Basic IT and Network Training
Basic IT and Network Training
Group
Basic IT Training & Data Networking Course
@: jasonarceolopez@yahoo.com
Communication protocols define the rules and data formats for exchanging information
in a computer network. Well-known communications protocols include Ethernet, a
hardware and link layer standard that is widely used for local area networks, and the
Internet protocol suite (TCP/IP), which defines a set of protocols for communication
between multiple networks, for host-to-host data transfer, and for application-specific
data transmission formats. Protocols provide the basis for network programming.
Today, computer networks are the core of modern communication. All modern aspects
of the public switched telephone network (PSTN) are computer-controlled. Telephony
increasingly runs over the Internet Protocol, although not necessarily the public Internet.
The scope of communication has increased significantly in the past decade. This boom in
communications would not have been possible without the progressively advancing
computer network. Computer networks, and the technologies that make
communication between networked computers possible, continue to drive computer
hardware, software, and peripherals industries. The expansion of related industries is
mirrored by growth in the numbers and types of people using networks, from the
researcher to the home user.
For example, a layer that provides error-free communications across a network provides
the path needed by applications above it, while it calls the next lower layer to send and
receive packets that make up the contents of that path. Two instances at one layer are
connected by a horizontal connection on that layer.
The data link layer provides the functional and procedural means to transfer data
between network entities and to detect and possibly correct errors that may occur in
the physical layer. Originally, this layer was intended for point-to-point and point-to-
multipoint media, characteristic of wide area media in the telephone system. Local area
network architecture, which included broadcast-capable multi-access media, was
developed independently of the ISO work in IEEE Project 802. IEEE work assumed
sublayer-ing and management functions not required for WAN use. In modern practice,
only error detection, not flow control using sliding window, is present in data link
protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE
802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area
networks, its flow control and acknowledgment mechanisms are rarely used. Sliding
window flow control and acknowledgment is used at the transport layer by protocols
such as TCP, but is still used in niches where X.25 offers performance advantages.
The ITU-T G.hn standard, which provides high-speed local area networking over existing
wires (power lines, phone lines and coaxial cables), includes a complete data link layer
which provides both error correction and flow control by means of a selective repeat
Sliding Window Protocol.
Both WAN and LAN service arrange bits from the physical layer into logical sequences
called frames. Not all physical layer bits necessarily go into frames, as some of these bits
are purely intended for physical layer functions. For example, every fifth bit of the FDDI
bit stream is not used by the layer. Following are the functions of data link layer:-
Framing
Physical Addressing
Flow Control
Error Control
Access Control
Media Access Control(MAC)
The network layer provides the functional and procedural means of transferring variable
length data sequences from a source host on one network to a destination host on a
different network (in contrast to the data link layer which connects hosts within the
same network), while maintaining the quality of service requested by the transport
layer. The network layer performs network routing functions, and might also perform
fragmentation and reassembly, and report delivery errors. Routers operate at this layer,
sending data throughout the extended network and making the Internet possible. This is
a logical addressing scheme – values are chosen by the network engineer. The
addressing scheme is not hierarchical.
The network layer may be divided into three sublayers:
1. Subnetwork access – that considers protocols that deal with the interface to
networks, such as X.25;
2. Subnetwork-dependent convergence – when it is necessary to bring the
level of a transit network up to the level of networks on either side
3. Subnetwork-independent convergence – handles transfer across multiple
networks.
An example of this latter case is CLNP, or IPv6 ISO 8473. It manages the connectionless
transfer of data one hop at a time, from end system to ingress router, router to router,
and from egress router to destination end system. It is not responsible for reliable
delivery to a next hop, but only for the detection of erroneous packets so they may be
discarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet
access protocols because they carry interface addresses rather than node addresses.
A number of layer-management protocols, a function defined in the Management
Annex, ISO 7498/4, belong to the network layer. These include routing protocols,
multicast group management, network-layer information and error, and network-layer
address assignment. It is the function of the payload that makes these belong to the
network layer, not the protocol that carries them.
An easy way to visualize the transport layer is to compare it with a Post Office, which
deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may have
the equivalent of double envelopes, such as cryptographic presentation services that can
be read by the addressee only. Roughly speaking, tunneling protocols operate at the
transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over
an IP network, or end-to-end encryption with IPsec. While Generic Routing
Encapsulation (GRE) might seem to be a network-layer protocol, if the encapsulation of
the payload takes place only at endpoint, GRE becomes closer to a transport protocol
that uses IP headers but contains complete frames or packets to deliver to an endpoint.
L2TP carries PPP frames inside transport packet.
Although not developed under the OSI Reference Model and not strictly conforming to
the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the
User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized
as layer-4 protocols within OSI.
In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed
into strict layers as in the OSI model. RFC 3439 contains a section entitled "Layering
considered harmful." However, TCP/IP does recognize four broad layers of functionality
which are derived from the operating scope of their contained protocols, namely the
scope of the software application, the end-to-end transport connection, the
Even though the concept is different from the OSI model, these layers are nevertheless
often compared with the OSI layering scheme in the following way: The Internet
application layer includes the OSI application layer, presentation layer, and most of the
session layer. Its end-to-end transport layer includes the graceful close function of the
OSI session layer as well as the OSI transport layer. The internetworking layer (Internet
layer) is a subset of the OSI network layer (see above), while the link layer includes the
OSI data link and physical layers, as well as parts of OSI's network layer. These
comparisons are based on the original seven-layer protocol model as defined in ISO
7498, rather than refinements in such things as the internal organization of the network
layer document.
The presumably strict peer layering of the OSI model as it is usually described does not
present contradictions in TCP/IP, as it is permissible that protocol usage does not follow
the hierarchy implied in a layered model. Such examples exist in some routing protocols
(e.g., OSPF), or in the description of tunneling protocols, which provide a link layer for an
application, although the tunnel host protocol may well be a transport or even an
application layer protocol in its own right.
The Internet protocol suite is the set of communications protocols used for the Internet
and similar networks, and generally the most popular protocol stack for wide area
networks. It is commonly known as TCP/IP, because of its most important protocols:
Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first
networking protocols defined in this standard. It is occasionally known as the DoD model
due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an
agency of the United States Department of Defense).
The TCP/IP model and related protocols are maintained by the Internet Engineering Task
Force (IETF).
The application layer contains the higher-level protocols used by most applications for
network communication. Examples of application layer protocols include the File
Transfer Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP). Data coded
according to application layer protocols are then encapsulated into one or (occasionally)
more transport layer protocols (such as TCP or UDP), which in turn use lower layer
protocols to effect actual data transfer.
Since the IP stack defines no layers between the application and transport layers, the
application layer must include any protocols that act like the OSI's presentation and
session layer protocols. This is usually done through libraries.
Application layer protocols generally treat the transport layer (and lower) protocols as
black boxes which provide a stable network connection across which to communicate,
although the applications are usually aware of key qualities of the transport layer
connection such as the end point IP addresses and port numbers. As noted above, layers
are not necessarily clearly defined in the Internet protocol suite. Application layer
protocols are most often associated with client–server applications, and the commoner
servers have specific ports assigned to them by the IANA: HTTP has port 80; Telnet has
port 23; etc. Clients, on the other hand, tend to use ephemeral ports, i.e. port numbers
assigned at random from a range set aside for the purpose.
Transport and lower level layers are largely unconcerned with the specifics of
application layer protocols. Routers and switches do not typically "look inside" the
encapsulated traffic to see what kind of application protocol it represents, rather they
just provide a conduit for it. However, some firewall and bandwidth throttling
The three top layers in the OSI model—the application layer, the presentation layer and
the session layer—are not distinguished separately in the TCP/IP model where it is just
the application layer. While some pure OSI protocol applications, such as X.400, also
combined them, there is no requirement that a TCP/IP protocol stack must impose
monolithic architecture above the transport layer. For example, the NFS application
protocol runs over the eXternal Data Representation (XDR) presentation protocol,
which, in turn, runs over a protocol called Remote Procedure Call (RPC). RPC provides
reliable record transmission, so it can run safely over the best-effort UDP transport.
Different authors have interpreted the RFCs differently, about whether the link layer
(and the TCP/IP model) covers OSI model layer 1 (physical layer) issues, or if a hardware
layer is assumed below the link layer.
Several authors have attempted to incorporate the OSI model's layers 1 and 2 into the
TCP/IP model, since these are commonly referred to in modern standards (for example,
by IEEE and ITU). This often results in a model with five layers, where the link layer or
network access layer is split into the OSI model's layers 1 and 2.
The session layer roughly corresponds to the Telnet virtual terminal functionality, which
is part of text based protocols such as the HTTP and SMTP TCP/IP model application
layer protocols. It also corresponds to TCP and UDP port numbering, which is considered
as part of the transport layer in the TCP/IP model. Some functions that would have been
performed by an OSI presentation layer are realized at the Internet application layer
using the MIME standard, which is used in application layer protocols such as HTTP and
SMTP.
The IETF protocol development effort is not concerned with strict layering. Some of its
protocols may not fit cleanly into the OSI model, although RFCs sometimes refer to it
and often use the old OSI layer numbers. The IETF has repeatedly stated that Internet
protocol and architecture development is not intended to be OSI-compliant. RFC 3439,
addressing Internet architecture, contains a section entitled: "Layering Considered
Harmful".
Conflicts are apparent also in the original OSI model, ISO 7498, when not considering the
annexes to this model (e.g., ISO 7498/4 Management Framework), or the ISO 8648
Internal Organization of the Network layer (IONL). When the IONL and Management
Framework documents are considered, the ICMP and IGMP are neatly defined as layer
An Internet Protocol address (IP address) is a numerical label assigned to each device
(e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication. An IP address serves two principal functions: host or
network interface identification and location addressing. Its role has been characterized
as follows: "A name indicates what we seek. An address indicates where it is. A route
indicates how to get there."
The designers of the Internet Protocol defined an IP address as a 32-bit number and this
system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due
to the enormous growth of the Internet and the predicted depletion of available
addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in
1995. IPv6 was standardized as RFC 2460 in 1998, and its deployment has been ongoing
since the mid-2000s.
IP addresses are binary numbers, but they are usually stored in text files and displayed in
human-readable notations, such as 172.16.254.1 (for IPv4), and
2001:db8:0:1234:0:567:8:1 (for IPv6).
The Internet Assigned Numbers Authority (IANA) manages the IP address space
allocations globally and delegates five regional Internet registries (RIRs) to allocate IP
address blocks to local Internet registries (Internet service providers) and other entities.
IP Versions
Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6.
Each version defines an IP address differently. Because of its prevalence, the generic
term IP address typically still refers to the addresses defined by IPv4. The gap in
version sequence between IPv4 and IPv6 resulted from the assignment of number 5
to the experimental Internet Stream Protocol in 1979, which however was never
referred to as IPv5.
IPv4 Addresses
In IPv4 an address consists of 32 bits which limits the address space to 4294967296
(232) possible unique addresses. IPv4 reserves some addresses for special purposes
such as private networks (~18 million addresses) or multicast addresses (~270
million addresses).
Ipv4 Subnetting
This early method soon proved inadequate as additional networks developed that
were independent of the existing networks already designated by a network
number. In 1981, the Internet addressing specification was revised with the
introduction of class-full network architecture.
Class Leading bits Range Net ID Host ID No. of nets Total addresses
7 24
A 0 0–127 a b.c.d 2 = 128 2 = 16777216
14 16
B 10 128–191 a.b c.d 2 = 16384 2 = 65536
21 8
C 110 192–223 a.b.c d 2 = 2097152 2 = 256
Class-full network design served its purpose in the startup stage of the Internet, but
it lacked scalability in the face of the rapid expansion of the network in the 1990s.
The class system of the address space was replaced with Classless Inter-Domain
Routing (CIDR) in 1993. CIDR is based on variable-length subnet masking (VLSM) to
allow allocation and routing based on arbitrary-length prefixes.
Early network design, when global end-to-end connectivity was envisioned for
communications with all Internet hosts, intended that IP addresses be uniquely
assigned to a particular computer or device. However, it was found that this was not
Today, when needed, such private networks typically connect to the Internet
through network address translation (NAT).
IPv6 Addresses
The new design is not intended to provide a sufficient quantity of addresses on its
own, but rather to allow efficient aggregation of subnet routing prefixes to occur at
routing nodes. As a result, routing table sizes are smaller, and the smallest possible
individual allocation is a subnet for 264 hosts, which is the square of the size of the
The large number of IPv6 addresses allows large blocks to be assigned for specific
purposes and, where appropriate, to be aggregated for efficient routing. With a
large address space, there is not the need to have complex address conservation
methods as used in CIDR.
Many modern desktop and enterprise server operating systems include native
support for the IPv6 protocol, but it is not yet widely deployed in other devices, such
as home networking routers, voice over IP (VoIP) and multimedia equipment, and
network peripherals.
Just as IPv4 reserves addresses for private or internal networks, blocks of addresses
are set aside in IPv6 for private addresses. In IPv6, these are referred to as unique
local addresses (ULA). RFC 4193 sets aside the routing prefix fc00::/7 for this block
which is divided into two /8 blocks with different implied policies. The addresses
include a 40-bit pseudorandom number that minimizes the risk of address collisions
if sites merge or packets are misrouted.
Early designs used a different block for this purpose (fec0::), dubbed site-local
addresses. However, the definition of what constituted sites remained unclear and
the poorly defined addressing policy created ambiguities for routing. This address
range specification was abandoned and must not be used in new systems.
Addresses starting with fe80:, called link-local addresses, are assigned to interfaces
for communication on the link only. The addresses are automatically generated by
the operating system for each network interface. This provides instant and
automatic network connectivity for any IPv6 host and means that if several hosts
connect to a common hub or switch, they have a communication path via their link-
local IPv6 address. This feature is used in the lower layers of IPv6 network
administration (e.g. Neighbor Discovery Protocol).
None of the private address prefixes may be routed on the public Internet.
All computers that belong to a subnet are addressed with a common, identical,
most-significant bit-group in their IP address. This results in the logical division of an
IP address into two fields, a network or routing prefix and the rest field or host
identifier. The rest field is an identifier for a specific host or network interface.
The routing prefix is expressed in CIDR notation. It is written as the first address of a
network, followed by a slash character (/), and ending with the bit-length of the
prefix. For example, 192.168.1.0/24 is the prefix of the Internet Protocol Version 4
network starting at the given address, having 24 bits allocated for the network
prefix, and the remaining 8 bits reserved for host addressing. The IPv6 address
specification 2001:db8::/32 is a large network with 296 addresses, having a 32-bit
routing prefix. In IPv4 the routing prefix is also specified in the form of the subnet
mask, which is expressed in quad-dotted decimal representation like an address. For
example, 255.255.255.0 is the network mask for the 192.168.1.0/24 prefix.
The benefits of subnetting vary with each deployment scenario. In the address
allocation architecture of the Internet using Classless Inter-Domain Routing (CIDR)
and in large organizations, it is necessary to allocate address space efficiently. It may
also enhance routing efficiency, or have advantages in network management when
subnetworks are administratively controlled by different entities in a larger
organization. Subnets may be arranged logically in a hierarchical architecture,
partitioning an organization's network address space into a tree-like routing
structure.
Computers participating in a network such as the Internet each have at least one
logical address. Usually this address is unique to each device and can either be
configured dynamically from a network server, statically by an administrator, or
automatically by stateless address autoconfiguration.
An address fulfills the functions of identifying the host and locating it on the
network. The most common network addressing architecture is Internet Protocol
version 4 (IPv4), but its successor, IPv6, is in early deployment stages. An IPv4
address consists of 32 bits, for human readability written in a form consisting of four
decimal octets separated by full stops (dots), called dot-decimal notation. An IPv6
address consists of 128 bits written in a hexadecimal notation and grouping 16 bits
separated by colons.
This logical addressing structure permits the selective routing of IP packets across
multiple networks via special gateway computers, called routers, to a destination
host if the network prefixes of origination and destination hosts differ, or sent
directly to a target host on the local network if they are the same. Routers constitute
logical or physical borders between the subnets, and manage traffic between them.
Each subnet is served by a designated default router, but may consist internally of
multiple physical Ethernet segments interconnected by network switches or
network bridges.
The routing prefix of an address is written in a form identical to that of the address
itself. This is called the network mask, or netmask, of the address. For example, a
specification of the most-significant 18 bits of an IPv4 address,
11111111.11111111.11000000.00000000, is written as 255.255.192.0. If this mask
designates a subnet within a larger network, it is also called the subnet mask. This
form of denoting the network mask, however, is only used for IPv4 networks.
The modern standard form of specification of the network prefix is CIDR notation,
used for both IPv4 and IPv6. It counts the number of bits in the prefix and appends
that number to the address after a slash (/) character separator:
This notation was introduced with Classless Inter-Domain Routing (CIDR) in RFC
4632. In IPv6 this is the only acceptable form to denote network or routing prefixes.
In classful networking in IPv4, prior to the introduction of CIDR, the network prefix
could be directly obtained from the IP address, based on its highest order bit
sequence. This determined the class (A, B, C) of the address and therefore the
network mask. Since the introduction of CIDR, however, assignment of an IP address
to a network interface requires two parameters, the address and its network mask.
In IPv4, on-link determination for an IP address is given simply by the address and
netmask configuration, as the address cannot be disassociated from the on-link
prefix.[2] For IPv6, however, on-link determination is different in detail and requires
the Neighbor Discovery Protocol (NDP).[3][4] IPv6 address assignment to an interface
IPv4 subnetting
The process of subnetting involves the separation of the network and subnet portion
of an address from the host identifier. This is performed by a bitwise AND operation
between the IP address and the (sub)network mask. The result yields the network
address or prefix, and the remainder is the host identifier.
An IPv4 network mask consists of 32 bits, a sequence of ones (1) followed by a block
of 0s. The trailing block of zeros (0) designates that part as being the host identifier.
The following example shows the separation of the network prefix and the host
identifier from an address (192.168.5.130) and its associated /24 network mask
(255.255.255.0). The operation is visualized in a table using binary address formats.
The mathematical operation for calculating the network prefix is the binary and of IP
address and subnet mask. The mathematical operation for calculating host number
is the binary xor of IP address and network prefix. The result of the operation yields
the network prefix 192.168.5.0 and the host number 130.
Subnetting
Subnetting is the process of designating some high-order bits from the host part and
grouping them with the network mask to form the subnet mask. This divides a
network into smaller subnets. The following diagram modifies the example by
moving 2 bits from the host part to the subnet mask to form four smaller subnets
one quarter the previous size:
The first subnet obtained from subnetting has all bits in the subnet bit group set to
zero (0). It is therefore called subnet zero. The last subnet obtained from subnetting
has all bits in the subnet bit group set to one (1). It is therefore called the all-ones
subnet.
