Skip to main content

Posts

Showing posts from June, 2012

IP Address conflict related problem, error and solution for Windows OS

When we connect our PC or Laptop through a LAN (Local Area Network) with home network, we may receive a common error message "Conflict IP address with another computer". This message confirms that you are using a IP which is already exist in network and same address is not permitted in any network because IP is unique inside any private network or global network (public network which we called real IP). Below I state reasons behind this conflict and resolution for this specific problem. Reason for this error message: 1. Your configured IP address is used by another system of your existing network, which is currently running and power on. 2. May be you use LAN and a DHCP server at the same computer and your static LAN IP address block same with DHCP IP address block. 3. Multiple Network card installed in your computer and IP addresses of network adapter is same configured. IP Address conflict problem Solution: 1. If you know the network address block, subnet m...

Baseband signal g(t) Modulation Concept and Different Modulation Scheme with equations

Modulation is used to modulate baseband signal. Basically it is a technique used to generate a strong signal from a weak signal with help of a transporter signal known as carrier signal. A baseband signal is main source of any signal. It can be a sinusoidal wave or discrete pulse. In communication a baseband signal need to traverse long distance, but it become weak with respect to distance so that we need to add a carrier which carry the base band signal and send baseband signal to destination. A baseband signal pass through a modulator with carrier frequency then transmission starts, on other side demodulator demodulate signal and receive the original signal.   Practical example: If we through a paper it will traverse some distance but if we through it along with a stone it will traverse more distance. Here paper is baseband signal and stone is carrier. Basic signal modulation concept with carrier frequency There are three basic type of Modulation schemes which ...

Increase security of Facebook by setting security question

Security Question is one of the security measures for latest website(s). Most of the new or establish website imposes this feature for user to increase security level. In this feature, users have to select one or multiple common question from drop down set by website administrator. After that they input answer for their question(s). This question and answer used when user request for any secret such as reset forgotten password, change email address or any type of personal information based on strategy of the website(s). Facebook also implement security question to distinguish between original and fake user. So, security Question is an important security measure to prevent your Facebook Account. If you haven't set your security question yet, please set your security question now! Steps to set Security Question in Facebook account: 1. Click on Drop-Down (Down Arrow) right side of "Home" Menu. 2. under this menu, Click on "Account Settings" submenu. 3. On Ac...

Mistakes and guideline to protect your Facebook account from unauthorized access

Facebook account unauthorized access is unwanted and troublesome for anyone, may be your friends or closer who know your Facebook id and some common secret about you, can try for illicit access of your account and if they provide sufficient information about you that satisfy Facebook security policy, they can get access of your account. After login they can easily change anything of your profile. So you need to be aware of security of your Facebook account, which involve password, e-mail address, security question etc. You can protect your Facebook account from any sort of illegal access by other just following below steps:- Steps to avoid unauthorized access: 1. Don't share your email address with others, that used in Facebook login or do not publish it publically so that others can not find it very easily from your public profile. 2. Try to use different E-mail address for Facebook login and avoid your correspondence e-mail for this purpose. 3. You must fill up your Security Que...

Brief and Examples on Simplex, Half-Duplex, Full-Duplex Transmission

In data communication, there are three types of communication styles; they are Simplex, Half-Duplex and Full-Duplex. Here we discuss about their characteristics with examples. Simplex: In this communication style data can send only and basically it is one way or uni-direction communication. This type of communication is not widely used for transmit trusted data because it can not send any error or control signal to sender terminal. This style of communication is vastly used in Radio and TV where we can see and hear or receive data only but we can not send any information data by the same channel. Half-Duplex: Half-Duplex is another type of communication style where data can and send and receive but not at the same time. In this communication type, if data is send from one end, then we can not send data from another that means communication establish in one direction.  This communication vastly used in walkie-talkie, intercom, string phone etc. The practical ...

Restrict deletion of printer to ensure misuse of system

Printer is an important output device for any system. When need hard copy of any soft copy we must need a printer to print the document on paper. Printer may be connected through LPT port or USB port, but modern printers are come with USB port. Then it needs a driver for specific operating system version to install properly. After installation, printer icon will appear in control panel under Printers. Now before printing it must ensure that icon exist and work properly.  There are many possibilities for removal of printer software or driver by others wrongly or intentionally. But you can protect it and restrict user from deletion of printer software from add/removal program or driver from control panel by click on uninstall button. In windows operating system, there are number of way to protect user from deletion printer. Here I describe very simple and shortcut method with the help of group policy edit. Steps for printer deletion in windows OS: 1. Go to START menu, and ...