Showing posts with label IT - Help Desk. Show all posts
Showing posts with label IT - Help Desk. Show all posts

Tuesday, March 30, 2010

Office 2010 and Sharepoint 2010 - 1

Dear Readers,

It has been quite long I did not blog. I would like to thank all the readers who keep reading my blog. And I try to fulfil your needs this year.


I am currently exploring Outlook 2010 Beta & Sharepoint 2010 and I found this interesting feature on Outlook & Share Point. I believe you all know Microsoft has invested a lot in SPS over few years. I hope this is the time for the corporates to look seriously into the SPS.


Here is one of the interesting features I found, People Pane on outlook and how we can hook up into the social network provider. Though the Microsoft says that it is “Connectors” to different social networking, we have to wait and see. But I am quite positive that it is not so far…

Thank you, Readers.

Thursday, May 14, 2009

Tips for securing your wireless connection

Article from Sophos.
Dear Readers,

With over 50% of people admitting to having used someone else's wireless internet without permission, how can you stop your neighbours from stealing your Wi-Fi connection? Securing your wireless network is just a matter of following a few simple tips:

Use encryption
Wireless routers give you the option of encrypting your data, so bank details and passwords can't be intercepted. Wi-Fi Protected Access (WPA and WPA2) is a much stronger encryption system for securing your communications than WEP, which can be easily cracked by hackers.

Use a passwordSet up a password for your wireless internet connection. Choose a strong password for securing your network - don't use the one that came with your Wi-Fi router or a dictionary word that is easy to guess or crack.

Don't broadcast the name of your wireless network
The name of your wireless network, known as the SSID, should not be broadcast to passers by. In addition, choose an obscure hard-to-guess SSID name to make life harder for Wi-Fi hackers. SSIDs such as 'home', 'wireless' or 'internet' are not good choices.

Use MAC address filtering
Wi-Fi routers and access points normally have the ability to prevent unknown wireless devices from connecting to the network. This works by comparing the MAC address of the device trying to connect to the Wi-Fi router with a list held by the router. Unfortunately, this feature is normally turned off when the router is shipped because it requires some effort to set up properly. By enabling this feature, and only telling the router the MAC address of wireless devices in your household, you'll be securing your wireless network against neighbors stealing your internet connection.

Securing your wireless network using MAC address filtering is not a total solution as it is possible for a determined hacker to clone MAC addresses and connect to your Wi-Fi network, but this measure should still be taken to reduce the risks.

Restrict internet access to certain hours
Some wireless routers allow you to restrict internet access to certain times of the day. For instance, if you know you will not need to access the internet from home between 9-5, Monday to Friday, then schedule your router to disable access between those hours.

Make sure your computers are properly secured
Check you have up-to-date anti-virus, security patches, and client firewall software, this will help to protect your wireless network by stopping malware-based connection to your Wi-Fi.

Thanks,
JS

Friday, May 8, 2009

General safety tips for Facebook

Adjust Facebook privacy settings to help protect your identity
Unlike some other social networking sites, Facebook has provided some powerful options to protect you online - but it's up to you to use them!

Think carefully about who you allow to become your friend
Once you have accepted someone as your friend they will be able to access any information about you (including photographs) that you have marked as viewable by your friends. You can remove friends at any time should you change your mind about someone.

Show "limited friends" a cut-down version of your profile
You can choose to make people 'limited friends' who only have access to a cut-down version of your profile if you wish. This can be useful if you have associates who you do not wish to give full friend status to, or feel uncomfortable sharing personal information with.

Disable options, then open them one by one
Think about how you want to use Facebook. If it's only to keep in touch with people and be able to contact them then maybe it's better to turn off the bells and whistles. It makes a lot of sense to disable an option until you have decided you do want and need it, rather than start with everything accessible.


source:Sophos

Wednesday, January 14, 2009

IT Quality

Dear Readers,
Here is the Paul’s list of great IT qualities (which I have edited) addresses both considerations.

1.The CIO reports to the CEO or, at least, the chief operating officer, giving the CIO clout and ensuring IT’s independence.

2.An IT steering committee, composed of C-level executives from the business units, makes allocation decisions based on a defined set of priorities and criteria such as ROI. The committee is necessary to ensure that investment decisions are made in the interests of the entire company and not just an individual department.

3.The organization spends an appropriate percentage of corporate revenue on IT, indicating the company’s level of commitment to IT.