The IETF originally discouraged the production use of these two subnets due to
possible confusion of having a network and subnet with the same address. The
practice of avoiding subnet zero and the all-ones subnet was declared obsolete in
1995 by RFC 1878, an informational, but now historical document.
The remaining bits after the subnet are used for addressing hosts within the subnet.
In the above example the subnet mask consists of 26 bits, leaving 6 bits for the host
identifier. This allows for 64 combinations (26), however the all zeros value and all
ones value are reserved for the network ID and broadcast address respectively,
leaving 62 addresses.
In general the number of available hosts on a subnet is 2n−2, where n is the number
of bits used for the host portion of the address.
RFC 3021 specifies an exception to this rule when dealing with 31-bit subnet masks
(i.e. 1-bit host identifiers). In such networks, usually point-to-point links, only two
hosts (the end points) may be connected and a specification of network and
broadcast addresses is not necessary.
A /24 network may be divided into the following subnets by increasing the subnet
mask successively by one bit. This affects the total number of hosts that can be
addressed in the /24 network (last column).
IPv6 subnetting
The design of the IPv6 address space differs significantly from IPv4. The primary
reason for subnetting in IPv4 is to improve efficiency in the utilization of the
relatively small address space available, particularly to enterprises. No such
limitations exist in IPv6, as the large address space available, even to end-users, is
not a limiting factor.
IPv6 does not implement special address formats for broadcast traffic or network
numbers, and thus all addresses in a subnet are valid host addresses. The all-zeroes
address is reserved as the Subnet-Router anycast address.
The recommended allocation for an IPv6 customer site is an address space with an
48-bit (/48) prefix. This provides 65536 subnets for a site. Despite this
recommendation, other common allocations are /56 as well as /64 prefixes for a
residential customer network.
Cable
Whereas Category 6 cable has a reduced maximum length when used for 10GBASE-
T; Category 6a cable, or Augmented Category 6, is characterized to 500 MHz and has
improved alien crosstalk characteristics, allowing 10GBASE-T to be run for the same
distance as previous protocols.
The heavier wire in some Cat 6 cables makes them too thick to attach to standard
8P8C connectors without a special modular piece, resulting in a technically out-of-
compliance assembly. Because the conductor sizes are generally the same, Cat 6
jacks may also be used with Cat 5e cable.
Category 6 cable can be identified by the printing on the side of the cable sheath.[1]
Pin T568A Pair T568B Pair Wire T568A Color T568B Color Pins on plug face (socket is reversed)
1 3 2 tip
white/green stripe white/orange stripe
2 3 2 ring
green solid orange solid
3 2 3 tip
white/orange stripe white/green stripe
4 1 1 ring
blue solid blue solid
5 1 1 tip
white/blue stripe white/blue stripe
6 2 3 ring
orange solid green solid
7 4 4 tip
white/brown stripe white/brown stripe
8 4 4 ring
brown solid brown solid
The latest standard from the TIA for enhanced performance standards for twisted
pair cable systems was defined in February 2008 in ANSI/TIA/EIA-568-B.2-10.
Category 6a (or Augmented Category 6) is defined at frequencies up to 500 MHz—
twice that of Cat. 6.
The global cabling standard ISO/IEC 11801 has been extended by the addition of
amendment 2. This amendment defines new specifications for Cat. 6A components
and Class EA permanent links. These new global Cat. 6A/Class EA specifications
require a new generation of connecting hardware offering far superior performance
compared to the existing products that are based on the American TIA standard.
The most important point is a performance difference between ISO/IEC and EIA/TIA
component specifications for the NEXT transmission parameter. At a frequency of
500 MHz, an ISO/IEC Cat. 6A connector performs 3 dB better than a Cat. 6A
connector that conforms with the EIA/TIA specification. 3 dB equals 50% reduction
of near-end crosstalk noise signal power; see 3dB-point.
Maximum Length
When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is
100 meters or 328 feet. This consists of 90 meters (300 ft) of solid "horizontal"
cabling between the patch panel and the wall jack, plus 10 meters (33 ft) of stranded
patch cable between each jack and the attached device. Since stranded cable has
higher attenuation than solid cable, exceeding 10 metres of patch cabling will reduce
the permissible length of horizontal cable.
When used for 10GBASE-T, Cat 6 cable's maximum length is 55 meters (180 ft) in a
favourable alien crosstalk environment, but only 37 meters (121 ft) in a hostile alien
crosstalk environment, such as when many cables are bundled together. However,
because the effects of alien crosstalk environments on cables are difficult to
determine prior to installation, it is highly recommended that all Cat6 cables being
used for 10GBASE-T are electrically tested once installed. With its improved
specifications, Cat6A does not have this limitation and can run 10GBASE-T at 100
meters (330 ft) without electronic testing.
Crimper
Tester
Cutter
Splicer
Modular Connector
http://en.wikipedia.org/wiki/Modular_connector#8P8C
IV. Router
V. Switch
Switches exist for various types of networks including Fibre Channel, Asynchronous
Transfer Mode, InfiniBand, Ethernet and others. The first Ethernet switch was
introduced by Kalpana in 1990.
VI. 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network
(WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands.
They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE
802). The base version of the standard was released in 1997 and has had subsequent
amendments. These standards provide the basis for wireless network products using
the Wi-Fi brand.
The 802.11 family consist of a series of half-duplex over-the-air modulation
techniques that use the same basic protocol. The most popular are those defined by
the 802.11b and 802.11g protocols, which are amendments to the original standard.
802.11-1997 was the first wireless networking standard, but 802.11a was the first
widely accepted one, followed by 802.11b and 802.11g. 802.11n is a new multi-
streaming modulation technique. Other standards in the family (c–f, h, j) are service
amendments and extensions or corrections to the previous specifications.
802.11b and 802.11g use the 2.4 GHz ISM band, operating in the United States
under Part 15 of the US Federal Communications Commission Rules and Regulations.
Because of this choice of frequency band, 802.11b and g equipment may
occasionally suffer interference from microwave ovens, cordless telephones and
Bluetooth devices. 802.11b and 802.11g control their interference and susceptibility
to interference by using direct-sequence spread spectrum (DSSS) and orthogonal
frequency-division multiplexing (OFDM) signaling methods, respectively. 802.11a
uses the 5 GHz U-NII band, which, for much of the world, offers at least 23 non-
overlapping channels rather than the 2.4 GHz ISM frequency band, where adjacent
channels overlap - see list of WLAN channels. Better or worse performance with
THE SPUTNIK
Until the evening of October 4th, 1957, the US President, Dwight Eisenhower, thought that he led
the world’s greatest nation. The USA was the richest country in the world, and until that evening,
it seemed that no other nation could threaten the USA.
But then some news arrived, that shook America’s belief in itself: The Russians were in space!
Until that moment, the Americans believed that their nation was the most powerful on Earth. But
the Soviet Union had gone beyond the Earth.
Millions of radios all over the world could hear a new broadcast: “Beep, beep, beep…” This
electronic noise was the sound of the satellite Sputnik 1, the first object placed in space by
humans. It was a Russian achievement and it shocked the Americans.
This was the time of the Cold War. The Soviet Union was America’s greatest enemy. The risk of a
real war was always present. But the Cold War was not just about armies and weapons. It was
also a war of technology and ideas. Each side presented its successes in science and technology
as proof that its political system was better.
Americans were worried. President Eisenhower ordered the creation of a department with the
best scientists to put together all their high-technology efforts and investigation.
They didn’t know it then, but they were taking the first step on a road that led to the most
important invention of the late twentieth century: the Internet.
On 7 January 1958, President Eisenhower announced a new organization called ARPA that would
control the government’s entire high technology network.
Soon ARPA was spending millions of dollars on research into new science and technology.
In the 1960s some American universities owned computers. They were used for mathematical
calculations, and were huge, the size of an apartment and cost millions of dollars. But the
computers couldn’t communicate with each other. In 1966, Bob Taylor, the head of ARPA, hired
Larry Roberts, an expert in technology who had managed to link two computers. He was put in
charge of the project to join the computers of universities in different parts of the USA. He said
he planned to do it by telephone line!
By the late 1960s ARPANET, a net that joined the computers of universities had been built. It
used a host computer and the messages went through the telephone lines.
The problem was that every computer used a different language, so they couldn’t understand one
another. They need smaller host computers that translated their code.
Bob Kahn and Vint Cerf thought that demand for the Internet would grow. But they never
imagined the size of its expansion. The fuel of this explosion was the arrival of the personal
computer.
One night in January 1975, Bill Gates was playing cards with some friends at Harvard University.
He was nineteen years old and he was studying law, but his first love was computers. Suddenly
his friend Paul Allen rushed into the room with a magazine. It had a picture of a new computer
called the Altair. It was the world’s first personal computer.
Bill and Paul had both loved computers for many years, from the time when they were at school
in Seattle. They had already started a company together which used computers to calculate the
best routes for traffic on busy roads. Both of them saw that the Altair was their big chance.
In 1975 the computer industry was almost completely controlled by one company: IBM
Bill and Paul realized that the producers of Altair would need software. So they wrote a software
program and sold it to Altair.
Bill soon left Harvard and started to work with Paul. They realized that even small computers
“micro computers” would need sotware.So they called their company Microsoft.
This was the beginning of a new industry . But before computers could become tryly popular, like
cars or televisions, they had to become something that anyone could use, This next step was
achieved by Apple computers.
Apple Computer was the big success story of the computer industry, It took a product that was
ugly, unfriendly and difficult to use and turned it into something that could be found besides
televisions and radios in ordinary US homes.
Apple Computers was founded by Steve Jobs and Steve Wozniak in Silicon Valley, California.
Now many computer companies were trying to produce hardware and software, but Apple was
the most successful. Brilliant technology and a friendly design at a price many people could afford
made Apple the star of this new industry.
In the 1980s computers became common. They began to appear in every area of life. And when
they were connected together, they created the Internet that we know today.
Tim is an English engineer with computers in his blood: both his parents worked on the first
commercial computer made in Britain, the Ferranti Mark 1. In 1980 Tim got a job at CERN for sis
months, and during this time he wrote a program called “Enquire Within”.
This name comes from a popular British book that was first published in 1856. The book is full of
advice and information on all sorts of different topics – from how to clean blood from a shirt to
how to get married.
Tim’s program aimed to organize his thoughts in the same way that the book organizes its
information. He wanted to find a way to create links among a wide variety of topics that
interested him. Within this program Tim could made electronic connections between documents.
He could also make connections between different documents on different computers, So, if Tim
was interested in apples, he could link all the paragraphs in a document that were about apples.
And if there was a very good data base on apples on another computer, he could make a link to
that as well.
Enquire Within was new because it could organize information according to the content of
documents, not where they could be found. It was “hypertext”.
A hypertext is a special kind of text that is intended to give more freedom to the reader (and the
writers). It contains links that take you to other places. They can lead to other texts, but also to
pictures or programs or musical recordings. There is no single path through a hypertext. Readers
can choose the path that suits them best.
In October 1989, he started writing a program that he called “World Wide Web”. At first “World
Wide Web” was the name of Tim’s program. Today the World Wide Web – or simply, the “Web” –
is all of the billions of documents on billions of computers that can be read by the “browsers” that
have followed Tim’s original program.
In ordinary life, if you “browse”, you look at a variety of things, people browse through
newspapers, or in bookshops or shops or museums. Tim’s program was designed for browsing, to
go wherever you liked in the text through links. Tim’s system used a new system of addresses.
The system means that anything, anywhere on the Internet can have its own address. The
addresses are called “URALs”.
Tim also created a new computer language called HTML. This is the language in which all Web
documents are written.
These inventions changed the world of Internet. The Internet of the 1980s was a place for
computer experts. Since the 1990s, anyone with a computer can use it. For most people, the
Web browser is the easiest program they ever use.
Observe safety rules when working inside the system and when handling computer components.
Avoid electric shock or personal injury by observing the following warning.
Hazardous Voltage
Electrostatic Discharge
WARNING: your computer's internal components are highly susceptible to risk of damage from
electrostatic discharge (static electricity, which occurs naturally on your body due to friction). To
avoid damaging your equipment, always earth yourself to your computer system before opening
the computer's chassis or handling any internal component(s).
Note: if you do not have a wrist strap, you can earth yourself by touching (and maintaining
continuous contact with) an unpainted metal part of the computer's chassis while handling
any of your computer's internal components or working inside the system.
Safety Rules
Select a suitable work space
Avoid carpets in cool, dry areas.
When you work on a carpet where static electricity is likely to be generated, make sure
take anti-static measures beforehand.
Wear cloth, Do not wear a wool or synthetic cloth to work with the computer.
Wear anti-static shoes to work with the computer.
Take off any jewels (a ring, bracelet, or wrist watch) before working with the computer.
Handling of components
Keep any component in an anti-static bag until you actually install it to the computer.
Hold an component by its edge to avoid touching any terminals or parts.
To store or carry any component, place it in an anti-static bag.
Turn off and disconnect all peripherals.
Do not disassemble parts other than those specified in the procedure.
Label any cable connectors before disconnecting. Note where the connector goes and in
what position it was installed.
CPU
The central processing unit processes all of the data that is accessed by the machine. In PCs
the CPU, or microprocessor, is a small silicon chip located beneath the fan. Essentially, the
purpose of a CPU is to process instructions through a four-part sequence of fetching,
decoding, execution and writeback.
Since the mid-2000s, most computers are sold with multi-core CPUs, which integrate two or
more processors into one unit. In 2007, Intel built an 80-core processor that can handle a
trillion operations per second.
RAM
Random access memory, also known as main memory, provides a buffer between the hard
drive and central processing unit. When files are requested for processing, they get
transferred from the hard drive to the memory. The CPU then processes the file and replaces
it in the memory.
The RAM provides a temporary storage that gets erased when power is removed from the
machine. It is important to save modified files to the hard drive so that they get saved if
power is lost.
Hard Drive
A hard drive provides permanent storage for the operating system, programs and files on a
machine. When files are saved to the hard drive, they are retained through power outages.
Traditional hard drives are composed of magnetic platters that spin when in use. Solid state
drives, which contain no moving parts, are another option.
Motherboard
The motherboard is an underlying circuit board that holds all the computer components
together. Computer components, including the CPU, RAM, power supply and hard drive, plug
into the motherboard. This allows the separate components to interact with each other to
create a fully functional machine. While each computer part has a unique function, they
would be useless without the unifying motherboard.
The power supply unit converts AC power from your wall outlet to DC power, usable by the
computer internals, and controls power saving. The original PSUs could only be turned on or
off, but ATX-compliant ones, first developed in 1995, support standby mode and powering
peripherals while the PC is not on.
Parts of a computer
If you use a desktop computer, you might already know that there isn't any single part called
the "computer." A computer is really a system of many parts working together. The physical
parts, which you can see and touch, are collectively called hardware. (Software, on the other
hand, refers to the instructions, or programs, that tell the hardware what to do.)
System unit
The system unit is the core of a computer system. Usually it's a rectangular box placed on or
underneath your desk. Inside this box are many electronic components that process
information. The most important of these components is the central processing unit (CPU), or
microprocessor, which acts as the "brain" of your computer. Another component is random
access memory (RAM), which temporarily stores information that the CPU uses while the
computer is on. The information stored in RAM is erased when the computer is turned off.
Almost every other part of your computer connects to the system unit using cables. The
cables plug into specific ports (openings), typically on the back of the system unit. Hardware
that is not part of the system unit is sometimes called a peripheral device or device.
System unit
Storage
Your computer has one or more disk drives—devices that store information on a metal or
plastic disk. The disk preserves the information even when your computer is turned off.
Your computer's hard disk drive stores information on a hard disk, a rigid platter or stack of
platters with a magnetic surface. Because hard disks can hold massive amounts of
information, they usually serve as your computer's primary means of storage, holding almost
all of your programs and files. The hard disk drive is normally located inside the system unit.
Nearly all computers today come equipped with a CD or DVD drive, usually located on the
front of the system unit. CD drives use lasers to read (retrieve) data from a CD, and many CD
drives can also write (record) data onto CDs. If you have a recordable disk drive, you can
CD
DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive,
you can watch movies on your computer. Many DVD drives can record data onto blank DVDs.
Tip
If you have a recordable CD or DVD drive, periodically back up (copy) your important files to
CDs or DVDs. That way, if your hard disk ever fails, you won't lose your data.
Floppy disk drives store information on floppy disks, also called floppies or diskettes.
Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also
retrieve information more slowly and are more prone to damage. For these reasons, floppy
disk drives are less popular than they used to be, although some computers still include
them.
Floppy disk
Why are floppy disks "floppy"? Even though the outside is made of hard plastic, that's just
the sleeve. The disk inside is made of a thin, flexible vinyl material.
Mouse
A mouse is a small device used to point to and select items on your computer screen.
Although mice come in many shapes, the typical mouse does look a bit like an actual mouse.
It's small, oblong, and connected to the system unit by a long wire that resembles a tail.
Some newer mice are wireless.
Mouse
A mouse usually has two buttons: a primary button (usually the left button) and a secondary
button. Many mice also have a wheel between the two buttons, which allows you to scroll
smoothly through screens of information.
When you move the mouse with your hand, a pointer on your screen moves in the same
direction. (The pointer's appearance might change depending on where it's positioned on
your screen.) When you want to select an item, you point to the item and then click (press
and release) the primary button. Pointing and clicking with your mouse is the main way to
interact with your computer.
Keyboard
A keyboard is used mainly for typing text into your computer. Like the keyboard on a
typewriter, it has keys for letters and numbers, but it also has special keys:
The function keys, found on the top row, perform different functions depending on where
they are used.
The numeric keypad, located on the right side of most keyboards, allows you to enter
numbers quickly.
The navigation keys, such as the arrow keys, allow you to move your position within a
document or webpage.
Keyboard
You can also use your keyboard to perform many of the same tasks you can perform with a
mouse.
Monitor
There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD (liquid
crystal display) monitors. Both types produce sharp images, but LCD monitors have the
advantage of being much thinner and lighter. CRT monitors, however, are generally more
affordable.
Printer
A printer transfers data from a computer onto paper. You don't need a printer to use your
computer, but having one allows you to print e-mail, cards, invitations, announcements, and
other materials. Many people also like being able to print their own photos at home.
The two main types of printers are inkjet printers and laser printers. Inkjet printers are the
most popular printers for the home. They can print in black and white or in full color and can
produce high-quality photographs when used with special paper. Laser printers are faster and
generally better able to handle heavy use.
Speakers
Speakers are used to play sound. They may be built into the system unit or connected with
cables. Speakers allow you to listen to music and hear sound effects from your computer.
Computer speakers
Modem
To connect your computer to the Internet, you need a modem. A modem is a device that
sends and receives computer information over a telephone line or high-speed cable. Modems
are sometimes built into the system unit, but higher-speed modems are usually separate
components.
Cable modem
What is it for?
http://www.youtube.com/watch?v=lPIXAtNGGCw
http://www.youtube.com/watch?v=d_56kyib-Ls
http://www.youtube.com/watch?v=RxaVBsXEiok
Chapter 2: Backups
Chapter 3: Formatting
3.1.1 Windows 7
When installing on a physical computer insert your Windows 7 DVD media into your DVD drive and
reboot your computer. If you are asked to press a key to boot from DVD or CD, press any key. A
black window will appear momentarily while the DVD content is read.
Note: Make sure that you are booting from the Optical Media/DVD Drive
Note: If the Windows installation page doesn't appear and you're not asked to press a key to start
from DVD or CD, you might have to specify that your computer uses its DVD or CD drive as the
startup device.
Like in Windows Vista and Windows Server 2008, and unlike previous versions of Windows, Windows
7 does not have a noticeable text phase of the setup process, and it will boot directly into the
Graphical User Interface (GUI) mode.
Click "Next" unless you want to change some regional settings for the installation process.
Next, unless you're upgrading an existing Windows installation, press the Custom (Advanced)
installation type button. Note that in this case, the Upgrade button is disabled because this specific
installation if performed on a new computer without any previous operating system on it.
The next phase is to pick the installation partition. Since this computer has a new hard disk that
hasn't been formatted before, you will only have the option to create a new partition on it.
Since I don't need to perform any additional task I will just click on the "Next" button. The installation
process will then create a partition on all the available disk space, and format it.
The setup process will now begin to copy files from the installation DVD media to the hard disk.
Process could take a while depending on the type of hardware your computer uses. In my VM test
sample I've used for this demo, the entire process finished before I could finish writing the previous 3
paragraphs, so it could be pretty quick.
The computer will reboot, and the next thing you'll see is the prompt to set the user's and computer's
name. By default, the computer's name will be username-PC, where username is the username
you've entered.
Click on "Next".
Enter the user's password. Remember this password, as it will be the ONLY user on the system, and
unless you create an additional user or enable the built-in administrator account, if you forget this
password you'll need to crack it to gain access to the system. The best option would be to choose a
complex password made of at least 8 characters or more (something like P@ssw0rd or MYpa$$w0rd).
You must also enter a password hint.
Click on "Next".
Next is type in your product key. If you do not have the product key at hand you can still click "Next",
and proceed with the installation. You will be asked to enter the product key after Windows is
installed.
Choose what sort of protection your computer gets. The recommended settings are best for someone
that doesn't plan to hide their computer behind a corporate firewall (and even then, in some cases,
Select your network location type. This setting can be changed later, but do note that choosing a
profile will have effect on the Windows Firewall and sharing settings. Click on "Next".
Windows will finalize the settings and your desktop will appear.
This concludes the Windows 7 installation. Next, you would probably want to update your computer
with the latest hotfixes and/or patches from Microsoft.
3.1.2 Windows 8
In this guide I will cover the installation of Microsoft Windows 8 Release Preview 64-bit from a
installation image. The installation of 32-bit and 64-bit are the same as this guide. I will try to explain
certain options and provide helpful hints along the way, so rather than just following the guide, you
can understand the reasoning behind the decisions.
If there are any mistakes please draw my attention to them and I will correct as needed. I have tried
to make this as simple as possible, whilst covering the vast majority of scenarios users will come
across whilst installing this operating system.
Step 1:
Backup your computer and prepare the installation discs.
Step 2:
Using your disc burning software, burn the .iso you downloaded to a DVD.
Step 3:
Before you go any further, ensure all important data is backed up in case of data loss on your drives.
This guide assumes you have media backups of your hard drives and you are safe to proceed.
Warning: Installing another operating system without first ensuring you have backups of your current
files and operating system is a big risk. If you have no data to lose or you’ve backed up important
data, you’re ready to proceed. YOU are responsible if you lose data.
Disclaimer: It goes without saying, that neither me or TechSpot accept any liability or responsibility
for any errors or damages made to your computer during, or after installing this operating system. It
is up to the user to ensure proper backups are made of important documents and files.
Step 4:
Ensure you have a network cable connected, restart your computer, and boot from the DVD drive.
Step 5:
The DVD will begin to load up, and you'll be presented by the following screen as the installer starts.
Step 6:
Once loaded you will see the following screen.
Select your location, keyboard and regional language settings as required and click "next" to continue
and you'll see the following box:
Enter the product key as written in the screenshot above. For the sake of clarity, the product key is
TK8TP-9JN6P-7X7WW-RFFTV-B7QPF for both the 32-bit and 64-bit versions.
Once you have entered the product key, click "next" to continue to the next step.
Step 8:
Before you can proceed with the setup any further you're required to accept Microsoft's license terms,
as below.
Read the terms, and once you're happy, tick the "I accept the license terms" box, and click "next" to
continue to the next step.
Step 9:
You will be greeted with the following screen.
For the purposes of this guide, we'll assume you are performing a fresh installation of Windows 8
Release Preview. Therefore, this tutorial covers the "Custom" option which will install a fresh copy of
Windows 8 Release Preview onto a clean hard drive, without backing up and restoring any existing
files or settings.
The first option, "upgrade" will allow those running previous versions of Windows to upgrade to
Windows 8 whilst keeping all files, settings and applications during the setup of the new operating
system.
Step 10:
The setup will then continue and start the disk manager as below.
Select the correct drive to use for the installation of Windows 8 Release Preview, and click "next" to
continue. For those trying this in a Virtual Machine, 20-25GB of hard drive space is more than
adequate.
Note: This step is the last point in which you can abort the installation without permanent data loss to
drives. Please ensure you have working backups before proceeding further.
Step 11:
The installer may restart during the installation stage as it configures the computer to run the new
operating system.
Step 12:
Once complete, it will reboot again and setup the computers devices and finalize the installation, as
below.
Once this stage has finished, you will be greeted with the following screen.
Select your preferred colour scheme for Metro, and then name your computer. The PC name is used
to identify the computer on local networks and ideally should be named so that other users your
network can identify who the computer belongs to. Then click "next" to proceed.
Step 13:
You will then be greeted with the following window.
At this point you can specify the final settings required in the configuration of your new Windows
installation. You can either choose "use express settings" or click "customize" to change the express
settings.
If you are unsure, it is best to choose the first option. The installer will then configure the final
settings and move onto the next step.
Step 14:
The next step asks you if you wish to sign into your PC using a Windows Live account.
Unlike previous versions of Windows, Microsoft's new operating system heavily integrates the
Redmond-based firms Windows Live features, including messenger, contacts, calendar and mail.
Signing in using your Windows Live account also offers Windows 8 users additional benefits like the
ability to download additional apps from the Windows Store and automatic synchronization of all your
Windows 8 computers so they look and feel the same regardless of which one you're using.
Note: Your Windows Live ID also becomes your username for Windows 8 Release Preview, and uses
your Windows Live ID password to log in.
You will then be asked for your password for your Windows Live account. Click "next" to continue.
The final step of integrating your Windows Live account with your new installation of Windows 8
Release Preview requires you to provide additional verification information. For those that have
previously set this up, the fields will be completed already. Verify they are correct, or add the
required information and click "next" to continue.
Step 15:
Windows 8 Release Preview will then complete its final configuration.
Once complete, it will then boot into Windows for the first time, as below.
Installation is now complete, and you can enjoy your new OS and begin exploring its features.
Feedback and comments are welcome. If you feel something is missing or you would like to see
something in particular covered in future tutorials let us know in the comments section, or contact me
directly.
Now that you have your Live CD/USB, you can boot up your machine from either and select the install
option at the first prompt. This will then load up the installer on your machine.
The first screen you will see during the installation process is the Language Selection screen. Simply
select your country/language and click Continue.
Next you will see a list of pre-requisites and options to configure the PinguyOS 12.04 installer before
it begins. This screen will also tell you if you have enough free space on your hard drive and if you
are connected to the internet and a power source if you’re on a laptop or netbook.
You will also see two options, one to download updates whilst installing PinguyOS 12.04 and another
to installed third party software such as audio/video CODECS. It is recommended to leave both of
these boxes un-ticked as PinguyOS 12.04 already comes with the third party software pre-installed
and the updates slow down the PinguyOS 12.04 installation process significantly.
Once you are happy that this screen is complete, click on the Continue button to progress on to the
next screen.
This next screen is arguably the most important step during the process of installing PinguyOS 12.04.
On this screen you are asked how you would like to install PinguyOS 12.04. If you have another
Operating System like Windows already installed on your machine, you will see an option to install
PinguyOS 12.04 alongside the current Operating System.
You can also erase the entire disk and install PinguyOS 12.04. This will wipe everything from your
hard drive and replace it with a fresh installation of PinguyOS 12.04 so make sure you have a backup
of your data if you are going to pick this option.
The final option is ‘something else’ which allows you to manually partition your drive. This option
should only be selected by advanced users.
Once you have made your selection click on the Continue button to be taken to the next screen.
If you are installing PinguyOS 12.04 alongside another Operating System then you will now see a
screen displaying a slider so you can select what portion of your hard drive to give to PinguyOS 12.04
– it will default to 50%.
If you are installing only PinguyOS 12.04 and using the whole hard drive then you will not see a
slider, you will just be allowed to pick a hard drive from the drop down menu at the top of the screen.
Once you are happy with your selection on this screen, select Install Now to begin the installation of
PinguyOS 12.04.
