Friday 30 September 2011

When Your Mobile Gets Wet



In the event that a mobile phone/ cell phone accidentally gets immersed in water, you should follow these steps:

(1) IMMEDIATELY REMOVE THE BATTERY. VERY VERY IMPORTANT! 60 seconds later and it may be too late. The battery is usually the source of damage, not just the water alone. Water+Battery = Short Circuits! So REMOVE the battery! And DONT TEST the cellphone after it's been dropped in water!
(2) As soon as possible (preferably within 20-30 minutes). dissassemble the phone using Torx T6 screwdriver.
 (3) Clean/dry as much as you can, using Q-Tips
(4) Dry the electronics components under a desk lamp on a paper towel for 24 hours. A drop of water may have gone under chips and components where you cannot dry, so you need to dry under a 40/60w desk lamp, or 24 hours under a desk fan pointed down at the disassembled components.
(5) Reassemble the phone
(6) Put back together
(7) Only now it's safe to put the battery back in.
( Phone may be good as new.

Try not use a hairdryer, unless with heat turned off or at very low settings. You do not want to scorch the electronics. A hairdryer may help in some cases, but more often than not (especially with clean water), a hairdryer will usually cause more damage caused by the stresses of expansion-contraction caused by all the heat. It's best to keep things cold, to keep any contaminants in the water as chemically inactive as possible.

If you follow these instructions, you have a reasonably good chance of a working phone after a non-waterproof phone was thrown into water.

Yes, make that emergency trip to buy the Torx T6 if you have to. You have to disassemble the phone. Although reports some devices such as a PalmPilot, has survived in a snowbank for 7 days (luckily, its batteries were dead) after being lost in a snow-filled driveway, it is generally best to disassemble the device quickly. Clean snow/water usually means you can wait a bit longer, but pool water (chlorine) or ocean water (salt) will make is VERY URGENT to dissassemble the phone.

SALT WATER TIP: If exposure was salt water; you may need to clean the salt water with water. (salt water is far more dangerous). This may actually mean washing the circuit board very briefly under filtered water, in order to save its life from salt water (ocean water) before immediately drying it out. This is a last resort, but NECESSARY if your electronic device was immersed in salt water (unless you have access to special electronics cleaning fluid solutions that can get rid of salt water on short notice. Sometimes filtered water is the only thing you have access to, for cleaning salt water ASAP)

Yes, one must get rid of fear of dissassembly! RESIST trying to test the telephone -- keep the battery away -- until the phone/PDA is disassembled and dried first!

FACT: Water almost never instantly kills a cellphone. You usually still have time to save the phone's life, especially if the water is clean!

Water is never usually the source of damage in a PDA/mobilephone/cellphone/pager/etc that has been immersed into water. The source of damage is usually the combination of Battery+Water which causes short circuits. If there are any backup batteries inside the cellphone/PDA, those preferably must be removed too. Removing all sources of power immediately (all batteries) is the most important step in rescuing water-logged electronics!

Also, phones that have already been exposed to water for longer periods even with the battery, are more likely to permanently stop working. For example, having been inside pockets of damp clothes or wet bags, or fallen in a rain puddle for an hour without you noticing until too late. However, remove the battery immediately anyway and dissassemble anyway. Sometimes you can still rescue electronics that has been wet with the battery for longer periods, especially if the water was clean and the electronics shut off the battery before it did any short-circuit damage.



PC Suit for Linux


It is for nokia n80, n73, 6230(somethinsimilar..is a folder java phone), 7610, 6630 & 6680....

This is how to do it...

Connect your phone via datacable
open terminal & type 

lsusb

now u will get the following output

owais@owais-desktop:~$ lsusb
Bus 002 Device 001: ID 0000:0000 
Bus 001 Device 004: ID 0421:0445 Nokia Mobile Phones 
Bus 001 Device 002: ID 046d:092f Logitech, Inc. 
Bus 001 Device 001: ID 0000:0000 
owais@owais-desktop:~$ 


it is on my compter,ur will not be exactly the same...

Now note the line in which NOkia Mobile Phones is written...it has two number one is 0421 & other is 0445...we'll take these numbers as 0x421 & 0x445

0421 is the Vendor ID & 0445 is the Product ID

Now enter this comand.

sudo /sbin/modprobe usbserial vendor=0x(vid) product=0x(pid)

eg, in my case::: sudo /sbin/modprobe usbserial vendor=0×421 product=0×445

Now enter this command

wvdialconf create
u'll get a long output which will be like 

Scanning your serial ports for a modem.
Port Scan: S0 S1 S2 S3
WvModem: Cannot get information for serial port.
ttyACM0: ATQ0 V1 E1 — OK
ttyACM0: ATQ0 V1 E1 Z — OK
ttyACM0: ATQ0 V1 E1 S0=0 — OK
ttyACM0: ATQ0 V1 E1 S0=0 &C1 — OK
ttyACM0: ATQ0 V1 E1 S0=0 &C1 &D2 — OK
ttyACM0: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 — OK
ttyACM0: Modem Identifier: ATI — Nokia
ttyACM0: Speed 4800: AT — OK
ttyACM0: Speed 9600: AT — OK
ttyACM0: Speed 19200: AT — OK
ttyACM0: Speed 38400: AT — OK
ttyACM0: Speed 57600: AT — OK
ttyACM0: Speed 115200: AT — OK
ttyACM0: Speed 230400: AT — OK
ttyACM0: Speed 460800: AT — OK
ttyACM0: Max speed is 460800; that should be safe.
ttyACM0: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 — OK
Found an USB modem on /dev/ttyACM0.
Modem configuration written to create.
ttyACM0: Speed 460800; init “ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0″

NOw.. notice the output says that there is a modem at /dev/ttyACM0 & max speed is 460800

now enter this command

sudo gedit /etc/wvdial.conf

A file will open in text editor...now delete everything in that file & paste the following there

[Dialer Defaults]
Modem = Your Modem Name(eg, /dev/ttyACM0 in my case)
Baud = ur max speed(460800 in my case)
Init1 = ATZ
Init2 = ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
ISDN = 0
Modem Type = Analog Modem
Phone = *99#
Username = username
Password = password
Stupid Mode = 1

save the file & you are done


NOw whenevr u need to connect...open terminal & type wvdial,,wait till some sort of IP adress is displayed like

pppd:
[06][06][08]` [06][08]
primary DNS address 218.248.240.135
pppd:
[06][06][08]` [06][08]
secondary DNS address 218.248.240.79
pppd:
[06][06][08]` [06][08]

Now you are connected....hit cntrl+c to dissconnect...



U can also create a laucher on desktop(application in terminal) & keep the command as wvdial..now double click it & u r connected



first download and install Virtualbox, which is a free app.
now install win XP in it. (you will be using Win xp as a application in linux, but if you are not familiar with virtual machines, use wikipedia to familiarize yourself)
In that win XP install P C suit
you ll be able to use it.

Or

Just install an app called wine in your linux. And then try installing PC suit for windows using windows progtram loader(WINE)












Installing Software in Ubuntu
Introduction
Most Windows users who migrate to Ubuntu end up confused about software installation. They go to a website, download a .tar.gz file, double-click it, and don't see a Next-Next-Next-Finish wizard. This tutorial is intended to introduce you to the preferred methods of software installation in Ubuntu.
Rather than leaving it up to the user to track down installer files and keep applications updated, Ubuntu (like many other Linux distributions) has a software package management system that provides a searchable database of easily installable applications (like an online shopping cart but the software is cost-free), which it will download and install for you with a few clicks.
For those of you with smartphones, it's a very similar process to installing applications using the iTunes App Store or Android Market.
Installing 101: Ubuntu Software Center
The best place to start with this package management process is to use a simple interface for it called Ubuntu Software Center. (The Software Center is available as of Ubuntu 9.10; in Ubuntu 8.04, there was a similar interface called Add/Remove.)
http://www.psychocats.net/ubuntu/images/softwarecenterlucidthumb01.png
Go to Applications and select Ubuntu Software Center.
http://www.psychocats.net/ubuntu/images/softwarecenterlucidthumb02.png
If you already know what software you're looking for, you can begin typing the name of it in the top-right corner to begin the filtering process. If you don't know, you can also browse by category.
In this case, let's say you're looking for an audio recording and editing program called Audacity.
So after filtering it, click Install and get prompted to authenticate with your password.
http://www.psychocats.net/ubuntu/images/softwarecenterlucidthumb03.png
Then after a few seconds, Audacity is downloaded and installed.
http://www.psychocats.net/ubuntu/images/softwarecenterlucidthumb04.png
Once it's finished installing, it's ready for you to use.
Manual download: .deb
Most of the time, if you need software, you can use the Software Center to install it from the online repositories. Sometimes, software is not available in the repositories, and you have to go to a website to download it. If you are able to download a file with a .deb extension, this is the software package format Ubuntu prefers.
http://www.psychocats.net/ubuntu/images/manualdeblucidthumb01.png
For example, Skype is not in the default Ubuntu repositories, so you can go to the Skype website, and download the Ubuntu package.
Note: Skype doesn't always update their Ubuntu packages. So, for example, in this screenshot Skype lists the installer file as being for Ubuntu 8.10+, but I'm using Ubuntu 10.04. Opera, on the other hand, even if it hasn't changed its browser version numbers will have all the Ubuntu release versions to choose from. I don't even think Google Chrome has version numbers, just separate 32-bit and 64-bit .deb files for Ubuntu. Try to select whichever version seems most appropriate. If you have questions, post a thread on the Ubuntu Forums.
http://www.psychocats.net/ubuntu/images/manualdeblucidthumb02.png http://www.psychocats.net/ubuntu/images/manualdeblucidthumb03.png
Once the .deb file has finished downloading, double-click it to install it. You'll be prompted for your password. Go ahead and enter it if you trust the source you downloaded the file from.
http://www.psychocats.net/ubuntu/images/manualdeblucidthumb04.png http://www.psychocats.net/ubuntu/images/manualdeblucidthumb05.png
After GDebi (that's the name of the graphical tool that installs .deb files manually) finishes...
http://www.psychocats.net/ubuntu/images/manualdeblucidthumb06.png
... your application should be ready to use.
Note: as of Ubuntu 10.10 (Maverick Meerkat), double-clicking a .deb file now opens it in Ubuntu Software Center instead of GDebi. The process is still the same, though (just double-click the file).
Last resorts: .rpm and .tar.gz
The preferred way to install software in Ubuntu is to use the package manager, which you can access through Ubuntu Software Center. As we've seen with Skype, sometimes you can also find a .deb for software not in the repositories. But what if you can't find a .deb?
.rpm
If you can't find a .deb, you can try a .rpm. These files are packaged for other Linux distributions (usually Fedora or Mandriva), but there is an application called alien(which you can install using Synaptic) that allows you (most of the time) to convert .rpm files to .deb. 
Read more about this process.
.tar.gz
As a last resort, you can download a .tar.gz file. The .tar.gz file extension indicates the file is a compressed set of files and folders (the compressed files you see in Windows usually have a .zip extension). If you see the .tar.gz, it could be compressed files that have a precompiled binary file, or it could be compressed files that have the source code allowing you to 
compile the application from source.
If you have trouble installing a .tar.gz file, you can ask for help on the Ubuntu Forums.
Links
There are other guides out there that help you understand software installation a bit better.
  • Community Documentation on Installing: The wiki gives a thorough explanation of the process of installing software and also includes the Adept package manager available in Kubuntu.
  • Video tutorials: A collection of YouTube videos showing the installation process in real-time, often with spoken narration.
  • Old Psychocats Tutorial: A very text-heavy explanation of software installation that also includes examples with the command-line way to access the package manager.
Advanced interface: Synaptic Package Manager
I have removed instructions for Synaptic, because I think Ubuntu Software Center is better for beginners, and it's become robust and functional enough so that only those who actually prefer Synaptic really need to know about it. If you are curious about Synaptic, though, I have step-by-step instructions for how to use it on 
an older version of this page.

How to start windows programs quickly with Run Command?



The run option of Start menu is used to run a program or to open a document directly. If you
do not know the exact location of the program or document then click on Start button to open

Run and type the programs shortcut name to open it directly.
Run Commands
appwiz.cpl — Used to run Add/Remove wizard
Calc –Calculator
Cfgwiz32 –ISDN Configuration Wizard
Charmap –Character Map
Chkdisk –Repair damaged files
Cleanmgr –Cleans up hard drives
Clipbrd –Windows Clipboard viewer
Control –Displays Control Panel
Cmd –Opens a new Command Window
Control mouse –Used to control mouse properties
Dcomcnfg –DCOM user security
Debug –Assembly language programming tool
Defrag –Defragmentation tool
Drwatson –Records programs crash & snapshots
Dxdiag –DirectX Diagnostic Utility
Explorer –Windows Explorer
Fontview –Graphical font viewer
Fsmgmt.msc — Used to open shared folders
Firewall.cpl — Used to configure windows firewall
Ftp -ftp.exe program
Hostname –Returns Computer’s name
Hdwwiz.cpl — Used to run Add Hardware wizard
Ipconfig –Displays IP configuration for all network adapters
Logoff — Used to logoff the computer
MMC –Microsoft Management Console
Msconfig –Configuration to edit startup files
Mstsc — Used to access remote desktop
Mrc — Malicious Software Removal Tool
Msinfo32 –Microsoft System Information Utility
Nbtstat –Displays stats and current connections using NetBIOS over TCP/IP
Netstat –Displays all active network connections
Nslookup–Returns your local DNS server
Osk —Used to access on screen keyboard
Perfmon.msc — Used to configure the performance of Monitor.
Ping –Sends data to a specified host/IP
Powercfg.cpl — Used to configure power option
Regedit –Registry Editor
Regwiz — Registration wizard
Sfc /scannow — System File Checker
Sndrec32 –Sound Recorder
Shutdown — Used to shutdown the windows
Spider — Used to open spider solitaire card game
Sfc / scannow — Used to run system file checker utility.
Sndvol32 –Volume control for soundcard
Sysedit — Edit system startup files
Taskmgr –Task manager
Telephon.cpl — Used to configure modem options.
Telnet –Telnet program
Tracert –Traces and displays all paths required to reach an internet host
Winchat — Used to chat with Microsoft
Wmplayer — Used to run Windows Media player
Wab — Used to open Windows address Book.
WinWord — Used to open Microsoft word
Winipcfg –Displays IP configuration
Winver — Used to check Windows Version
Wupdmgr –Takes you to Microsoft Windows Update
Write — Used to open WordPad

Hidden Programs in Windows XP


http://lovebeats.org/community/Themes/orange-lt116v1/images/post/xx.gif




1- Private Character Editor : This program is for designing icons
and Characters (Alphabets)

Click :start
Then :run
type :EUDCEDIT
.....................................................................
.....................................................................
.......

2- iExpress : This Program is for converting your files to EXCUTABLE
files

Click : start
Then : run
type : iexpress
.....................................................................
.....................................................................
.......

3-Disk Cleanup : This program used for cleaning hard disk to offer
space
Click : start
Then : run
type : cleanmgr

.....................................................................
.....................................................................
.......

4-Dr Watson : This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32

.....................................................................
.....................................................................
.......

5-Windows Media Player 5.1 : Opens the old media player
Click : start
Then : run
type : mplay32

.....................................................................
.....................................................................
.......

Program ............. CODE
__________ __________

Character Map = charmap

DirectX diagnosis = dxdiag

Object Packager = packager

System Monitor = perfmon

Program Manager = progman

Remote Access phone book = rasphone

Registry Editor = regedt32

File signature verification tool = sigverif

Volume Control = sndvol32

System Configuration Editor = sysedit

Sys key = syskey

Microsoft Telnet Client = telnet

Sunday 25 September 2011

Key Board Shortcuts in MS Excel


F1 Key
Help
F2 Key
Edit current Cell
F5 Key
Goto
F7 Key
Spell Check
F12 Key
Save file as
CTRL and A
Select entire worksheet.
CTRL and B
Toggle Bold Text.
CTRL and C
Copies the item or items selected to the Clipboard and can be pasted using CTRL and V.
CTRL and F
Displays the Find dialog box.
CTRL and H
Displays the Replace dialog box.
CTRL and I
Toggles Italic Text.
CTRL and N
New File.
CTRL and O
Open File.
CTRL and P
Print.
CTRL and S
Save File.
CTRL and U
Toggles Underlined Text.
CTRL and V
Paste the contents of the clipboard.
CTRL and X
Cut the selected item.
CTRL and Y
Redo the last undone action
CTRL and Z
Undoes the last action.
CTRL and 1
Displays Format Cells Dialogue Box
CTRL and 5
Toggles Strikethrough Text


Keyboard Shortcut
Result in Excel 2000 – Formulas
ALT and =
Autosum
ALT and F8
Macros
CTRL and ;
Insert Current Date
CTRL and :
Insert Current Time

Keyboard Shortcut
Result in Excel 2000 – Movement
Left Arrow
One Cell Left (also SHIFT and TAB)
Right Arrow
One Cell Right (also TAB)
Up Arrow
One Cell Up
Down Arrow
One Cell Down
Home
Go to End of row
CTRL and left Arrow
Go to End of Column
CTRL and Home
Go to Top of Worksheet (A1)
CTRL and End
Go to End of Worksheet
CTRL and PAGE-DOWN
Go to Next Worksheet

Keyboard Shortcut
Result in Excel 2000 – Cell Selection
CTRL and Spacebar
Select the entire Column
SHIFT and Spacebar
Select the entire Row
CTRL and A
Select Entire Worksheet
SHIFT and Left Cursor
Select all cells to the left of the active one
SHIFT and Right Cursor
Select all cells to the right of the active one

How to Increase the Life of Hard Disk



Taking care of your hard disk is important because this is the place where all the data is stored and once the hard disk crashes, data in most cases is not recoverable. There are data recovery softwares and programs which recover data from crashed hard disks but that is not for normal computer users.
But why do hard disks crash and what can be done to prevent them from crashing?. At the same time how can a hard disk be made more efficient? Here are the answers.
Hard disks crash due to many reasons. Voltage fluctuations, physical impact, improper alignment and of course mechanical failure due to wear and tear of internal parts. Let us start one by one and get the answers to the above problems.
1. Voltage fluctuations or spikes as they are called can be prevented by using voltage stabilizers or spike guards. This will limit the damage to the hard disk to a great extent.
2. Physical impact can be prevented by handling the hard disk carefully when installing/ re-installing. When installing the hard disk care should be taken to see that it sits perfectly horizontal and that it does not vibrate or shake once the computer is started.
3. The natural wear and tear of parts can be limited by defragmenting your hard disk from time to time.But what is defragmentation? All newly created files are stored in various places on the hard disk in a single cluster ( contiguous file ). But, as the number of files and programs increase, these files are not stored as one contiguous file but broken down and scattered in various places on the hard disk. In short files get fragmented. When these files are accessed by the user, the head on the hard disk moves to and fro to locate these fragments. These fragmented files puts lot of mechanical pressure on the internal parts of the hard disk. This leads to crashes. To start disk defragmenter from the start menu, click the start button and follow this path (All Programs / Accessories / System Tools / Disk Defragmenter). A minimum of 15 percent free space on your disk is needed for disk defragmenter to run. The disk can also be defragmented automatically by using schedule task. This program can can be accessed via system tools.
4. Power management tool can also be used to enhance the life of hard disk. To access this program go to start / control panel / power options and set the parameters for various hardware devices.
5. Disk cleanup increases the efficiency of the hard disk. So delete unwanted files and programs regularly.
Follow the above rules to increase the life of you hard disk.

