Fix your 10 common Wi-Fi problems(last five)

6. Which wireless channel should I use?Wireless 802.11b and 802.11g routers have at least 11 channels, and most routers come set to channel 6 as the default. If you experience interference--from a neighbor's router, for instance--you can change your channel to solve the problem. Channels 1, 6, and 11 are non-overlapping channels; other channels overlap a bit. So if your neighbor's network uses channel 6, change your router to 1 or 11. You'll typically find channel settings on the router's basic wireless settings page. Just click the drop-down menu...

Fix your 10 common Wi-Fi problems

1. I cannot connect to my router. How do I resolve this?This is a wide-open problem with an almost limitless range of causes and solutions, but here are several actions that might do the trick. First, make sure your router is configured for Dynamic Host Configuration Protocol (DHCP). If it is, try disabling and re-enabling the DHCP function. If that doesn't work, disable wireless security and see if you get a connection; sometimes a mismatched Wired Equivalent Privacy (WEP) key can drop the IP address. You should also check for electrical interference...

6 Steps to Secure Your Home Wireless Network

Most of you might have enabled wireless encryption, which is only one of the 6 steps mentioned in this article to make your wireless network safe and secure from hackers.1. Enable Encryption Let us start with the basics. Most of the wireless router has the encryption disabled by default. Make sure to enable either WPA or WPA2 wireless encryption. Click on Wireless -> Wireless Security , to enable the encryption and assign a password . Following are the different wireless encryption options available. WEP (Wired Equivalent Protection) 64-bit...

MOST COMMON MOBILE VIRUS ABOUT WHICH U SHOULD KNOW

Cabir: This infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.Duts: A parasitic file infector virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes)Skulls: A trojan horse piece of code. Once downloaded, the virus,...

Tips and tricks avoiding virus attack on your mobile phone

If you had affected your mobile phone attack by virus that causes your mobile phone was error or your important data were lost then here are some tips that you can apply to your mobile phone to avoid any attack from the virus.1. Make sure the Bluetooth in the hidden condition modeIf you have a Bluetooth mobile phone, make sure that these features are hidden in the invisible mode, or to prevent other Bluetooth devices to detect your device unless you really will. In addition, turn off Bluetooth when not in use. This step will be enough to protect...

How dowe know if our phone has a virus?

Different viruses affect your phone in different ways, but common signs are: Your phone runs much more slowly than usual# You can’t access any of your files or only some of them# Your icons have disappeared/changed to all the same icon# You can’t see any text on your phone# Your phone bill has increased suddenly, but you haven’t been using it more than usual# Your phone resets itself on a monthly basis# Your battery doesn’t last as long as usualThis list is not exhaustive, so if you notice your phone behaving in an unusual manner you may have a...

how firewall can prevent your computer from hacking

Computer FireWall's: Computer users are unaware that the Internet user's can access your PC just as they can access the Internet. If you use DSL or a cable modem to access the Net, you most likely have a static IP address assigned by your provider, which means that your machine is permanently exposed to the Internet. We've all heard about hackers ranging from so called Script Kiddies launching mostly annoying hacks, to professional hackers trying...

A Dozen Dangerous Myths About Computer Viruses

One of the reasons viruses have become such a threat to modern computer systems is the fact thattoday’s viruses are different in almost every way from what they were a few years ago. But mostcomputer users aren’t aware of these changes. Consequently, their idea of adequate protectionagainst viruses, worms, and Trojan horses is likely to be far less than what is necessary.All of the following statements are beliefs commonly held about viruses, and all are myths. In mostcases the statement was true a few years ago, but certainly not in now:1....

The Top Ten Email-Viruses: How to Protect Yourself from All Viruses

What are the current top ten email viruses? How does one protect his or her computer from them?. This article is going to explore it.1.The most often reported computer virus is the Netsky/32-P. It was a mass mailing worm which spreads by e-mailing itself to addresses obtained from local hard drives.The worm will also copy itself to peer-to-peer shared folders as a variety of files. There are too many of them to list all here, but they are all related to popular topics, obviously designed to catch the eye of the public. Some of the files are: Adobe...

more tricks to remove virus from pen drive

Most of the pen drive viruses create an autorun.inf file in the root of the pen drive folder to load automatically when the pen drive is inserted in the system.1. You can create a folder named autorun.inf in the root folder of pen drive to overcome this problem.2.Set this folder to read only, system and hidden by using attrib +h +r +s autorun.inf at the command prompt of the pen drive.3.Also you can hold SHIFT key to stop the execution of autorun.inf when you inserting the pen drive.4.Then use your antivirus scanner to remove the infected fil...

Protect Windows from Pen Drive Viruses

#image_big { left: -670px; } #interlink_hover { margin: -1px 0 0 -5px; } #interlink_hover span { display: block; } #interlink_hover a { cursor: pointer; color: #fff; } #image_big { float: none; position: static; margin-bottom: 25px; } Regardless of the antivirus you run in your computer there are times when nasty viruses comes from your USB pen drives to sneak into your windows system. The chances of getting infectedby unknown threats that manipulate autorun.inf method is pretty high for people who frequently using USB flash drives...

PREVENT PENDRIVE VIRUS

: : Do the following ::1) Disable autorun/autoplay function of your pen drive. 2) Now plugin your pen drive and open any folder of your computer. (Do not open any folder from ur pen drive.) 3) Now goto tools then select Folder Option In that box mark the Show Hidden Files & Folders option. Also Uncheck Hide Extension for known file types & Hide Protected OS files. Now click apply and ok buttons and close that folder. 4) Nome come to...

PHONE LACKING IMEI NUMBER FACE DEATH IN INDIA CHINESE MOIBILE

--------------------------============000000000 Mobile phone manufacturers in China have sold up to 25 million of their grey market phones in India, and those phones often lack international mobile equipment numbers. An IMEI is a unique 15-digit code that identifies the handset. Each time a call is made, the telecommunications company uses the IMEI to identify the caller via a universal registry of phones. If a phone lacks an IMEI, the telecommunications company can still route the number to the destination, but it does...

HOW TO REMOVE VIRUS FROM MOBILE PHONE BY SOME CODE

IF any virus has attacked your mobile, its inevitable u do something wrong, Now what to do you simply have to format your phone.To format the phone, press *#7370#, then enter the lock code, which is the sec code of the phone. NOTE: battery must be filled, else if format is disrupted by low battery, consequences will be disastrous I heard the code *#7780# works too, pretty much the same i think.For 6600 users, to format the fone, there's an alternative way.Press and hold <3>, <*>,...

HOW TO BLOCK YOUR LOST OR STOLEN MOBILE USING IMEI NUMBER

When you switch on our mobile phone, your mobile SIM card tries to connect with any available network. Once it finds a supported network it tries to build a network connection between your mobile handset and the nearest tower. During this connection negotiation, your SIM transfers some internal information to the network operator such as your mobile IMEI number, mobile model, version etc. This means your mobile operator keeps the record of your mobile...

Find IMEI Number of Your Mobile Phone

IMEI number or International Mobile Equipment Identity number is a unique number associated with every GSM and UMTS mobile phone and can help you find your stolen cell phone easily. Save your IMEI number today. Find your IMEI number To find your mobile phone IMEI number, simply dial the sequence *#06# into the phone. The unique 15 digit IMEI code of your cell phone will be instantly displayed. Copy it and keep it in a safe place so that you can find it when you phone ius misplaced or stolen. You can also find the IMEI number by checking the compliance...

Personal Portable Security Devices Are Pocket-Sized, All-In-One Security Devices Ready For Prime Time?

Key Points• Personal portable security devices integrate cryptographically strong user authentication, such as OTPs (one-time passwords) and public key certificates with ample hardware-encrypted flash storage, all housed in a compact USB device. • The functional integration enables new usage models for secure mobile computing, such as standalone portable applications, browsers, or complete desktop environments. • PPSDs are a relatively new and evolving technology that suffers from hardware costs substantially higher than those of point products,...

What is Maverick Secure Mobile (MSM)?

Maverick Secure Mobile (MSM) is a security application. Secure mobile helps you protect your data, track your stolen device, retrieve your phonebook & disable the stolen device remotely.The application works in hidden mode and cannot be viewed in the device, To launch / customize this application one has to press pre defined short keys and password. After installing MSM in the device one must add “Reporting contact” in the application. Reporting contact can be your second number/friends number or any other mobile number on which you want to...

MOBILE PHONE VIRUS

DEFINITION - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a "proof of concept" virus, because it...

mCrime:-- Hacking Mobile Phones for Identity Theft

History indicates that we are at the forefront of an era in which criminal hackers develop tools and techniques to steal your money using your own cell phone.Fifteen years ago, cell phones were so bulky and cumbersome, they had to be carried in bags or briefcases. Then they became chunky, heavy bricks. Calls dropped every other minute. Clearly, cell phones have evolved since then. Today’s cell phone is a lot more than a phone. It’s a computer, one that rivals many desktops and laptops being manufactured today. A cell phone can pretty much do everything...