Friday, May 14, 2010
How to Stop Your Mom from Spying in Your Personal, Private Email Account
spy mom!
Steps
1.First, make sure that your mom is actually spying on you. Make sure that she is really reading your personal account and all.
2.After that you try to find out "why?" Usually parents do it because they are worried of your particular behavior.
3.Try not to show your behavior changes in front of your Mom. Yeah, it's difficult, but the least you can do is try.
4.If your suspicion turns out to be true, sit down with your mother and have a heart-to-heart talk. Let her know that you are aware that she is intruding on your privacy and that you'd like her to stop. Your privacy is important but you still love her.
5.You can always do is change your password. Change to something difficult, something complicated.
Tips
* Change your password.
* Act normal around your mom.
Warnings
* Don't be harsh on your mom. Be polite!
* Don't make accusations.
Source: WIkihow
Free Download Games
It is a very nice car speeding game, Download it here.
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Simply Install and Follow the Intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Tuesday, May 11, 2010
How to Use Your Mobile Broadband Connection Card for Your Wireless Router
Steps
1.Make sure you have an active mobile broadband connection from a cellular provider it could be from a USB or Laptop card device.
2.Log onto the administrator or host account of your computer.
3.Go to Start, then click on Control Panel.
4.Find Network and internet Connections and click on it.
5.Select Network Connections.
6.Select your type of internet connection, then click Properties.
7.Click on the Advanced tab.
8.Look under Internet Connection Sharing, there should be a check-off box that says Allow other network users to connect through this computer's Internet connection. Check off that box.
9.If you use dial-up for your internet connection, check off Establish a dial-up connection whenever a computer on my network attempts to access the Internet. Then click OK.
10.Click "Yes" when you receive this message;
* When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address 192.168.0.1. Your computer may lose connectivity with other computers on your network. If these other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11.Run a Cat 5 cable from your desktop or laptop with active Mobile broadband ICS connection from the computers LAN port to the Routers Internet In Port. And Voila !
Tips
* You might have to Plug in a laptop or desktop directly to one of the routers outgoing LAN ports on the back of the router and access the wireless settings to change those, then save them how you wish and you're good. Use your laptop to log onto the router and change the wireless security settings. The manual with your router describes how to do this.
Warnings
* Be careful when messing with the setting, you could do something wrong and nothing will work!
Things You'll Need
* A wireless Broadband Card or USB stick from a cellular provider
* Desktop or Laptop
* Wireless or Regular Router
* A little know how
Source: www.wikihow.com
Free Download Games
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Monday, May 10, 2010
Tooth Extraction - Prize of USD 1,500,000.00
If you ever want to have your upper tooth extracted, do you think your dentist will inform you that this extraction could effect to your eye?
The answer is NO and they probably will say that you are nuts to believe this rumour. However, this isn't rumour because it is a fact and happens to me! My Right Eye went blind effectively 4 days after my 3rd upper molar tooth extracted.
In Indonesia, all doctors helps each other to protect those doctors that did malpractice due to their doctors' ethic codes. They always have their medical terms to say in front of a judge to protect themselves. This is why doctors in Indonesia always win in any cases in the court even if a patient has suffered and died due to doctors' wrong action.
I personally have brought text books that can explain the relationship between eye's and tooth's nerves to the dentist who did the extraction. However, he denied all theories I spoke which I got from those text books and planned to sue me back. So, I just can say sorry to him to prevent his sue.
The point is that I am offering USD 1,500,000.- prize for doctors or dentists who are willing to come to Indonesia and help me to sue the dentist that caused me to lose my right eye sight. The prize and all expenses such as air plane tickets and hotel will be paid immediately after both of us wins the lawsuit. However, if we lose the case then it is at your own risk and you must be ready and responsible if the dentist sue us back. Fair enough? I think it's fair enough considering to the prize I am offering to you.
E-mail me at hidajat.jackson@gmail.com or jacksonhidajat@yahoo.com
Free Download Games
It's fun because you can play it in the morning before going to work or school.
Get it here.
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Sunday, May 9, 2010
Free Download Games
Download is available here
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Free Download Games
Do not worry to download it here because it is free of virus.
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Saturday, May 8, 2010
Air Force Missions
Get more informations and download the game at www.myplaycity.com
Bible in Indonesian
Instructions:
1. Download the apllication by PC
2. Transfer the downloaded file from PC into your external memory of your Cellphone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This application I got it from my friend as well. It's for none commercial use only too. I do not allow anyone to redistribute it for making cash because this is a free application.
Free Download Games
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Math Scientific Calculator
Math Mechanixs will provide you a complete function for calculator, starting from the regular function to the scientific function.
Explore this application for its other functions by downloading it at http://www.mathmechanixs.com
Brain Education
It probably helps a little bit especially for those who are insane.
This application will give you a test by letting you play a game that can stimulate your stupid brain.
Comic Downloader
There are few categories provided by this comic application that is located on the left page of its window.
These available comics are interesting to be read.
You may download it at http://software.bootblock.co.uk/
Friday, May 7, 2010
Free Download Games
Instructions:
1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions
Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.
Free Download Yahoo! Messenger 10.0.0.1264
Keep friends at your fingertips with the new Yahoo! Messenger:
- Easier ways to stay up to date - See more updates from your friends in the detailed Messenger list
- Show off your status - Easily add links and emoticons to your status messages
- Watch videos together - Share videos from popular sites and watch them with friends right in your IM window
Other features include:
- Instant message with one friend, or conference in a bunch
- Send text messages (SMS) to friends' mobile phones
- Join a chat room to meet new friends while you discuss your favorite topics
- Make free PC-to-PC calls and PC-to-phone calls for as low as 1¢ a minute (plus free voicemail!)
- Use the built-in media player to watch web videos and view photos with friends
- Show your style with emoticons, Avatars, audibles and IMVironments
- Share securely with automatic file scanning for users of Norton AntiVirus or Internet Security 2007/2008
Click here to Download
How to Do the Google Tricks
Steps
- Type the following link in your address box:http://darkartsmedia.com/google.html # Make sure all of the letters are in lowercase.
- Then place your fingers on the o's in Google. Click any where and ta-da, it has vanished.
- Then place your fingers back on the o's and again click anywhere.
- It has come back again! But don't do this again or else it will take u to the real Google site because this is a fake one. So if u want to do it again go back and then do it.
- ENJOY!
Tips
Warnings
Things You'll Need
- A computer
- An Internet connection
Monday, May 3, 2010
How to Trace an IP Address
Whenever you get online, your computer is assigned an IP address. If you connect through the router, all of the computers on that network will share a similar Internet Protocol address; though each computer on the network will have a unique INTRAnet address. An IP address is the Internet Protocol (IP) address given to every computer connected to the Internet. An IP address is needed to send information, much like a street address or P.O. box is needed to receive regular mail. Tracing an IP address is actually pretty straightforward, and even though it's not always possible to track down a specific individual, you can get enough information to take action and file a complaint.
For example, if there was some guy claiming to be Chuck Norris, and tried to get personal information from your Gmail account, you could view his IP address, and then track him. Here's how:
Steps
- Find the IP number you wish to check. The format of an IP address is numeric, written as four numbers separated by periods. Each number can be zero to 255.Use ping or tracert in the command prompt to find IP address'.
- To find the IP of an e-mail sent to you, investigate the message's "headers" by using your e-mail program's "details" or "properties" function. For example, in Outlook Express, select "Properties" from the "File" Menu, or just press ALT+Enter. Next, select the "Details" tab. In Yahoo, click "Full headers" on the upper right hand corner while you see the message. In Hotmail, go to "Mail Display Settings" and set "Message Headers" to "Full" or "Advanced". See this website for more information on viewing headers.
- Go to a website that will allow you to look up IP address information. See External Links below. Type the IP number in the input box and submit.
- Understand that in many situations you will learn a few things about the IP address:
- Which internet service provider (ISP) the user is using. In some cases this may be the user's company (e.g. Ford.com). In other cases it may be just one of the large ISPs such as ATT or Comcast.
- The approximate physical location of the user (e.g. Palo Alto, California.)
- Recognize that usually you will not learn the actual name of the person doing at that IP address (e.g. Joe Smith). ISPs will typically only release such information under a court order.
Tips
- Another way--if you are using a Windows computer--to find out some information about someone is to go to Command Prompt (if you do not know how to do that, go to the Start menu, Run, and type "cmd" and press OK) and type in tracert
. On UNIX (including Linux and OS X), open a shell and use the command traceroute
Warnings
- It is not always possible to find out someone's exact address from this. People can take extreme measures to remain anonymous (even forging e-mails). Your search may just result in knowing the company that the person gets their Internet connection from. You can report abuse to that company, but it's not likely they'll divulge contact information for the individual without a court order.
- If you are being harassed or you are concerned about your safety, file a complaint with your local police authorities. If you traced the IP address through an e-mail, give them a copy of the e-mail with detailed headers showing.
Things You'll Need
- A computer
- Internet
- A Knowledge Of Dos commands
How to Remember a Forgotten Password
-
- Ask yourself the following questions:
- What are the passwords I normally use for other things?
- What was I obsessed with when I created the password?
- What are some "key words" in what I are trying to get into? (For example, if you forgot the password to a document, it might be something like "homework" or "essay".)
- What are some of my favorite colors, animals, foods, sports?
- What are some of my nicknames?
- What was I thinking about when I created the password? (For example, you might have used "I am hungry" or "I am bored".)
- Think back to the day you created the password and walk yourself through the process.
- Try "Confidential," "Do Not Read," or something along those lines.
- The standard password is just that: "password."
- You would be surprised how many teen's passwords have to do with siblings! Normally an adult's passwords will not, but often with youth "Robert Is So Annoying" or others are way more popular than you would think!
- If you still have your surfing history (or any other similar information) that could give you a clue as to what you were doing on the computer right before you changed your password, look through it trying to identify what was on your mind at the moment.
Tips
- Sometimes it is possible to hack into computers or reset a password by other means by going to the control panel.
Warnings
- Use this information to figure out your own passwords, not someone else's.
- If you lost the password to a Microsoft Word document, you will not be able to recover it. There will be no way to hack into the document and it has no "I forgot my password" option.
How to Add Your Site to the Google Index
Go to Google Add URL.
- Enter the URL (Web Address) of your site.
- Enter the verification code, (to prove you're human and not a bot).
- Click the "Add URL" button at the bottom of the page.
- Your site will be added to the Google index.
- It may take a while for the crawler to get to your site (there are more than a billion pages on Google).
- Google also has other webmaster tools, you should check them out.
Tips
- If the site is already in Google, there is no need to add it again.
- You must add the http:// prefix when submitting your site.
- Add very relevant material to a certain topic (Don't get off track) and Google will most likely rank you first, depending on the query.
Warnings
- Google says that there is no guarantee that their web spider will definitely index your site.
Source: www.wikihow.com
Wednesday, April 28, 2010
How to Know if Your Computer Has Been Tracked
Steps
- Go into control panel, and choose add/remove programs. Uninstall any antivirus software you have currently installed (obviously, if you have antivirus software which you are happy with, then leave it installed). This is to avoid antivirus clashes which may render your computer unusable.
- Secure your computer. If you already have a full antivirus suite, that is up to date and includes all of the following three components, then skip to step 8. Otherwise, for your computer to be secure you will need to download all of the following which you do not already have;
- Install an antivirus scanner with real-time and heuristic scanning; Comodo BoClean and AVG Free work.
- Install an anti-spyware scanner; HijackThis and Spybot S&D work.
- Install a firewall to replace the weak windows firewall; ZoneAlarm works great.
- Consider using intrusion detection software.
- Install all of the required programs. Connect your computer to the Internet again, and allow them to update fully.
- Run the antivirus scanner and anti-spyware scanners. If anyone has hacked your computer, the malware should be detected, and hopefully the software can remove it. Now your computer should be secure
- Make sure to update your software frequently, at least once a week and you should be able to prevent nearly all attacks on your computer, provided you use your computer in a sensible manner.
Tips
- Use an alternative browser. Using Firefox or Opera as your web browser (or any browser other than Internet Explorer, which is infamously known as "Internet Exploder" because of its common malfunctions and vunerabilty to viruses) would result being targeted much less by viruses, as many are directed at Internet Explorer.
Warnings
- Never install something you have downloaded without fully reading the license agreement. Many newer malware programs are effectively legal as they are hidden or packaged with the desirable software and have a license agreement detailing their effects. If you see anything dubious in the license agreement, don't install. Pay attention to the "Agree" boxes when installing software. Blindly agreeing to everything presented can make cleaning out "added bonus" applications difficult, when it could have been much easier to "decline" when installing instead.
- Don't go to dodgy websites. If you search on google for something, and the description for one of the sites has a lengthy list of irrelevant and unconnected words in it, it's probably a sham site.
- Don't install activeX controls from a site you don't trust.
- Don't open E-mail "attachments" unless you have spoken to the trusted sender and they have verified that they included the attachment. Just because an E-mail originates from a friend, does not mean his / her computer hasn't been infected. The virus can spread by sending itself to everyone in the E-mail program contact list, often without the owner even knowing it is happening.
- Don't run applications or copy content from disks, thumbdrives, CDs, etc. that have been provided by others (including friends); or belong to you if they have previously been connected to another computer, unless scanned with your anti-virus program first. If an infected computer has accessed the data on the media, the data is likely to be infected as well.
How to Avoid False Information on the Internet
Steps
- Use "common" sense. This simple tool will allow you to filter information that is not correct from the correct.
- Cross-check. Reading from more one source allows for the correction of mistakes, errors and malicious intent.
- Go to the source. Using a real library, real people and your legs can be positive steps in gathering information that is free from errors.
Tips
- Face value is never face value. The only facts you should accept at face value are ones you have requested and paid for, i.e., an education. That said, check the teacher or professor's source. You'd be surprised how many are incompetent or have their facts clouded by a conflicting agenda.
Warnings
- Media outlets should be treated with the same caution.
How to Add Google AdSense to Feedburner
Finally, Google has fully integrated Feedburner as one of their services. Google Adsense has merged Feedburner into its arsenal also.
Steps
- If a publisher already has a Google Adsense account, he/she simply needs to log into it.
- On your reports overview page under the “Adsense for Mobile Content” line, you will notice “Adsense for Feeds”, click the “Get Started” link.
- The “Get Started” page will look similar to the “Activate FeedBurner Ad Network and/or Google AdSense for Content” feedburner.com page discussed above.
- Near the bottom of the page, you will see an inviting link to gaining help and support for migrating your feed into adsense….or, visa versa.
- The process is quite 20th century-like from here on out, because the publisher must then email, adsense-support-aff@google.com his/her Feedburner account username, and Google Account email address used to sign in to Adsense.
- Google will respond via email with a lovely note similar to the following:
- “Hello FabulousAndTechfilled.com,
- Success!
- Effective immediately, you can access your feeds by signing into your Google Account when you visit http://feedburner.google.com. You will no longer be able to sign in to feedburner.com, but that's okay: from now on, there is no reason to do so.
3.To repeat: visit http://feedburner.google.com from this point forward to view and manage your feeds.
- If you want to use AdSense for feeds, you may now do so. Visit http://www.google.com/adsense and click "AdSense for Feeds" under the Get Ads section to get started.
- Sincerely,
- The Google AdSense Team”
Source: www.wikihow.com
Friday, April 23, 2010
How to Add Google Analytics to Blogger
Do you know which websites refer the most visitors to your site? Or the most common keywords used to find your site? Google Analytics can provide the valuable answers to these questions, and many more.
Steps
- Open a Gmail account if you don’t already have one.
- Create a Google Analytics Account.
- Click on: 'Add Website Profile.' Installing Google Analytics does not require knowledge of HTML, but there is a piece of HTML code that must be copied onto your blog.
- In the box, enter your URL. (For example: www.yourwebsite.com or yourblog.blogspt.com.)
- Set your Country and Time zone, and hit Continue.
- Highlight the tracking code displayed in the large box and 'Copy'.
- Sign into Blogger. Click on the 'Layout' Tab, then click on 'Edit HTML'
- Click on 'Download Full Template' to back up your template onto your computer. It's always a good idea to back up your template before you make any changes.
- Scroll down to the bottom and paste the tracking code just before the closing 'body' tag.
- Press 'Save Template' to save the changes.
- Back in Google Analytics, click on 'Check Status' or 'Verify Tracking Code' under the Status column. Once your tracking code has been verified, the status will change to: 'Receiving Data.'
- Installing Google Analytics is a huge step towards taking control of your online marketing. It will open your eyes to valuable information about your website visitors and display the data in an easy to read, easy to understand format. Over time you will see trends that you could not have discovered any other way.
- The longer you have have Google Analytics installed, the more interesting and valuable the data will be.
- To remind yourself what the code you have added to the template is for, add a comment above it like this
Warnings
- It will take about 24 hours or so after you install Google Analytics before you start seeing any data. Check back the next day to familiarize yourself the various reports.
How to Preserve Your Privacy in an Internet Cafe
Steps
- Use Tor.
- When logging in to webmail such as Hotmail, Gmail or Yahoo Mail on a public computer; look for any check boxes that say "Remember my password" or "Remember my email address." Make sure they are UNCHECKED.
- Because the security status of a public computer is unknown, it may be infected with keystroke logging spyware for example, never log into any site that manages your sensitive or financial information such as your stock broker site.
- Many browsers will offer to store your user name and password when you log in, be sure not to allow it.
- Make sure that you log out of every site you've logged in to. This can include web browsers, instant messaging clients and ftp sites.
- Clear the browser history and cache when you are finished using the computer. In Firefox, go to the Tools menu at the top and choose "Clear Private Data." In Internet Explorer go the Tools menu at the top and choose "Delete Browsing History."
- Be certain that when you leave the computer you have deleted everything you saved to the desktop. If you scanned in an image, saved pictures from your vacation or edited your resume make sure you permanently delete all personal files from the computer.
- Never borrow a neighbor's free WiFi connection. Your neighbor might be running a packet sniffer and intercepting your network traffic.
- Do not open email attachments with a .exe file extension or coming from someone you don't know.
- Store personal data on a USB flash drive using FreeOTFE and FreeOTFE Explorer to secure it.
Tips
- If you're in a public cafe, ask the barista to verify that you have deleted all personal data from the computer.
- If you don't want other customers in the cafe to see what you are doing, ask for a computer near the back or make sure the computers near yours are unoccupied.
- It's also possible to download a web browser to install on a flash drive. Versions of Mozilla can be downloaded from http://www.lupopensuite.com/ which leaves all the temporary files on the flash drive and not on the cafe's computer.
- Using a live boot CD will help preserve your privacy on a computer, use a search engine to find a list of live boot CDs, booting from a live CD will leave no trace of your activities.
Warnings
- Never post any personal information in a public place like Myspace, Facebook or Craigslist.
Thursday, April 22, 2010
How to Know if You've Been Hacked
There are many ways to find out if your hacked but some ways hackers get in are surprising.
Symptoms of being hacked are
*If programs and files wont work or open
*Deleted files that you didnt delete
*Password changes
*You find information on the net, that you haven't let out.
*You find some program that shouldn't exist on your system
*Your computer is connecting to the net frequently while you are not doing anything.
*The contents of files change and you didn't change it
Steps
- If suspected that the hacker is still in the computer, IMMEDIATELY disconnect from the Internet.
- Check if there aren't any "new programs" (eg. Anti-virus, Anti-spyware, etc.)OR if programs and files won't work or open.
- Do a sweep of your computer with a Anti-virus/spyware scanner you trust. It is stressed on what you trust(eg.AVG Free edition, Avira AntiVir)
- If that turns up Nada, backup IMPORTANT files and do a system restore and update the computer.
Tips
- The best method is to prevent it before hand
- Backup important files (eg.Family pictures,Documents,e.t.c) onto a encrypted USB drive and store it in a vault
- To keep the Operating system use a backup program
Warnings
- If left unchecked, the computer could become completely useless, and you might have to reinstall the operating system or buy a new computer.
- Worse yet, your computer could be turned into a zombie that the hacker may use to attack other computers/networks and commit illegal activities.
- If programs and files won't work or open, you are looking at a light show or a electronic picture, the computer will need a new operating system or a restore if the hacker didn't mess with the backups.
How to Change your IP Address (Windows)
Steps
Windows XP
- Click on "Start" in the bottom left hand corner of screen.
- Click on "Run".
