বৃহস্পতিবার, ৬ মার্চ, ২০১৪

Windows short-cut key for you work easy!

Action: Shortcut-keys
Copy:Ctrl+C
Create new VI:Ctrl+N
Cut:Ctrl+X
Exit LabVIEW:Ctrl+Q
Find and replace:Ctrl+F
Full Size:Ctrl+/
Navigation Windows:Ctrl+shift+N
Open Project:OAlt+F E
Open VI:Ctrl+O
Page Setup:Alt+F T
Paste:Ctrl+V
Print Window:Ctrl+P
Redo :Ctrl+shift+Z
Remove Broken Wires:Ctrl+B
RUN :Ctrl+R
Save:Ctrl+S
Save all open VI:Ctrl+shift +S
Save All:Ctrl+Shift+S
Save VI as ..:Alt+F+A
Search the Labview Help:Ctrl+?
Select All:Ctrl+A
Show Context Help:Ctrl+H
Show Front Panel:Ctrl+E
Step Into:Ctrl+Down
Step Over:Ctrl+Right
Tile Left and Right:Ctrl+T
Undo Window Size:Ctrl+Z
Step Out:Ctrl+Up
VI properties:Ctrl+I
VI Revision History:Ctrl+Y
Brings the desktop to the top of all other windows:WINKEY + D
Cycle through open programs through the taskbar:WINKEY + Tab
Display the Microsoft Windows help :WINKEY + F1
Display the search for computers window:WINKEY + CTRL + F
Display the Windows Search / Find feature:WINKEY + F
Lock the computer (Windows XP) :WINKEY + L
Undo the minimize done by WINKEY + M and WINKEY + D:WINKEY + SHIFT +M
Minimizes all windows:WINKEY + M
Open Microsoft Explorer:WINKEY + E
Open the run window:WINKEY + R
Open the system properties window :WINKEY + Pause / Break key
Open Utility Manager:WINKEY + U
Bold:Ctrl-B
Check for new mail:F9 (Outlook 2003)
Check for new mail:F5 (Outlook 2000,2002)
Close a window:Esc
Close a window:Alt-F4
Copy:Ctrl-C
Create Appointment:Ctrl-Shift-A
Create Contact:Ctrl-Shift-C
Create Flag for follow-up:Ctrl-Shift-G
Create Folder:Ctrl-Shift-E
Create Meeting Request:Ctrl-Shift-Q
Create Message:Ctrl-Shift-M
Create Note:Ctrl-Shift-N
Create Task:Ctrl-Shift-K
Create Task Request:Ctrl-Shift-U
Cut:Ctrl-X
Delete opened item:Ctrl-D
Find Advanced:Ctrl-Shift-F
Folder List - Open:Ctrl-Y/td>
Forward selected mail:Ctrl-F
Italics:Ctrl-I
Mark item as read:Ctrl-Q
Move down one screen:PgDn
Move to first item:Home
Move to last item:End
Move up one screen:PgUp
Create new default item:Ctrl-N
Open “Find a Contact”:F11
Open “Look In”:Open Alt-I
Open selected item:Ctrl-O
Open selected item:Enter
Paste:Ctrl-V
Print:Ctrl-P
Read next email:Ctrl->
Read previous email:Ctrl-<
Redo :Ctrl-Y
Remove last semi-colon from mail addressee:Remove last semi-colon from mail addressee Alt-K
Reply to selected message Ctrl-R:Reply to selected message Ctrl-R
Save Ctrl-S:Save Ctrl-S
Select all items Ctrl-A:Select all items Ctrl-A
Select to first item Ctrl-Shift-Home:Select to first item Ctrl-Shift-Home
Select to last item Ctrl-Shift-End:Select to last item Ctrl-Shift-End
Send email message:Ctrl-Enter
Spell check open item:F7
Switch to Inbox:Ctrl-Shift-I
Switch to Outbox:Ctrl-Shift-O
Underline:Ctrl-U
Undo:Ctrl-Z
Application window-maximize:Alt-F10
Application window-previous:Alt-Shift-F6
Application window-restore :Alt-F5
AutoFormat:Ctrl-Alt-K
AutoText-create :Alt-F3
AutoText-insert entry :Ctrl-Alt-V
AutoText-insert :entry F3
Bold :Ctrl-B
Bookmarks :Ctrl-Shift-F5
Break-column:Ctrl-Shift-Enter
Break-page:Ctrl-Enter
Browse a document:Ctrl-Alt-Home
Browse next/previous item:Ctrl-PgDn/PgUp
Capatilize word:shift+f3
Case-All Caps:Ctrl-Shift-A
Close:Ctrl-F4
Close:Ctrl-W
Copy :Ctrl + C
Copy formatting:Ctrl-Shift-C
Create a nonbreaking hyphen:CTRL+HYPHEN
Create a nonbreaking space:CTRL+SHIFT+SPACEBAR
Customize a menu:Ctrl-Alt =
Customize a shortcut :Ctrl-Alt-Num +
Cut:Ctrl-X
Date Field:Alt-Shift-D
Decrease font size:CTRL+SHIFT+<
Dialog box next tabbed section :Ctrl-Tab
Dialog box previous tabbed section:Ctrl-Shift-Tab
Document window-move:Ctrl-F7
Document window-restore:Ctrl-F5
Document window-size:Ctrl-F8
Drawing-constrain shape to symmetrical :Shift-drag
Drawing-draw from center :Ctrl-drag
Ellipsis:Ctrl-Alt-
Em Dash:Ctrl-Alt-Num -
Endnote:Ctrl-Alt-E
Exit application:Alt-F4
Fields-display code:Shift-F9
Fields-display codes (toggle):Alt-F9
Fields-double-click in field:Alt-Shift-F9
Fields-insert blank field:Ctrl-F9
Fields-lock a field :Ctrl-3
Fields-lock a field:Ctrl-F11
Fields-next:field F11
Fields-previous field:Shift-F11
Fields-unlink a field:Ctrl-6
Fields-unlink a field:Ctrl-Shift-F9
Fields-unlock a field:Ctrl-4
Fields-unlock a field:Ctrl-Shift-F11
Fields-update:Alt-Shift-U
Fields-update link in source:Ctrl-Shift-F7
Fields-update selected:field F9
Find :Find Ctrl + F
Font:Ctrl-D
Font:Ctrl-Shift-F
Font grow/shrink 1 pt:Ctrl- ] or [
Font next/previous size:Ctrl-Shift- >or <
Font Size Ctrl-Shift-P:Font Size Ctrl-Shift-P
Footnote:Ctrl-Alt-F
Create a new blank document:Ctrl + N
Go Back :Ctrl-Alt-Z
Go Back :Shift-F5
GoTo :Ctrl-G
GoTo Next/Previous Paragraph :Ctrl-Up/Down
GoTo Next/Previous Word :Ctrl-Left/Right
Graphic-crop:Shift-drag
Graphic-original proportions :Ctrl-click
Hanging indent-decrease :Ctrl-Shift-T
Hanging Indent-increase :Ctrl-T
Hard hyphen - :Ctrl-Shift -
Hard space:Hard space
Header/Footer-link to previous:Alt-Shift-R
Heading Level 1:Ctrl-Alt-1
Heading Level 2:Ctrl-Alt-2
Heading Level 3:Ctrl-Alt-3
Help:F1
Help-Whats This? :Shift-F1
Hidden text:Ctrl-Shift-H
Hyperlink:Ctrl-K
CTRL+SHIFT+>:Increase font size
Indent-decrease:Ctrl-Shift-M
Indent-increase:Ctrl-M
Ctrl-Alt-M:Insert Comment
Insert ListNum:field Ctrl-Alt-L
Italics:Ctrl-I
Justify-Center:Ctrl-E
Justify-Full:Ctrl-J
Justify-Left:Ctrl-L
Justify-Right:Ctrl-R
Line-spacing:Ctrl-1
Line-spacing 1.5 :Ctrl-5