Glossary of Internet


- A -
Address mask (Subnet Mask)
This is used to recognize the sections of an IP address that concur with the different parts. Also known as the “subnet mask”.
Alias
A nickname that refers to a network resource.
Anonymous FTP
This is a method of bypassing security checks when you logon to an FTP site. This is done by typing “anonymous” as your user ID and your e-mail address as the password.
Application
A program that performs for a certain purpose.
Archie
A method of automatically collecting, indexing, and retrieving files from the Internet.
ATM (Asynchronous Transfer Mode)
A transfer mode that designates bandwidth using a fixed-size packet or cell. Also called a “fast packet”.
Authentication
A method of identifying the user to make sure the user is who he says he is.
- B -
Bandwidth
A measurement in Hz that reads the difference between the highest and lowest frequencies of a transmission.
BBS (Bulletin Board System)
A computer which provides file archives, email, and announcements of interest. Users usually dial in with a terminal program to access these.
Bounce
This term refers to when you send an e-mail to a non-existent recipient and the e-mail is “bounced” back to you.
BTW
By the way.
- C -
CHAP (Challenge-Handshake Authentication Protocol)
A method of authentication when connecting to an Internet service provider.
CHAT
Conversational Hypertext Access Technology.
CIX
Commercial Internet Exchange.
Client
An application that performs for a certain purpose.
Cracker
Persons who attempt to gain illegal access to computers. Not to be confused with hackers.
Cyberspace
According to M.N.A “the world of computers and the society that gathers around them.”
- D -
Data Encryption Key (DEK)
Used for encryption and decryption of message text.
Data Encryption Standard (DES)
Standardized encryption method used most on the Internet.
Datagram
A block of data that can travel from one Internet site to another without relying on an earlier exchange between the source and destination computers.
DDN (Defense Data Network)
The United States Department of Defense global communications network.
DECnet
A proprietary network protocol designed by Digital Equipment Corporation.
Dedicated line
A communications line used solely for computer connections, such as T1 and T3 lines. An additional phone line solely for your modem is a dedicated line as well.
Defense Data Network (DDN)
The United States Department of Defense global communications network.
Dial-up
Most widely used way of accessing the Internet. This involves one computer connecting to another by way of a modem.
DNS (Doain Name Service)
A name service used with TCP/IP hosts. A DNS exists on numerous servers over the Internet. It is a database for finding host names and IP addresses on the Internet and trying to figure them out.
Domain
An area on host or an IP address.
Domain Name Service (DNS)
A name service used with TCP/IP hosts. A DNS exists on numerous servers over the Internet. It is a database for finding host names and IP addresses on the Internet and trying to figure them out.
Dot address
IP addresses in the form of 1.1.1.1 in a 4-byte IP address where each number is equal to 1 byte.
- E -
Electronic mail (e-mail)
Electronic mail, or e-mail, is a way users with a computer can send messages between each other easily and more quickly than regular mail.
e-mail address
A person’s email address is usually like this:
Userid@domain.com
Userid represents the identification of the person, the @ is what separates the userid from the domain name, and the domain name refers to the host that the person is using.
encryption
This is what Internet security is built upon. Encryption will scramble information so it is readable only by the intended recipient.
Ethernet
An Ethernet connection is a LAN (Local Area Network) that consists of computers connected by twisted-pair or coaxial cable. Transfers can be made on an Ethernet connection at up to 10 Mb/s.
- F -
FAQ
Stands for Frequently Asked Questions. FAQ’s are available almost anywhere on the Internet. FAQ’s are usually used as a place to look for help or advice when working on the Internet or on your computer.
File Transfer Protocol (FTP)
FTP’s are the most widely used format to uploading and downloading files on an Internet connection. FTP’s are used so computers can share files between each other.
Finger
A finger is a UNIX command that displays information about a group or user on the Internet.
flame
This is a negative response to a newsgroup posting or e-mail message. If makes a newsgroup post or sends an e-mail message that is deemed inappropriate, they might get flamed. The most popular method of flaming is a mail bomb. This is where the sender or poster receives an overwhelming amount of messages in his or her mailbox and their system can crash.
follow-up
A response to a newsgroup posting or e-mail message.
- G -
Gopher
A search and retrieval tool for information used mostly for research.
- H -
Hacker
A user of a computer who attempts to understand the particulars of a computer. A hacker will look for ways around things while using a computer.
host
Any computer that is connected to the Internet or a network.
host address
The address of the host computer which is on the Internet.
HTML (Hypertext Markup Language)
HTML stands for Hypertext Markup Language. This is the standard method of publishing web documents onto the World Wide Web (WWW). HTML consists of tags surrounded by brackets.
