July 2020: Having trouble connecting to a computer over the network check this out

In this article there you are going to learn about how to fix the different issues concerning computer connectivity over a network for instance at the office or at school or even at home, hang on in there and learn one or two things.

1. Workgroup

Make sure any computer you want to use is in the same working group. The Workgroup name on any machine should be exactly the same. Always, make sure to use the same case for names (all tops or all bottoms).

Press Start in Windows 7 or higher, type in Workgroup and then select Change Workgroup Name. To change the workgroup name press the Change tab.

2. Homegroup

Windows 7 introduced a new feature called the HomeGroup that sets things up automatically to allow you to share files between Windows 7, Windows 8, and Windows 10 computers.

3. File and Printer Sharing 

Make sure the network adapter is switched on for file and printer sharing. You can allow this by going to Control Panel, Network Connections, right-clicking on a network link, selecting Properties, and testing for Microsoft Networks File and Printer Sharing.

You need to go to the Network and Sharing Center in Windows 7 and higher, then press Advanced Sharing Settings and turn it on there.

4. Correct Subnet and IP addresses 

If all of your computers are connected to the same router, you really shouldn't have this problem, but it is worth mentioning. 

Ensure sure all machines have the same Subnet mask and Default Gateway. If these aren't the same, then there would be problems linking the machines over the network.

These details can be viewed by going to Start, Run, Type CMD and then typing IPCONFIG / ALL at the command prompt on each computer.

5 Check Firewalls 

My recommendation here is to disable the Windows Firewall on all machines first and then try to access the shared folders afterward. Additionally, make sure all third-party firewall programs like Norton or Comodo are disabled. 

If you notice that the sharing works with the firewall off, make sure to add File and Printer Sharing to the Windows Firewall and third-party firewall exceptions list

6. Shared permissions

If you get permission you do not have to use this network resource ... Access is denied message, the issue could also be that the shared directory permissions are not correctly set.

You'll need to configure the sharing properly depending on whether you're running XP Home or XP Pro. You can only share files with XP Home through Simple File Sharing. It is pretty quick because they have a wizard to guide you through the process of sharing.

You need to disable Simple File Sharing and set NTFS permissions for XP Pro, and share permissions to allow access for all. Check my post about setting file/folder permissions, or how to share files between computers for more information.

7. Use TCP/IP Protocol 

You probably don't have to worry about this either, but just to cover all the bases, you need to make sure the computers on the network all use the Internet TCP / IP protocol to communicate and not IPX / SPX or NetBEUI. 

You can go to Begin, Control Panel, Network Connections, right-click on the link to the network, select Properties, and see the protocol is specified in the list box.

8. Username and Passwords

If you have done all of the above correctly and still can't communicate, then you should always try to make sure the usernames and passwords are exactly the same on all devices.

It is best to use passwords on all accounts, and build a new account with the same username and password on each device. Often creating a new account is necessary, instead of just changing the name or password on an existing account. Make sure Administrators are the accounts.

9. Computer Names

Make sure the names of NetBIOS are specific for all computers. NetBIOS names are only 8 characters, so if you named one of the user1 and User2 computers they will have the same name as NetBIOS. 

Make sure that a computer name's first eight characters are identical, or you'll be having problems. Remember this is only a concern with very old Windows versions.

10. Local Security Policy 

A local security policy is another explanation you might not be able to reach another device across the network.

You can go to the Administrative Tools, Local Security Policy, Local Policies, Security Options, Control Panel. check the following protocol now:

Network access: Do not allow anonymous enumeration of SAM accounts and shares

Make sure that the value is set to Disabled. Also, make sure to disable only the setting that says “SAM accounts and shares” not the one that says “SAM accounts” only.

11. Uninstall anti-virus and Internet Security 

 Finally, make sure that all your anti-virus programs are either turned off or uninstalled to test out the connection. If you have any Internet Security programs such as Norton Internet Security or Kaspersky Internet Security, disable them!

That is literally about it check these settings out and in case you need more assistance contact the technical department about it via our email techsupport@wougnet.org

For more insight in-depth check out Online Tech Tips all images are from Online Tech Tips

Read More Computer,

June 2020: Web hosting explained

When it comes to web hosting there are a couple of types and they are explained below, but before that let us understand what is meant by web hosting.

Web hosting

This is a service that is provided to a company from a remote location, its executed by a computer that is on 24/7, this computer stores all the files of a given website making it available upon request and that's why you find when you visit for instance wougnet.org you are able to see content any time of the day. Therefore, web hosting is the service that allows users to reach a server in a remote area and see the content of a website/web page(s) stored on that server.

Types of web hosting:

Shared web hosting

Shared hosting is the most basic form of web hosting available. Purchasing a shared hosting plan is like renting a home with a few roommates; or in this case, up to a few thousand.

When you purchase this type of plan, your business’ domain will be housed on a web server along with those of a few hundred to a few thousand other businesses. Generally, this works just fine as most of the web pages being housed on the server are relatively small and supported easily with little risk of site speed interference.

Advantages

  • Cost–As with any shared living situation, the most obvious advantage is splitting the cost of rent between multiple parties. When a hosting provider is able to split the cost of operating a single server between a couple of thousand clients, they’re able to offer very affordable rates.
  • Beginner-friendly—Generally, all your needs regarding setup will be accommodated under a shared hosting plan. This allows you the freedom to focus your attention on the development and web design aspects of your webpage instead.

Disadvantages

Unfortunately, when sharing living space (or any other resource) it is always possible that you will run into competition for said resource. This is precisely what can happen when using a shared host.

  • Bad neighbors — the “bad neighbor effect” (yes, it is actually called that) is a phenomenon that occurs when one website on the shared server begins to hog resources, usually due to unusually high traffic or poor coding. This tends to result in slower loading speeds or operational downtime, which means it is more difficult to reach your website.
  • Customer service –– obviously, when a bad neighbor situation arises, every other website owner on the server is going to hop on the customer service line pronto. Unfortunately, when there are so many mouths to feed it is difficult to accommodate them all efficiently. Additionally, the incentive for companies to do so is rather low, given that most websites are only yielding the company $5-$10 each.
  • Inflexible –– Shared hosting does not allow you to customize your environment, since making changes to your own would affect every other website on the server.

VPS hosting

If shared hosting is comparable to sharing a house with roommates, then VPS hosting, which stands for Virtual Private Server, is a lot like renting your own apartment in an apartment complex.

Advantages

VPS offers a number of key advantages over simple shared hosting that make it far more desirable overall.

  • Reliability – Reduces the number of websites per server from a few thousand to about 20, decreasing the demand on the server. Resources are allocated evenly between websites. No single website is allowed to exceed its set share.
  • Flexibility – VPS servers offer the ability to customize your environment since you are virtually partitioned from the other websites on the server.
  • Scalability – Since you have a measured portion of the server’s resources dedicated to your website, it is a simple matter to increase the amount available to you.

Disadvantages

  • Cost — naturally, with added advantages comes added cost. The cost of VPS hosting ranges from around $20 per month at the lowest to $50 on average and is scalable all the way up to around $200.

The disadvantages of using VPS hosting are few and negligible. Many marketers agree the increased capacity allowed to your website quickly covers the increase in cost from VPS hosting.

Dedicated hosting

Dedicated hosting is recommended for big companies with big websites and big needs. When you choose dedicated hosting, you enjoy a server dedicated strictly to running your website, and all its advantages.

Advantages

The advantages afforded by having a dedicated server are unique and significant in comparison to shared and VPS hosting.

  • No bad neighbors — Since the server is dedicated strictly to you, you don’t have any neighbors at all.
  • Reduced security risk — Without neighbors, there is far less risk of security issues.
  • Total flexibility — Most hosting companies allow extensive customization with a dedicated hosting plan. You have full autonomy to choose your desired operating system, amount of memory, and various other hardware features.
  • Customer service — As you would expect, big companies putting up big money for web hosting services net more attention on the customer service end.

Disadvantages

There are some distinct and rather consequential disadvantages to hosting your website on a dedicated server. We’ll start with the obvious and go from there.

  • Cost — The pricing jumps significantly with this type of package, ranging anywhere from $60 to $350 per month.
  • Technical knowledge—Managing your own server requires a good bit of technical acumen, particularly if you are using a fully unmanaged service.
  • Unmanaged service—Some services will require you to manage your server entirely on your own. In such cases, you will need someone with the know-how to:
  • Install your operating system
  • Install malware removal
  • Provide security scanning
  • Install other tools necessary to run a web server (there are a few)
  • Security—By hosting your website on a dedicated server you are essentially putting all your eggs in one basket. Should the hardware fail, your website will experience downtime until your own technician can get it up and running again.

Many web hosting providers will offer solutions to mitigate the negative aspects of using a dedicated server. For instance, your hosting provider may offer you the option to hire a service manager with the technical knowledge to take care of installation needs and oversee security. Of course, this comes with additional cost. However, it is expected that a company large enough to require such services will be able to absorb the additional cost.