Line-spacing 2:Ctrl-2
List Bullet Style:Ctrl-Shift-L
Macros-edit:Alt-F8
Macros-view VBA code:Alt-F11
Mark-Index entry:Alt-Shift-X
Mark-TOA citation:Alt-Shift-I
Mark-TOC entry:entry Alt-Shift-O
Maximize window:Ctrl-F10
Menu Bar:F10
Merge-data edit:Alt-Shift-E
Merge-field insert:Alt-Shift-F
Merge-preview:Alt-Shift-K
Merge-to document:Alt-Shift-N
Merge-to printer:Alt-Shift-M
Microsoft Script Editor:Alt-Shift-F11
Microsoft System Info:Ctrl-Alt-F1
Move between master/subdocument :Ctrl-\
Newline within paragraph:Shift-Enter
Next window:Ctrl-F6
Nonprinting characters:Ctrl-Shift-8
Normal Style Ctrl-Shift-N:Ctrl-Shift-N
Open a document:Ctrl-O
Open:Ctrl + O Opens a saved document
Outlining-collapse:Alt-Shift-Num -
Outlining-expand :Alt-Shift =
Outlining-expand:Alt-Shift-Num +
Outlining-move:Alt-Shift-Up/Down
Outlining-promote/demote:Alt-Shift-Left/Right
Outlining-Show 1st line:Alt-Shift-L
Outlining-Show All Headings:Alt-Shift-A
Outlining-Show Heading 1:Alt-Shift-1
Outlining-Show Heading 2:Alt-Shift-2
Outlining-Show Heading 3:Alt-Shift-3
Outlining-Show Heading 4 :Alt-Shift-4
Outlining-Show Heading 5 :Alt-Shift-5
Outlining-Show Heading 6:Alt-Shift-6
Outlining-Show Heading 7:Alt-Shift-7
Outlining-Show Heading 8:Alt-Shift-8
Outlining-Show Heading 9:Alt-Shift-9
Page number field:Alt-Shift-P
Pane-Close:Alt-Shift-C
Paragraph Space Above (add/delete 12 pt.)Ctrl-0:Ctrl-0 (zero)
Paste:Ctrl-V
Print:Ctrl-P
Print Preview:Ctrl-Alt-I
Redo the last action:CTRL+Y
Remove Character formats:Ctrl-Shift-Z
Remove menu item:Ctrl-Alt -
Remove Paragraph formats:Ctrl-Q
Remove paragraph or character formatting:CTRL+SPACEBAR
Repeat the last command:Ctrl-Y
Repeat Find:Ctrl-Alt-Y
Repeat Find Shift-F4 :Repeat Find Shift-F4
Replace:Ctrl-H
Revision Marks on/off :Ctrl-Shift-E
Save As:F12
Save:Ctrl-S
Select All:Ctrl-A
Selection extended:F8
Selection reduced:Shift-F8
Shortcut Menu:Shift-F10
Small Caps:Ctrl-Shift-K
Soft hyphen - :Ctrl -
Spelling and Grammar check:F7
Spell-It-display next misspelling:Alt-F7
Spike-cut to :Ctrl-F3
Spike-paste:Ctrl-Shift-F3
Split a window:Ctrl-Alt-S
Style box:Ctrl-Shift-S
Subscript:Ctrl =
Symbol Font :Ctrl-Shift-Q
Table-remove border lines :Ctrl-Alt-U
Table-to column:bottom Alt-PgDn
Table-to column top:Alt-PgUp
Table-to row beginning:Alt-Home
Table-to row end:Alt-End
Thesaurus:Shift-F7
Time Field:Alt-Shift-T
To bottom/top of screen :Ctrl-Alt-PgDn/PgUp
Type (c):Ctrl-Alt-C
Type (r):Ctrl-Alt-R
Type (tm):Ctrl-Alt-T
underline:CTRL+U
Underline-double:Ctrl-Shift-D
Underline-word:Ctrl-Shift-W
Undo:Ctrl-Z
View-Normal :Ctrl-Alt-N
View-Outline:Ctrl-Alt-O
View-Page :Ctrl-Alt-P
Window pane-next:F6
Window pane-previous:Shift-F6

