Blog

  • Why You Should Secure Your Wireless Network

    Why You Should Secure Your Wireless Network

    While it may seem like a pain at times to connect a wireless device to your wireless network, there are very good reasons why you should take the necessary steps to ensure that your network is secure. Some people may choose to keep their network unsecured, but they are unaware of the consequences of allowing anyone to connect.

    Wired networks are different because in order to connect to a wired network, you would need to physically connect a cable from your computer to the router in order to join the network. With wireless networks, anyone within range of your router can join and use your wireless network if it isn’t secure.

    (more…)

  • Schema.org – Does it Provide a New Structured Markup Language For All Websites?

    Schema.org – Does it Provide a New Structured Markup Language For All Websites?

    It has been several weeks now since Google, Microsoft and Yahoo! introduced schema.org to webmasters. Schema.org provides information regarding the structure data markup language that has become an initiative for the three big search engine companies. While the new structure markup language does seem intriguing, it remains to be seen how various webmasters will take to the new markup.

    Google introduced rich snippets in 2009 to provide a better way of structuring data on a web page. Once specific markup was added to an HTML page, Google would parse the page and provide an enhanced search result in its search results page. With Schema.org, Google has now come together with Microsoft and Yahoo! to provide a more uniform structured markup language for webmasters.

    (more…)

  • Fix: The Settings Saved on This Computer Do Not Match the Requirements of the Network

    Fix: The Settings Saved on This Computer Do Not Match the Requirements of the Network

    In some of my posts regarding securing a wireless router, I am occasionally asked about solving the following error message:

    The settings saved on this computer do not match the requirements of the network.

    While I haven’t experienced this error, a quick search online has revealed that it can be a common error to receive when connecting to a wireless network. When solving errors that you receive after making changes, it is important to understand what changes you have made, and how they would affect your wireless connection. While everyone’s wireless network configuration may be different, let’s look at the possible changes that could cause the above error.

    Computer Settings Don’t Match the Wireless Network.

    There are many settings that you can change within your wireless router. Most routers contain the same settings, such as security type, and encryption algorithm, and it is important that when you change these settings that you also change them within your operating system.

    When changing the settings on your wireless network, you must ensure that the settings in your router match those in your operating system. As I mentioned above, all wireless networks will have different settings, but the following list are some settings that you should ensure match between your operating system and your network:

    • Ensure that the DHCP settings match. Most home networks would have this set to automatic.
    • The security type (WEP, WPA, WPA2) is set properly. For most home users the WPA/WPA2 type will probably be set to “Personal.”
    • The encryption algorithm (AES, TKIP) is set properly. Like the security type, this setting can be found within your router.
    • The passphrase associated with your wireless network was entered properly in your operating system when connecting to your network.

    The above list probably contains the most common settings that could cause an issue when attempting to connect to your wireless network. Ensuring that the settings defined within your wireless router match the network settings defined within the operating system will ensure that you don’t have any connectivity issues.

  • Windows Installer Fix: Error 1718. File was rejected by digital signature policy

    Windows Installer Fix: Error 1718. File was rejected by digital signature policy

    I recently was attempting to install a Windows Installer patch on a Windows 2003 server and received the following error:

    Error 1718. File was rejected by digital signature policy

    The patch was rather large (over 600 MB), so after doing some searching I noticed that Microsoft had a hotfix. The hotfix, unfortunately, installed an older version of a file on my system than was currently installed. Because of this, I avoided installing the hotfix.

    There was another solution, which was to edit the registry and change a registry key value. Once I changed the registry key value, I restarted the Windows Installer service and the patch was applied successfully.

    (more…)

  • How Mac Cleanup Boosts Your Mac’s Performance?

    How Mac Cleanup Boosts Your Mac’s Performance?

    Your Mac always performs faster when after its purchase. However, this decreases with time and your Mac begins to run very slowly. This can be very irritating because you can no longer download your applications faster. Your Mac running slowly does not mean you have to buy a new computer. It rather means that it is time you conduct Mac cleanup. This greatly improves the performance of your Mac. Your computer can run slow due to a number of reasons.

    (more…)

  • Tips for Attracting More Readers to Your Blog

    Tips for Attracting More Readers to Your Blog

    You have identified the right audience, come up with great topics and carefully crafted your content. Then you hit the ‘publish’ button, and the worst happens. Nobody reads your articles. No tweets, no comments, no sharing on Facebook. This is enough to make you depressed and lower your motivation for writing any further.

    (more…)

  • 5 Tools to Test Your Browser for Vulnerabilities

    5 Tools to Test Your Browser for Vulnerabilities

    Everybody knows how important it is to protect our computers from viruses, malware and spyware. Keeping all your software patched and installing a good anti-virus and a reliable firewall is a start, but it’s not enough. You should also keep an eye on the most vulnerable part of your computer – your browser.

    No matter which browser you use and how secure you think it is, there are always weak spots. These can be code vulnerabilities, insecure add-ons, ActiveX controls and so on. In short, there are hundreds of ways your computer can be infected through your browser. Fortunately, a lot of browser vulnerabilities can be fixed if you know where they are. Here are five tools that will help you test your browser  and firewall for vulnerabilities and give you advice how to fix them.

    (more…)

  • 5 Software That You Should Keep Up-To-Date

    5 Software That You Should Keep Up-To-Date

    Software companies are constantly updating their software. New features may be added, bugs may be fixed and security holes may become closed. Regardless of the reasons for the update, it is usually a good idea to review the updates and determine if you should update the software.

    For some software, however, it is a good idea to install the updates, mainly because of security concerns. The software listed below are well-known to be exploited for security holes, or help keep your computer free from malware.

    (more…)