Tuesday, June 25, 2013

UNKNOWN GOOGLE TIPS

Getting the most out of Google products such as Gmail, Docs, and YouTube is a must if you're using them for business. However, the products are so packed with features that it can be hard to keep up.
Here are 10 little-known features across various Google services that could change the way you work, or perhaps make life that little bit easier.
1. View All Kinds of Files Online
Google Docs Viewer is a neat little Website that lets everybody view files online, avoiding the need to download and open them manually. Despite its name, you don't have to be a Google Docs user to access it. All you need do is visit Google Docs Viewer and enter the address of the file you want to view. (Gmail users will find that attachments in messages are automatically linked to the Google Docs Viewer--just click the View link at the end of the message.)
Until recently it was only possible to view office documents, such as Microsoft Word or Excel files, but a few weeks ago the list expanded significantly to include Adobe Photoshop and Illustrator files, TrueType fonts, AutoCad files, and even files created by Apple's iWork Pages.
2. Send Somebody a URL to View a File Online

Google Docs Viewer lets you view all kinds of files online.
Google Docs Viewer lets you view all kinds of files online.
Another feature of the Google Docs Viewer Website mentioned above is that you can create your own URLs that point to files online, and send them to others so they can instantly view the file by clicking the link.
Just make the first part of the URL read as follows:
http://docs.google.com/viewer?url=
And then add the URL of the file straight afterwards, including the http:// component. If I wanted somebody to be able to view the Microsoft Word file located athttp://keirthomas.com/dump/testfile.docx, for example, I'd send them the following URL:
http://docs.google.com/viewer?url=http://keirthomas.com/dump/testfile.docx
3. Add 'S' For Safety
Practically all of Google's services can be accessed via HTTPS, which makes for a totally secure connection across the Internet--the same kind of connection online banks use. Just add an "S" to the http:// part of the address to make https://. For example, to view the Microsoft Word file mentioned above over a secure connection, you could type the following:
https://docs.google.com/viewer?url=http://keirthomas.com/dump/testfile.docx
Gmail can be configured to use HTTPS always by clicking the Settings link at the top right, and then selecting Always use HTTPS under the Browser Connection heading that appears.
4. Avoid Account Hijacking
To ensure that nobody but you ever accesses your Google account, you can have Google phone you with a confirmation code or send a SMS to your cell phone, every time you login. That way, even if somebody steals or second guesses your password, there's simply no way they can access your account.
This security is known as a two-stage verification procedure, which you can set up here. Note that this service is still being rolled out and might not yet be available to you. Keep checking back, however, because the intention is for it to be available to all Google users.

Gmail users can also use an @google-mail.com address.
Gmail users can also use an @google-mail.com address.
A drawback (or benefit) of the new security is that you might need to add new, specific passwords for certain Google services, such as mobile Gmail, desktop Picasa, or AdWords Editor. This is because these services don't yet work with the two-step verification process. Signing up using the link above will walk you through what's required.
5. Use Two Different E-mail Addresses
You might already know about Gmail aliases, which is to say, using periods or plus symbols to extend your standard Gmail address so you can filter for spam.
What you might not know is that you can use @google-mail.com as well as @gmail.com. In other words, if you normally use example.address@gmail.com for your e-mail, then you can also use example.address@google-mail.com , and the message will still reach you. You could use @google-mail.com when signing up to newsletters, for example, and create a filter rule within Gmail to sort any messages sent to that address into a spam folder.
The @google-mail.com address came about because of trademark issues in Europe, where Gmail was already being used by rival services.
6. See Who Last Accessed Your Account
Worried somebody's been snooping on your Gmail account? By clicking the Details link at the very bottom of the Gmail page, you can view when, where and how your Gmail account was last accessed. The last 10 logins are listed.
7. Test Your YouTube Connection
Has YouTube been stuttering, or just a little slow? By right-clicking any video and selectingTake Speed Test or just visiting this speed-test link , you can compare your playback speed to others who use your ISP, as well as comparing it to the average speed for your city, and country. By clicking the Show Video Test link, you can measure your speed. Just look at the HTTP section in the information window at the top left of the video display to see how quickly you're receiving the video file.
8. Drag and Drop

You can drag and drop files onto Gmail windows if using Chrome or Firefox.
You can drag and drop files onto Gmail windows if using Chrome or Firefox.
If you're using Firefox or Google Chrome to access Google's services, you can often drag and drop files onto the browser window if the Google product is one that works with files.
For example, when creating a mail message, you can simply drag and drop files onto the browser window to instantly attach them (you'll need to "drop" them over the green Drop Files Here area). If creating a word processor document in Google Docs, you can drag and drop pictures into the browser window to place them on the page.
This doesn't work with Internet Explorer, unfortunately.
9. See if Google Services Are Working
Ever tried to access one of Google's services but you've been unable to? If you're like me, the first think you'll do is ask any colleagues nearby whether they can access the service. Well, no more. By visiting the Google Apps Status page you can see at a glance whether there are any problems, and if so, what the nature of the problem is.
10. Collaborate on Documents within Microsoft Office
If you're not quite ready to take the plunge into working with Google Docs through your Web browser, you can download the Google Cloud Connect plugin for Microsoft Office, which is now freely available after a long period of testing. This allows more than one person to work on a Microsoft Office file that's been uploaded to somebody's Google Docs space. Any edits made by others are instantly reflected within the document, all within the standard Microsoft Office program window, and you have the added benefit that files are stored in Google's cloud and revisions tracked.

