Saturday 10 September 2011

Internet Connection Sharing

Internet Connection Sharing
What Is Internet Connection Sharing?
A: Windows 98 now provides users the ability to share one Internet connection with multiple computers on your home network. One computer, the Connection Sharing computer, communicates with the Internet. Requests from other computers on your home network are routed to the Internet through the Connection Sharing computer. You can also configure Internet Connection Sharing to allow users on the Internet to reach Web, e-mail, and game servers that are on your home network.
Why does Internet Connection Sharing not install File and Printer Sharing by default. Therefore?
  To install File and Printer Sharing:
1.     Click Start, point to Settings, click Control Panel, and then double-click Network.
2.     Click Add, click Services, and then double-click File and Printer Sharing for Microsoft Networks.
3.     Double-click TCP/IP (shared)->External Adapter (or Dial-Up Adapter if a dial-up connection is used).
4.     Click OK, and then click the Bindings tab. Click to clear the File and Printer Sharing check box.
5.     Click OK.
6.     Click OK, and then restart the computer when you are prompted.

Sharing Folders or Printers

File and Printer Sharing must be installed on any computer on which folders or printers will be shared on the network.
To share a folder or printer, use the right mouse button to click a folder (Microsoft Windows 98 and Microsoft Windows 95 are unable to share specific files) or printer, click Sharing, click Share As, type a name for the share, select the access level, and click OK.
To map a network drive, use the right mouse button to click Network Neighborhood, and then click Map Network Drive. Type \\computername\sharename, where computername is the name of the computer sharing the folder or printer, and sharename is the name of the shared folder or printer.
NOTE: Binding File and Printer Sharing to the external adapter and opening the SMB ports on the ICS host makes all shared folders and printers accessible from the Internet and creates a possible security issue. Although ICS is not designed to function as a firewall or provide strong firewall protection, shared files and folders possess a reasonable level of security if configured in the manner described in this article.
How Do I Use AOL With Internet Connection Sharing?
A: If you use different AOL accounts on multiple ICS client computers, use the AOL dial-up program to establish a connection to the Internet for each ICS client computer. You can use chat, messaging, and e-mail through your Internet connection.
If you use different AOL accounts on an ICS host computer and multiple ICS client computers, use the AOL dial-up program to establish a connection to the Internet on the computer.
If you establish a connection to the Internet using AOL on the ICS host computer while some ICS client computers are already connected, the ICS client computers running AOL 4.0 are disconnected and the ICS client computers running AOL 3.0 are not disconnected. Any ICS client computers running AOL 3.0 or 4.0 cannot establish a new connection until the ICS host computer disconnects.
 Double-clicking the Internet Connection Sharing icon on the taskbar displays the number of computers connected to the ICS host. It can take up to 15 minutes before the correct number of connections is displayed. How can I speed this up?
A: ICS holds Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports open for a client for up to 10 minutes after the activity on that port has stopped. When a port is open for a client, ICS counts the port as a connected client. The count of connected computers is updated after the port is closed. This is the way ICS was supposed to behave.
I am sometimes getting the following error messages The Page cannot be displayed and The Mail Server can not be located. How do I fix this?
This issue can occur if the ICS host computer is started or restarted after the ICS client computer is running. NOTE: The ICS host computer does not send notification to the ICS client computers when the ICS routing and DHCP services are shut down.
To resolve this issue, follow these steps:
1.     After the ICS host computer is completely started, open the Internet program again. If the error message still occurs, continue to the next step.
2.     Click Start, click Run, type winipcfg in the Open box, and then click OK.
3.     Click Release All.
4.     Click Renew All, and then click OK.

Copy-Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers

Microsoft has announced a free download called Mouse Without Borders that lets you Copy-Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers, easily lock or log into all your PC’s at one time and share screen captures from one PC to another.
mouse without borders 400x200 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
Mouse Without Borders is a very useful tool from The Garage that allows you to reach across your PC’s as if they were part of one single desktop. For those who don’t know, The Garage is located at Building 4 at Microsoft’s Redmond HQ, where Microsoft’s developers and employees are encouraged to tinker about with their ideas and to incubate pet personal projects of its employees.
Developed by Truong Do who works by day for Microsoft Dynamics, and at The Garage in the evenings, the software is easy to set up and in addition to all mentioned above, as a bonus it even allows you to customize your Windows logo screen with the daily image from Bing or a local collection of pictures
Features:
  1. Copy-Paste across computers
  2. Drag and drop files and media across computers
  3. Share one keyboard and mouse across multiple Windows computers
  4. Lock or log into all your PC’s at one time
  5. Share screen captures from one PC to another
  6. Customize your Windows logo screen.
The installation is easy as goes as follows:
mouse without borders 1 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
mwb 2 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
mwb 4 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
After you click Finish, the following dialog box will open.
mwb set Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
Toward the end it will ask you if you have already installed it on the other PC. If you say No, it will give you a Security Code that you will be required to use when you install it on your other computer/s.
mwb 5 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
If you click Yes, the you will be required to enter this code which you may have received on your other PC, here.
mwb 6 Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
After this, you continue to configure the Settings.
mwb taskbar Copy Paste, Drag and drop, share one keyboard and mouse across multiple Windows computers
Mouse Without Borders works on up to 4 PC’s and you can download it from TechNet.


Traveling? 10 tips to protect your laptop from theft

These days, it seems that just about everybody uses a laptop or notebook computer to get work done away from the office or on the road. Unfortunately, the pervasiveness of laptop computing has made portable systems an easy target for theft. If your laptop computer is stolen, or if someone gains access to your files while your back is turned, your company information—not to mention your personal and financial data—can be exposed.
Looking for information about security features you can use on your laptop to keep your data safe while you travel? This article covers some of the most pertinent. If you’d like more general security suggestions (whether on the road or at the office), check out 10 ways to work more securely.
Use these 10 tips to learn how you can help protect your laptop from theft when you're on the road.

1. Avoid using computer bags

Computer bags can make it obvious that you're carrying a laptop. Instead, try toting your laptop in something more common, like a padded briefcase or suitcase.

2. Use strong passwords, and do not keep them in your laptop bag

Strong passwords that are difficult to break or guess can thwart unauthorized access to individual files and even to the entire operating system. Learn how to create strong passwords:
You can also check the strength of your password by typing it into a password checker like this free one offered by Microsoft Security.
Learn how to password-protect your files:
Of course, the strongest password in the world won’t help if you give it away to a thief. Keeping your password with your laptop is like leaving your keys in the car. Without your password or important access numbers, it will be more difficult for a thief to access your personal and corporate information.

3. Encrypt your data

If someone should get your laptop and gain access to your files, encryption can give you another layer of protection. With the Windows operating system, you can choose to encrypt files and folders. Then, even if someone gains access to an important file, they can't decrypt it and see your information. Learn more about how to encrypt your data:

4. Use a screen guard

These guards help prevent someone from seeing your screen—even if he or she peeks over your shoulder. They can be very useful if you need to work on sensitive information in a public place, and they are especially helpful when you're traveling or need to work in a crowded area. The screen guard from Secure-It is just one example of a screen guard you could use.

5. Carry your laptop with you

Always take your laptop on the plane or train rather than checking it with your luggage. It's easy to lose luggage and it's just as easy to lose your laptop. If you're traveling by car, keep your laptop out of sight. For example, lock it in the trunk when you're not using it.

6. Keep your eye on your laptop

When you go through airport security, don't lose sight of your bag. Hold your bag until the person in front of you has gone through the screening process. Many bags look alike, and yours can easily be lost in the shuffle.

7. Avoid setting your laptop on the floor

Putting your laptop on the floor is an easy way to forget or lose track of it as you talk at a ticket counter or order your latte. If you have to set it down, try to place it between your feet or leaning against your leg, so you're always aware of it.

8. Buy a laptop security device or program

If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs and devices that will report the location of a stolen laptop. These work when the laptop connects to the Internet and can report the laptop's exact physical location. Absolute Software’s LoJack and its line of Computrace products, for example, offer physical location tracing in addition to capabilities for remotely disabling a missing computer, retrieving or deleting data, and more. Search for more computer tracking and recovery solutions.

9. Try not to leave your laptop in your hotel room

Too many things have been lost in hotel rooms. These rooms may not be completely secure. If you must leave your laptop in your room, put the "Do not disturb" sign on the door to keep hotel staff out. Don’t leave your laptop at the front desk, either.

10. Affix your name and contact info to the laptop

Security experts advise that you affix your name and contact information, along with a promise of a "Reward if lost or stolen—no questions asked,” on the computer. These can help improve your odds of getting the computer back in the event of theft or a simple mix-up.

What to do if your laptop is stolen

  • Change your network password to help secure access to corporate servers.
  • Report the theft to local authorities (such as the police) and to your company's IT department.
  • If customer data was on the laptop, contact your account representative, legal representative, or appropriate person at your company so they can take the necessary actions.

Recover encrypted files or folders

You can lose access to encrypted files if you install a new operating system or upgrade your current one, or if your current operating system fails. The following steps can help you regain access to encrypted files.
You must have a backup copy of your encryption key and related certificate on a disc or other removable media (such as a USB flash drive) to follow the steps below. For more information, see Back up Encrypting File System (EFS) certificate.

Note

These steps can't be completed on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.
  1. Do one of the following:
    • To recover encrypted files stored on an external hard disk, connect the hard disk to the new computer.
    • If your operating system fails and you need to recover encrypted files that are stored on a different partition from your failed operating system, move the encrypted files to a computer that is working, or install a functional operating system on the current computer.
  2. Insert the removable media that your certificate and key are saved on.
  3. Open Certificate Manager by clicking the Start button Picture of the Start button, typing certmgr.msc into the search box, and then pressing Enter. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  4. In the left pane, click Personal.
  5. Click the Action menu, point to All Tasks, and then click Import. This opens the Certificate Import wizard.
  6. Click Next.
  7. Type the location of the file that contains the certificate, or click Browse and navigate to the file's location, click Open, and then click Next.
    If you have navigated to the right location but don't see the certificate you are importing, then, in the list next to the File name box, click Personal Information Exchange.
  8. Type the password, select the Mark this key as exportable check box, and then click Next.

    Note
    Do not enable strong private key protection.

  9. Click Place all certificates in the following store, confirm that the Personal store is indicated, click Next, and then click Finish.
    After you import the certificate, you should have access to the encrypted files.

Create/ Install/ Update a recovery certificate for encrypted files

You must be logged on as an Administrator to perform these steps.
A recovery certificate is a special Encrypting File System (EFS) certificate you can use to recover encrypted files if your encryption key is lost or damaged. You need to create the recovery certificate, install it, and then update previously encrypted files with the new recovery certificate.

Note
These steps cannot be completed on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.

To create a recovery certificate

You should store your recovery certificate on removable media such as a disc or USB flash drive.
  1. Open the Command Prompt window by clicking the Start button Picture of the Start button. In the search box, type Command Prompt, and then, in the list of results, click Command Prompt.
  2. Insert the removable media that you're using to store your certificate.
  3. Navigate to the directory on the removable media drive where you want to store the recovery certificate by typing drive letter: (where drive letter is the letter of the removable media), and then press Enter.
  4. Type cipher /r:file name (where file name is the name that you want to give to the recovery certificate), and then press Enter. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

Notes

  • Windows will store the certificate in the directory shown at the command prompt.
  • You should store the removable media containing the recovery certificate in a secure location, such as a locked desk drawer.

To install the recovery certificate

  1. Insert the removable media that contains your recovery certificate.
  2. Click the Start button Picture of the Start button. In the search box, type secpol.msc, and then press Enter.‌ Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  3. In the left pane, double-click Public Key Policies, right-click Encrypting File System, and then click Add Data Recovery Agent. This opens the Add Recovery Agent wizard.
  4. Click Next, and then navigate to your recovery certificate.
  5. Click the certificate, and then click Open.
  6. When you are asked if you want to install the certificate, click Yes, click Next, and then click Finish.
  7. Open the Command Prompt window by clicking the Start button Picture of the Start button. In the search box, type Command Prompt, and then, in the list of results, click Command Prompt.
  8. At the command prompt, type gpupdate, and then press Enter.

To update previously encrypted files with the new recovery certificate

  1. Log on to the account you were using when you first encrypted the files.
  2. Open the Command Prompt window by clicking the Start button Picture of the Start button. In the search box, type Command Prompt, and then, in the list of results, click Command Prompt.
  3. At the command prompt, type cipher /u, and then press Enter.
    If you choose not to update encrypted files with the new recovery certificate at this time, the files will automatically be updated the next time you open them.

Back up Encrypting File System (EFS) certificate

If you encrypt data on your computer, you need a way to recover that data in case something happens to the encryption key. If your encryption key is lost or damaged and you don't have a way to recover your data, the data is lost. You will also lose data if you store your encryption key on a smart card and the smart card is damaged or lost. To make sure you can always access your encrypted data, you should back up your encryption certificate and key. If more than one person uses your computer, or if you use a smart card to encrypt files, you should create a file recovery certificate. For more information, see Create a recovery certificate for encrypted files.

Note

These steps can't be completed on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.

To back up your EFS certificate

  1. Open Certificate Manager by clicking the Start button Picture of the Start button, typing certmgr.msc into the search box, and then pressing Enter. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. In the left pane, double-click Personal.
  3. Click Certificates.
  4. In the main pane, click the certificate that lists Encrypting File System under Intended Purposes. (You might need to scroll to the right to see this.)
    If there is more than one EFS certificate, you should back up all of them.
  5. Click the Action menu, point to All Tasks, and then click Export.
  6. In the Certificate Export wizard, click Next, click Yes, export the private key, and then click Next.
  7. Click Personal Information Exchange, and then click Next.
  8. Type the password you want to use, confirm it, and then click Next. The export process will create a file to store the certificate.
  9. Type a name for the file and the location (include the whole path) or click Browse, navigate to a location, type a file name, and then click Save.
  10. Click Next, and then click Finish.

Note

Store the backup copy of your EFS certificate in a safe place.

Encrypt or decrypt a folder or file

Encrypting folders and files is a way to protect them from unwanted access. Encrypting File System (EFS) is a feature of Windows that you can use to store information on your hard disk in an encrypted format. Encryption is the strongest protection that Windows provides to help you keep your information secure.

To encrypt a folder or file

  1. Right-click the folder or file you want to encrypt, and then click Properties.
  2. Click the General tab, and then click Advanced.
  3. Select the Encrypt contents to secure data check box, click OK, and then click OK again.

    Note

    The first time you encrypt a folder or file, an encryption certificate is automatically created. You should back up your encryption certificate. If your certificate and key are lost or damaged and you don't have a backup, you won't be able to use the files that you have encrypted. For more information, see Back up Encrypting File System (EFS) certificate.

     

     

    To decrypt a folder or file

    1. Right-click the folder or file you want to decrypt, and then click Properties.
    2. Click the General tab, and then click Advanced.
    3. Clear the Encrypt contents to secure data check box, click OK, and then click OK again.
Browser Name:
Browser Version:
Browser Code Name:
User-Agent: