Showing posts with label Wi-Fi Networks. Show all posts
Showing posts with label Wi-Fi Networks. Show all posts

ACER P3 UltraBook WIFI and Bluetooth Not Working Solution



Solution for Acer P3 UltraBook Wifi Not Working:

At first, Open Network and sharing center

Change adapter setting

Right Click network adapter and select properties

At displays internet properties select IP4 and click on properties

Select use the following DNS Server Addresses

In prefered DNS Type: 1.1.1.1

In alternate DNS Type: 1.0.0.1

Press Ok and close the window

ReadMore »»  

Two-Factor Authentication a method of confirming a user's claimed identity


The second security feature is called Two-Factor Authentication, arguably the best way to keep any internet sign-in you have secure. here’s been a lot of security issues popping up on the internet lately such as password leaks.
Two-step verification or two-step authentication is a method of confirming a user's claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are.

An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system. If you’ve claimed your account with an email and verified it, your account is protected automatically with our IP Location Lock.

Furthermore, to make your account effectively impenetrable, you should also enable Two-Factor Authorization. Read on for a quick explanation of how each of these features protect your account (plus some password tips at the bottom of this post).

The use of multiple authentication factors to prove one's identity is based on the premise that an unauthorized actor is unlikely to be able to supply the factors required for access.
If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being protected by multi-factor authentication then remains blocked.
The authentication factors of a multi-factor authentication scheme may include: some physical object in the possession of the user, such as a USB stick with a secret token, a bank card, a key, etc. some secret known to the user, such as a password, PIN, TAN, etc. some physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern in key press intervals, etc.

Somewhere you are, such as connection to a specific computing network or utilizing a GPS signal to identify the location. Many multi-factor authentication vendors offer mobile phone-based authentication.
ReadMore »»  

WiMAX Connect to The 2010 Winter Olympic Games Visitors


The 2010 Winter Olympic Games Visitors in Vancouver, Canada will be able to connect Internet with their laptops by WiMAX-enabled to check results and stream video of events using a new mobile WiMAX service.

For a small—50 employees—family-owned company, global exposure may seem beside the point with roots firmly planted in the great white north, but the Vancouver WiMAX launch is the official debut of a reborn Craig with a more global perspective.

Founded over 60 years ago, Craig was originally a regional broadcaster. In the 1990s, it diversified into wireless cable TV—using MDS or multipoint distribution system technology—and then into broadband wireless access. More recently, Craig has remade itself as a “4G” company with an international footprint.

Even before the coming-out party in Vancouver, the company will launch WiMAX service in Palm Springs, California and most of the rest of the Coachella Valley. It also plans to launch in Manitoba in central Canada, its original home base, and in Athens and Thessaloniki in Greece—all in 2010.

The company has spectrum in Norway and New Zealand, as well. The spectrum is 2.5GHz everywhere except Greece where Craig will be using 3.5GHz.

It will deploy WiMAX 802.16e infrastructure everywhere—supplied by Motorola in the case of the Vancouver network—but in all of the other markets it will start with fixed/nomadic service and work towards the coverage density needed for mobile.
ReadMore »»