Complete List of Errors and Problems in Outlook PST Files

 Complete List of Errors and Problems:
      

When you use Microsoft Outlook to open a corrupt personal folders (PST) file, you will see various error messages, which may be a bit confusing to you. Therefore, here we will try to list all possible errors, sorted according to their occurring frequency. For each error, we will describe its symptom, explain its precise reason and give a sample file as well as the file fixed by our Outlook recovery tool DataNumen Outlook Repair, so that you can understand them better. Below we will use 'filename.pst' to express your corrupt Outlook PST file name.


  >The file xxxx.pst is not a personal folders file.

   > Errors have been detected in the file xxxx.pst. Quit Outlook and all mail-enabled applications, and then use the Inbox repair tool(Scanpst.exe) to diagnose and repair errors in the file. For more information about the Inbox repair tool, see Help.

   > Microsoft Outlook has encountered a problem and needs to close. We are sorry for the inconvenience.

   > The file xxxx.pst could not be found.

   > Unable to display the folder. The file xxxx.pst could not be accessed.

  >  xxxx.pst can not be accessed - 0x80040116.

   > File xxxx.pst could not be accessed. Data error. Cyclic redundancy check.

 Although Microsoft provides Inbox Repair Tool (Scanpst.exe) to fix problems in corrupt PST files, it cannot work for most of the cases. Blow are frequently encountered problems when Inbox Repair Tool fail to work:


   > The Inbox Repair Tool does not recognize the file xxxx.pst...

   > An unexpected error prevented access to this file. Use ScanDisk to check the disk for errors, and then try using the Inbox Repair tool again.

  >  Inbox Repair Tool (Scanpst.exe) hangs endlessly and does not perform the repair.

   >  The PST file fixed by Inbox Repair Tool (Scanpst) is empty or does not contain the wanted items.


Moreover, when using Microsoft Outlook, you may also encounter the following problems frequently, which can be solved by DataNumen Outlook Repair easily.


   > Oversized PST file problem (the PST file size reaches or exceeds the 2GB limit).

    >Outlook emails and other items are deleted by mistake.

    >Forget or lose the password or login information for the PST file.

Outlook problem / Repair Outlook Data Files (.pst) -1

Inbox Repair tool

If you can't open your Personal Folders file (.pst) or you suspect that your .pst data file is corrupted, you can use the Inbox Repair tool (Scanpst.exe) to diagnose and repair errors in the file. The Inbox Repair tool scans only the .pst file, not your mailbox on the server running Microsoft Exchange or others. The tool determines whether the file structure is intact. If it is not intact, the Inbox Repair tool resets your file structure and rebuilds the headers.

The Inbox Repair tool works on both the Microsoft Outlook 97-2002 Personal Folders File (.pst) and the Office Outlook Personal Folders File (.pst) data files in Microsoft Office Outlook 2003 and Microsoft Office Outlook 2007.

Scanpst.exe is installed when you install Outlook. It is located at:

drive:\Program Files\Microsoft Office\OFFICE12.

Repair errors by using Scanpst.exe
1.    Exit Outlook if it is running.
2.    Double-click Scanpst.exe, located at drive:\Program Files\Microsoft Office\OFFICE12.
3.    In the Enter the name of the file you want to scan box, enter the name of the .pst file that you want to check, or click Browse to search for the file.
4.    To specify the scan log options, click Options, and then click the option that you want.
5.    Click Start.
6.    If errors are found after the scan is complete, you will be prompted to start the repair process to fix the errors.
A backup file is created during the repair process. To change the default name or location of this backup file, in the Enter name of backup file box, enter a new name, or click Browse to look for the file that you want to use.
7.    Click Repair.
8.    Start Outlook by using the profile that contains the .pst file that you tried to repair.
9.    On the Go menu, click Folder List.
In the Folder List, you may see a folder named Recovered Personal Folders that contains your default Outlook folders or a Lost and Found folder. The recovered folders are usually empty, because this is a rebuilt .pst file. The Lost and Found folder contains the folders and items recovered by the Inbox Repair tool. Items that are missing from the Lost and Found folder cannot be repaired.

10.    If you see a Recovered Personal Folders folder, you can create a new .pst file, and drag the items in the Lost and Found folder into the new .pst file. When you have finished moving all the items, you can remove the Recovered Personal Folders (.pst) file, including the Lost and Found folder, from your profile.

বুধবার, ৫ মার্চ, ২০১৪

Administrator Password forgot at Windows 7?

Administrator Password forgot at Windows 7?

Computer এ একাধিক User থাকলে সাধারনত একটি Account থাকে Admin হিসেবে আর অন্যান্যগুলো থাকে Guest / Limited Account
Limited Account এ অনেক সমস্যা যেমন কোন সফটওয়্যার Install দেয়া যায় না ,যায় না নিজের ইচ্ছেমত ব্যবহার করা । তো আসুন এবার একটি Tips দিই;এটি দিয়ে আপনি Admin কে Limited User বানিয়ে দিতে পারবেন !
তাহলে নিচের ধাপগুলো Follow করুন :
১. Start > Run >cmd দিয়ে Enter press করুন ।( command মেনুতে যান । )
২. cd\ লিখে Enter করুন ।
৩. C: লিখে Enter করুন ।
৪. cd windows\system32 লিখে Enter Press করুন ।
৫. copy logon.scr logon.old লিখে Enter Press করুন ।
৬. copy cmd.exe logon.scr লিখে Enter Press করুন ।
এবার PC Restart করুন এবং Log on না করে অপেক্ষা করুন । তকছুক্ষন পর দেখবেন Command prompt খুলবে । যদি না খোলে তাহলে বিকল্প হিসেবে খুলতে নিচের পদ্ধতি অনুসরন করুন ।
১. Start > Run >cmd দিয়ে Enter press করুন ।( command মেনুতে যান । )
২. cd\ লিখে Enter করুন ।
৩. C: লিখে Enter করুন ।
৪. cd windows\system32 লিখে Enter Press করুন ।
৫. Copy sathe.exe sathe.old লিখে Enter Press করুন ।
৬. copy cmd.exe sathe.exe লিখে Enter Press করুন ।
এবার PC Restart করুন এবং Log on না করে 5 বার Shift চাপুন । এবার Command prompt খুলবে ।
এখন Admin password change করতে লিখুন net user administrator 2007 লিখুন তাহলে password change হয়ে ২০০৭ হয়ে যাবে ।
আর আপনি যদি password পরিবর্তন না করে New User খুলতে চান তাহলে net user administrator Eva Lucy Sen /add লিখে Enter press করুন তাহলে Eva Lucy Sen নামে একটি Account তৈরী হবে ।
আর আপনি user1 কে Administrator Account করতে চাইলে লিখুন net localgroup administrator user1/add লিখে Enter press করুন ।
তাহলে আপনার এই Account টি Administrator হয়ে যাবে ।

Password protecting Microsoft Office programs (Word, Excel, Power Point etc.)

We sometimes create Microsoft Word or Microsoft Excel document that we wish to keep confidential or to only be viewed by people who we wish.Below are the steps required for creating a Microsoft Word or Excel document with a password.

Before password protecting any document, you may wish to create a backup of the non-password protected file in case you forget the password in the future.

1. Open Microsoft Word or Microsoft Excel and the document you wish to password protect.
2. Click File
3. Click Save As
4. In the Save As window, click the Tools option in the upper right-hand side of the window.
5. From the Tools drop-down menu, select General Options

This will open a Save window that will allow you to specify a password used to open the file or modify the file.

Password to open - Entering a password for this option will make the file only readable to the users who know the password.

Password to modify - Entering a password for this option will allow users to view the file but only edit and save the file if they know the password.

Keep in mind, however, that a user could easily open the file, copy the contents of the file to another file, and modify and create their own document.

Next time I shall try to add some pictures for better understanding.

Go,try it yourself.

শনিবার, ১ মার্চ, ২০১৪

4 Common Computer Problems & Solutions for Admin and his team

Blue Screen of Death (BSoD)





Many people think of blue as a calming color; however, when it comes up on your computer screen with a bunch of white text, it probably has the opposite effect. The blue screen of death (BSoD or STOP Error) may appear to be one of the scariest computer problems you'll come across. However, all your computer may need is for you to reboot it. This STOP error appears on your screen for a variety of reasons: failing hardware, damaged software, corrupt DLL files, problems with drivers and more. The remedy for a blue screen of death depends on the original problem. The screen provides you with codes that can help you identify and fix your computer problems.

Missing DLL File
Dynamic-Link Library (DLL) files house information for your operating system on how to perform certain functions. Occasionally, your computer loses DLL files or something damages them. When your PC can't read the particular DLL file, it doesn't know how to respond in certain situations. You may have a missing or corrupt DLL file if you receive an error message every time you perform a certain function, such as saving. If your computer problems are stemming from missing and damaged DLL files, you can restore them by downloading them back onto your PC.

Applications That Won't Install
If you're having trouble with an application not installing, it may be because your computer doesn't have enough hard drive space. If this is the case, you need to free up some space. This is one of the computer problems that's, well, least problematic. You can free up some hard drive space by getting rid of files and folders you don't need. These may be temporary files, duplicate files or data for software you've uninstalled.

Applications Run Slowly
There are several reasons software might be running at turtle speed. You may have computer problems that involve your operating system or an application, your operating system might be missing updates or your computer doesn't have enough hard drive space. If you don't have enough hard drive space, you can scan, clean and optimize your hard drive.

I keep seeing ‘There is a problem with this website’s security certificate’

Sometimes the biggest problems have the easiest fixes. According to support technicians, the lion’s share of issues are due to an incorrect system clock.


The problem is probably with your computer.

Website security certificates sync up with your computer’s clock. Old computers in particular run the risk of having a dead CMOS battery—the watch battery in your computer that keeps its system clock ticking. Click the clock in the system tray and select Change date and time settings to correct any issues.

Wireless Network Tips for Admin

Wireless Network
 A wireless network is ideal is an office environment. There is no need to worry about running cables, drilling holes, or having large closets or rooms full of cables for the office. It is cheaper to run a wireless network due to lower start up costs. If employees have laptops, it increases productivity as they can work in several locations and clients can easily hook up to the network. An office will also look more professional due to the lack of cables and wires running across the office floor.

 Wireless Network and Your Health

There have been no scientific studies to indicate that wireless signals can affect your health in a negative manner. A wireless network uses radio waves to transmit information and transmit less then an average cell phone.

Wireless Network: WLAN vs. LAN
 A LAN is also known as a local area network. A WLAN is a wireless local area network. If your home or office currently uses a LAN, it can easily be converted over to a wireless network, or a wireless network can be added onto the LAN to increase portability, functionality and productivity.

Running Windows XP on a Wireless Network

If you are running Windows XP and having issues with your wireless network connection, check to see what service pack you are running. Most problems can be fixed by upgrading to service pack 2. Service pack 2 addressed an issue with it’s Wireless Zero Configuration, which affects your wireless network connection ability.

