Posts

What is NAS ?

Image
NAS Or  Network Attached Storage NAS is a brief form of Network Attached Storage , it is a network device basically, which is used to store and backup your data in a network. It is a device that works on RAID technology and backs up your data without your day to day intervention. NAS is a good option for your home and small businesses or at the places where you don’t have lots of data storage and backup requirements. NAS is just a network device with multiple hard disk support, you can insert multiple hard disks to increase your storage and backup capacity, thereafter you can access and share your data from anywhere within a network, except that you can also create cloud storage to access it publicly when you are not at your home. NAS basically does centralize file management in a very efficient manner and provides an additional data security layer to your files and data by using some encryption techniques. It is not affected by viruses because it is just external storage ap...

What is HS2(Hotspot 2.0)

HS2 stands for Hotspot 2.0 which is an advanced version of Hotspot, mainly designed to give more control over peers. Security of this version enhanced a lot as compare to previous version. It is also known as Wi-Fi CERTIFIED PASSPOINT. It works on 802.11 u standard protocol and WPA2 encryption standard, which is a strong encryption standard. It has more bandwidth as compare to the previous version, which offers more Internet speed to download and upload or to surf internet for other purposes. This is mainly designed to connect with hotspots at airport, railway or metro stations, Coffee Shops, libraries and public areas. It ensures that you will surf internet securely at these places without worrying about malicious users. It does not require additional sign up information and authentication process. As a Hotspot 2.0 device comes under the range it automatically connects to the network without sing up and authentication. It is discovered by WI-FI alliances, to ease WI-FI services ...

Concepts of Subnetting

Subnetting is a technique used in order to divide a network into subnetworks, so that all of the networks could mange easily and if a network fails then it will not affect on the other networks. When we do subnetting a concept of subnet mask is used in order to divide a network into subnetworks. So we will learn that how do we create subnetworks by using subnet mask. For instance if we use 192.77.50.0 which is a class C IP address so here we need class C subnet mask 255.255.255.0 . So it depends on the numbers of the subnetworks we have to create means if we have to create 2 subnetworks then we will borrow a bit from third octate of the subnet mask. We can easily calculate no. of bits to create desired no. of networks with the help of 2 n , where n is no of bits. So we will borrow 1 bit because 2 1 = 2. Believe me it is very easy. Let me show you how do we do that. IP address:        192.77.50.0 Subnet mask:    ...

How To Use ABS Function In MS Excel

Image
Use of ABS Functions in Microsoft Excel ABS Formula Syntax and usage in MS Excel explanation by ComputerFlicks… The easiest function of Excel, easy to use, and understand. If we need to get the absolute value irrespective of negative or positive, we can use ABS function . As a reference, we can use a number or a cell reference.   Let suppose we have huge data that contains positive and negative values, but our requirement is to get the sum of all values. For example, we have two values +20 and -20 , if we add both values it will be zero, instead of zero we want the sum of both values "40" . In such cases the first step is to use  ABS function and convert all values into absolute values, after getting absolute values, we can add both values and we will get the output "40" . Syntax:   = ABS (number) We place the number of which we want the absolute value. In the place of no we can also select the cell reference in the excel sheet. Imag...

How To Use IF Formula In Excel.

Image
Use of "IF" Formula in easy form. MS Excel – “IF” Formula Explanation By Computer Flicks … In order to understand easily we have divided the if formula in multiply example (Simple to Hard) Definition : IF formula is very popular function among excel formulas, it is a logical function biased on true and false value. We have to create a logic between the values. In logical function we can put two condition, result will display as per true and false defined values. According to logic, value can hit the true or false condition and the result will display accordingly. Simple Example: If  (Cell A:1 is Blank , then print 1, otherwise print 2 ) The above example is for your understanding, the correct syntax is given below. The function is divided in three parts. In the first Part we have to define a logic. if cell A:1 is blank then, the true value will print or reflect  "1"  as output and if A:1 is not blank the...

Short Cut Keys in Microsoft Excel

Image
Microsoft Excel – Short Cut Keys. Some important Excel Short Cut Keys. If you are a daily excel user, you must know some short cut keys to get a good speed over your reporting with excel sheets. In this article we have defined short cut keys depends on your requirement. Some of the short cut keys you must know. Make a habit to use short cut keys to improve your work style with excel. Some of the keys are not limited to Microsoft Excel but you can use it with MS Word and any other application also. We have divided this article into three parts. First is basic short cut keys, second is the text formatting and third is Good to know if you want to learn. The first and second parts are important to learn.   Let's see the table below and start learning.   Image: 1 - Microsoft Excel Short Cut Keys. See the Excel short cut keys above. We have defined only important excel short cut which is important for daily use. Please post a comment or any...

PPTP vs L2TP vs SSTP vs OpenVPN

PPTP PPTP stands for Point To Point Tunneling Protocol, which is also termed as P2TP, is a protocol designed by Microsoft to provide secure communication and it is a very common protocol being used from windows 95. It has some drawbacks like it is no more secure at all now. Although, it is easy to use and set up but vulnerable with lots of weaknesses. The major advantage of this protocol is that it is built-in with the Windows operating system. It has almost been obsoleted. It's better to go for an advanced and secure feature. OpenVPN OpenVPN is more secure than PPTP and also provides more flexibility like it can be mount on any port, so it is difficult for a firewall to block it properly. OpenVPN uses open technologies like OpenSSL encryption library and SSLV3 and TLS v1 protocols. It is most popular and can be more secure if it uses AES encryption rather than a Blowfish encryption technique. It is required to install a third-party software before configuring OpenVPN bec...