background preloader

FREE Computer Training - Computer Repair Classes - Laptop Repair Instruction - Data Recovery Lessons - Web Design Seminars - Computer Security Counseling

http://www.elithecomputerguy.com/

Packet Tracer Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts. Packet Tracer supplements physical equipment in the classroom by allowing students to create a network with an almost unlimited number of devices, encouraging practice, discovery, and troubleshooting. The simulation-based learning environment helps students develop 21st century skills such as decision making, creative and critical thinking, and problem solving. Packet Tracer complements the Networking Academy curricula, allowing instructors to easily teach and demonstrate complex technical concepts and networking systems design.

What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Introduction to Computer Science Course (CS101) When does the course begin? This class is self paced. You can begin whenever you like and then follow your own pace. It’s a good idea to set goals for yourself to make sure you stick with the course. Convert your existing Windows XP system into a virtual machine Run your Windows XP system in Windows 8 with VMware In a recent series of articles culminating with Make USB devices accessible to a Windows XP virtual machine, I showed you how to create a Windows XP virtual machine in Windows 8 using the built-in Client Hyper-V tool. I've received quite a few emails about that series and several people have asked about the possibility of converting their existing Windows XP installation into a virtual machine.

Bluejacking This Siemens M75 is Bluejacking the Sony Ericsson K600i pictured below This Sony Ericsson K600i is getting Bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. 10 best practices for successful project management The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. Given the high rate of project failures, you might think that companies would be happy to just have their project finish with some degree of success.

Preparing for the Windows 10 Upgrade: What Your PC Needs Any version of Windows just performs better on newer equipment. That's a given. But, with Windows 10 so close to its official upgrade rollout, you might be wondering if your old PC can work adequately with the upgrade. The last thing you want (and Microsoft wants) is to have a horrible experience with this reported fantastic new operating system. Here's the minimum specs you need for the upgrade:

23 must-have Chrome extensions If you’re a Chrome user, chances are good that you’ve already got a handy extension or two—but you can always use a few more to enhance your online experience. Here are our picks for 23 of the most useful Chrome extensions currently out there. Get ready to start downloading, because these just might change how you use the internet. 1. Three methods for transferring files to and from your Android tablet If your Android tablet doesn't have a USB port, you can still easily transfer your files to and from a PC. Jack Wallen explains three ways this can be done. Transferring files to and from your tablet can sometimes be difficult, especially if it doesn't include a standard USB port. Sure, emailing files back and forth works, but many users need to have a more consistent, reliable, and easier means to transfer files to and from their Android tablet. Let's dive in and examine a few methods for transferring files without a USB port.

A Guide to the Windows 10 Start Menu Since the release of Windows 95, the Start Menu has been the primary way for users to access their files and applications. Microsoft attempted to move away from this setup with Windows 8, creating a serious backlash. Now the Start Menu is back and better than ever for Windows 10. DIG - DNS lookup - find IP address Query a DNS domain nameserver to lookup and find IP address information of computers in the internet. Convert host and domain names to IP addresses and vice versa. This is the right place for you to check how your web hosting company or domain name registrar has set up the DNS stuff for your domain, how your dynamic DNS is going, or to search IP addresses or research any kind of e-mail abuse (UBE/UCE spam) or other internet abuse. This online service is for private non-commercial use only. Please do not abuse.

Kernel modules Kernel modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. Overview To create a kernel module, you can read The Linux Kernel Module Programming Guide. A module can be configured as built-in or loadable. To dynamically load or remove a module, it has to be configured as a loadable module in the kernel configuration (the line related to the module will therefore display the letter M). Five free and reliable cloning tools Image your drives for free with the help of one of these reliable tools. It's inevitable: At some point you're going to need to recover from a disaster. When this happens, if you happen to have a cloned image, the task will be far easier. But many budgets don't include the cost of some of the pricier cloning tools, like Acronis Backup and Restore.

Upgrade from Windows 7 to Windows 10, on the same hardware? So, are you one of those long-time Windows users who lived through the Vista fiasco and then upgraded to Windows 7 as soon as it was apparent that it was far superior to the previous version? Then, when you saw Windows 8 coming, you vowed to never again get caught with an experimental operating system and decided to stick it out with Windows 7? If so, chances are you're glad that you did so. Windows 7 has served you well, and you continued to be productive, while all those who upgraded to Windows 8 struggled with the Metro UI and its touch-based implementation on a desktop PC.

Related: