background preloader

FREE Computer Training - Computer Repair Classes - Laptop Repair Instruction - Data Recovery Lessons - Web Design Seminars - Computer Security Counseling

http://www.elithecomputerguy.com/

Packet Tracer Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts. Packet Tracer supplements physical equipment in the classroom by allowing students to create a network with an almost unlimited number of devices, encouraging practice, discovery, and troubleshooting. The simulation-based learning environment helps students develop 21st century skills such as decision making, creative and critical thinking, and problem solving. Packet Tracer complements the Networking Academy curricula, allowing instructors to easily teach and demonstrate complex technical concepts and networking systems design.

How to Design a Search Engine Marketing Strategy Most of my visitors always asking me that, which Operating system is used by Hackers ?.We can’t say that particularly all Hackers are using which Operating system,that completely depends on their mind sets and Compatibility.But as per records Linux is the Most used flavor for Hacking,because of its high anonymity and strength,hackers normally depends on Linux flavors. But here Question is not about Windows or Linux.Its all about Which is the Specific Operating System used by the Hackers ?.

What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Citrix XenDesktop 7.6, Provisioning Services 7.6 and the XenDesktop Setup Wizard with Write Cache and Personal vDisk Drives The original articles I wrote for XenDesktop 7.1 and PVS 7.1 and XenDesktop 7.5 and PVS 7.1 have proven to be extremely popular. This article will show the same process as the original articles but use XenDesktop 7.6 and PVS 7.6 and show what differences XenDesktop 7.6 and PVS 7.6 bring to the process. Introduction A while back, I worked on a project where the customer required the use of a Write Cache drive and a Personal vDisk (PvD) drive with XenDesktop 7.1 using Provisioning Services (PVS) 7.1.

Convert your existing Windows XP system into a virtual machine Run your Windows XP system in Windows 8 with VMware In a recent series of articles culminating with Make USB devices accessible to a Windows XP virtual machine, I showed you how to create a Windows XP virtual machine in Windows 8 using the built-in Client Hyper-V tool. I've received quite a few emails about that series and several people have asked about the possibility of converting their existing Windows XP installation into a virtual machine. Jailbreak basics: Everything you need to know for iPhone and iPad We see quite a few questions in our Jailbreak Forums about jailbreak basics. So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). We've included common jailbreak lingo, popular jailbreak apps and tools, and videos highlighting some awesome jailbreak utilities!

Bluejacking This Siemens M75 is Bluejacking the Sony Ericsson K600i pictured below This Sony Ericsson K600i is getting Bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Citrix XenDesktop vs VMWare View - Virtual Desktop Resource I was recently asked to compare XenDesktop to VMWare View. I'm always happy to handle such a request because I love comparing technology, especially Desktop Virtualization technology. Many of the articles I read online are overly biast, or approach it from one stand point. Also, this technology is changing DAILY and many of the articles are outdated. I'm sure by the time you read this article it will be outdated, so take anything I say with a grain of salt, and also call a consultant to see where I'm right, where I'm wrong and what may have changed to make it so. The way I approach any technology at any customer is pretty basic but a lot of tech people tend to forget this: the "right" technology is whatever technology makes sense for the customers environment.

10 best practices for successful project management The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. These guidelines will help you plan the work and work the plan. Given the high rate of project failures, you might think that companies would be happy to just have their project finish with some degree of success.

WIRELESS - Securitytools A curses based tool that allows identification, classification and data capturing of wireless networks. The interface is inspired by the unix top utility. Currently it works under Linux. Preparing for the Windows 10 Upgrade: What Your PC Needs Any version of Windows just performs better on newer equipment. That's a given. But, with Windows 10 so close to its official upgrade rollout, you might be wondering if your old PC can work adequately with the upgrade. The last thing you want (and Microsoft wants) is to have a horrible experience with this reported fantastic new operating system. Here's the minimum specs you need for the upgrade:

5 Killer Tricks to Get the Most Out of Wireshark Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro. We’ve already covered basic usage of Wireshark, so be sure to read our original article for an introduction to this powerful network analysis tool. Network Name Resolution While capturing packets, you might be annoyed that Wireshark only displays IP addresses.

Three methods for transferring files to and from your Android tablet If your Android tablet doesn't have a USB port, you can still easily transfer your files to and from a PC. Jack Wallen explains three ways this can be done. Transferring files to and from your tablet can sometimes be difficult, especially if it doesn't include a standard USB port. Sure, emailing files back and forth works, but many users need to have a more consistent, reliable, and easier means to transfer files to and from their Android tablet. Let's dive in and examine a few methods for transferring files without a USB port. A Guide to the Windows 10 Start Menu Since the release of Windows 95, the Start Menu has been the primary way for users to access their files and applications. Microsoft attempted to move away from this setup with Windows 8, creating a serious backlash. Now the Start Menu is back and better than ever for Windows 10.

Related: