How to Control Multiple PCs With One Keyboard Using Synergy

If you use multiple Windows machines on your desk, you’re probably tired of swapping between keyboards and mice. There are hardware solutions—KVM switches, which use multiple inputs and outputs to share physical mice and keyboards. Synergy, a program that does the same thing over a network, is a more elegant solution, and it works with Windows, macOS, and Linux.

Step One: Download and Install Synergy

SourceForge has the latest version of Synergy available for Windows and macOS. Synergy used to be completely free software, but the code was purchased by Symless and monetized. The app is hosted on the company’s website too, […]

How to change JioFi device default password

Connect to your JioFi
Open router settings(http://jiofi.local.html/) in browser.
Log in (top right of the screen) using USERNAME: administrator – PASSWORD: administrator (These are the default username and passwords, Use your password if you changed it before. Hint: You probably didn’t)
Now you will easily be able to find the option to change the device password. It will ask you for your Old Password and will then allow you to enter a new password.
Enter old, new and confirm the password. Save.

You are done! Now no need to remember the random default password!!


Differences Between the JioFi 2 and JioFi

Confused to decide which one to buy between the two?

Differences Between the JioFi 2 and JioFi are as follows

The revised variant sports a mere 512 MB LPDDR RAM in comparison to the decent 2 GB LPDDR2 RAM of its predecessor.
ROM capacity has also been significantly downgraded in the new model. The original JioFi 2 features 4 GB of NAND storage, while the current JioFi only has 1 GB of NAND memory.
The older JioFi 2 has a smaller dimension than the latest one. However, the new model is a bit slimmer with a thickness of 15.2 mm in contrast to […]

Make JioFi invisible to others but connected to yourself

The steps are easy. By making your WiFi connection invisible, you are actually protecting your wifi from hackers and unauthorized access, except they know device SSID.

For This

Login into Jiofi configuration Page
Go to settings
Tap WiFi Option
Go to SSID Broadcast at the bottom
Select Disable Option

Your Jiofi device will reboot. Now your wifi connection is invisible.

Now a question will definitely arise in your mind. How would you be able to connect to Jiofi itself when SSID is invisible to all?

The answer is that only those who know SSID will be able to connect to Jiofi.

For this

Go to […]

The Infrastructure-as-a-Service (IaaS) Model

In the traditional hosted application model, the vendor provides the entire infrastructure for a customer to run his applications. Often, this entails housing dedicated hardware that is purchased or leased for that specific application. The IaaS model also provides the infrastructure to run the applications, but the cloud computing approach makes it possible to offer a pay-per-use model and to scale the service depending on demand. Prom the laaS providers perspective, it can build an infrastructure that handles the peaks and troughs of its customers’ demands and add new capacity as the overall demand increases. Similarly, in a hosted application […]

WannaCry Ransomeware

What is Ransomware?

Ransomware is a form of malware that was made by its creators to cause problems on a PC which blocks access to information. The creators will essentially block files and demand money to give access to the information.

How Does It Work?

1. the computer becomes infected,

2. contact is then made to the central computer to access the information that is needed to commence the ransomware programs.

3. all files get encrypted.

4. a message is then posted requesting payment to decrypt the files.

5. pressure is mounted for the sum to be paid or else threatened to lose the information.

How is the […]

What is VMware Cloud

VMware Cloud

The VMware Cloud (also called vCloud) mainly provides PaaS and can be used to create private, public, and hybrid clouds (NIST definition). If you are wondering about the small “v” in front of most VMware products, it stands for VMware, or more recently, just for virtual. It’s similar to the small “i’ in front of Apple products.
The VMware Cloud’s basic core is a product named VMware vCloud Director. It is an interface based on HTTPS (secure HTTP) that abstracts and presents the underlying virtualization for consumption to the end user. Basically, when we talk about the vCloud we are […]

What is the meaning of 1s and 0s in subnetting

Subnetting is taking the original subnet mask and adding bits to it to create more networks. In other words, if you convert a subnet mask into binary form and add more 1s, you are subnetting that network. The more is that are present in the subnet mask means the more networks with a fewer number of hosts.

The more 0s that are present in the subnet mask means the fewer networks and the more hosts you have. In other words, the subnet mask tells routers and computers which portion of the IP address is for the network and which is for […]

VoIP and Packet Switching Technology

One of the reasons VoIP is so successful and advantageous is it uses packet switching technology rather than circuit switching technology to provide phone services. Most phone companies use circuit switching technology. Packet switching technology is different in that it allows multiple phone calls to occur within the same space a single phone call would occupy using a circuit network.

This means less transmission time is used and less expense is incurred for the same phone call placed using packet switching versus circuit switching technology. How does packet switching work? Basically, you pick up the receiver or initiate a phone call, […]

Differences between Switched Networks and Routed Networks

Switched Network

Switched network involves the use of a device that filters, forwards, or floods frames based on the destination address of each frame. Switches perform their routing functions at the layers 2 model of the OSI. Some switches process data at the Network Layer (layer 3), This types of switches are referred to as layer 3 switches or multilayer switches. Switches form integral parts in networking LAN or WANs. Small office, Home office ( SOHO) applications normally, use a single or an all-purpose switch.

The network switch is a very adaptable Layer 2 device; it replaces the hub as the central […]

Differences between IP Addresses and Data Link Addresses

An IP address (abbreviation of Internet Protocol address) is an identifier assigned to each computer and other devices (e.g., printer, router, mobile device, etc.) connected to a TCP/IP network that is used to locate and identify the node in communications with other nodes on the network. In other words, the IP address is an address bound to the network device, i.e., computer, via software. In a Windows-powered computer, the Windows operating system allows the user to configure the IP address the specific workstation will have. This IP address is used to allow all network aware programs, i.e., Internet Explorer, Netscape, […]

Remote Desktop Service – Advantages, Disadvantages and Its Monitoring

Remote desktop service is a technology enabling you to sit at a computer and connect to a remote computer (host computer) in a different location. In other words, you can get access to your office computer from your home desktop and can use all your files, applications, and network resources exactly as you use to work on your office computer. You need to leave your office computer on with programs running and when you get home you can watch your work computer’s desktop seen on your home computer, with the same programs running.

Industry Application Remote Desktop Service

RDS is successfully applied […]