25 computer networking tips and tricks

25 computer networking tips and tricks


1. Change channel number
Wireless routers operate on a fixed channel. Since most routers ship with a pre-selected channel, the wireless signal may interfere with other routers in the vicinity that are operating on the same channel.
Changing the wireless channel from the factory default is a good starting point if your wireless signal strength is poor.
2. Give the router space to breathe
The biggest advantage of a wireless router is that it can penetrate doors and walls – but that doesn't mean you can just stuff it next to a wall or cordless telephone, or use it as a stand for your stack of DVDs. Treat it with respect.
Try to keep it in a central location, away from other wireless devices; make sure it's not in direct sunlight; lift it off the carpet; and ensure its vents and air holes aren't covered.
3. Improve reception
Try as you might, you'll find it's sometimes not possible to put the router in a good spot. One way around the problem is to buy a router with multiple antennas and point them in a variety of directions covering your home.
Alternatively, if you've already got a router, check whether it's possible to upgrade its antennas to something stronger. However, don't get disheartened if your router doesn't have any antennas. A wireless repeater compatible with your router is a perfect solution.
4. Use WEP
Running an unsecured network will earn you brownie points from neighbours and hackers with cars, but that's about it. Wireless routers support a variety of encryption methods, such as WPA and WEP, but these aren't enabled by default.
WPA2 is the most secure method at the moment, but before deciding on an encryption method, make sure your network cards and adapters support it as well. Bear in mind that older machines – and games consoles such as the Nintendo DS – don't support WPA.
5. Restrict access to specific PCs
If you really don't want to use encryption, you can force your router to only connect to specific PCs. Your router identifies each computer by the unique MAC address of its network gear. Feed it a list of MAC addresses to connect to and you save yourself the trouble of entering a password each time you log in.
The disadvantage is that you'll have to add the MAC address of any new computer before it can get on your network – which is probably a more annoying way of getting things done.
6. Disable SSID broadcast
All wireless routers have a Service Set Identifier (SSID) that identifies them to network computers. Routers from the same manufacturer generally ship with the same SSID; 'Netgear' or 'Cisco', for example.
You should first change the SSID to something unique to set your router apart from those of your neighbours. Then, once all your hardware has been set up, it's better to turn off broadcasting the SSID altogether. This ensures your router isn't displayed in the list of available networks, and won't be a target for potential hackers.
7. Keep the firmware updated
Router manufacturers keep working on firmware, even after hardware has been shipped. In addition to tweaks in the user interface, new versions might make better use of the various components in the router, or add extra features.
Just like with an operating system, it's a good idea to upgrade the firmware of the router regularly – check the manufacturer's website for a new version. In the good old days, there was the risk of a botched firmware upgrade bricking your router, but it's a lot safer today.
8. Familiarise yourself with the router manager
All routers ship with a browser based manager. To use many of the tips in this article, you'll have to log in to this interface – try typing 192.168.1.1 into your web browser for the most common location.
It's a good idea to familiarise yourself with the various options and settings you can tweak from within this software. Many routers also have detailed documentation that's updated regularly, so hunt out the latest manual online.
9. Check your connections
There's nothing more irritating than receiving a 'cannot connect to remote machine' error. To ensure a solid connection, use Ethernet cables where possible. It's also a good idea to check the connection between the two PCs with the ping command.
To do this, simply open a command line and type, for instance, ping 192.168.1.2. You'll need to replace the address given here with that of your target machine. Ping works identically on Windows, Mac and Linux.
10. Forward ports
port forwarding
Many servers and applications – for example, file-sharing software, FTP servers and music-streaming servers – need to serve people outside the network. These applications accept connections on specific ports.
With port forwarding – check your router's interface – you can poke holes in your router and ask it to direct incoming traffic on a particular port (or, if you wish, a range of ports) to a specific computer that's on the network.
11. Change DNS providers
DNS is what fetches you a website by translating the human-friendly address, such as www.pcplus.co.uk, into a bunch of machine-friendly numbers. It also displays the '404 page not found' error, corrects misspelt URLs and finds the fastest route to a web server that hosts the site you want to visit, along with lots of other cool things.
Generally, it's up to the ISP to put up a DNS server. However, there are other free services as well, including the likes of OpenDNS and Google Public DNS.
12. Use USB adapters
These days, it's difficult to find a laptop or netbook without a built-in wireless module, but if you've used one, you'll know that they can't always be relied upon. Network cards with antennas are the best option, but they're really only suitable for desktops.
If you really need both mobility and assurance, make sure you get a USB adapter. Most of them ship with a Windows driver, but many work out-of-the-box on Linux as well.
13. Enable Dynamic DNS
The Dynamic DNS feature enables you to connect to your computer remotely. Back in the day, when real-estate on the web was expensive, it was a wonderful option to show off your HTML skills and host your own website.
Now, by associating your dynamic IP address with a domain name, DDNS enables you to connect to the internet-exposed home computer from anywhere in the world. In addition to enabling the feature on your router, you'll also have to register with a dynamic DNS provider, such as DynDNS.org.
14. Save power with Wake-on-LAN
What's the point of keeping a print server on when there's nothing to print? The smart way to save energy is to use the Wake-on- LAN feature of the network card. Thanks to this, you can put the machine to sleep after it's been configured to wake upon detecting network activity.
15. Encrypt your online activity
With the range of snooping tools now available, it isn't safe to do anything online without covering your footprints. There are lots of tools that promise to encrypt your online activity, making it completely unintelligible to anyone who might be listening in.
16. Get a Firewall distro
You can configure a firewall on a Windows or Linux machine, and there are also a bunch of third-party software firewalls available. However, building a firewall isn't easy. If you're serious about putting one up, download a dedicated firewall distro, such as Ebox.
17. Install the software
Ebox is distributed as a Live CD ISO and there are VirtualBox/VMWare images as well. It's based on Ubuntu Server 8.04. You can also pull in Ebox packages to a standard Ubuntu Server 10.04 installation. You can find it atwww.ebox-platform.com.
18. Configure settings
Ebox can be adapted flexibly to your network. You can use it to restrict services that can be accessed and slice the network to keep some areas more secure than others. The distro runs a browser-based interface for adding, removing and configuring the components.
19. Filter content
Besides the firewall, intrusion detection (via Snort) and filtering content (via DansGuardian) are two other highlights of the distro. DansGuardian can also plug into the ClamAV antivirus scanner and filter content based on known virus signatures.
20. Exploit other features
In case you're still not satisfied, Ebox can also act as a gateway and provide a host of other services. It bundles various applications that enable you to turn your network into a VPN, host XMPP chat sessions or run a Postfix mail server, a Squid web proxy and more.
21. Turn on UPnP
Universal Plug and Play helps smart devices that support UPnP to discover each other without any user intervention. Once turned on from within your router, UPnP enables a compatible infrared device, a Bluetooth phone or a FireWire camera to see and talk to each other.
22. Write files remotely
The most logical use of a network is to share files. This is the job of the SMB protocol. Thanks to it, you'll be able to write files to a remote network share via Network Neighbourhood. On Linux, the SMB protocol is implemented by Samba.
23. Share printers remotely
In addition to sharing files, SMB can be used to share printers attached to a Windows machine. Once configured via the Windows Control Panel, a printer can be used to accept print orders or even be managed from a remote machine, irrespective of its operating system.
24. Format shareable partitions as FAT
PCs running Windows can easily see each other and share files. For Linux or Mac machines, ensure the partitions are formatted with the FAT filesystem. Create them as Samba shares and they'll show up under Network Neighbourhood.
25. Plug in USB drives
Once, if you wanted to share files on the network, a network-attached-storage, or NAS, device was the best bet. Not any more. New routers enable you to plug in one or more USB devices that are automatically accessible by all the users connected to the router.

Linux

Linux

TuxA free and open-source operating system developed by Linus Torvalds and friends and was first announced by Linus in a post he made August 25, 1991. The Linux kernel runs on numerous different platforms including the Intel and Alpha platform and is available under the GNU General Public License.

Unix, Linux, and variants

Quick links
Unix ABCs
Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language. The Unix today, however, is not just the work of a couple of programmers. Many other organizations, institutes and various other individuals contributed significant additions to the system we now know today.
See additional Unix information and variants and information on the Unix variants page.
Linux ABCs
Developed by Linus Torvalds and further elaborated by a number of developers throughout the world, Linux (lee'nuhks/ or /li'nuks/,_not_/li:'nuhks) is a freely available multitasking and multiuser operating system. From the outset, Linux was placed under General Public License (GPL). The system can be distributed, used and expanded free of charge. In this way, developers have access to all the source codes, thus being able to integrate new functions or to find and eliminate programming bugs quickly. Thereby drivers for new adapters (SCSI controller, graphics cards, etc.) can be integrated very rapidly.
See additional Linux information and variants and information on the Linux variants page.
MS-DOS vs. Linux and Unix
If you are able to navigate using MS-DOS, you should be able to quickly pick up on the navigation of Linux and Unix. In the below chart is a listing of common MS-DOS commands with their Linux and Unix counterpart.
MS-DOSLinux and Unix
attribchmod
backuptar
dirls
clsclear
copycp
delrm
deltreerm -R
rmdir
editvi
pico
formatfdformat, mount, and umount
move and renamemv
Typeless <file>
cdcd
chdir
more < filemore file
mdmkdir
winstartx
Linux and Unix Commands
  * See the Linux and Unix overview page for a brief description on all commands on one page.
Aa2p | ac | alias | ar | arch | arp | as | at | awk
Bbasename | bash | bc | bdiff | bfs | bg | biff | break | bs | bye
Ccal | calendar | cancel | cat | cc | cd | chdir | checkeq | checknr | chfn | chgrp | chkey | chmod | chownchsh | cksum | clear | cls | cmp | col | comm | compress | continue | copy | cp | cpio | crontab | csh |csplit | ctags | cu | curl | cut
Ddate | dc | dd | df | deroff | dhclient | diff | dig | dircmp | dirname | dmesg | dos2unix | dpost | du
Eecho | ed | edit | egrep |  elm | emacs | enable | env | eqn | ex | exit | expand | expr
Ffc | fdisk | fg | fgrep | file | find | findsmb | finger | fmt | fold | for | foreach | fromdos | fsck | ftp
Ggetfacl | gprof | grep | groupadd | groupdel | groupmod | gunzip | gview | gvim | gzip
Hhalt | hash | hashstat | head | help | history | host | hostid | hostname
Iid | ifconfig | ifdown | ifup | ip | init | info | isalist
Jjobs | join
Kkeylogin | kill | ksh
Llast | ld | ldd | less | lex | link | ln | lo | locate | login | logname | logout | lp | lpadmin | lpc | lpq |lpr | lprm | lpstat | ls
Mmach | mail | mailcompat | mailx | make | man | merge | mesg | mii-tool | mkdir | mkfs | more |mount | mt | mv | myisamchk | mysql
Nnc | neqn | netstat | newalias | newform | newgrp | nice | niscat | nischmod | nischown | nischttl |nisdefaults | nisgrep | nismatch | nispasswd | nistbladm | nmap | nohup | nroff | nslookup
Oon | onintr | optisa
Ppack | pagesize | passwd | paste | pax | pcat | perl | pg | pgrep | pico | pine | ping | pkill | poweroff |pr | priocntl | printf | ps | pvs | pwd
Qquit
Rrcp | reboot | red | rehash | remsh | repeat | replace | rgview | rgvim | rlogin | rm | rmail | rmdir | rn |route | rpcinfo | rsh | rsync | rview | rvim
Ss2p | sag | sar | scp | screen | script | sdiff | sed | sendmail | set | setenv | setfacl | settime | sftp |sh | shred | shutdown | sleep | slogin | smbclient | sort | spell | split | stat | stop | strip | stty | su |sudo | sysinfo | sysklogd
Ttabs | tac | tail | talk | tar | tbl | tcopy | tcpdump | tee | telinit | telnet | test | time | timex | todos |top | touch | tput | tr | traceroute | tree | troff | tty
Uul |  umask | unalias | uname | uncompress | unhash | uniq | unmount | unpack | untar | until | unzipuptime | useradd | userdel | usermod
Vvacation | vedit |  vgrind | vi | view | vim | vipw | vmstat
Ww | wait | wall | wc | wget | whereis | which  | whilewho | whoami | whois | write
XX | xargs | xfd | xlsfonts | xset | xterm | xrdb
Yyacc | yes | yppasswd
Zzcatzipzipcloakzipinfozipnotezipsplit
* In addition to each of the above explanations, additional information about a specified command for your Unix or Linux variant can be found by using the man command.


Quickly search all Linux manuals for help

Users who have the manuals installed on their computer can quickly search those manuals by typing the below command.
man -k keyword
This is great for locating a command you may not be able to remember.



Set Linux aliases for hard to remember commands

Create an alias for commands frequently forgotten, cause issues or long commands.
For example, you may type edit to edit a file when in Linux or Unix. However, users who may be new to Linux or Unix may not be able to use the edit program or this may cause an error message.
Set the edit command for an easier to use editor such as pico. Below is an example:
alias edit pico