Saturday, November 15, 2008

D-Link La Fonera Router and X-Box Setup






Sort Description
The only modification I made to my D-link 624 router was to enable 64-bit WEP Encryption. All other settings remain in the default state, with the exception of port forwarding. Why did I not enable a higher encryption? Because, I live in a neighborhood where the nearest house is 15 yards away and the network would hardly reach them. In addition, if it did reach them they could not join the network because it is secure. If they really wanted internet access that bad and cracked, the 64-bit key then it would show up in my logs and I could change it or let then have it for all their hard work.

Website: dltv.files.wordpress.com | Filesize: 480kb
No of Page(s): 6

Content

1. Log into the La Fonera Router.
2. Administration Tab — Factory Defaults Subtab
1. Restore Factory Defaults: Yes
2. Click “Save Settings” — triggers reboot.
3. Router’s IP will now be 192.168.1.1 if it was not already. This was a very important step.
3. Connect Wirelessly to the Router.
4. Setup Tab — Basic Setup Subtab
1. Connection Type: Automatic Configuration - DHCP
2. STP: Disable
3. Router Name: BRIDGE - Optional Settings
4. Host Name: BRIDGE - Optional Settings
5. Domain Name: blank
6. MTU: Auto
7. Network Setup – Router IP
1. Local IP Address: 192.168.0.10 ( Changed to match main router subnet)
2. Subnet Mask: 255.255.255.0
3. Gateway: 192.168.0.1 (IP of the router your wanting to connect to)
4. Local DNS: 192.168.0.1 (IP of the router your wanting to connect to)
8. DHCP Type: DHCP Server
9. DHCP Server: Disable
5. Click “Save Settings” — triggers reboot.


Get the file Download here

Get Download Link...

Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for MS-DOS



The Cisco Aironet Wireless LAN Client Adapters, also referred to as adapters, are radio modules that provide transparent, wireless, data communications between fixed, portable, or mobile devices and other wireless devices or a wired network infrastructure. The adapters are fully compatible when used in devices supporting Plug-and-Play (PnP) technology. Host devices can be any device equipped with a PC Card Type II or Type III slot. These devices include:

• Desktop systems
• Portable laptops
• Notebook computers
• Personal digital assistants
• Pen based computers
• Other data collection devices


The primary function of the adapters is to transfer data packets transparently through the wireless infrastructure. The adapters operate similarly to a standard network product except that the cable is replaced with a radio connection. No special wireless networking functions are required, and all existing applications that operate over a network can operate using the adapters. The PC Card can also be built into peripheral devices such as printers to provide them with a transparent wireless connection to a wired network.

Get pdf Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for MS-DOS

Get Download Link...

Beginners Guide To Free Article Marketing



By: Darren

Free article publishing is widely known as one the best internet marketing procedures to achieve free search engine rankings. Learn how best to incorporate this into your internet business, with this free article marketing ebook.



Download

Get Download Link...

7 Steps to Making Money Online...FAST!


By: David Perdew

There is one question every newbie internet marketer asks... over and over and over. What are the steps I should take to make money online fast -- with zero budget and no list? It is the question all beginners have. And the answer seems to be a closely


guarded secret. Until now... I asked a master marketer that question in front of a group of 40 students. To my surprise, he laid out a clear 7-step process. You will be astounded how simple the answer is.

Download

Get Download Link...

Friday, November 14, 2008

Develop your own database software


By: Madhav

an overview of how to develop your own database software for the web and client server environments, asp.net, visual basic, c# and sql server.




Download



Get Download Link...

Photoshop CS Manual

Short Description
This document is designed to get you quickly familiarized with Photoshop so you can begin in-depth learning of this versatile software. This handout IS NOT meant to replace careful study of a Photoshop manual, nor will it replace the in-depth learning available through books such as Visual Quickstart Guide to Photoshop 6.0 (available through PeachPit Press). Rather, this handout is designed to serve as a checklist or a quick reference guide as you become familiar with the software. Also note that these directions are intended to help film and videomakers become familiar with ways that Photoshop can be used in their projects. How a photographer or graphic artist may use Photoshop could be quite different.

Website:
astro.temple.edu | Filesize: 72kb





Content
Introduction
Photoshop is a graphics program used by film and videomakers to create graphic files for use on the Web, in CD-ROMs, as animation files, or for import into full motion video projects. You may also use Photoshop to create original promotional materials such as posters, tape cases, and one sheets for your film or video projects. Original images can be created in Photoshop using drawing and painting tools. You can also scan images into Photoshop or import/scan photos, slides, negatives, or video stills for manipulation in Photoshop.

The Toolbox
Upon launching Photoshop, the Toolbox should be visible on your desktop. The Toolbox contains a variety of tools for creating and manipulating images. If the Toolbox is not visible, go to the Window Menu, Show Tools. Notice that there are a number of other windows you could open, each with a unique use in Photoshop. We’ll talk about more relevant windows later.

Download

Get Download Link...

Cisco IOS XR Security Guide Book

This introduction contains the following:
• Definition of security and the role of security in the larger context of high network availability
• A preview of the modules in the Cisco IOS XR Security Guide
This guide describes many aspects of the system security that Cisco IOS XR software provides on the Cisco CRS-1 routers and Cisco 12000 Series Router.

Internet attacks occur every day, and these attacks can include core routers as targets—usually with some form of denial of service (DoS) attack.




Fortunately, the Cisco CRS-1 router and Cisco 12000 Series Router come with a highly robust, built-in security structure. These routers can withstand attacks and remain in service until the necessary responses have been completed. This guide describes the software architecture and the hardware support for addressing these attacks. It also provides guidance on how you can further protect your investment in these products. Our security goal for the Cisco CRS-1 router and the Cisco 12000 Series Router is to neutralize attacks and recover quickly from any degradation of service. The point is to keep the router always operating, regardless of even a distributed denial of service (DDoS) attack. We developed the systems that run Cisco IOS XRsoftware so that an attack on one process, service, or plane does not compromise any other process, service, or plane. For example, a process that is shut down automatically restarts, and when needed, a patch can be applied without restarting the router. Essentially, these mechanisms are:
• Modularity of services
• Separation and isolation of management, control, and data (or forwarding) planes
• Multiple layers of increasingly stringent defense
• Convenient upgradability

Get pdf Cisco IOS XR Security Guide


Get Download Link...

My Headlines