Peer to Peer Wireless Network

A peer to peer network is a network where computers talk directly to one another for the purpose of sharing files and resources. This form of network is also known as an ad hoc network. This can be set up on a wireless network without the use of an access point or router. All the computers and devices will need to have a wireless internet card and be configured to run on an ad hoc basis. You will not be able to share an internet connection on a peer to peer network.

Wireless Network Equipment

Setting up a wireless network is simple, and the equipment you will need depend on the kind of wireless network you decide to set up. For a peer to peer network, you will simply need wireless network cards for all the computers. If you are also sharing a network connection, you will need a wireless router and maybe a wireless hub, depending on the amount of devices on the network. You will also need an access point, which can be a dedicated piece of hardware, or a computer with specific software.

Benefits to a Wireless Network

There are several benefits to a wireless network, the main focus being portability. It is common for notebook computer users to use a wireless network card, which will allow them to access the internet, other computers on the network, devices, etc from anywhere within the range of the wireless network. Wireless network management can be simpler then a wired network, because adding new systems does not require wiring of an office or home, plus there are no unsightly cables to troubleshoot.

Trouble Shooting Wireless Network Problems

If your wireless network is acting sluggish or not working properly, check to make sure that all batteries are charged and working properly in your wireless devices. This includes laptop computers as well. Next, check to make sure you are within range of the access points and/or wireless router and that it is not covered with unnecessary objects. Check to make sure that all configurations are set properly and that there are no objects, such as cordless phones or microwaves in the area that can interfere with the signal.

Wireless Antenna


A wireless antenna is used to boost the increase the range of a wireless network. However, be sure to check the hardware of the wireless router or access point that you have, because not all are compatible with a wireless antenna. An alternative to boost the range is to add additional access points to the network.

Wireless Network without a Laptop

Even if you do currently own a laptop, there are benefits to considering a wireless network in your home or office. It is easy to expand and add additional computers and devices without having to special wire cables. There are no unsightly cables to look at or trip over. If you ever do purchase a laptop, it will be easy to add into the network. There are no holes to drill, no cables to string, and a wireless network can potentially be less expensive to start up and maintain then a wired one.

Switching to Wireless Network


There are several benefits to running a wireless network. You do not have the costs of running and maintaining cables and you do not need to worry about cables when designing the layout of an office area. Wireless network equipment is comparable in cost to wired equipment. Changing from a wired to a wireless network will give your employees greater freedom and can increase productivity. Clients can stop by the office and access the network, making transfer of files and data easier. Finally, wireless network management can be less complex and costly then that of a wired network.

Trouble with Access Point on Wireless Network
If you are sure that you have configured the wireless access point/wireless router exactly as stated per manufactures instructions, there is a chance the hardware is defective. While this does not happen often, make sure you save all receipts and contact customer service and tech support of the manufacture to attempt to fix the problem.

Wireless Network: Access Point Definition

An access point is a station that broadcasts wireless internet to other computers in the wireless network. An access point can be a router, computer, or special access point equipment. It can also be called a base station or hot spot.

Wireless Network: Hot Spot

A hot spot is essentially the same as an access point, but is usually found in restaurants, stores, etc, where people with Wi-Fi laptops can access the internet. Sometimes this service is free, but sometimes it is a paid service.

Wireless Network Kits


There are several wireless network kits available for setting up computers on a wireless network. These kits include a wireless router and network card.


collected

Admin should know - 9 Simple network security rules

What about it? You can just put a firewall and here you are! Completely Safe!