PinguyOS 12.04 will now start being installed on your machine. You will see a few more configuration
screens during the installation process, these are as follows:
Time Zone – you will be asked to pick a time zone. All you need to do is click on your country on the
world map. PinguyOS 12.04 will then detect you time zone automatically.
Keyboard Layout – this is determined by the time zone you picked but it can be changed in this
screen. You can test your keyboard functions in the field provided.
User setup – This screen asks you to setup you main administrative user account, password and
computer name. The password will be required when carrying out any administrative tasks such as
installing applications so please ensure that this password memorable.
That’s it! Pinguy OS 12.04 will now finish off the installation and you will be asked to reboot once it is
complete.
Once the machine starts to reboot, you will be asked to remove your installation media (CD or USB)
and press enter. This is to ensure that you don’t reboot the machine back to the PinguyOS 12.04
installer.
Once you have logged on, you will be greeted with the default PinguyOS 12.04 desktop and the
installation process is complete.
3.2.2 CentOS
2. Choose skip media test as it may take long time to check media.
4. Language Selection.
7. You may get Storage Device warning, you can click Yes, discard any data button to Continue.
8. Give a Hostname to the server and click on Configure Network button if you want to configure
network while installation.
10. Select Connect Automatically, go to ipv4 settings tab and select Method and select Manual in drop
down. Click on Add tab to fill address box with IP Address, Netmask, Gateway and DNS Server. Here
I’m using IP Address 192.168.1.6 and DNS Server is 4.2.2.2 for demo. This IP Address may vary in
your environment.
14. Verify filesystem. Here, you can edit filesystem If you want.
18. Here, you can give Boot loader Password for better security.
19. Select the applications you want to install, you can choose Customize now and click Next.
20. Select the applications you want to install and click Next.
21. Installation started, this may take several minutes as per selection of packages.
This is the screen that greets you when you Lion finishes downloading. Not much to see here, just
press ‘Continue’.
Yes, this is that inevitable, pages-long license that you must agree to before continuing on your Lion
installation journey.
3. Which drive
Most users just need to press continue on this step, but the Installer does give you the opportunity to
Install Lion to another disk if you so choose. For this section we won’t be changing the drive, but this
option becomes useful when we discuss Clean Installations in Section 6 below.
4. It begins
Once your Mac has booted into the full Mac OS X Installer, Lion is literally installing itself – this
process doesn’t require any interaction from you. Depending on your computer this could take
anywhere from 15 minutes to 40 minutes.
Login and enjoy your new operating system! If you want to learn more about the operating system
be sure to check out our review of Lion too.
When you install a copy of Lion to your hard drive, part of the installation process involves a new
recovery partition being created. This recovery partition contains a portion of the Lion installer, but
more importantly some tools that will help troubleshooting and repairing installations.
To enter the recovery partition all you need to do is hold the ‘option’ button on your keyboard (Alt on
a non-Mac keyboard) and wait for a list of bootable drives to appear, once they do, simply select the
recovery partition. Give it a minute or so to load and you will be presented with the Mac OS X Utilities
window which gives you four tools to help recover your Lion Installation. These include restoring from
a Time Machine backup, reinstalling Mac OS X, getting help online and using Disk Utility.
Note: There are other (more advanced) options available from the menu bar within the Mac OS X
Utilities screen.
These four options are fairly self-explanatory but there are some interesting points to note. If you do
choose to reinstall Lion from this recovery partition, Apple does require you to send your Mac’s serial
number back to them. At this stage it is not known whether this is being used to prevent users who
did not purchase Lion from re-installing, but they could well be the case.
If you choose to get help online, the Utilities application will literally open up an instance of Safari,
which is fully-functional, so that if you are having a particular problem you might be able to easily
find a resolution without re-installing Lion or booking an appointment with your local Genius Bar. In
case you are wondering, yes you can easily connect to the Internet in this mode by setting up Wi-Fi
or using Ethernet - the experience is nearly identical to the ‘full’ OS X.
The first thing to do is to make sure you get those Lion installation files – Apple automatically deletes
it once you do an installation of Lion, so make sure you do this step before you try installing Lion.
The Mac App Store downloads the Lion Installer into the /Applications folder and it is named ‘Mac OS
X Installer’. Copy this file to somewhere else for now, preferably an External HDD or separate
partition.
What you copied over was an application, but technically all you need to create a bootable drive or
disc is the Lion Installer image. This is located inside that application.
Go to the Mac OS X Installer.app file, right click and select ‘Show Package Contents’, open the
‘Contents’ directory and then the ‘Shared Support’ directory. Inside ‘Shared Support’ is that all
important file named ‘InstallESD.dmg’.
Now you can go on to the next step and either create a bootable DVD, or bootable USB drive for
installing Lion.
You’ll need a USB drive that is larger than 4GB – a 6GB or larger drive is a requirement. The first
thing to do is insert the USB drive, launch Disk Utility (just do a search in Spotlight for it) and select
the thumb drive. From there you will want to click the ‘Erase’ tab (make sure you don’t have anything
important saved, everything will be deleted), check that the Format is ‘Mac OS Extended (Journaled)’
and click erase.
The next thing to do is right click that thumb drive and select ‘Restore’, a window will pop up asking
for a source – this is where the InstallESD.dmg comes into play. Locate that image and press
Restore, give Disk Utility a little while and there you have it, your own Lion USB Drive.
Using the DVD medium instead of a USB Drive is also an option and the process is similar. Insert a
blank DVD and open Disk Utility, this time click on the DVD and select ‘Burn’ from the toolbar.
Find that same InstallESD.dmg image, select it and press ‘Burn’. This will take a while, depending on
how fast your DVD drive is. Once done you have your own, home-made, Lion Install DVD.
Whilst I know a number of pro and power users will frown upon this suggestion, I have decided it is
worth briefly explaining a ‘quasi-clean’ installation of Lion where you do a clean install of Snow
Leopard and then do an upgrade installation of Lion. There are two reasons for this:
2. Despite taking longer, it is a far simpler process than the completely clean installation.
This installation is fairly simple; firstly make sure you have all your documents backed up because
you will be wiping your hard drive (or partition) to make way for a new installation. This can be
anything from a Time Machine backup to just copying everything you need to an external drive or
using something like Dropbox or SugarSync to back your files up to the cloud.
The best way to begin this installation is to insert your Snow Leopard disc (or USB drive if you got a
new MacBook Air) and reboot. On that gray boot screen press ‘option’ (Alt on a Windows keyboard)
and select the Snow Leopard Disc. Now you need to wipe the hard drive or partition to which you
want to install Snow Leopard (and later, Lion). I strongly recommend disconnecting any external
drives that may be connected to the Mac in case you accidently choose the wrong one!
To wipe the drive, just select the particular hard drive you wish to install Lion on to and then select
the ‘Partition’ tab, from there change the Volume Scheme to 1 partition (or whatever else you want).
You can change the name and then press ‘Apply’. Once this is done you can close Disk Utility and run
the Snow Leopard installation as normal.
As soon as you are done with the installation of Snow Leopard, do not install anything. Go straight to
Software Update and get all the necessary updates, all the way up until you have version 10.6.8. At
this stage, you are all ready to start the upgrade installation of Lion. You can just go straight to the
App Store to download and then run the Lion installation. Alternatively, if you copied the installation
files (the Mac App Store downloads it to the Applications folder) you can just run that straight away.
So now that you’re all set to install Lion, jump back to Section 2 and follow the steps there – they’re
literally identical.
Unfortunately, Apple has made the clean installation a far tougher process with Lion and the way it
works will differ depending on the method you choose to do a clean installation. I shall start off with
the simplest method – this where you install it from Snow Leopard and install Lion to a different
partition.
Method One: Installing Directly On To another (Clean) Partition from Snow Leopard
All you have to do is follow the steps in Section 2 but in the step where the Installer asks which drive
to Install Lion to, select “Show other disks” and select a clean partition to which to install to. Apart
from this one difference, you can follow the steps outlined in that section.
Using this method, you would be able to subsequently copy your data from the Snow Leopard
Installation (either manually or through a Time Machine backup) and then delete the Snow Leopard
In this article you will learn how to identify unknown devices in a Microsoft Windows operating
system. There is no need to download any programs/tools to detect what drivers you need. Before
you start please close all programs and tasks to avoid any complications.
1. Locate the Device Manager control panel. Device Manager is used to control attached
hardware to your computer. If the operating system does not have a driver for your hardware
installed the device will not function. You can find the Device Manager control panel by right-
clicking My Computer and selecting properties. Select the Hardware tab and click Device
Manager.
2. Highlight the unknown device. Select the device which is not identified. Windows places all
unknown devices in a group labeled other devices. Do not try to configure a device that is properly
installed. A solid yellow question mark icon indicates the device is unknown to Windows
3. Find the vendor and device IDs. In the properties of the unknown device there is a tab labeled
details. In this tab you will find a drop down list with Hardware IDs. VEN_XXXX is the vendor ID
and DEV_XXXX is the device ID. The four characters after VEN and DEV are unique identifiers.
These identifiers will help you identify your unknown device.
5. Search online for drivers. Use a search engine to find the drivers for your device. There are
many harmful websites trying to charge you money or make you download malicious software for
drivers. This can be avoided by searching for drivers on your manufacturer’s website. If you cannot find
your driver online, email the manufacturer for help with drivers.
6.
Updates can enhance the security and performance of your computer. Here are ways to help you
keep Windows and your programs up to date.
Your computer is up to date when you've installed the latest updates for Windows and your
programs. To check for Windows updates, follow these steps:
1. Open Windows Update by clicking the Start button . In the search box, type Update, and
then, in the list of results, click Windows Update.