4.A well-managed, highly visible security team is in place, since this is one of the most vulnerable areas of IT.

5.Disaster recovery plans and processes, involving users and a documented recovery plan, are well-established and tested regularly.

6.An ongoing commitment to training keeps IT staffers up to date. Organizations that don’t train IT folks and use lots of consultants are not sufficiently focused on in-house staff.

7.Rigid adherence to an appropriate system development life cycle, that both IT and the user community understand, is a priority. Documenting the selection process offers insight into the professionalism of the IT organization.

8.Well defined technical and managerial career paths let all workers achieve higher pay and status. This is the only way to retain top technical people who don’t want to manage others.

9.A monthly major IT project status report is widely distributed throughout the company.

10.The CIO participates in long-range, organizational strategic planning. If not, it’s clear the business views IT as an implementer and not a strategic enabler.

Thank you, Readers
JS

Friday, January 2, 2009

Outsourcing - Book Keeping Services

Dear Readers,

I manage to secure a small outsource contract business for a US firm, which sells figh performance fuel pumps and injectors via their portal and through e bay.
Outsource job invovles, managing and maintain their Accounting Books.

We get the data of their transaction online, say for example we have given with view only account for their Paypal and we download the transaction history from there.

We enter those data into the accounting software, for this project we use Quick Books.
Reconcile them and upload the data back to their server.

We had automated few process of importing and exporting so that we can give cost effective and best performance for the customers.

Currently , i managing this through few university students who have some free time. So, it means cheaper for the clients.

If any one has any enquires for the similar services, please drop a email.

Thank you, Readers,
JS

Moving Virtual PC from Host's

Dear Readers,

Happy New Year - 2009.
I am happy to start with my blog on "Troubleshooting Virtual PC" as my first on this year.

Let is jump into the topic, which is "How to move a Virutal PC instance from host to host?"
I am not able to find (at least several pages of search results in google) correct answers though there are many posts available (i can say questions) on the same.

Here is the scenario, I had host machine with Microsoft Vista Home edition (this case is applicable for all Vista editions) and I installed virtual PC with sp1 (download available at Microsoft download center) and I had XP running on this virtual PC. I had separated the VPC in a partition and I did not combine with vista system directory.

All of sudden the host machine failed (Acer Aspire – Service center is still figuring out the issue) but fortunately I can recover the data from the HDD. I copied the Virtual PC Partition into a external HDD (the important file is *.vhd)

Now I need to run this instance on my standby notebook so that my work does not get disturbed (since it is outsourced job from US).


Here are the steps.
1.Install the virtual PC on the new machines. It can be any host operating system (xp, 2000 or vista). Important thing is make sure you use the same Virtual PC version.
2.After the installation restart the PC.
3.Connect the external HDD (via usb or whatever), where you had copied the file from your old host machine.
4.Start the Virtual PC console, select new.
5.The “New Virtual Machine Wizard” Will start, press next to continue.
6.Select “Create New Virtual Machine”
7.Specify the Name and location of the new virtual machine instance, - it could be into your host file system.
8.Select the operating system – should be windows Xp in this case.
9.Next, select the recommended RAM Settings
10.Next, this is important – select “Existing Virtual Hard Disk” , presss Next.
It is ask you to select the vhd file, now, you browse and choose the vhd file from the external HDD. That’s it.
11.Run the instance from the Virtual PC. There you go.


Hope this helps, if you need any further information on the same. Leave your questions here.

Thank you, Readers

JS

Tuesday, November 11, 2008

10 Dumb things to be avoided by IT Network Engineer

1: Don’t have a comprehensive backup and disaster recovery plan

It’s not that backing up is hard to do. The problem is that it sometimes gets lost in the shuffle, because most network administrators are overloaded already, and backups are something that seem like a waste of time and effort–until you need them.
Of course you back up your organization’s important data. I’m not suggesting that most admins don’t have a backup strategy in place. But many of those backup strategies haven’t changed in decades. You set up a tape backup to copy certain important files at specified intervals and then forget about it. You don’t get around to assessing and updating that backup strategy — or even testing the tapes periodically to make sure your data really is getting backed up — until something forces you to do so (the tape system breaks or worse, you have a catastrophic data loss that forces you to actually use those backups).
It’s even worse when it comes to full-fledged disaster recovery plans. You may have a written business continuity plan languishing in a drawer somewhere, but is it really up to date? Does it take into account all of your current equipment and personnel? Are all critical personnel aware of the plan? (For instance, new people may have been hired into key positions since the time the plan was formulated.) Does the plan cover all important elements, including how to detect the problem as quickly as possible, how to notify affected persons, how to isolate affected systems, and what actions to take to repair the damage and restore productivity?

2: Ignore warning signs

That UPS has been showing signs of giving up the ghost for weeks. Or the mail server is suddenly having to be rebooted several times per day. Users are complaining that their Web connectivity mysteriously drops for a few minutes and then comes back. But things are still working, sort of, so you put off investigating the problem until the day you come into work and network is down.
As with our physical health, it pays to heed early warning signs that something is wrong with the network and catch it before it becomes more serious.

3: Never document changes

When you make changes to the server’s configuration settings, it pays to take the time to document them. You’ll be glad you did if a physical disaster destroys the machine or the operating system fails and you have to start over from scratch. Circumstances don’t even have to be that drastic; what if you just make new changes that don’t work the way you expected, and you don’t quite remember the old settings?
Sure, it takes a little time, but like backing up, it’s worth the effort.

#4: Don’t waste space on logging

One way to save hard disk space is to forego enabling logging or set your log files to overwrite at a small file size threshold. The problem with that is that disk space is relatively cheap, but hours of pulling your hair out when you’re trying to troubleshoot a problem without logs to help you discover what happened can be costly, in terms of both money and frustration.
Some applications don’t have their logs turned on automatically. But if you want to save yourself a lot of grief when something goes wrong, adopt the philosophy of “everything that can be logged should be logged.”

5: Take your time about installing critical updates

The “It’ll never happen to me” syndrome has been the downfall of many networks. Yes, updates and patches sometimes break important applications, cause connectivity problems, or even crash the operating system. You should thoroughly test upgrades before you roll them out to prevent such occurrences. But you should do so as quickly as possible and get those updates installed once you’ve determined that they’re safe.
Many major virus or worm infestations have done untold damage to systems even though the patches for them had already been released.

6: Save time and money by putting off upgrades

Upgrading your operating systems and mission-critical applications can be time consuming and expensive. But putting off upgrades for too long can cost you even more, especially in terms of security. There are a couple of reasons for that:
New software usually has more security mechanisms built in. There is a much greater focus on writing secure code today than in years past.
Vendors generally retire support for older software after awhile. That means they stop releasing security patches for it, so if you’re running the old stuff, you may not be protected against new vulnerabilities.
If upgrading all the systems in your organization isn’t feasible, do the upgrade in stages, concentrating on the most exposed systems first.

7: Manage passwords sloppily

Although multifactor authentication (smart cards, biometrics) is becoming more popular, most organizations still depend on user names and passwords to log onto the network. Bad password policies and sloppy password management create a weak link that can allow attackers to invade your systems with little technical skill needed.
Require lengthy, complex passwords (or better, passphrases), require users to change them frequently, and don’t allow reuse of the same passwords over and over. Enforce password policies through Windows group policy or third-party products. Ensure that users are educated about the necessity to keep passwords confidential and are forewarned about the techniques that social engineers may use to discover their passwords.
If at all possible, implement a second authentication method (something you have or something you are) in addition to the password or PIN (something you know).

8: Try to please all the people all of the time

Network administration isn’t the job for someone who needs to be liked by everyone. You’ll often be setting down and enforcing rules that users don’t like. Resist the temptation to make exceptions (”Okay, we’ll configure the firewall to allow you to use instant messaging since you asked so nicely.”)
It’s your job to see that users have the access they need to do their jobs — and no more.

9: Don’t try to please any of the people any of the time

Just as it’s important to stand your ground when the security or integrity of the network is at stake, it’s also important to listen to both management and your users, find out what they do need to do their jobs, and make it as easy for them as you can–within the parameters of your mission (a secure and reliable network).
Don’t lose sight of the reason the network exists in the first place: so that users can share files and devices, send and receive mail, access the Internet, etc. If you make those tasks unnecessarily difficult for them, they’ll just look for ways to circumvent your security measures, possibly introducing even worse threats.

10: Make yourself indispensable by not training anyone else to do your job
This is a common mistake throughout the business world, not just in IT. You think if you’re the only one who knows how the mail server is configured or where all the switches are, your job will be secure. This is another reason some administrators fail to document the network configuration and changes.
The sad fact is: no one is indispensable. If you got hit by a truck tomorrow, the company would go on. Your secrecy might make things a lot more difficult for your successor, but eventually he or she will figure it out.
In the meantime, by failing to train others to do your tasks, you may lock yourself into a position that makes it harder to get a promotion… or even take a vacation.

Thank you Readers,
JS

Monday, September 15, 2008

Safe Guard your wifi / Wireless Access Point.

Dear Readers,

I was busy with my new projects (IT Infrastructure) and had little time to write on blogs. Hopefully, i can contribute now like before.

Here are some of the TIPS to safe guard your wireless access point at home or business. (which i practice and implement in all my projects)

1.Disabling the SSID broadcast.
To some extent this makes it difficult for the hacker to detect the presence of a WiFi access point.

2.Enable MAC address filter.
Each network interface has a unique MAC address, by filtering it, one can to an extent control which machines can use the access point. Of course, it makes difficult for the IT Support guys to add the mac address to the "white list" everytime into the WAP. But it is a easy task to do.

3.Turn on WPA/WEP encryption.
Make the password / Network key stronger (say minimum 8 letters, do not use company name or easy to guess names).

4.Change default admin passwords for access points.
All the wireless access points comes with(atleast for the same brand) default password such as 1234 or admin or admin1234 etc. Your first step in wireless installation should be changing the default admin password. Please store / save it somewhere, you might need it to re-configure or change settings.

5.Ensure access points are placed securely. In the centre of a room/office etc to minimise its signal strength outside the office.

6. Turn OFF the wireless devices when not used.
Do not leave your WAP devices ON when there is no activities.

Thank you, Readers.
JS

Monday, September 1, 2008

Prevent Computer from virus

Dear Readers,

It can happens to everyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus, what can you do?
If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.

1. Call IT support
If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.

3. Back up your important files
At this point it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or save them to some other external storage device. It is vital to note that these files cannot be trusted since they are still potentially infected.

4. Install an anti-virus program and scan your machine
Since your computer is infected with an unknown malicious program, it is safest to install an anti-virus program from an uncontaminated source such as a CD-ROM. You will have to visit your local computer or electronics store to a purchase the software. There are many to choose from, but all of them should provide the tools you need.
After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious program(s). Ideally, the anti-virus program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given.
If the anti-virus software successfully locates and removes the malicious files, be sure to follow the precautionary steps in Step 7 to prevent another infection. In the unfortunate event that the anti-virus software cannot locate or remove the malicious program, you will have to follow the next steps.

5. Reinstall your operating system
If the previous step failed to clean your computer, the only available option is to reinstall the operating system. Although this corrective action will also result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications. Before conducting the reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.
It is vital that you also reinstall your anti-virus software and apply any patches that may be available. Consult “Before You Connect a New Computer to the Internet” for further assistance.

6. Restore your files
If you made a back up CD in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them with your anti-virus software to ensure they are not infected.

7. Protect your computer

Prevention is always important.
To prevent future infections, you should take the following precautions:
• Do not open unsolicited attachments in email messages.
• Do not follow unsolicited links.
• Maintain updated anti-virus software.
• Use an Internet firewall.
• Keep your system patched.
To ensure that you are doing everything possible to protect your computer and your important information, you may also want to read some of the articles in the resources section below.

If you have any issues related to any of the above, mail me

Thank you, Readers
JS

Friday, August 8, 2008

Computer security professionals vulnerable to scams

Computer security professionals tend to be a highly paranoid bunch, seeing potential threats everywhere. It turns out that some aren't cautious enough, though.

Two researchers demonstrated Thursday at the Black Hat hacking conference how they had gotten computer security experts to let their guard down online the same way they advise the average Internet user not to, especially on social networking Web sites.

A relatively simple ruse persuaded dozens of prominent security analysts to connect on their social networking Web pages with people who weren't friends at all. They were fake profiles, purportedly of other well-known security pros. The scam was designed to expose the trust that even some of the most skeptical Internet users display on some of the most insecure sites on the Web.

Some social networking sites can be dangerous because they allow people to post programming code — used for good or evil — on other people's pages. Even networking sites that don't allow that step carry their own security risks, because it's relatively easy for someone to masquerade as a "friend" who isn't actually friendly — and recommend malicious Web sites to click on.

The ruse concocted by Shawn Moyer, chief information security officer for Agura Digital Security, and Nathan Hamiel, senior consultant for Idea Information Security, worked like this:

They found prominent security figures who didn't have profiles on particular social networking Web sites.

They built up fake profiles by using information from press releases and news articles. Then they built up the profiles' authenticity by sending them around to people who indiscriminately add friends on those sites.

Finally, once the profiles looked legitimate, they identified groups of security professionals on those sites and sent their friend requests to them.

Moyer and Hamiel said they did it three times, each time impersonating a different person. Each time they lured in more than 50 new friends within 24 hours. Some of those people were chief security officers for major corporations and defense industry workers, they said. They declined to identify any of those people.

"We really were surprised at the level of trust we found — we didn't think we'd be as successful as we were," Moyer said. "Any one of these people would have happily clicked on a malware site or viewed our profile with a (data-stealing) Trojan application."

Moyer and Hamiel said they even landed an interview with a journalist who responded to one of their friend requests. But they got busted: the reporter sent an e-mail to the target's real profile page on another social-networking site and discovered the fraud.

Moyer and Hamiel emphasized that the talk wasn't intended to single out any particular social networking site. Many of them have the same security problems, and users need be cautious about verifying the people they add as friends.

Readers, i receive this email article from my friend. Yes, it is true no one could escape from the on line vulnerable scams. So, please take necessary steps to not to became victim of the same.
Analyse any request from any social networking before you accept it.

Monday, July 28, 2008

Installing XP on notebooks / laptops with SATA HDD

Dear Readers,

Very recently i had to install windows XP professional for one of the ASUS note book
(F9s Series). The Asus note book comes with Windows Vista Home Premium edition bundled. Sow how, user wants to use windows XP.

Well, on the first try , i put the booting cd and started, but somehow i can not see the HDD (eventually failed to install the XP) and can not see any drives at all. Realised that it is using SATA .

I googled to find that the ways to install by using nlite program, create another bootable CD..blah..blah..

But i somehow felt that there should be easy way to do. I went back to BIOS again and i noticed the Serial ATA was set to "Enchanced Mode", i change the settingst to "Compatible Mode". Thats all, i could install the XP Pro easily.

Hope this helps for others too.

JS

Friday, July 11, 2008

Safe Guard your data in Internet

Dear Readers,

I am sure in this current internet era, we atleast sign up one service a month on the internet. That means another exposure of your personal data. How do you safe guard your personal identify on the internet, below are some tips.

1.Read privacy policies before you sign up. Although you have little control over what happens to data, you can at least know what gets collected and retained.

2.Avoid identifying information in user IDs, such as a first initial and full last name. Choosing a moniker that avoids any reference to your name, job or other personal attributes can make tracking more difficult.

3.Don't use the same user ID across multiple services. For example, if a user ID is attached to a message board posting that includes your full name, even if the ID itself does not contain your real name, it's now tied to your name when used elsewhere.

4.Use anonymizing software such as Tor. Such systems relay data packets through many servers to help mask the numeric Internet Protocol address identifying your computer.

Hope this Helps,
Thank you, Readers
JS

Saturday, July 5, 2008

Internet Speed In Indonesia…

Dear Readers,

As more and more people download albums and watch movies (watch youtube or youporn , btw younporn is banned in Singapore) via the web, are we heading for an ‘internet jam’?
Did it take your browser (whatever, ie or mozialla) a little bit longer than normal to open this article? Have you found yourself twiddling your thumbs recently as you wait two or three minutes (rather than the usual second) for an email to send? (This is applicable for internet users in Indonesia using broadband).

Perhaps you’ve even found yourself making a cup of tea while waiting for the homepage of a particularly image-heavy website to download. Using the web, do you sometimes feel like you’re stuck in 1998 – all slow connections and snail-paced emails – rather than 2008?

If so, it might be because somewhere else on the web, a few thousand people are watching a movie. Welcome to the internet jam. As more web-surfers listen to music and watch TV shows and movies, there is great concern that the broadband infrastructure won’t be able to cope, and that things will slow down and possibly even come to a standstill.

New audio- and video-based sites have started to take up more and more bandwith, yet the networks have not been properly upgraded. As a result, the infrastructure of the internet, the physical stuff it is built on, will potentially struggle to cope with increased demand for new, improved, snazzy online services. All of these new services are putting an extraordinary strain on the infrastructure.
For example, downloading a film in the HD format (that’s high definition) takes up as much bandwidth as a whopping 2.5m emails or 100m webpage downloads. Fifteen years ago, people like me thought it was amazing that we could send an email to a friend; today’s web-users think little of sending the equivalent of a couple of million emails as they download the latest movie.

And when you consider that the movie in you tube (or similar video sharing portal) reports a video was being 100,000 times via internet – which must be the equivalent of someone sending millions and millions of emails, or visiting an ordinary website a few billion times – it is clear that the bandwith and infrastructure issue is one that needs to be resolved.
Is there likely to be a collapse of the internet, or is than an exaggeration? Clearly the infrastructure needs to be improved.
Thank you, Readers
JS

Thursday, July 3, 2008

Problem with yourminis widget creation

Dear Readers,

Recently I having problem with creating widgets as well editing my old (working) widgets in www.yourminis.com.

I did create my widgets and worked fine and my flash test program works well too.

Nothing happens when I say +add new widget followed by specifying the name of the widget. After that there supposed to be upload page, which does not appearing for me.

I tried on IE as well on Mozilla. Something wrong with the website. Any help?

Thank you, Readers
JS

Tuesday, July 1, 2008

Widgets Development

Dear Readers,

I am exploring widgets hmmmmmm, looks cool and interesting.

BTW, Nokia does not spell widgets as widgets they use ‘s’ instead of ‘g’, so it is widsets for Nokia.

I developed widgets using yourminis sdk, yahoo sdk and finally widsets from Nokia. Results are interesting. I found youminis widget develop as easy tool, their widget action script for Flash is very handy. I use yahoo widget converter to convert the widgets developed on yourminis. Great, it did work fine. Expect I was expecting some drop down list, which was not appearing.

Finally, on the Nokia, I tried with simple syndication service and upload the widset. It does not work. They do have option for the creating syndication (RSS) feed widget and I had tough time in figuring out why it not show up properly (the child items are not showing in the widget) And I found it is because of the rss version supported by Nokia. It has to be, Rss version 2. If you have developed some feed on your website using older version. Please do upgrade.

Testing is on going, you can see my widsets soon on Nokia… coooool

Thank you, Readers
JS

Monday, June 30, 2008

Set up GMAIL account for BB in 3 steps...

Dear Readers,

3 steps to set up your Black berry to receive mails from GMAIL.


Step 1. Login in to your Gmail account. Select settings (from top right corner) .select the tab “ Forwarding and POP/ IMAP” . On this Tab select “Enable POP only for the mail from now on” (this way you can avoid your old email being delivered to BB).


Step2: Open your bis (blackberry internet service) of your BB provider. In this case http://bis.ap.blackberry.com/html?brand=indosat. ( if you done remember, just copy paste the above URL on the browser, just replace only brand = with your provider name).

If you are not created any profile at your providers BIS site, create one. It will ask for your BB PIN and IMEI (you can find them in BB, options, status menu). Remember your user name and password for later use.


Step3:. Setup a account / Create email account (above screen). Provide your Gmail account name and password (gmail password).

It will take 20 minutes for the settings to be affected. For me it happened in 2 minutes.
Test your settings by sending a mail to your gmail account.
All the best..

Thank you, Readers
JS

Friday, June 6, 2008

Setting up the second screen for desktop...

I happen to come across many users don’t understand how to setup or configure second monitor or projector for presentation in windows operating system. They say, it worked fine in my place but somehow it does not work here. They even conclude that it Projector problem. Honestly, it is very simple and easy to do it.

1.check for the cable connection (make sure your monitor out put connected to input vga of projector, Few projector have 2 VGA being one for input and one for output – to connect to the next projector for looping so make sure you connect to input)

2.Make sure the projector’s input source is pointing to vga or pc (it differs for different make of the projector)

3.Make sure your notebook graphics adaptor property is set to have extend my windows desktop onto this monitor (see the above diagram) selected. We can extend or we can mirror it. This property menu appears upon "Right Click" on your display and select properties then this "Diaplay property" pop up will appear.

4.Select the appropriate resolution for the second display. If you are using old projector it may not support wide screen , so the safest resolution for second screen is 1024 * 768.

5.This will give you two screens to work, one is your notebook and the second monitor is your projected image. I strongly recommend using this way since you have your screen to do your activity and audience will look into the second screen.

6.Of course, if you are training and facing the students or the room layout of the presentation hall does not allow you to see the projected image, you can mirror your desktop in this case both notebook and projected images are the same.

Hope this helps.

Thank you
JS