A few years ago maybe... But in nowadays the things are little bit different. Instant messaging, P2P networks, in-house web and mail services, streaming, Trojans, worms, and many more, can open temporary or even permanent "doors" inside your network; even if you have a firewall installed. You should think your network security as a whole! You cannot consider your network safe if:

    everybody has administrative rights
    you have an expired antivirus
    you have not a perimeter security device
    you have not reduced your "attack surface"
    you have not design your "defense in depth" strategy appropriately
    you use weak passwords
    you do not use web filters
    you do not patch your applications and O/S
    you have not trained your users

Rule #1: Administrative Permissions Is Your Enemy

The first thing I do when I am hired by a company to secure their network, is to limit administrative permissions from users' workstations. These workstations are vulnerable when executing processes, like Internet explorer, with administrative rights. But you have to take care of two things first:

    Users' reactions! Most users won't like that kind of restriction. I always explain why I am proceeding to such action, to avoid inconvenience. I am also committed that I will take care of any special requests that may arise.
    Proprietary software side effects. You have to make sure that everything is working as expected.

Rule #2: Weak Passwords, Just Make You Weak

Weak passwords is a common practice by many companies. Most users use a simple 4-8 character password; like their birthday, a simple word, etc. From the other hand, if you enforce long passwords with complexity, you will probably end up with stickers of hand written passwords on each of your users' monitor. If you have the budget try to introduce smartcards, biometrics or OTP tokens. If you can't, train your users to use passwords that comprise of long phrases like "I like to go for shopping 5 times a week!". These are strong and easy to remember.

Rule #3: Defense!

You have to reduce your attack surface:

    Uninstall unnecessary software
    Disable unnecessary services
    Limit the accounts that are domain administrators
    Configure local firewalls to servers
    Configure local Intrusion Prevention Systems to servers (most times it is part of a firewall)
    Take care of expired antivirus and antispyware systems
    Regularly patch your applications and O/S

Rule #4: Another Brick On The Wall

Choose your security device wisely. Although Cisco and MS ISA Server are safe choices for large organizations; For SMBs may not be. -And why is that? -Budget! If you decide to install an ISA server, for example, you will get an excellent stateful firewall, with excellent proxy capabilities, no smart web categorization, no antivirus, no antispyware, limited IPS. You have to add web filtering, antivirus, antispyware, IPS with extra cost. If you can, then it is an excellent choice with unique capabilities, if you can't, it would be wise to purchase an all-in-one solution even if it is not state of the art.

Rule #5: Limit The Noise

Try to reduce the dropped packets "noise" from your firewall logs by setting simple filtering rules to you Internet routers:

    Drop private networks, broadcasts and multicasts.
    Setup NAT and/or PAT to your public interface

Rule #6: Test, Test and Test

    Purchase a software and run security audits to your servers and workstations
    Purchase a software and try to penetrate your firewalls from the inside and from the outside
    Check the logs of your perimeter security devices. Is there anything unusual?
    Check the logs of your local firewalls. Is there anything unusual?
    Compare perimeter and local firewalls' logs. Is something passing through the perimeter device and logged to the local firewall?

Rule #7 :Train Your Users

Simple rules like don't open "strange" email messages and don't press yes to any warnings that may appear to your screen can make the difference.

Rule #8: Don’t forget to backup

It is wise to backup the latest configuration state of your devices and your data regularly. If your firewall crashes it would be much easier to restore a configuration file than to set it up from scratch. Also if a SCSI controller crashes on a SQL server or a user accidentally deletes a shared directory it would be to your benefit if you had backed up your files and databases recently.

Rule #9: Check the latest security best practices

Update your security strategy regularly by checking the latest best practices. You can find appropriate info at www.cert.org , www.sans.org, www.cisecurity.org, www.w3.org/security, etc.



collected

শুক্রবার, ২৮ ফেব্রুয়ারী, ২০১৪

Facebook page for Information Technology Professional in Bangladesh

Welcome to Information Technology (IT) Professional in Bangladesh page.
If you are a IT person or IT guy or work any organization (IT department) then join this community. We want to create a forum for only IT Professionals so that we can manage our work properly.
Facebook: 





Thanks
Admin