Sunday 4 September 2011

What is GSM ?

http://total-one.blogspot.com


Here you will learn about gsm network technology introduction, cellular operators, cdma, voice mail, sim cards, dual band, quad band, communication channel, wireless communication and gprs overview. GSM was first introduced in the Finland in the year of 1991. GSM mobile phones operate on the TDMA systems. In the TDMA (time division multiple access system), multiple users can access single radio frequency without any interference. GSM is now the de facto standard for the mobile communication in the world.  
The GSM (Global System for Mobile Communications) is a hugely successful wireless technology in the world. GSM has become the world’s largest growing communication technology and it has been expand in more than 214 countries of the world. The TDMA technology provides the individual time slot within a specific channel for each user.


GSM leads the world as the fastest growing mobile/wireless digital technology that is most reliable and is available in the marketplace today. GSM provides the integrated high-speed data, fax, voice mail, paging and short messages services features. GSM offers the secure communication, privacy and fraud prevention.
 
After subscribing to the GSM service, you can use your phone at your home, office, across the continent or around the world with the country specific SIM cards. GSM operates on the different frequency levels like 900 MHz, 1800 MHz or 1900 MHz.
1900Mhz is used in the North America and 1800 MHz is for the other locations. Different mobile phone networks around the world operate at different frequencies. If you wish to use your mobile phones outside of your GSM frequency range then you should use a mobile/handset that support multiple frequencies. Before buying a mobile phone, make sure that it is compatible with the different bands of the GSM.
Dual-band – A dual band phone operates at different spectrum like 900 MHz and 1800 MHz. Dual-band GSM works in Europe, Asia, Africa, Australia and Sound America.
Tri-band – A tri band phone operates on the three different frequency levels like 900 MHz, 1800 MHz and 1900 MHz. This means that you can use your mobile phone in Europe, Asia, Australia, Africa and North America.
Quad-band – A quad band GSM capable phone allows you to roam almost everywhere in the world. It covers the different frequency ranges like 850 MHz, 900 MHz, 1800 MHz and 1900 MHz. 99% countries in the world use the GSM standard and it seems that GSM will eventually be the only cell phone standard in the mobile communication world. GSM provides the best voice quality and standard.
Today, there are more than 720 GSM mobile networks across the more than 214 countries. According to the recent statistics, there are more than 2 billion users of the GSM in the world. Major GSM using countries includes China, Russia, United States and India. A mobile phone can be a bewildering affair for a traveler. It is mostly incompatibility with the network of your visiting country, since every country in the world has different frequency band of operation. With a GSM enable mobile phone you can access more than 214 countries around the globe.
GSM is a state of the art technology offering voice, data, fax and SMS capabilities. Most of the mobile phone operators now offers email to SMS service by which you can receive the important news, flight status and other useful information on your mobile phone. Many operators give access to the ISDN services by which fast data transmission is possible. Many other offers GPRS (Global Packet Radio Service) with this service you can connect to the high speed data communication channel like 9600 bps. The two major GSM service providers in the US are the T-mobile and Cingular.

Computer Useful Tips




How to Setup Workgroup and Computer Name in Windows XP
Computer name is the unique identifier of the computer in the network. If you want to setup the computer name and the workgroup in the Windows XP then follow these steps.
1. My Computer>Right Click>click on Properties>
2. Assign unique computer name.
3. Assign the same workgroup name as of the other computers.
4. You will be prompted to restart the computer.
How to secure your computer network
Securing a computer networking is the vital part of the administration of the network. There are different security threats of a computer network such as hacking, viruses, unauthorized user access, spywares, adware, Trojan horses and other malicious codes. If you are managing your computer network, it’s your responsibility to secure your network from all above mentioned aspects. Always install up to dated antivirus program such as Norton Antivirus, Trend Micro Antivirus, McAfee or Panda Antivirus. Enable firewall router or firewall software on your network to control the unauthorized access so that no intruder or hacker can access your network.

Filter the internet and monitor all the activities of the users on the internet. Block the risky websites and web applications. Install a network monitoring software and monitor the activities of users. Regularly update your software applications on the server and the client computers.
How to Share Printer and Folders in Windows XP
If you have two or more computers then a computer network will be formed and there will be necessity to share the files and printers. For sharing the folders, you need to right click the folder > Sharing and Security > Share this folder on the network > give the shared name for this folder. You can set further rights and permissions on this folder for different users.
 
Sharing a printer is the same as sharing a folder on the network. Click start > Control Panel > Printer and Faxes > Right click on the printer name > Properties > sharing > Share this folder (set the shared name for the printer. This same shared name of the printer will be accesses from the other computers on the network to access and share the printer such as \\computename\printername
How to troubleshoot computer network using Ping command
The PING command is the basic network troubleshooting command. Ping shows the status of the other computer whether it is on the network or not. Let’s say you have three computers in your computer network computer A (IP Address, 10.10.10.1), computer B (IP address 10.10.10.2) and computer C (IP address 10.10.10.3). You are on computer A and you want to check the connectivity of the computer B then you will need to go the Start > Run > type CMD > DOS screen will appear. Now type there ping 10.10.10.2 if you get the reply this means the computer B is connected on the network and if you get the timed out message then there is some problem in the connectivity. This can be due to different reasons like check both the ends of the network cables in the computer and in the Router/Switch, check if the green LED light is blinking in the network card of the computer also check if any software application blocking the network communication such as firewall or antivirus etc.
How to setup Xbox Network Connections
Following is the simple configuration methods of Xbox network connectivity.
1. Go to the settings of Xbox Dashboard and then network settings. You will see IP address, DNS and some other settings.
2. Click IP settings. You can select to obtain the IP address and other settings automatically from the DHCP server or router.
3. Go to the previous menu and set obtain the DNS settings from the Router or DHCP server automatically.
How to Setup Roaming Profile in Windows 2000/2003
Roaming profiles are saved on the network server. If you want your users to access their own roaming profiles then you need to open Active directory users and computers, right click on the user, then properties and then profile tab. In the profile tab type the UNC path of the user you made on the server like this \\servername\profiles\%username%. Profiles folder should be in the root of the C Drive. Make sure you have created the profiles folder on the C drive and shared it with the same name as the name of the folder. Next time when the user will log on from the client computer, his/her local profile will be saved in the folder same as the user name and this folder will be created in the profiles folder.
How to Install IIS in Windows XP
Windows XP Professional edition has the built-in IIS. Internet information server is used to host the website on your own computer and these sites can be accesses from all over the world. IIS has great administrative features but it supports only 10 concurrent connections of the clients at a time.
1. Click start>settings>control panel>Add remove program
2. Click Add remove windows components.
3. Click on Internet information services > Details.
4. In the IIS check the boxes SMTP and World Wide Web and you can also check FTP if you want to setup it.
5. In Windows components selection, make sure that you have selected IIS and you may need to insert the CD of Windows XP Professional during the installation.
How to Setup Roaming Profiles in Windows 2000
The TCP/IP component in the Windows operating systems is considered a core component so it cannot be easily uninstalled. Using the following commands with the certain switch you can however achieve the same results and by uninstalling and reinstalling the TCP/IP components.
netsh int ip reset [logfile]
Logfile is the name of the file that is used to records the actions by the netsh command.
netsh int ip reset iplog.txt is used to create the iplog.txt in the current directory.
Caution: Be very careful while using these commands because they can directly damage your system.
How to Hide a shared folder in Windows XP
If you want to hide a shared folder from the network users, right click the folder and click sharing and security and give a shared name of a folder plus $ sign e.g. ebooks$. In this way network users will not be able to see the shared folder on the network. For you to see the hidden shared folder, map the drive and type in the path including the $ sign in the folder box.

Google Search Tips and Tricks

  • Search all Pages of a Site:-
site:"name of site"
for example.
site: http://total-one.blogspot.com/
Using site: operator we can search all pages of site.
intitle:"search string"
for example.
using intitle: operator we can search title of web pages for a particular string.







intitle:index.of? (pdf|chm) "ebook name"
For example.
above command search all Open directory for ebooks.
intitle:index.of? (mp3|dat|mpg|mpeg|rm|rmvb|3gp|flv|mkv|avi) "Music or Movie name"
For example.
above command is used to search music and movies. if you want movie in a format other than listed above then add yourself using | after avi.
  • Search Particular Type of File(filetype:):-
"file to search" filetype:"file type"
For example.
filetype: operator is used to search a particular type of file for example pdf(ebook), txt(text file) etc.
  • Search words in url of web pages(inurl):-
inurl:"string to search"
For example.
inurl: operator is used to search some words in the url of web pages.
  1. Use double quotes for searching given string e.g. "computer and networking tricks" using double quotes we will get result having whole string in the sequence as written above.
  2. use + and - sign to include pages having word(+ ahead of it) and exclude pages having word(- ahead of it) e.g. computer and networking +tricks -tips the result will have page that contain tricks and do not have that contain tips.
  3. put * in your search string where you are doubt full about the word or phrase. for e.g. hacking is * that will search page having phrase shown with some wild card terms.
  4. use OR operator where you want to search terms contain either of its operands for e.g. tips OR tricks this will search pages containing either tips or tricks.
NOTE:-
  • In case you are not used to of this or you don't like it then you can use google's advanced search
  • Buy "google hacks" ebook of oreilly from here to Learn more on this topic. or search on http://findfreebook.blogspot.com for free ebook on google hacks.

How to make pen drive bootable?


Introduction:-
Now a days many operating system are coming into market of linux. but because of the cost of original cd people usually download it from net and write it into cd and then run it. for testing an operating sysytem wasting the cd is not good task as well.So for testing there is a simple way to do it, and that way is making your pen drive bootable and installing OS into it,
Now the question arises that our pen drive is not a bootable device but we can make it bootable by creating track and sector on it by using software
Steps:-
  • Firstly format your pen drive into disired format which os require for example dos require fat 16 and all the newer versions support fat32 and ntfs.
Note:- windows in build utility does not provide you fat16 and many more formatting option so you have to do it using other utility search on google for required format.
  • Now create bootsector into your pen drive using the software

a) syslinux utility(command line e.g in cmd)
type "\syslinux.exe -m -a -d /boot/syslinux z:" (z=pen drive letter)
or
b) HP Drive Key Boot Utility (graphical).
1) install it into your computer.
2) now start it from start menu.
3) follow the simple steps and tell it to make your pen drive bootable.

How to Speed Up Slow Torrent in Utorrent/Bitorrent


First and The Most effective way to increase speed is using Vuze instead of any other torrent client.
Other Ways:-
There are some Setting in torrent Client that you need to change to Increase your download Speed. Some of the setting(with value) are listed below.
  • Torrent Download and upload Speed:-
    1. Go to Options > Preferences in your utorrent Client.
Click Bandwidth option as shown below

Here put zero for both max. upload rate and max. download rate.

Port:-
Go to connection option from the same window as shown above.

    1. Press random Port option as shown above to change your port.
      Note:-
      The concept behind changing port is that sometimes your isp may block your torrent ports(active torrents port) so it is good to change your port at regular interval.
  • Increase TCP Connection:-
    1. Download patch from here.
    2. Open this file in cmd(open cmd and then run it from there).
      NOTE:-

      1. This will increase the limit of no. of connection that you can make. this is for windows xp sp2.
      2. This setting require restart of computer so restart your computer after you have applied all the these settings.
  • Increase Tracker(Most Effective):-
    1. First, download Tracker list from here.
    2. Now Go to property of the torrent having slow download speed(right click the torrent in utorrent). 
    1. Now in the box highlighted above past content of file just downloaded.
    2. Make sure "Enable DHT" and "Peer Exchange" and "Local peer Discovery" are checked.
    3. Press OK.
      NOTE:-make sure you do not include more than 10 tracker for a single torrent.
  • Make Continues Connection with Internet
    1. Make a Batch file(bat extension) with Ping to 192.168.1.1(router/modem) address with unlimited time
      OR
      Download file from here. and then change extension from mp3 to bat.
    2. Start this file whenever you starts your torrent application.
      NOTE:-
      I have realized that whenever i excess my internet my torrent download speed remain up but once i go somewhere else or go for sleep speed goes down.

      therefore i made this cmd command to make my torrent client realize that i m working. i can't explain why this is happening but this is working very well on my PC.
  • Tips:-
    1. Right click torrent in utorrent and press Update Tracker.
    2. Press Force download on torrent required first.
    3. Right click torrent required first then go to Bandwidth allocation>high.
    4. Use Vuze(BitTorrent Client) Instead of any other BitTorrent Client because it somehow give high speed.        <<--Effective

How To change|Spoof IP And Mac Address?


Introduction:-
MAC Address(media access control) is the unique Code/Name given to your LAN card that differentiate your computer from any other computer on the internet. mac address sometime also called as Ethernet Hardware Address. Now the question arises if the mac address is unique then how can we change it?
The answer to this question is very simple, the exact address is only known to your Operating System(windows xp) because this is the one who actually interact with hardware And operating system provide allow us to change this address that's why we are able to change our mac address[mac address can not overwritted it can only be spoofed].



Steps:-
  1. Open Network connections from Control Panel.
  2. right click the connection (of which you want to change mac address).
  3. Click Property.
Now the window will appear as shown below in here click configure...

      5.Now a window will appear in here click Advanced Tab.
6.In here in Property click Network address.







    7.Now in the combo box that appear write the mac address that you want to spoof.
      8.Your mac address now is been spoofed.







Saturday 3 September 2011

Protecting Document with Password


You can protect your document by applying password so that unauthorized person can not display as well as modify your document. You can apply two types of passwords:
Password to open the document: 
If it is applied then you have to give the correct password to open the document, otherwise you cannot open the document.
Password to modify the document: 
If it is applied then you have to give the correct password to modify the document, otherwise your document is opened but you cannot modify the document. It means that your document becomes read-only.
To apply a password to document, follow these steps.
* Open Save As dialog box by selecting "Save As" command from File menu.
* Click "Tools" button of Save As dialog box and choose "General Options" from drop down menu, "Save" dialog box appears as shown in figure below.
* Enter first password in "Password to open" text box and second password in "Password to modify" text box (if required) and click "Ok" button of dialog box. Microsoft Word will open "Confirm Password" dialog box for the confirmation of passwords. The maximum length of password is 15 characters.
* Re-enter the password to open and password to modify and click "Ok" button of Confirm Password dialog boxes one by one.
* Click "Save" button of Save As dialog box.