hypermedia
A combination of hypertext and multimedia in a document online.
hypertext
A kind of text that permits embedded links to other documents.
- I -
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN) combines digital network services and voice into one. Users can access digital services at 115,200 bps.
Internet
A vast, uncontrolled network of computers that is available almost anywhere in the world. Basically, when you sign on to the Internet, you become a part of it.
Internet protocol (IP)
A packet switching protocol that is used as a network layer in the TCP/IP protocol suite.
Internet Protocol Address (IP Address)
Each computer is assigned an IP address. These are similar to phone numbers. When you attempt to connect to an IP address, you will connect to the computer with that IP address.
Internet Relay Chat (IRC)
Internet Relay Chat, or IRC, allows users to chat on different channels over the Internet. IRC channels are preceded by a # sign and are controlled by channel operators. Channel operators can kick people out of the channel if he or she feels necessary.
Internet Service Provider (ISP)
An organization or company that has a network with a direct link to the Internet. This is done by using a dedicated line connection, usually through a link known as a T1 connection. Users can dial into to that network using their modem. Most ISP’s now charge a monthly fee.
- L -
LAN
Local Area Network. A LAN allows users to share files between computers, send e-mail and access the Internet. Most companies use Local Area Networks so that users can access information within or outside the LAN.
leased line
A leased line is a dedicated line that connects a user or network to another network or an ISP.
Listserv
An automated mailing list distribution system.
lurking
Lurking involves simply listening or watching and not participating on an IRC channel, a mailing list, or some other type of Internet connection.
- M -
mail reflector
A mail reflector is a program that distributes information or files to a subscriber of a mailing list, Usenet group, or an IRC channel.
mailing list
A mailing list is a list of e-mail addresses used to have messages forwarded to groups of people.
MIME (Multipurpose Internet Mail Extensions)
Multipurpose Internet Mail Extensions, or MIME, is the standard way to organize different file formats. For example, if you receive an e-mail, which is in a different format than yours, the file will be decoded so you can read it using MIME.
mirror site
A mirror site is usually set up due to overwhelming traffic on an existing web site. A mirror site is a site that is kept separate from the original site but contains the same information as that site. This is an alternative to users who attempt to go to a web site but cannot due to traffic problems.
moderator
A person who manages online discussion groups or mailing lists for services such as CompuServe, America Online, Prodigy or the Microsoft Network.
mosaic
A graphical browser that supports hypermedia on the World Wide Web (WWW).
- N -
netiquette
Internet etiquette. This refers to proper behavior while using the Internet.
Network File System (NFS)
A Network File System allows a computer to access and use files over a network, just as if it were a local network.
Network News Transfer Protocol (NNTP)
A standard industry protocol for the inquiry, distribution, retrieval, and posting of news articles.
- P -
packet
A standard unit of data sent across a network.
Packet Internet Gopher (PING)
A Packet Internet Gopher, or PING, is a simple way to time or test the response of an Internet connection. A PING sends a request to an Internet host and waits for a reply message called, what else, a PONG.
PAP (Password Authentication Protocol)
A widely used method to log on to an ISP without using a terminal window.
Password Authentication Protocol (PAP)
A widely used method to log on to an ISP without using a terminal window.
PING (Packet Internet Gopher)
A Packet Internet Gopher, or PING, is a simple way to time or test the response of an Internet connection. A PING sends a request to an Internet host and waits for a reply message called, what else, a PONG.
Point of Presence (POP)
Installation of telecommunications equipment.
Point-to-Point Protocol (PPP)
A PPP is a protocol that provides a method for sending and receiving packets over serial point-to-point links.
POP
Installation of telecommunications equipment (Point of Presence). A protocol that allows single users to read mail from a server (Post Office Protocol).
Post Office Protocol (POP)
A protocol that allows single users to read mail from a server.
posting
Sending an article to a BBS or a Usenet newsgroup.
PPP (Point-to-Point Protocol)
A PPP is a protocol that provides a method for sending and receiving packets over serial point-to-point links.
protocol
A language spoken between computers to assist each other in sending and receiving information.
- R -
router
A device that forwards traffic between networks.
- S -
Serial Line Internet Protocol (SLIP)
A standard protocol which is used to run TCP/IP over a serial line. SLIP, however, will not run on a Local Area Network (LAN) connection.
server
Any computer that can provide resources to another.
service provider (Internet Service Provider)
An organization or company that has a network with a direct link to the Internet. Using a dedicated line connection, usually through a link known as a T1 connection does this. Users can dial into to that network using their modem. Most ISP’s now charge a monthly fee.
SIG (Special Interest Group)
A Special Interest Group, or SIG, sponsors different items such as IRC Channels, Listservs, and Internet Sites.
signature
Type that can be automatically added to the end of an e-mail message that will identify the sender. Signatures are usually ASCII text files.
Simple Mail Transfer Protocol (SMTP)
A standard protocol used to transfer e-mail messages.
Simple Network Management Protocol (SNMP)
A standard Internet protocol. It is commonly used to wire hubs.
SLIP (Serial Line Internet Protocol)
A standard protocol which is used to run TCP/IP over a serial line. SLIP, however, will not run on a Local Area Network (LAN) connection.
smiley
The use punctuation marks to show feelings and emotions. For example, a smiley face is :) , and a sad face would be :(
SNMP (Simple Network Management Protocol)
A standard Internet protocol. It is commonly used to wire hubs.
Special Interest Group (SIG)
A Special Interest Group, or SIG, sponsors different items such as IRC Channels, Listservs, and Internet Sites.
subnet mask (Address Mask)
This is used to recognize the sections of an IP address that concur with the different parts. Also known as the “subnet mask”.
- T -
T1
A connection of a host to the Internet where data is transferred at 1.544 megabits per second.
T3
A connection of a host to the Internet where data is transferred at 44.746 megabits per second.
TCP/IP (Transmission Control Protocol/Internet Protocol)
Transmission Control Protocol/Internet Protocol, or TCP/IP, is the basic communications protocol required for computers that use the Internet.
TCP/IP Stack
This is needed to properly run a TCP/IP protocol. It is made up of TCP/IP software, hardware drivers, and sockets software.
Telnet
This is the standard Internet protocol to connect to remote terminals.
TN3270
A slightly different protocol than Telnet, TN3270 is used to connect users to an IBM mainframe.
token ring
A token ring is a kind of LAN that consists of computers that are wired into a ring. Each computer is constantly in direct contact with the next node in the ring. A token, which is a type of control message, is sent from one node to another, allowing messages to be sent throughout the network. A Token Ring network cannot communicate within itself if one ring is broken.
topology
The arrangement of all the computers on a network and the links that join them.
Tranmission Control Protocol/Internet Protocol (TCP/IP)
Transmission Control Protocol/Internet Protocol, or TCP/IP, is the basic communications protocol required for computers that use the Internet.
- U -
Universal Resource Locator (URL)
An example of a URL would be http://www.computer.com. A Universal Resource Locator refers to the universal address of an Internet web page. A URL consists of three things. First, it starts with letters such as http, ftp, or gopher that identify the resource type, followed by a colon and two forward slashes. Next, the computer’s name is listed. And finally, the filename and directory of the remote resource is listed as well.
UNIX to UNIX Copy (UUCP)
A protocol that passes e-mail and news through the Internet. Originally, UUCP allowed UNIX systems to send and receive files over phone lines.
URL (Universal Resource Locator)
An example of a URL would be http://www.computer.com. A Universal Resource Locator refers to the universal address of an Internet web page. A URL consists of three things. First, it starts with letters such as http, ftp, or gopher that identify the resource type, followed by a colon and two forward slashes. Next, the computer’s name is listed. And finally, the filename and directory of the remote resource is listed as well.
Usenet
A.K.A. newsgroups. There are a vast number of different newsgroups worldwide on the Internet, available to almost anyone.
UUCP (UNIX to UNIX Copy)
A protocol that passes e-mail and news through the Internet. Originally, UUCP allowed UNIX systems to send and receive files over phone lines.
- V -
Veronica
Allows searches of all gopher sites for directories, files, and other resources. Veronica is a search engine that is built into Gopher.
- W -
W3 (World Wide Web)
A collection of online documents on Internet servers worldwide. World Wide Web documents are written in HTML. In order to use the World Wide Web, you must have a World Wide Web browser.
WAIS (Wide Area Information Service)
A search engine and distributed information service that allows indexed searching and natural language input.
White Pages
Databases containing postal addresses, telephone numbers, and e-mail addresses of users on the Internet.
Wide Area Information Service (WAIS)
A search engine and distributed information service that allows indexed searching and natural language input.
Winsocks
Acronym for Windows Sockets. A set of standards and specifications for programmers who are programming a TCP/IP application to use in Windows.
World Wide Web (W3, WWW)
A collection of online documents on Internet servers worldwide. World Wide Web documents are written in HTML. In order to use the World Wide Web, you must have a World Wide Web browser.
WWW (World Wide Web, W3)
A collection of online documents on Internet servers worldwide. World Wide Web documents are written in HTML. In order to use the World Wide Web, you must have a World Wide Web browser.