Antiviruses are the most essential programmes on a computer as they assist in prevention of viruses, malware and spyware from affecting computers. This makes it necessary to have antiviruses always running on a computer. There are a lot of viruses and spyware on the internet and can affect the computers at any moment causing damage on the files in an operating system.
The following steps should be followed while installing an antivirus:
- First and foremost, one needs to understand the need for the antivirus. Windows is the OS that is prone to the dangers of viruses as it is used by many people across the world. Hence needs the best antivirus and one that is always running.
- Insert the CD or DVD that has the antivirus into the computer, the installation process should start automatically with a window opening that will guide you through the installation process.
- However, if the antivirus was downloaded and it is in a zip file, extract the files n the zip and look for a file named setup.exe or install.exe or any other file with a .exe extension. In case of a file, there is no extraction but one goes directly into locating the files with the .exe extension. Double click on the file to start the installation process. Also the same window that takes you through the installation process opens.
- The installation process will provide you with the recommendations and prompt you to select the best options in which the antivirus will operate properly.
- Decline the installation of any other programs that may be prompted by the installation wizard. This s because there is no and additional program that is needed for an antivirus to run properly
- Close all the install windows when the installation is finished and remove the disk or delete the files on the computer if you are sure you won’t need them again.
At this point, the antivirus is already installed in your computer. It is recommended that you restart your computer so that any changed settings in the operating system can take effect. If you receive a prompt to update the antivirus, you are highly recommended to do so.
Leave a Reply
CCTV cameras are of importance for security in home. However watching the footages on the big monitors at home is sometimes hard as one might not be near the home all times. The technology where the footages can be viewed remotely over a Wi-Fi connection on an android or windows mobile phone is therefore important to assist one view the footages when they are not near the big monitors. This articles outlines the steps one needs to configure the DVRs so that one can view the footages from a mobile phone.
The following steps are to be followed so as to configure this setup.
- Connect the CCTV DVR to a monitor directly using a VGA or a HDMI cable.
- Go to configurations or settings and then to NETWORK.
- Disable OBTAIN IP AUTOMATICALLY in the network section of your DVR. This sets IP to static.
- Input the following data and then reboot the DVR.
- IP Address: 192.168.1.7
- Subnet mask: 255.255.255.000
- Gateway: 192.168.1.1
- HTTP PORT: 80
5. Now open the PC AND CONNECT Wi-Fi
6. Open the INTERNET EXPLORER (chrome may cause problems) and type 192.168.1.1 OR 192.168.0.1.
7. This opens the router`s home page. Get the ID and PASSWORD from the WI-FI router manual as you will be prompted to input them.
8. Find section for port forwarding. This is done by inputting the following.
- Port: 80 or 8080
- IP Address: 192.168.1.7
- Protocol: All
- Leave all the others to default
9. Save and enable all. Reboot the WI-FI router.
10. Connect the CCTV DVR to a monitor directly using a VGA or a HDMI cable.
11. Go to configurations or settings and then to NETWORK.
12. Disable OBTAIN IP AUTOMATICALLY in the network section of your DVR. This sets IP to static.
13. Input the following data and then reboot the DVR.
- IP Address: 192.168.1.7
- Subnet mask: 255.255.255.000
- Gateway: 192.168.1.1
- HTTP PORT: 80
14.Now open the PC AND CONNECT Wi-Fi
15. Open the INTERNET EXPLORER (chrome may cause problems) and type 192.168.1.1 OR 192.168.0.1.
16. This opens the router`s home page. Get the ID and PASSWORD from the WI-FI router manual as you will be prompted to input them.
17. Find section for port forwarding. This is done by inputting the following.
- Port: 80 or 8080
- IP Address: 192.168.1.7
- Protocol: All
- Leave all the others to default
18. Save and enable all. Reboot the WI-FI router.
- IP and PORT: 192.168.1.7:80
- ID: Find the Admin ID in the DVR user manual.
- PASSWORD: Found in the DVR user manual
- NETWORK: WI-FI
- Hit enter and at this point you should be able to view your footages from your handset.
19. These steps should be able to assist you forward your CCTV footages to your phone for viewing.
Leave a Reply
Local M5 is a wireless router. It offers Wi-Fi connectivity which allows you to connect various devices to your router. Devices that can be connected have to be able to connect on a wireless connection e.g. Wi-Fi enabled smartphones. In this article, we will discuss how to configure local M5 as wireless access point.
The following steps have to be followed while configuring your Local M5 as wireless access point. First and foremost you need to login into your router. You can of course skip this step if you are already logged in.
Then login to the ubiquity Nano station M5. This is done by:
- Find the Internet IP Address of your router. This can be found on the internet
- Go to the internet to the Ubiquity Nano Station M5 web platform and login from there. This is done by pasting the ubiquity Nano Station M5 IP Address at the address bar on the browser.
- A dialogue box pops up after pressing enter requesting you to input your ubiquity Nano Station M5 username and password. The default username and passwords are all available on the internet
- After entering the username and password(obtained from the internet), The ubiquity Nano Station Home screen is shown now. You are now ready to go ahead and configure the M5
- On the home screen, at the top, Click on the WIRELESS tab. A page that allows you to set your wireless connection opens.
- Enter an ID on the SSID box. This is the name of your network and should be unique. Avoid using obvious values, for instance your name.
- The next settings that needs to be changed is the security settings. Do this by selecting WPA2-AES on the security drop down list.
- Finally, set your password. This is done on WPA preshared key. This also has to be unique with 14 to 20 characters. You can read guidelines on how to set up a strong password from the internet.
- Then select the change button on the right corner of the page.
These steps should be able to help you configure your M5 as a wireless router. Your connection at this point is secure for usage.
Leave a Reply
The LHG 5 can be used as Point to point connection over WI-FI. It is and outdoor system that has a built in antenna. This article outlines the process of configuring the Mikrotik LHG 5 light head grid as point to point WI-FI. The following process is to be followed for a successful configuration of the LHG 5.
First and foremost, the device has to be assembled and all the parts attached to their respective places. Attach the assembled LHG unit to the grid appropriately and attach the legs to the case, using two self-thread screws, fix the legs. Fix the grounded cable connector and 5 degree angle adapters appropriately. More details are available on the internet on how to assemble the LHGs.
After assembling, the device needs to be connected. This is done by:
- Open the Ethernet door to connect your PC or LAN cable to the Ethernet port, connect the other end of the Ethernet cable to a PoE injector
- Ensure that you set the LAN computer IP configuration to automatic
- Open your browser and on the address tab, type 192.168.88.1
- This starts configuration process. Note that the username is “admin” and there is no password.
- In case the IP connection is not available use win box to connect to the MAC address of the device
- Note that the router accepts from passive PoE injectors only.
- If you want to boot the device from network the following procedure is followed. While booting, long-press the RESET button of the device till the LED light turns off. At that point, the device will start looking for net install servers.
- Note that either straight or cross-over cables can be used for connecting to other network devices.
- Note that the RESET button has got 3 functions and the functions depends with how long one presses the button that is:
- To reset router OS configuration: Long press the button when the device s booting till the LED light starts flashing and then release the button. This is approximately 5
- Turn on CAPs mode : continue pressing the button till the LED light turns solid. This is approximately 5 more second from the time the light turned LED
- Make the Router BOARD look for Netinstall servers: Keep holding the light till it goes off. This is approximately 5 more second from the time the light turned solid.
Leave a Reply
Power beam is a high performance integrated wireless device for point to point and also point to multi point connection solutions. Different power beam models have different transmit powers. For instance 150 mbps throughput on 30km distance for PBE-M5-620. We will discuss the steps taken to configure the light/power beam for a point to point data transmission.
First and foremost, 2 devices are needed. These devices are configured in different modes. The local side as access point mode and the remote side device as client mode.
- A PoE adapter is used to power on the device (it comes with the power beam adapter). This is done by Cat6 LAN cable from PoE out port in adapter to device LAN port. Connect the laptop/computer in PoE adapter LAN port
- On your laptop, paste 192.168.1.10 IP address on the address tab and login into UBNT Power beam with default username and password as ubnt and ubnt respectively.
- After you are logged in, choose your country and country language from the list, agree to the terms and conditions and then hit login button.
- At this point, the devices on both the local and remote sides is configured.
- Click on the settings gear at the right side top of the window.
- Save the wireless mode as ACCESS POINT PTP
- Use a unique name to set your SSID. Any name that you wish.
- Set the channel width according to area interphase. 40/80 MHZ is recommended but 40 MHZ for high interphases.
- Set your frequency also according to area interphase. (To find the area frequency, a wireless analyser is used )
- Use the point to point link security key to protect your wireless link at the wireless security.
- Reduce the power according to your point to point devices distance.
- Hit save changes button to apply settings.
- All the devices come with the same IP address. It is therefore recommended that you your IP address so as to avoid point to point connection conflict. This is done by:
- Go to the network tab on the top menu.
- Change IP address on the IP ADDRESS box.
- Keep the access point on and connect to the second point for client configuration.
- Site B is configured as client mode. Go ahead and configure the client mode. This is done by:
- Login and go to the settings gear.
- Then wireless tab.
- Chose station PTP on the wireless mode
- Press the select button to scan for the access point device.
- Select you access point name or try rescanning if it does not show the name
- Press the save changes button.
- At this point, the device will reboot. You will then login again and see the connection status and signal strength i.e. local RX DATA rate and remote RX data rate.
These steps are going to assist you configure your light/power beam as point for point data transmission. Note that the firmware used for you devices have also to be in a good state that is you have to ensure that they are up to date
Leave a Reply
M5 as a ubiquity device can be configured as point to point wireless connection for data transmission. This article focuses on the steps taken so as to successfully configure Local M5 as point to point bridge for data transmission.
First and foremost, the device has to be properly and carefully unboxed. Then the following steps will guide you on how to configure the M5 router for the point to point bridge.
- A P2P device wired physically to your network referred to as ROOT BRIDGE. One needs to connect their work station to this device. This s done by pasting this address (192.168.1.x).
- Make sure that there is a connection between your device and the Nano Beam M5`s LAN interphase.
- The next step is pointing your browser to 191.168.1.20. The default username and password at this point is ubnt and ubnt simultaneously.
- The next step is changing the login and password into your own preferred details.
- Then make the following wireless changes:
- Wireless then mode: set the Backbone to AP – mesh point(remote) = station
- Wireless then WDS (Transparent bridge) Set the mode to ENABLED
- Wireless then SSID and change the SSID
- Wireless then Wireless security and set the WPA2-AES by changing the keys to your preferred password
6. Make the following Network changes
- Network and then the bridge mode
- Network and then configure and set management Net Settings to static
7. On the system, Change device name and time zone.
8. Make the same changes to the mesh point(this is the other end of your connection)
9. Place the trans receivers at the correct pint for the network to be received and also the correct angle. A 35 degree angle is the angle allowed for these devices.
These steps should assist you configure local M5 as point to point for data transmission. This setup configuration is almost similar to all ubiquity devices.
Leave a Reply
Mikrotik port forwarding is used to redirect a request from mikrotik port number and IP address combination to a local port number and IP address. This assists a lot in remote access of your data in a server. There are different ways of configuring mikrotik for port forwarding on different processes. This article focuses on the configuration of the mikrotik port forwarding using a winbox.
The following steps will assist a lot in the process of configuring mikrotik port forwarding
- Using winbox, login to the mikrotik router with the admin previllages.
- Go to IP then to firewall menu item and click on NAT tab, click on the plus sign. This opens a NAT rule window
- Go to general and from the chain dropdown menu, choose dstnat. In the Dst .address input field, Put the MikroTik WAN IP which is 175.58 this ranges from 58 to .198.
- From protocol dropdown menu, choose TCP.
- In DST port input field, put 80 because the web server works on TCP port 80.
- Click action tab. This shows an action dropdown menu. Choose dst-nat.
- On the Address input field, put the web server IP ADDRESS and put the 80 on the ports input field.
- Click apply and then OK button
- Now at this [point, the mikrotik port forwarding is configured. To access your servers remotely just type the IP address and you will be able to see the data.
These steps should be able to assist you configure your Mikrotik port forwarding aim using a WinBox. These steps are similar to all the other processes steps.
Leave a Reply
Mikrotik routers can be used in providing more reliable wifi connections. The connection can serve more than 50 devices and manage to be strong still. This is contrary to the other Hotspot routers and that is why using mikrotik satellites as point to point wifi is very important. This article discusses the steps to be followed while configuring this.
Mikrotik routers are of different models and each model has its strength. For instance RB2011 with 100 connections, and RB1100AHX4 with 500 connections. First there is the need to ensure that the hotspot router is connected to the mikrotik satellite.
- Connect the access point wireless routers with network cables. In the location of my WIFI Services, disable SEPARATE FROM THE WI-FI LAN option.
- The access is then connected to the hotspot router and the switch. By doing this, an area of arbitrary size is covered using all access points required.
- The need of using outdoor access points arises in the latter case. This is because they have a capability of using the PoE. In this setup, each antenna will be achieved with Ethernet cable. An example of the outdoor Access points is the ubiquity Pico station M2.
However n cases where cabling is so complex or there is any difficulties in cabling, the best option s building the network using the wireless technology to repeating the signal. This technology is known as WDS. This is done by expanding the WI-FI network with two routers that are connected to the mikrotik satellite router without cables. The following steps have to be followed while configuring the mikrotik satellite for a WI-FI connection.
- First and foremost, go to the MY WI-FI servce control panel and deactivate SEPARATE WI-FI FROM LAN option.
- Enable the WDS on the router. This is done by setting the mode to ACCESS POINT(WDS), i.e. click on NETWORK then WI-FI, then EDIT then under INTERPHASE CONFIGURATION
- Idealy, if the connection needs to be spread to an area that has no etheret cables, these steps are to be followed.
- First and foremost, to spread the WI-FI signal to this area, The need to use two antenna Pico stations arises.
- The first antenna is connected to a Mikrotik hotspot router and the second to the first antenna in WDS
- To the second antenna, a switch is connected via the PoE`s LAN port.
- To this switch several additional access points are connected. Both antennas are configured using the following process:
a) Reset using the button on the back of the of the antennas.
b) Open the browser and paste 192.168.1.20
c) Under wireless tab, set Wireless Mode on “AP-Repeater”, in WDS Peers put the Mac address of the other antenna, specify an SSID and a frequency (channel) transmission common to the two antennas, and finally set the “Channel Width” of 20 MHz.
d) Disable the airMax technology
e) In Network | Management Network Settings, set the LAN Ip on 10.182.0.2 (10.182.0.3 for the other), subnet 255.255.0.0 and gateway 10.182.0.1
f) Click change and then apply to save your settings
g) Note that you cannot set a different SSID for different antennas
Leave a Reply
Installing an operating system on a computer can be done by inserting an operating system installation disk or drive in a computer then booting the computer from the disk or drive. The processes used in installing an operating depend on:
- Weather the computer is new or already in use.
- Weather the Operating system is on a disk or drive
This article outlines the steps taken for a successful installation of an operating system.
Installing an Operating system
First and foremost, if the computer was already in use, the need to back up data arises. This is done by partitioning of the computer disk and backing up all the relevant data on the new disk. This is done by right clicking on This PC and then left click on manage. Click on storage and then Disk Management. Click on ‘C’ and then shrink volume. You will be prompted to key in the size of the disk that you want it to shrink to. Follow the procedure and then copy all the data in your computer to the new volume created. In case a computer is new, this process is not necessary as there are no data in the computer
The following steps are followed while installing an OS on a computer:
- Insert the drive or the disk in the computer then boot the computer. This can be done by long pressing the computer power button to switch it off then wait for some few seconds before pressing the power button again to start the computer.
- In case of the disk, the computer will automatically boot with the disk. But in the case of a drive, you can make it bootable or you will have to specify on how the computer should boot when it is restarting.
- Wait for the computer`s first start up screen to appear then a small window on which you can press the setup key will appear. You can also start pressing the setup key as soon as the first window appears.
- Long press DEL or F2 to enter the BIOS page. The computer might prompt you to press a different key. Use that key in case prompted to.
- From the computer BIOS page, select your installation disk or drive
NOTE: Different computers have different BIOS keys. You can read your computer manual to confirm the key of your computer.
- Locate the boot order section which is normally on the main page of the BIOS. You may need to use the arrow keys on the keyboard to navigate in the BIOS window.
- Select the location from which you want to restart your computer. In this case, you will start the computer either from the disk drive or an external drive e.g. flash drive.( The disk drive is usually labelled as CD-ROM Drive while the external drivers coming up as removable drivers)
- Move your selected location to the top of the list. This s done by pressing the + key with the boot location that you want to use selected until it is at the top of the list.
- Save your settings and exit the BIOS. Press enter to confirm.
- Restart your computer. This will boot from your flash drive or disk and it will start installing the OS.
- The installation will prompt you to click on and confirm some actions. Follow the prompts to the latter
These steps are to be followed in most OS. Installing an OS on a computer using this method will be successful. On other Operating systems, i.e. apart from windows, the same procedure can be followed.
Leave a Reply
Sharing a printer across a network is a requirement in every company and some homes. It assists in sharing of peripherals accessed from different computers that are in one network amongst the computers and also printing them easily without having to move them. This makes the sharing of printers over networks important as it saves time and makes work easier. This article highlights the steps of installing and sharing a printer over a Local Area Network (LAN).
Installing a printer
Installing a printer on a computer requires basic computer knowledge and this makes it easy to be done by most people. First and foremost one needs to ensure that the connection between the printer and the computer is in good state then follow the installation process. The following steps are to be followed so as to install the printer:
- Click the windows button found on the keyboard. This can also be done by clicking on the windows icon found on the left bottom of the computer (i.e. on windows 10).
- Type printers and faxes and click to open.
- Click on add printer.
- The printer will come up after searching and then connect to the printer.
Sharing a printer over Local Area Network
First, one needs to ensure that the printer drivers are in good state on all the computers in the connection, then install the printer on the computers and then connect the computers using the cables or on a wireless connection if the hardware supports.
Additional drivers that may be require in the connection have to be added by Clicking on ‘Additional Drivers’ and checking all the drivers that are needed then click OK. After checking the drivers and the connection of the computers, the following steps are followed while sharing the printer over the connection:
- Install the printer on the network server or domain controller by using the setup wizard found under ‘printers and faxes’ then click on ‘Add a Printer’.
- Click on the windows icon and type printers and Faxes. Click to open.
- Right Click on the ‘New Printer’ Icon and select properties.
- Click on the ‘sharing’ tab and highlight `Share this printer`.
- Fill in the share name field with the identity you have selected for this printer.
- Install the printer on other network computers by opening the printers and faxes console
- Open the printer installation wizard by clicking on Add Printers
- Click `Next`, select ‘network Printers` then click `Next’ again.
- Highlight “Browse for a printer” and click next. This brings a list of every printer available on the network.
- Highlight the printer you wish to add the click Next
- Click finish and send a test page to the printer to ensure that it is working. This is done by right clicking on the printer Icon, choose properties and click on print a test page.
These steps should be able to lead you through the installation of a printer on LAN.
Leave a Reply
How to backup, restore and recover contacts from your mobile/ smart phone
When a mobile phone is lost or gets spoilt beyond repair, the need of getting a new one arises. However, the new one comes with no contacts and needs to be updated. This brings out the reason why backing up of contacts and restoring of the same is very vital in our daily operation of the mobile phones. This article therefore outlines the ways of backing up contacts on a phone, restoring contacts after one has lost the phone or the contacts and discovering contacts that are hidden in the handset.
First, there is the issue of syncing with google. The cloud technology has always been the best way to backup any type of data as it makes the data accessible from any place and at any time. In this case, if the contacts were saved previously with google that is after oozing them be it through losing the handset or getting spoilt, after one logs in the google account on the new handset the contacts automatically show on the device eve without syncing. This is the reason why it is very important to backup contacts n google since restoring them becomes easy. Also discovering them is easy as the contacts saved on google will always be available on the google platform unless deleted by the account owner.
On the backing up of contacts on google, you have to ensure that you turn automatic backup on and off. This is done by the following procedure:
- Open your device’s Settings app
- Type system then backup
- Turn backup to google drive either on or off
Turn on ones in a while and at this time all the recently added contacts to the device will be backed up to the google drive in addition to those that were previously already backed up.
The other way of backing up and restoring contacts is by exporting them either from the phone to the sim card or vice versa. This is done by the following process:
- Open the contacts app on the handset
- Tap more than settings then export.
- Choose one or more accounts to export the contacts from then tap export to VCF file.
These steps assist in exporting the contacts to VCF file that you can access at any time. Also after taping export, there are many options, Export them to different destination so that you can access them for instance to google, sim card, memory card and phone memory.
Also restoring contacts from backups is very important as it is vital when oe wants to get the contacts that they had backed up recently. The following steps assist in the restoring of the contacts that had previously been backed up on a smartphone:
- Open the settings app on the device
- Tap google
- Under services, tap restore contacts.
- Tap from account in case of multiple google accounts and select from which account you want to backup contacts.
- Tap the device with the contact copy.
- Turn off sim card/device storage if you do not want to copy contacts in the sim card and phone.
- Tap restore
- Wait for the device to restore the contacts.
The above procedure however does not work with window handset. In this case, if one upgraded to windows 10 and they are missing their contacts, calendar items or email, one has to make sure that the phone is up to date and re-add their Microsoft account. This is done by the following steps:
- Swipe to the all apps list and then select settings then update & security and then phone update
- Select check for updates and then follow the instructions.
- Then go back to settings and select accounts then your email and accounts
- Under email, calendar and contacts, select add an account and then add your main Microsoft account again.
These steps are very important as they will assist one backup, restore and find contacts in their accounts and device.
When a mobile phone is lost or gets spoilt beyond repair, the need of getting a new one arises. However, the new one comes with no contacts and needs to be updated. This brings out the reason why backing up of contacts and restoring of the same is very vital in our daily operation of the mobile phones. This article therefore outlines the ways of backing up contacts on a phone, restoring contacts after one has lost the phone or the contacts and discovering contacts that are hidden in the handset.
First, there is the issue of syncing with google. The cloud technology has always been the best way to backup any type of data as it makes the data accessible from any place and at any time. In this case, if the contacts were saved previously with google that is after oozing them be it through losing the handset or getting spoilt, after one logs in the google account on the new handset the contacts automatically show on the device eve without syncing. This is the reason why it is very important to backup contacts n google since restoring them becomes easy. Also discovering them is easy as the contacts saved on google will always be available on the google platform unless deleted by the account owner.
On the backing up of contacts on google, you have to ensure that you turn automatic backup on and off. This is done by the following procedure:
- Open your device’s Settings app
- Type system then backup
- Turn backup to google drive either on or off
Turn on ones in a while and at this time all the recently added contacts to the device will be backed up to the google drive in addition to those that were previously already backed up.
The other way of backing up and restoring contacts is by exporting them either from the phone to the sim card or vice versa. This is done by the following process:
Leave a Reply
A network bridge assists in joining PCs to a network in cases where there are no ports available on the router and WI-FI connectivity is not possible. First and foremost, at least two network adaptors are needed. One will be used to connect to the internet and the second one to another computer. Also as a result of setting up a bridge, the primary network adaptor will lose connectivity. To regain connectivity, one needs to set a static IP address to the computer manually. This calls for the need to search for an IP address on the computer. This article therefore outlines the steps taken to create a network bridge on a win PC.