2. In the left pane, click Check for updates, and then wait while Windows looks for the latest
updates for your computer.
You might see both important and optional updates. If you don't see the Install updates
button when there are only optional updates, click Optional updates available, choose the
ones you want, and then click OK.
Security updates for Windows can help protect against new and ongoing threats to your privacy
and to your computer. The best way to get security updates is to turn on Windows automatic
updating and stay informed about security issues. For more information about automatic
updating, see Understanding Windows automatic updating.
When you turn on automatic updating, Windows can automatically install important updates
(including security updates) and recommended updates for your computer as Microsoft releases
them. For more information, see Turn automatic updating on or off and How can I tell if my
computer is up to date? For more information about updating computers on a network, see
Keeping computers on a network up to date.
To learn how Microsoft monitors and responds to security issues, go to the Microsoft Security
Response Center website. It offers tools such as an alert service, monthly webcast, blog, and
Really Simple Syndication (RSS) feeds to help you stay current with security-related updates and
information for Windows.
If you have a hardware device that isn't working properly with your computer, you probably need
an updated driver. There are three ways to update a driver:
Use Windows Update. You might need to set Windows Update to automatically download
and install recommended updates.
Install software from the device manufacturer. For example, if your device came with a
disc, that disc might contain software that installs a driver for the device.
Download and update the driver yourself. Use this method to install a driver that you
download from the manufacturer's website. Do this if Windows Update can't find a driver
for your device and the device didn't come with software that installs a driver. The
Windows 7 Compatibility Center website lists thousands of devices, and has direct
links to driver downloads.
Windows Defender definitions are files that act like an encyclopedia of known spyware and other
potentially unwanted software. Because spyware is continually being developed, Windows
Defender relies on up-to-date definitions to determine if software that's trying to install itself or
run on your computer is spyware or potentially unwanted software.
To find updates for the Microsoft Office System, including Word, Outlook, Excel, PowerPoint, and
more, go to the Microsoft Update website.
Chapter 6: Protection
Though understanding computer security needs much study, I have tried to compile all types of
computer security in concise and comprehensible format. Among different types of computer security,
I assume you already know about virus and spyware - precautions etc.
Internet Security is the one most people are concerned with as it deals with malware and hackers.
The next type of computer security, Network Security, deals with the security problems on networks
of any size. This includes external problems as well as problems from users of computers inside the
network. Standalone computers refer to computers that are not connected to any network (but may
be connected to Internet). This part will cover the possible security vulnerabilities on such systems.
Finally, the Data Loss part is applicable to networks and computers in the networks as well as
standalone computers.
Internet Security, among different types of computer security, covers malware and hacking
techniques. The Internet is an open zone where anyone can create a website that may place malware
on your computer or server. This is also the space that gives shelter to people who are on the prowl
to reach your computer or servers to access your data for misuse.
You can divide the Internet into unknown and trusted sites. Trusted sites are simply the ones
that you can trust, with a good example being your own office website. Obviously, you won't
knowingly place any code on your own website to compromise the computer security of
people visiting it. Another way to divide the Internet is into secure and non-secure zones. The
secure zones are normally represented by a lock symbol in the address bar of your computer.
An example of such sites can be your Internet banking site that employs high level encryption
to secure their database as well as your computer.
While you already know about malware, there are two more common techniques used by hackers to
access your data: port knocking and packet sniffing.
There are several ports on your computer that allow different applications to transfer data to and
from your computer. A good application would instantly close the port as soon as it sends or receives
information. However, there are some applications that delay or forget to close these ports.
Sometimes it is the OS to blame. Port knocking, or port scanning, is the technique where hackers
keep on trying to access the different ports on your computer or server. Once they find an open port,
they can easily reach your data and use it the way they want.
You might know that to transmit data over Internet, it is divided into several chunks (called packets)
of equal size. Each packet contains the sequence number of the packet preceded by the IP address of
the computer or website (server) to where it is send. They also contain the IP address of source
computers/network components such as servers (websites). These packets are mostly encrypted
before leaving for the destination. Packet sniffing is another effective technique that helps hackers
gain control over the source as well as destination computers. This is more dangerous than port
knocking as it affects the entire network system. The technique involves observing the encryption and
transmission patterns from a computer/server to the ISP's server. Other hackers can also sniff data
transmission from certain websites. Once they crack the encryption, or if the ISP or website does not
support high level encryption, the data is easily accessed by the hacker. Once accessed, even a data
This is why most browsers use high level SSL encryption to keep your data safe. Still, no software is
perfect and may give out details if there is any kind of security lapse on part of end-user, ISP, or the
website developers.
Among other types of computer security problems, this section deals with client-server model of
networks. Any network is only as secure as the network designers and administrators make it. There
are numerous ways whereby a network is vulnerable to both external and internal threats. The choice
of server and its configuration plus encryption methods highly affect the security of any network.
Following are a few of the "most possible" threats to a network on client-server model:
2. Misuse of User Rights- users with certain rights may misuse their privileges to steal
company data and sell it competitors or use it for some other malicious purpose such
as destroying data files concerning competitors, etc.
3. Spamming to create Denial of Service- this technique is again used by both internal
and external hackers. The trick is to flood the network with fake data packets. The
network is totally congested and results in a crash. If the server is not well
configured, the network fails and does not work, resulting in the loss of real data that
can be picked up by the hackers. Even if the hackers cannot intercept data in this
case, the data in transmission is lost forever.
Among the major types of computer security are factors affecting data on standalone computers. The
major threat is stealthy techniques used when such computers are left running and unattended. Many
users do not consider locking their computers before taking a short break. Others can easily take a
peek into the computer by the time the actual user returns. Hence it is recommended to program the
computer to lock by itself after a few minutes of inactivity. The option is available in Windows OS
where you can set a password for each user and set the properties to ask for the password when the
screen saver is removed. This also calls for lowering the time before screen saver starts. Still, users
should make it a habit to lock their computers as part of their data security policy.
Another safety factor that is often abused is users not using any security for booting the computer. I
strongly suggest a BIOS password so that unauthorized users can't even see the full configuration of
the computer. Among other security threats that are again Internet related are the possibility of
infection and hacking by way of malware and the methods discussed on the first page.
A network failure or a HDD crash is never predictable. One of the most important angles in types of
computer security is loss of data caused by problems with data storage devices and data loss during
transmission. While the latter has to be dealt with a good network security policy - to recover data
packets lost in transit, the data loss caused by a computer/server crash can be prevented using a
This article only touched the most common types of computer security. There can be several other
problems that may cause infections and/or data loss under each of the different types of computer
security discussed here, which also need to be attended to as and when required.
This series on types of computer security informs you about different types of security threats. It
helps you deal with security threats to computer and security threats to networks. The series on
types of computer security also discusses computer based security systems before detailing firewalls.
VLC is a free and open source cross-platform multimedia player and framework that plays most
multimedia files as well as DVD, Audio CD, VCD, and various streaming protocols.
LibreOffice 4: The free office suite the community has been dreaming of for twelve years.
WinRAR is a shareware file archiver and data compression utility developed by Eugene Roshal and
distributed by Ron Dwight, first released in autumn of 1993. It is one of the few applications that is
able to create RAR archives natively, because the encoding method is held to be proprietary.
Microsoft Office is an office suite of desktop applications, servers and services for the Microsoft
Windows and OS X operating systems, introduced by Microsoft on August 1, 1989. Initially a
marketing term for a bundled set of applications, the first version of Office contained Microsoft Word,
Microsoft Excel, and Microsoft PowerPoint. Over the years, Office applications have grown
substantially closer with shared features such as a common spell checker, OLE data integration and
Microsoft Visual Basic for Applications scripting language. Microsoft also positions Office as a
development platform for line-of-business software under the Office Business Applications brand.
Office is reported to now be used by over a billion people worldwide.
Adobe Acrobat is a set of application software developed by Adobe Systems to view, create,
manipulate, print and manage files in Portable Document Format (PDF files). All parts of the set,
except Adobe Reader (formerly Acrobat Reader, and also referred to by the program name
acroread), are proprietary commercial programs, while the latter is available as freeware and can be
downloaded from Adobe's website. Adobe Reader enables users to view and print PDF files but has
negligible PDF creation capabilities. Acrobat and Reader are widely used as a method of presenting
information with a fixed layout similar to a paper publication.
Adobe Flash (formerly called "Macromedia Flash") is a multimedia and software platform used for
authoring of vector graphics, animation, games and Rich Internet Applications (RIAs) which can be
viewed, played and executed in Adobe Flash Player. Flash is frequently used to add streamed video or
audio players, advertisement and interactive multimedia content to web pages.
Flash manipulates vector and raster graphics to provide animation of text, drawings, and still images.
It supports bidirectional streaming of audio and video, and it can capture user input via mouse,
Adobe Flash Player makes the Flash content accessible on various computer systems and devices and
is available free of charge for common web browsers (as a plug-in), some smartphones and tablets,
and a few other electronic devices using Flash Lite.
Flash has been criticized for adversely affecting the usability of web pages.
Java is a set of several computer software products and specifications from Sun Microsystems (which
has since merged with Oracle Corporation), that together provide a system for developing application
software and deploying it in a cross-platform computing environment. Java is used in a wide variety
of computing platforms from embedded devices and mobile phones on the low end, to enterprise
servers and supercomputers on the high end. While less common, Java applets are sometimes used
to provide improved and secure functions while browsing the World Wide Web on desktop computers.
Writing in the Java programming language is the primary way to produce code that will be deployed
as Java bytecode. There are, however, bytecode compilers available for other languages such as Ada,
JavaScript, Python, and Ruby. Several new languages have been designed to run natively on the Java
Virtual Machine (JVM), such as Scala, Clojure and Groovy. Java syntax borrows heavily from C and
C++, but object-oriented features are modeled after Smalltalk and Objective-C. Java eliminates
certain low-level constructs such as pointers and has a very simple memory model where every object
is allocated on the heap and all variables of object types are references. Memory management is
handled through integrated automatic garbage collection performed by the JVM.
On November 13, 2006, Sun Microsystems made the bulk of its implementation of Java available
under the GNU General Public License (GPL).
Skype was first released in 2003 written by Estonian developers Ahti Heinla, Priit Kasesalu, and Jaan
Tallinn, who had also originally developed Kazaa. It developed into a platform with over 600 million
users and was bought by Microsoft in 2011 for $8.5 billion.
The service allows users to communicate with peers by voice using a microphone, video by using a
webcam, and instant messaging over the Internet. Phone calls may be placed to recipients on the
traditional telephone networks. Calls to other users within the Skype service are free of charge, while
calls to landline telephones and mobile phones are charged via a debit-based user account system.
Skype has also become popular for its additional features, including file transfer, and
videoconferencing. Competitors include SIP and H.323-based services, such as Linphone and Google
Voice.
Skype has 663 million registered users as of EOY 2010. The network is operated by Microsoft, which
has its Skype division headquarters in Luxembourg. Most of the development team and 44% of the
overall employees of the division are situated in Tallinn and Tartu, Estonia.
Unlike most other VoIP services, Skype is a hybrid peer-to-peer and client–server system. It makes
use of background processing on computers running Skype software. Skype's original proposed name
(Sky Peer-to-Peer) reflects this fact.
Some network administrators have banned Skype on corporate, government, home, and education
networks, citing reasons such as inappropriate usage of resources, excessive bandwidth usage, and
security concerns.
Windows XP
These are the minimum requirements for basic functionality. Actual requirements vary, depending on
the system configuration and the programs and features that you choose to install. If you are
installing Windows XP over a network, you may need additional available hard-disk space.
Video adapter and monitor with Super VGA (800 x 600)or higher resolution
Sound card
Speakers or headphones
For more information about system requirements for Windows XP Home Edition, visit the following
Microsoft Web site:
http://www.microsoft.com/windowsxp/home/evaluation/sysreqs.mspx
For more information about Windows XP Home Edition, visit the following Microsoft Web site:
http://www.microsoft.com/windowsxp/home/howtobuy/choosing2.mspx
Video adapter and monitor with Super VGA (800 x 600) or higher resolution
Sound card
For more information about system requirements for Windows XP Professional, visit the following
Microsoft Web site:
http://www.microsoft.com/windowsxp/pro/evaluation/sysreqs.mspx
For more information about Windows XP Professional, visit the following Microsoft Web site:
http://www.microsoft.com/windowsxp/pro/default.mspx
Windows Vista
The following list describes the recommended minimum hardware requirements for basic functionality
of the different editions of Windows Vista. Actual hardware requirements will vary, depending on
system configuration and on the programs and the features that you install. If you install Windows
Vista over a network, additional hard disk space may be required.
o 32 MB of graphics memory
o 20-gigabyte (GB) hard disk that has 15 GB of free hard disk space
Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, and
Windows Vista Ultimate
o 1 GB of system memory
Note This includes a DirectX 9-class graphics card that supports the following:
A WDDM driver
o 40-GB hard disk that has 15 GB of free hard disk space (the 15GB of free space
provides room for temporary file storage during the install or upgrade.)
Note A Windows Aero-capable graphics card is a graphics card that meets the following
requirements:
Has a DirectX 9-class graphics processor unit (GPU) that supports Pixel Shader 2.0
Passes the Windows Aero acceptance test in the Windows Driver Kit (WDK)
Depending on resolution, video playback may require additional memory and advanced
graphics hardware
Some games and programs might require a graphics card compatible with DirectX 10 or
higher for optimal performance
For some Windows Media Center functionality a TV tuner and additional hardware may be
required
Product functionality and graphics may vary based on your system configuration. Some features may
require advanced or additional hardware.
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2
To access the Windows Store and to download and run apps, you need an active Internet
connection and a screen resolution of at least 1024 x 768
Secure boot requires firmware that supports UEFI v2.3.1 Errata B and has the Microsoft
Windows Certification Authority in the UEFI signature database
Some games and programs might require a graphics card compatible with DirectX 10 or
higher for optimal performance
BitLocker requires either Trusted Platform Module (TPM) 1.2 or a USB flash drive (Windows 8
Pro only)
Client Hyper-V requires a 64-bit system with second level address translation (SLAT)
capabilities and additional 2 GB of RAM (Windows 8 Pro only)
A TV tuner is required to play and record live TV in Windows Media Center (Windows 8 Pro
Pack and Windows 8 Media Center Pack only)
Free Internet TV content varies by geography, some content might require additional fees
(Windows 8 Pro Pack and Windows 8 Media Center Pack only)
To check if your PC meets these requirements, you can run the Upgrade Assistant.
The computer goes blank before the Word document was saved. The browser window freezes for no
reason. You can't hear anything from your speakers.
Most people have at one time or another experienced a computer problem like the situations just
described, and if you haven't, chances are you will at some point. When a problem occurs, don't
panic! Instead, work your way through some basic troubleshooting techniques and try to solve
the problem.
There are many devices, parts, cords, and connections on a computer, which means that there are
many possible problems that could arise. In addition, your computer uses a variety of software, which
can also cause problems. However, no matter what the problem is, you can use the following tips
to help you find a solution:
Isolate the problem: If possible, try to isolate the problem. For example, if you can't get
the cursor to move on the screen, try to determine if the issue is with the mouse. If you have
an extra mouse, you can alternate devices to see if the one plugged in is the issue, or use the
arrow keys on the keyboard to help determine if the mouse is the source of the problem.
When trying to isolate the problem, only make one change at a time.
An error message
Take notes about error messages: If your computer gives you error messages, be sure
to write down as much information as possible. If the basic troubleshooting steps don't work,
you may need the information.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't repeat
yourself. If you can't remember it, then write it down. If you end up asking someone for help,
it will be much easier if they know exactly which steps you've taken.
Most of the time, problems can be fixed by using simple troubleshooting techniques, such as closing
and re-opening the program. It's important to try these simple solutions before resorting to more
extreme measures. If the problem still isn't fixed, you can then try other troubleshooting techniques,
such as reinstalling the software.
If a program is running slowly or otherwise isn't working right, the first thing you should try is
closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and boot it up again. Some
minor problems will work themselves out when you do this.
Check with the company for any known problems or updates to the software.
If a program has become completely unresponsive, you can press (and hold)
Control+Alt+Delete on your keyboard to open the Task Manager. You can then select
the program that isn't working and click End Task. If you are using a Mac, you can press
Option+Command+Esc to open a similar dialog box.
If your computer does not start, begin by checking the power cord to confirm that it is
plugged securely into the back of the computer case and the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often, this will require you
to plug a lamp or other electrical device into the outlet to make sure it is receiving power.
If the computer is plugged into a surge protector, verify that it is turned on. You may have
to reset the surge protector by turning it off and then back on. You can also plug a lamp or
other device into the surge protector to verify that it is on.
If you are using a laptop, the battery may not be charged. Plug the AC adapter into the
wall and then try to turn on the laptop. If it still doesn't start up, you may need to wait a few
minutes and then try again.
If you get this message when you boot up your computer, it usually means there is a CD,
DVD, USB flash drive, or floppy disk in your computer, which is interfering with your
computer's booting process. Remove the disk from the drive and restart the computer.
Sometimes Windows will freeze during the shutdown process. If this happens, the Windows
is Shutting Down message screen will stay active on your screen. To finish shutting down
the computer, press and hold the power button for about 10 seconds, or until the computer
turns off.
Check for overheating. Make sure the vents in the case are not blocked. Confirm that there
is good air flow around the computer.
Kaspersky antivirus
Check the brightness control, located on your monitor or your keyboard, and make sure it
is not set too low.
Check the connections for the monitor and surge protector, and make sure the surge
protector is turned on.
You may have the screensaver enabled. If the screen saver is enabled, just move your
mouse back and forth and your original screen will appear. You can change the screensaver
settings by going to your Control Panel (or your System Preferences if you're using a
Mac).
No Sound
Check the volume control on your computer. In Windows, the sound icon will usually be on
the taskbar, and you can also access the sound options in the Control Panel. On Macs, the
sound options are found at the top of the screen or in System Preferences.
Most media programs (such as iTunes or Windows Media Player) have a volume
control, which will need to be turned up.
Make sure the speakers are turned on, if using external speakers.
Connect headphones to the correct audio port and determine if sound is audible from the
headphones.
If you still haven't found a solution to your problem, you may need to ask someone else for help. Try
searching the web for the problem that you're having, as other people may have had similar
problems. Also, if you have a friend or family member who knows a lot about computers, they may
be able to help you.
Keep in mind that most computer problems have simple solutions, although it may take some time to
find them. For very difficult problems, a more drastic solution may be required, such as reformatting
your hard drive, reinstalling programs, or reinstalling your operating system. If you're not a computer
expert, it's possible that you could make the situation worse, so it's best to consult a professional if
you think a drastic solution is needed.