- Type in "command" and hit Okay. You should now be at an MSDOS prompt screen.
- Type "ipconfig /release" and hit "Enter". This will disable your internet connection. To undo it, type "ipconfig /renew".
- Type "exit" and leave the prompt.
- Right-click on "Network Places" or "My Network Places" on your desktop.
- Click on "Properties". You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
- Right-click on "Local Area Connection" and click "Properties".
- Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab.
- Click on "Use the following IP address" under the "General" tab.
- Create an IP address. (It doesn't matter what it is.)
- Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
- Click the "Ok" button.
- Click the "Ok" button. You should now be back to the "Local Area Connection" screen.
- Right-click back on "Local Area Connection" and go to properties again.
- Go back to the "TCP/IP" settings.
- Select "Obtain an IP address automatically".
- Click the "Ok" button.
- Click the "Ok" button.
- You now have a new IP address
Warnings
- This will only work if both your computer, and the network it is directly connected to, use Dynamic Host Configuration Protocol (DHCP). If you are using a router, and DHCP is enabled, the steps above will only affect the IP address your computer is using on the Local Area Network (LAN) between your computer and the first router "en route" to the Internet. To change the public IP you are using to connect to your service provider, you must instead change the IP address used by last IP address using (OSI Layer 3) device seperating the Internet from your computer.
- Manually assigning your IP address is also possible, but you run a very high risk of your ISP(Internet Service Provider) banning you from connecting to the internet. To manually change your IP, follow the steps above for your Operating System. In step 9 or 10, depending on your O/S, enter an IP similar to the one displayed in the command prompt window. For example, if the IP displayed in the command prompt window is 75.1.2.3, change yours to 75.1.2.4. You’ll also need to manually enter the Subnet, Gateway and DNS Server IP addresses as well. If the new IP you give your computer doesn’t work, chances are someone else on the ISP network has already been assigned that IP. You’ll need to move on to the next one and keep trying until you find an open one. However, some ISPs match up your MAC or modem data to the IP that’s been assigned. If those 2 things don’t match up, you won’t be able to connect no matter what. If your router gets the IP and not your computer, you’ll need to http in to your routers interface and manually assign the IP there. It’s pretty much the same method as assigning the IP to your computer. The method that varies is how you reach your router's interface. You can get those instructions from your manufacturer’s website.
How to Ping an IP Address
Steps
Windows XP or Vista
- Open the command window by clicking START, then RUN. Type CMD, and hit Enter or click OK.
- Type "ping" in the Command Window.
- Hit the space bar once.
- Type the IP or website address that you want to ping. For example, if you want to ping eBay, type "www.ebay.com" after the space. If you want to ping your Router, it might be "192.168.1.1"
- Hit "Enter." If the website is up and actively responding, you receive replies back from the server that you pinged with the following information:
- The IP address
- The number of Bytes sent
- The time it took in milliseconds
- The TTL is Time to Live (This indicated the number of "hops" back from the computer pinged from that computers initial TTL value.)
- Analyze the information. The lower the round trip number in milliseconds, the better. The higher the round trip number in milliseconds, the higher the latency, which may indicate a network problem between your computer and the server you pinged.
Tips
- You can also run a remote PING[1]. This allows you to ping an IP address or computer from a computer other than yours to see if the problem may be associated with your local connection rather than the IP Address you are trying to connect to.
- There are a number of options when running PING to give different results and outcomes. Type them after the IP address. **-c Count. Send count packets and then stop. The other way to stop is type CNTL-C. This option is convenient for scripts that periodically check network behavior.
- -f Flood ping. Send packets as fast as the receiving host can handle them, at least one hundred per second. This is most useful to stress a production network being tested during its down-time. Fast machines with fast Ethernet interfaces (like SPARCs) can basically shutdown a network with flood ping, so use this with caution.
- -l Preload. Send preload packets as fast as possible, then fall into a normal mode of behavior. Good for finding out how many packets your routers can quickly handle, which is in turn good for diagnosing problems that only appear with large TCP window sizes.
- -n Numeric output only. Use this when, in addition to everything else, you've got nameserver problems and ping is hanging trying to give you a nice symbolic name for the IP addresses. When pinging locally, the -n option is used specify a number of repeats. 'ping [2]