Follow the following steps so as to successfully create a network bridge using your PC.
- Open the power user menu by pressing windows + x keys and select network connections
- Select the two adaptors. That is the one connected to the internet and that that will be used in the bridge connection.
- Right click on the selection and click bridge connection.
- At this point, the device connected to the bridge port should have access to the network and internet with the IP address information coming from the router, but the computer hosting the bridge won’t be able to access the internet unless you have a third network adapter that is also connected to the network or a static IP address.
- After setting up the bridge there is the need to regain internet access. This arises to the following procedure.
- Open the power user menu by pressing windows + x keys and select network connections
- Right click the bridge adaptor and select properties
- Select the network adaptor that connects to the internet.
- Select Internet protocol version 4 (TCP/IPv4)
- Click properties.
- Select the Use the following IP address option
- Use the IP address information you collected at the beginning of this guide to assign a static IP address like is shown in the screenshot below
- Click OK
- Click Close to complete the task
The above procedural steps assist in the setting up of a bridge connection
Leave a Reply
The main aim of the configuration of IPCCTV is to get the right IP address of a camera which makes it easy to identify it amongst various devices attached in on the same network. This makes the concept of IPCCTV vital especially on large networks like WAN. However, the IPCCTV installation is not limited to the larger networks only. It can be configured on the LANs to.
Also, an internet Protocol camera distinguishes itself with a direct internet connection which makes t able to send and receive data via the internet. This means that the CCTV camera footages can be accessed with any device for instance a mobile phone even without being on the home network after configuring the IPCCTV. The process of configuring IP cameras is quite different on LAN and WAN. This article outlines the steps that are vital in the configuration of IPCCTV on LAN and WAN.
The following procedure outlines the steps taken for a successful configuration of IPCCTV:
- First and foremost, both the monitoring devices and the CCTV cameras have to be connected to the home network. The connection can be done with or without a router.
- In case there is no a router, the P2P technology comes in. P2P provides an easy exit for remote viewing with no need of an IP address: Simply entering the UID and password on the camera app or client, and then you can access the camera. This however won`t be discussed in details here as it does not involve the installation of CCTV by identifying them with their IP address.
- The next step after ensuring the connection is configuring the IP camera. This step depends with the connection. On LAN network for instance (e.g. the typical home network), One needs to know the CCTV camera local IP address.
- Input the IP address on the web search. This open the camera`s UI. Everything appears on the web page.
- In case of a WAN network, there is the need for port forwarding. Also in this type of network, one has to find the local IP address of a CCTV camera. In addition to that, finding HTTP and RTMP port number and the WAN IP address is vital.
- In this case, port forwarding transfers the local IP address into a public one that is used to access a specific camera in the WAN.
The above steps assists in configuring IPCCTV
Leave a Reply
There are many ways to recover photos that are deleted from a mobile phone. One of the most convenient ways is almost ensuring that the photos on a mobile phone are always backed up either in drop box, google or even on cloud platforms like Facebook and Gmail. In some cases, people forget to back up the photos and this makes it hard for them to recover after they have been deleted from the phone. This article outlines the steps taken in recovering permanent deleted photos from a smartphone.
The following procedure assists a lot in the recovering of permanently deleted photos from a mobile phone.
- First, download the android recovery software.
- Connect the mobile phone to the PC via the usb cable. Ensure that usb debugging is enabled on the phone and wait for the device to connect.
- After the device is connected, Android recovery software will display all the data types that it supports. Select all the data types that you want to recover.
- In some cases, mostly when the device is rooted, two options pop up i.e. scan for all files and scan deleted files. In such a case, scanning all the files will be the most effective choice to select although it takes longer time as compared to scan deleted files.
- Then click on next. This scans the device to rescue lost data. Give it time to scan until it is finished. This will take few minutes
- After the scanning, a preview option is displayed where one can check which data to recover. Select all the data to be recovered and then click on recover to save all lost data to your PC
Note that although it is possible to recover deleted photos on your android handset, it is recommended that you ensure that at least you backup every important data in the smartphone so as to ensure that the you are always having the data whenever you need it. The online backup is important also fo r remote accessing of the data. The above steps are very vital when it comes to the recovering of already lost data from a smart phone. The procedure however only works with the android phone
Leave a Reply
Frequently people get a chance to get accidentally deleted files restored back to their windows PCs. This is because it comes with a recycle bin on the desktop that will assist in this process. Recovery of data files on laptops is easy as most laptops use windows that come with the recycle bin. In case the deleted files are permanently deleted and have bypassed the recycle bin, then there is the need to employ software to assist in the recovery.
On the other hand, in mobile phones and tablets that use android, data files recovery is difficult as they do not have the recycle bins. Recovery of data files in these devices can be done by the use of android data recovery tools. This feature of restoring already deleted files from a device is important for recovering files that are deleted accidentally. This is the reason this article aims at outlining the steps taken in recovering data files on smartphones, tablets and laptops emphasizing on the android devices.
First and foremost, the android data recovery tools have to be used with a PC and the recovery process done via USB debugging. The most common android data recovery tools that have proven to work well are:
- EaseUS MobiSaver for android
- 7-Data android recovery tool 1.0
- Data recovery for android
EaseUS MobiServer for android
The following are the steps that are followed in recovering android device data using EaseUS MobiServer for android:
- Install the EaseUS MobiServer for android and run it and make sure that the android device is rooted.
- Connect the device to a computer using a USB cable then click the `Start` button. This allows the software to recognise and connect the device.
- Scan the android device to find all the lost and existing data. This is even made easy as it is possible to specify which file you want to be recovered by choosing a specific file type.
- After the scanning, click on `only display only deleted files`. Preview all the deleted recoverable files and then click on recover button. This gets all the selected files back ones.
7-Data android recovery tool 1.0
The following are the steps that are followed in recovering android device data using 7-Data android recovery tool 1.0:
- Install the software
- Connect the android device to the PC via a USB cable
- Chose which memory to scan for recoverable file that is either internal or external
- Preview the files to be recovered. A search can be used to get to specific files.
- Click save and select the directory to save the recovered data. Then move to the directory and save the data in the mobile phone.
Data recovery for android
This s also a very reliable software when it comes to recovering data on the android devices. The following are the steps that are followed in recovering android device data using Data recovery for android
- Connect the android device to the computer via USB.
- Enable USB debugging and wait for the android device to be detected
- Begin data analysis by clicking on `Start`
- Choose the files to be restored and then click on `recover`
This recovers all the selected data.
Using the above three software, it is easy to successfully recover the android lost data files.
Laptop recovery of permanently deleted data files
Also if a tablet or any PC has permanently deleted files, that means that the files are also not in the recycle bin, It is possible to still recover the files using RePicyid Free Photo recovery software. The following steps will be useful in this case.
- Run the RePicyid and then choose `All file types` and then click on the location where the files existed
- Click on advanced settings and then check the file format and then scan for all the files. This may take a few minutes.
- Preview the scanned files and select the ones that are needed, then save the selected files to another folder.
The above processes offer the best and easy data files recovery methods on the devices we use in our daily lives.
Leave a Reply
First and foremost, to configure mkrotik Access point, connecting to the mikrotik router via winbox has to be the first step. Then the configuration process follows after that. This artices outlies the steps that one needs so as to successfully configure mkrotik as Access point for an internet connecton.
The following steps have to be followed from connecting via the winbox to the final step of configuring mkrotik as Access point:
- Make sure that the antennas are connected and the interphase configured. This s done by double clicking on an interphase name. This opens a config window. On this window, chose AP bridge mode. This set the device as an AP. In this case the device to be set as an AP is the mikrotik router.
- Open the wireless interphase window in winbox, click on the blue Enable button to enable all the wireless cards that are disabled.
- Then configure WPA2 security to secure the AP. Click on OK button to close the wireless setting window and move to the security profile tab of the wireless interphase window.
- Press the add button and set a new profile with a different WPA2. A security car that works better with you. However, this can be done back in the interphase configuration.
- Go to the wireless interphase window on the Registration table tab and check if any stations are connected to your access point.
- Go to the IP menu to configure the AP`s IP address. Set up a DHCP server in this router the stations you are configuring have no IP addresses from the same subnet.
- Configure SRC-NAT. This assists the stations to have access to the internet via their private P addresses. Note that this step is needed only if the ISP does not know about the new local network and hasn’t set up proper routes to it.
- Then setup wireless interphase. This is done by setting mode to ap_bridge, band to ap_operated_band, frequency to ap_operated_frequency and ssid to network_identification.
- At this point, the wireless connection is established. Now add IP address for the wireless interface for IP routing.
- Now you are ready to configure stations. This is done by connecting to the client router via the same way and then proceeding to the Wireless interface configuration.
- Finally configure IP address. This s done by adding the IP address to access point router.
- Add IP address to the client router. This IP address should be from the same subnet as the first one.
The above steps are the steps to followed for a successful configuration for mikrotik AP
Leave a Reply
Port forwarding routers to the internet assist in ensuring that a program that is running on a certain device does not stop functioning due to internet connection. This is important as it allows swift operation of software that is running in a gadget connected to the internet through a router. To port forward a router to the internet, one needs to assign a static IP address to a device. A static IP address is an unchanging number identifying a device on your network, and to forward a port you first need to give your router the static IP address of the device for which you are opening the port.
Assigning a static IP address is done by the following procedure:
- In a computer connected to your internet connection, Click start and then type cmd and then enter.
- After the command prompt window has opened, type ipconfig /all and then enter.
- The windows IP configuration menu displays the IP address.
- Record the following numbers listed under your network connection (labelled “Local Area Connection” or “Wireless Network Connection”):
- Subnet mask
- IPv4 address or IP address
- Default gateway
- DNS server
- To set a static IP address on a Windows 7 or Vista PC, open Control Panel then Click Network and Internet, then Network and Sharing Centre. In the left pane, click Change adapter settings in Windows 7; in Vista, click Manage network connections
- Right-click Local Area Connection; then click Properties
- In the list, select Internet Protocol Version 4 (TCP/IPv4), and click Properties Select Use the following IP address. Add 10 to the last digit of your Default Gateway number and enter it into the IP address field. For example, if your Default Gateway is 192.168.1.1, the new number is 192.168.1.11.
- Assigning a static IP address is done by tinkering with the IPv4 Properties menu of the router
- Enter the numbers of the Subnet Mask, Default Gateway, and DNS Servers that you recorded earlier into their respective fields. Click OK.
- To assign a static IP to a printer, video game console, or other device on your network, you’ll need to use the device’s control panel or a Web-based interface.
- Then login to the router interphase and open a port.
- Open a web browser and type your default gateway number in the address bar then press enter.
- Enter the default username and password that are on the router documentation on a sticker at the side of the router. Also the credentials may be on the port forward website.
- Click on applications & Gaming, then advanced.
- Then click on Port forwarding/Port triggering. Then NAT/ QoS or something similar.
- Enter the port you want to open under Internal and External, or enter a range of ports to open under Start and End.
- . Choose the Protocol (TCP, UDP, or both) then Enter the static IP address that you created
- Be sure Enable is selected if available. Enter a name under Application if you want, then save the changes.
Leave a Reply
Android mobile phones, computers and laptops mention all devices that are used in browsing the internet are all prone to malware. Annoying popup ads that show at any time and all the other sophisticated mobile spyware that allows hackers to spy on the activities by the users are the most common attacks on the devices. Viruses are very common in affecting our gadgets to. They are acquired mostly though internet downloads.
