base Station System (BSS)

  • Home Location Register (HLR)

  • Visitor Location Register (VLR)

1.Serving GPRS Support Node (SGSN): In GPRS network SGSN is equivalent to MSC. Packets of data between MSC and Public Switch Data Network (PSDN) are transferred and received by SGSN.

2.Gateway GPRS Support Node (GGSN): GSM databases e.g. HLR and VLR are supported by GGSN. It also interacts with external packet-switch networks.

3.Mobile Station (MS): In GPRS network MS consists of Mobile Terminal (MT) and Terminal Equipment (TE). A computer attached to MT is called a ME. Through air, MT communicates with the BSS.

4.Base Station System (BSS): In BSS, Base Transceiver Station (BTS) and Base Station Controller (BSC) are modified to support GPRS channel coding schemes BTS is modified while to forward calls to Mobile Switching Centre (MSC) and data to SGSN through Packet Control Unit (PCU), is supported by BSC. One SGSN is served by one BSC.

5.Home Location Register (HLR): In GPRS, HLR contains information about routing. To map an MS to one or more GGSNs, update the SGSN and to store the Internet Protocol (IP) address, this information is accessed by both SGSN and GGSN.

6.Visitor Location Register (VLR): In GPRS. VLR contains the SGSN number and this number indicates the MS currently served by the SGSN.

GPRS Interfaces

Different interfaces are used for routing between network nodes in GPRS.

  • Um interface provides communication between MS and BSS.

  • Gb interface provides connection between BSS and SGSN.

  • Gn interface provides connection between SGSN and GGSN within the same GPRS network.

  • Gp interface provides connection between SGSN and GGSN when they are in different GPRS network.

  • Gi interface provides connection between GGSN and external networks.

  • Gs interface provides communication between MSC and SGSN.

GPRS functional Groups

The functions which are defined in GPRS are following.

  • Network access function: Point to point data transfer, registration of MS with packet data protocols, radio resources for MS communication and charging information about packet transmission, is provided by this function.

  • Packet routing and transfer function: Routing of data between an MS and destination, conversion of GPRS address to external address and forwarding of packets between an MS and GGSN, is provided by this function.

  • Logical link management function: The communication between an MS and the GSM network is maintained by it.

  • Radio resources management function: Radio communication paths are allocated by it.

  • Mobility management function: Current location of an MS is kept by it. When an MS is entered to a new area, all routing and location in formations are also updated by it.

  • Network management function: If provides mechanisms to support network functions related to GPRS.

Advantages

The major advantage of GPRS is that, to access data no dial-up connection is required. It is an inexpensive mobile data service as compared to Short Message Service (SMS) in GSM.

Wireless Internet Tips

|

Wireless Internet Sharing

If you plan on sharing your wireless internet access, you will need to have that option turned on in your settings. However, if you do not have other computers hooked up to the network at this time, for security purposes, you should leave the setting turned off until the need arises to share the wireless internet access.


Wireless Internet Speeds

Coming in at the slowest is Bluetooth, followed by 802.11b, 802.11a and topping the charts currently is 802.11g. 802.11b is roughly equivalent to the traditional wired 10BaseT Wired Ethernet networks. Therefore, switching to Wi-Fi should not considerably slow down your wireless internet connection.

You will need to have a wireless network card, either an adapter or integrated in your laptop. If you do not have an available slot on your PC, there are adapters you can purchase that plug into a USB port on the computer.


Finding a Wireless Internet Hot Spot

There are several stores and restaurants that offer wireless internet access, such as Starbucks. If you have a particular destination in mind, you can call the hotels to see if they offer the service. There are also hot spot directories that you can search to find wireless internet access.


Wireless internet - WiFi Standards

802.11 is the Wi-Fi standard, however there are other standards which are variations of the 802.11. These include:

  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11i.

The differences among these standards includes speed, transmission frequency, and price. 802.11g is backwards compatible with previous products, but that is not the case with 802.11a. Make sure you check on compatibility issues prior to purchasing products.


Wireless Internet and Dial up

It is possible to share a wireless internet connection with dial up, but it is not a very good idea. Some access points, such as the airport extreme base station from Apple, will allow this. However, there is some slow down time with sharing a wireless internet connection, and if you decide to share a dial up connection, you won't be surfing anything fast.


Finding a Wireless Internet Hot Spot in a Chain

If you are traveling and know that you will be stopping at Starbucks, for example, and want to access the internet, you can check out their website to see what specific franchises offer wireless internet access.


Paying for Wireless Internet Access

Most likely, you will need to pay for the high speed wireless internet access when you travel. Starbucks for example uses T-mobile as their wireless internet provider. You will need to have a t-mobile account in order to access wi-fi at Starbucks. There are some restaurants that may advertise free Wi-Fi, but in general, you should expect to pay a fee.


Nationwide Wireless Internet Service

There are a plethora of national wireless high speed internet services available. AT&T, Sprint PCS, T-mobile, and Verizon are a few which offer nationwide service. You will want to check out various pricing, roaming policies and fees for the various networks.


Mixing Apples and PC's to Share Wireless Internet Connection

You can mix apple and PC on a wireless network and share a wireless internet access. For example, Apple makes an access point called the AirPort Extreme Base station. Even though it is made by Apple, it still uses the Wi-Fi standard, and PC computers with a wireless adapter on the network will be able to share the wireless internet connection


Mixing Wireless Internet and Wired Internet

You can easily share a wireless internet access while still maintaining a wired network. There are many wireless routers on the market which offer both wired and wireless network capabilities. It is also possible to add on an access point after a wired router for wireless access.


Configuring Wireless Access Point to Share Wireless Internet Connection

Once you install the drivers on your computer for the access point, you will be able to open up the configuration software that comes with the router. The IP address 192.168.0.0 is the lowest in the network and should be dedicated to the router. Make sure to follow the specific configuration instructions that come with your wireless router, as each product will be slightly different from one another.


Wireless Internet Equipment

The beauty of the WI-FI is that it set a standard for wireless networking. Because of this, you do not need to have equipment from all the same venders in order to run a successful wireless network. You will be able to share wireless internet access as well without having equipment from all the same venders.


Configuring Wireless Internet Card

You will need to use the configuration software that comes with your network card to configure your computer to work at various hot spots. Simply type in the hotspot network name (various depending on the service you are using) and state the type of network, such as access point. You can also scan available wireless broadband internet access in the area and choose which network you wish to connect with.


Wireless Internet WIFI

WI-FI, the 802.11 standard, is important for a variety of reasons. Having a standard in the industry ensures that anyone using wi-fi will be using the same standard, therefore equipment and connections are interchangeable. Having a set standard makes setting up wireless networks, sharing wireless internet access and working with wireless equipment more users friendly.


Wireless Network Equipment While Traveling


WiMAX Wireless Broadband Info

|

WiMAX stands for World Interoperability for Microwave Access that enables the actual broadband wireless network with high speed. WiMAX operate same like WiFi but WiFi operate with some limitation like it is base band technology and cover only 100 feet radius with slow speed. WiMAX covers a radius of 50 Km and work with the speed of 70 Mbps. WiMAX is the replacement of the wired broadband. In wired broadband connection, we can transmit data with 512 Kbps to 10 Mbps speed and more, for example DSL broadband and cable broadband. In future all new desktop and notebook computers will be incorporated with WiMAX technology. With this technology you will be connected to the internet even you are driving your car with the speed of 120 Km.

Objective of WiMAX

  • Superior Performance

  • Flexibility

  • Advanced IP-Based Architecture

  • Attractive Economics

IEEE 802.16 Specifications

  • Range 30 mile radius from the base station for LOS (line-of-sight).

  • Range 4-6 miles radius from the base station for NLOS (Non-line-of-sight)

  • Maximum data speed supported as 70 Mbps.

  • Licensed frequency band: 2- 11 GHz

  • Un-licensed frequency band: 10- 66 GHz

  • Line of sight is not needed between user and the base station unless very high date rates are required at the user premises.

What is a DVR or Digital Video Recorder?

|

If you are interested to record and save your favorite TV program with best quality (audio and video) then your choice will be a DVR (Digital video Recorder) for high quality result. A DVR you can say a latest technology after VCR, Its main functions just like a VCR. DVR offers up to 500 GB hard drive fitted to data save and also with option of 2nd hard drive for program recording.

There are many advantages to having a digital video recorder. For Example: you can recording your program with better quality and same time you can record one program and view another show. it can operate of Live, recording, playback, backup, network and copy. A normal DVR can records up to 120/100 frames per second and with built-in DVD-RW or CD-RW support. By using Digital Video Recorder you can quickly locate the show, stop, pause, play and rewind live TV shows. A DVR can supports recording mode like Manual, Schedule/ Motion detection and Sensor. You can also connect it to your network because it can work with 10/100 Base Ethernet, TCP/IP and DHCP.

If you are using digital video recorder for recording, your can easily skip the TV commercials, any unwanted part of show and forward it without disturbing your recording. Yon can run it using your native language because DVR supports many languages like English, Chinese, Japanese, Korean, Spanish, polish , Russian and many others. A good feature for recording you can record a program with different resolutions for example 360x240, 720x240, 720x480,
360x288, 720x288, 720x576.


How to disable the "Turn Off Computer" button in windows XP?

|

Today tip is very useful particularly for those users who want to restrict the common users to shutdown public computer in common areas. You can disable the "Turn off Computer" button on the start menu and a common user will not "Turn Off, Restart and Stand By" a computer. Using registry editor, you can implement this task in all windows XP versions with minimum effort.

Follow the given steps to disable Turn off Computer" button on the start menu:

To use this feature, you will need to be logged into your computer with administrative rights.

Click Start button and type regedit in Run option then press Enter for next.


Here locate the location to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Here in right side panel, right click to create a new DWORD value with the name NoClose.



Now assign number 1 in value data box and close the registry editor.



Now close the registry editor and restart your computer after any changes to go into effect.

But next time, if you want to enable "Turn Off Computer" button on start menu then simply change the value of data box to 0 or delete NoClose DWORD item.


How to apply password and compressed feature in windows XP?

|

In windows XP, you can store your data on hard disk using less space than normal size. There is no need to install any third party software to compress or decompress your data, you can use windows built-in data compression or decompression feature to manage disk space issue.

I think many users are worried about the security of their file and folder also, so another benefit of this feature, you can protect your compressed file and folders with password.

Follow the given steps to implement the compression and password feature to mange data:

First double click on "My Computer" and locate the disk where you want to create compressed (zipped) folder. For example, if you want to create this compressed (zipped) folder on C drive, then open C drive.

Here open the "File" menu, go to "New" then click on "Compressed (zipped) Folder" option.



Rename this folder according to data information and press "Enter" button.



Now you can move (drag and drop or copy and paste) your files and folders to this compressed (zipped) folder then compression feature will implement automatically on that data.



When you want to open these compressed files, simple right click on compressed folder and click on Extract All. This extract wizard will automatically extract all these files to location you choose.



Now if you want to protect this compressed folder with password, simply open the compressed folder and go to "File" menu then here click on "Add a Password" option.



A small dialog box will appear with title "Add Password", type password in "Password" box and confirm password also then press Ok button.



Now when you will try to open your compressed files, system will prompt you a dialog box to enter password to open this file.




 

©2009 Computer Tips | Template Blue by TNB