It is very important to ensure that the devices are free from malware all the times so as to ensure that the devices operate well and also that the personal data on our gadgets are not compromised. This article outlines the ways in which viruses can removed from smart phones, computers and laptops.
Smart Phones
First and foremost, removing a virus from a mobile phone starts with realising that the phone is infected. The following are the signs that show a mobile phone is affected by a virus.
- Decreased battery life
- The smart phone functions slowly.
- High data usage
- Suspicious notifications from banks and unknown services
- Pop up ads
These signs won`t be discuss in details here. The next step is getting rid of the malware. The following ways wil get rid of any malware in our phones.
- Uninstall any suspicious apps
Any app that is not useful and was not install by the owners of the device may be a maware and if left for so long may start to cause more problems on the device. It is therefore recommended that if one gets any apps on their devices and they have no idea of where they are from they should be uninstalled immediately. To do this:
- Go to settings
- Tap on apps and notifications then all apps
- Choose the app in questions then click on uninstall
If the uninstalled button is greyed, the app may have gained admin access. In this case:
- Go to settings then security & location
- Go to advance and then to device admin apps. Tap on the app in question to deactivate it then proceed back to the apps and notifications to uninstall it
- Run an antivirus
Today, there are many antiviruses in the internet. They are the best in clearing the viruses on our gadgets. First and foremost one need to visit the internet and do research on which Is the best antivirus to use then install it on the device. Run the antivirus scan and it will detect all the malware especially viruses that have affected the device. Note that after the antivirus runs, it scans all the malware and lists them for the user to proceed and remove it. The removing of the virus can be done from the app but in some cases there is the need to remove it from the phone settings.
- Factory reset
This function clears all the phone data. It is recommended that the user arises to this method after all the other methods prove not to be of assistance. It is done by:
- Backup any important data in the phone then proceed to settings
- Go to System > Advanced > Reset options then Erase all data.
Computers and laptops
Computers and laptops are more or less the same. The process followed in removing a virus using an antivirus and the signs that the device is infected are also the same as the ones on smart phone. Computers and laptops however have a method of removing the viruses via command prompt. The process followed in removing a virus using cmd is what this article will cover.
- Click on start button then type Command prompt. Right click on it and click on run as administrator. This opens a window that allows the keying in of commands
- Enter the drive that is infected with the antivirus e.g. For drive ‘D’ just type ‘D’
- Type `dir D` and hit enter. Following this command, will show you the directory of D drive.
- Type “dir D: attrib -s -h /s /d *.*” and then hit enter. This will search through all the hidden and system files in the drive
- In the window that shows the files, check of an unusual file with a exe extension.
- Rename the file by using this command – rename filename.extension new filename before deleting it.
Using the above procedure, one can remove viruses from the computer or USB drive without using an antvirus
The above procedure assists a lot in getting rid of viruses in a computer and mobile phone.
Leave a Reply
The ring camera is one of the latest security technologies that allows one to extend the Ring of Security around their entire property. It allows the mo0nitoring of property from whichever place one is on the phone, laptop, tablet or PC. It is meant to alert and show videos on intruders in case there is one. This articles outlines the processes of installing this camera in the premises ranging on how best it can be used to the installation process. It covers the Features, physical installation, in app setup, charging and troubleshooting.
First and foremost, it is easier to set up and use this camera as it is mostly done by an app, the ring app. So one has to start by installing the app. Then make sure that the battery is fully charged before starting the installation process.
- Download the ring app from one of the app stores or visit ring.com/app.
- Then set up the spotlight cam near the router.
- After this, tap the Live View button in the Ring app to see video from the camera.
- Note that if the white light at the bottom of the spotlight cam flashes, it means that it is updating its software. Wait till it stops and the update shall have finished.
- Test video quality by the cam and ensure that it is the way you want it to.
- Then remove the mounting plate on the cam and, insert the mounting plate with the ball socket pointing down in case the cam is meant to be mounted on the wall. Iinsert the mounting plate with the ball socket pointing up in case the cam is meant to be mounted on the eave. This can be checked on the manual. How to mount the cam.
- Then install the mounting bracket on the wall then mount the cam. (Also check this on the manual on how to mount the cam)
- It is recommended to use a ring solar panel as this will assist in energy hence prevent the switching of batteries.
- After mounting the cam in the proper way, adjust it to the best direction that needs surveillance.
- Then select your spotlight cam in the ring app to open the Device Dashboard, from here, one can change settings and access various features.
- Check the battery level from the app and turn notification on or off. This is meant for event alerts.
- Then select motion zones such that in case the cam notices motion in the selected zones it will alert you through your device.
- At this point the cam is ready to serve the user better. A live event begins when motion is detected or when selecting Live View.
- The ring video recording is an optional feature that assists in saving the videos for the user to view later.
- The manual comes with the ways to troubleshoot the ring camera in case of any problems.
The above process should be able to assist one in installing and knowing how to use a ring camera. Note that the product manual has more on the installation with images on how to mount the ring camera.
Leave a Reply
A router assists a lot in the sharing of the internet and this makes it very important for our offices and homes. However, losing a router password can be a challenge as this can lead to difficulties in changing the router settings and also sharing of the internet in some cases. First and foremost one needs to now that the default WI-FI password on the back or the underside of the routers. This article outlines the steps that one can use in changing a router password and reset the passwords to default.
The following steps will assist in successfully changing of a router password. Note that these steps can be used if you remember your password. In case one has forgotten their password, they have to reset the password to default password first before changing the password.
- Make sure that you are connected to the network.
- Open a new web browser window.
- Type 192.168.0.1 in the address bar and press enter.
- On the right hand menu, select something to do with wireless password. This depends on the router type as on others you may have to select wireless, setup or wireless settings.
- Enter the default router settings username and password or the one that you have been using. If the login details do not work, the need to reset your router arises. Note that if you reset the router, it will lose any personalised router settings.
- Enter the new network key that you want to use and then select apply.
- Reconnect all the devices using the new password.
- In cases where the passwords are forgotten, the need to reset the router password arises. In this case, all the connected devices disconnect as you reset your password.
- The above method can also be used in resetting the password. The other convenient method is:
- Long pressing The Reset button for at least five seconds on the router.
- This resets your password to a default password or network security key found on the back or underside of the router.
- Reconnect all your devices using the new password as they all disconnected when the password was reset.
These steps should be of great assistance in the resetting and changing of router passwords.
Leave a Reply
TP link router is an important device in both offices and homes for providing an internet connection. There are many ways to configure the router but the process that one uses depends on what they want and of what use they want the TP link to be. For instance, if one wants to configure a TP link router to work with a fibre or cable modem if they have one. This article outlines the steps for a successful configuration of a TP link router.
The following steps should be followed when configuring a TP link:
- Attach an active data jack or a modem to the TP link using an Ethernet cable.
- Plug in the router and power it on.
- Connect the wireless network broadcasted by the router. The default WPA2 key and the SSID are on the bottom of the router.
- Open your browser and navigate to tplinkwifi.net
- Login with the default credentials which are admin for user name and admin for password.
- Click system tools and then password on the left side navigation bar to change the default password. This makes it more difficult for someone to change settings in the event that they are able to gain unauthorized access to your network.
- Key in admin on both old username and old password fields and your new user name and password to. Then click save.
- You will be logged out. Login again and ensure that the credentials you entered are functional.
- After logging in, click next to run the quick setup which will manually configure the internet connection and wireless settings. This gets started.
- On the next panel, input your connection details. That is input the network SSID of your choice. It is recommended to choose a name that is not common or personal information as the nearby computers can see your connection. Then type your unique password that you will be using for your connection in the WPA-PSK/WPA2-PSK field. Note that the password should be difficult for other people to guess.
- Then click next and then finish
- This step automatically disconnects the computer from the internet. Sigh in using the new username and password that you had set in the process above.
- Note that Wi-Fi Protected Setup (WPS) allows you to connect devices to your network without using the WPA2 key. If physical security of your router is a possible concern, disable WPS by clicking WPS on the nav bar, then clicking Disable WPS.
These steps should be able to lead you through a successful configuration of a TP link router.
Leave a Reply
The physical setup for a wireless access point is so easy. First and foremost it is kept near a network jack and a power outlet, a power and network cables are then plugged in. The software configuration is done online. This is done by typing the IP address of the access point on the address bar on an internet browser. Multifunction access points provide NAT and DHCP for the networks and double as the network’s gateway router. Due to this, they typically have a private IP address that’s at the beginning of one of the Internet’s private IP address ranges, such as 192.168.0.1 or 10.0.0.1. However, the manual that comes with the wireless access point always explain on how to go about the IP address. This article outies the procedure taken when creating a wireless access point.
The following steps will assist in the creating of the wireless access point after typng the IP address on the address bar.
- Enable the device wireless access point by clicking the on disable.
- Set the SSID. This is the Server Set Identifier used to uniquely identify the network. You can decide to leave the SSID on default or change. It has no much impact when it comes to hacking.
- Disable allow broadcast SSD to associates. This disables the access point’s periodic broadcast of the SSID. This is for more security as by disabling this function, a wireless client must already know the network’s SSID in order to join the network.
- Then select a channel. Select one of the 11 channels on which to broadcast. In ths case, all the access points and computers in the connection should use the same channel. Try switching to another channel if you find out that the computer loses network frequently.
- Then on WEP – mandatory or disable. This allows the use a security protocol called wired equivalent privacy.
- For small networks, it’s common for the access point to also be the DHCP server for the entire network. This calls for the need to configure the DHCP server of the access point. This is done by the following procedure:
- Enable option and then specify the other configuration options to use for the DHCP server
- In cases where Larger networks that have more demanding DHCP requirements are likely to have a separate DHCP server running on another computer, one can disable the DHCP server in the access point to defer to the existing server.
The above description will assist a lot in letting the reader know what s best in configuring a wireless access point.
Leave a Reply
Ubiquity Nano station is a very vital device when it comes to sharing of network. It is the ideal device for connecting two remote locations on one network. This is the therefore the best device for sharing broadband across distance and for bridging networks. The Nano Bridge supporting AP-WDS can link up to six remote buildings over one connection. It is therefore a very important device in the bridging of AP stations. This article outlines the steps taken in configuring the ubiquity Nano Station as Access Point Station Bridge.
The following steps assist a lot in successful configuration of ubiquity Nano station as Access Point Station Bridge.
- Installation is simple. The units are placed at both ends of the network and then connected to Ethernet cables. For instance one unit connected in the modem and another one connected to an Ethernet switch or a WI-FI Access Point at the other location. This means that a virtual network cable between two facilities. I this case, there is no routing configuration and this makes the network setup so simple. All protocols work perfectly.
- After successfully creating the hardware, then the need to create a WI-FI access point arises. To create a high performance WI-FI with a long range, log in to Air OS management software and set to AP mode. Note that the hardware part of the Nano Station that one has also assists a lot when t comes in the wide range coverage. For instance, Nano Station M2 is ideal for covering sports grounds and outdoor areas with a sector-by-sector approach.
- At this point, the unit is ready to be mounted. It is recommended to put it at an higher place like the roof as all the networking hardware in the unit are integrated and the unit Is also weather proof for permanent installation at a certain place. It can survive the toughest weather conditions.
- One end of the Ethernet cable s plugged into the Nano station and the other into the Power over Ethernet injector. This injector s plugged into the AC power. This setup has a role to allow one cable to carry the network traffic and at the same time power the unit.
- Note that t is recommended to use two surge protectors one near the Nano Station and the other one at the building’s entry point in the case of outdoor installations.
The above setup procedure should be able to give out steps to be followed so as to successfully configure ubiquity Nano station as Access point Station Bridge.