Cloud hosting

Cloud hosting was developed as an innovative way to pull all the juice you need to run your website from a host of different computers, as opposed to a single server. It holds a lot of similarities to VPS hosting, so much so that many hosting companies refer to it as Cloud VPS.

Advantages

Cloud hosting offers incredible advantages over other options by combining a lot of its best features into one package. Some of these include the following, which we will cover further below:

  • Scalability
  • Setup
  • Advantageous billing structure
  • Security

Scalability

Increased scalability may be the single largest perk that cloud hosting offers over the others, particularly its cousin VPS. With traditional VPS, you can scale up, but only to the extent allowed by the capacity of the single server that houses your unit.

A cloud-based system, on the other hand, allows you to scale much further by combining the power of a multitude of computers. These networks form a virtual server that allocates resources based on need, so your potential for scalability is effectively endless.

Setup

An advantage that clouds shares with VPS and shared servers is that setup is essentially handled for you by whoever manages the host servers. The technical knowledge required to run a dedicated server is not required.

Billing Structure

Cloud-based services are billed differently than other services as well. As you will notice, every other type of package comes with a set price for a set amount of web resources. You will be charged the full amount for the number of resources allocated to you whether you use them or not.

This is not the case with cloud-based servers. In this case, the price is incurred as the resources are allocated; based on need. You will only be charged for the resources you actually use.

Security

Cloud hosting is also remarkably resilient against cyber-attacks, particularly of the DDoS variety. This type of attack is designed to overwhelm a server by sending huge numbers of requests at the same time. A cloud system is able to distribute these requests throughout the network and minimize their impact to keep your website up and running.

Disadvantages

Frankly, there are hardly any disadvantages to speak of. It is true that traffic spikes and the subsequent increase in resource consumption can make predicting cost a little tricky. However, this tends to be a rather minor concern since increased traffic tends to increase revenue, allowing a business to absorb the additional cost.

Self-service hosting

Self-service web hosting is precisely what it sounds like. Should you choose to undertake a fully self-sufficient hosting operation, you will be responsible for providing all of the following, and more.

  • Power
  • Cooling
  • Physical security
  • Internet uplink
  • Server hardware
  • Server software
  • Data storage
  • Backup procedures
  • Bandwidth
  • Systems administrator
  • Cybersecurity

Advantages

The advantages of hosting your operation on this type of system are numerous. You have full autonomy over:

  • Cost
  • Customizability
  • Security
  • Scalability
  • Configuration

Essentially, you have a system that is customized and optimized to fit your needs. The only limits to what you can do are dictated by your budget and your technical expertise.

Disadvantages

The disadvantages to operating your own in-house hosting system should be pretty obvious. You are solely responsible for the up-front costs, as well as any additional costs which can rise dramatically should any of the following occur:

  • Hardware malfunction
  • Software malfunction
  • Security breach
  • Power failure
  • Cooling failure

This type of hosting is generally well beyond the scope of what is necessary to run an online business, especially a small one. There are a select few, though, that are both large enough and run their businesses entirely online, who might opt for this type of hosting system (for example, Amazon). However, the cost and level of effort necessary for the upkeep of a system like this will likely make this option prohibitive.

Reseller hosting

Reseller hosting is specific to those who wish to turn a profit by providing hosting services to others. In effect, they are shared hosting accounts with additional tools built-in to sweeten the pot and help resell host space. Some of these tools included in reseller web hosting include:

  • Website templates — Help business owners who may be new to website building.
  • Technical support — Built-in tech support allows better access to IT services than traditional shared host services, which are often lacking.
  • Private name servers — Used to give the appearance of authority by making your company seem larger.

Advantages

For the person(s) attempting to resell premium hosting space, the main advantage is profit. However, there are a couple of other advantages for those purchasing resold hosting space. Access to the tools listed above, particularly website templates and tech support, dramatically increases one’s ability to navigate a web buildout without acquiring a lot of technical knowledge. In short, it saves time and resources that can be used elsewhere.

Disadvantages

The disadvantages are essentially the same as those you would encounter using shared hosting services. There is the potential for:

  • Security issues
  • Slowing or downtime due to bad neighbors hogging web resources
  • Lack of flexibility and customizability

Fortunately, with features such as built-in tech support, many of these issues can be resolved in a more efficient manner. This makes resold space worth the consideration, especially if you have been burned in the past and are looking to make a change while staying within your existing budget.

Choose the right type of hosting for your business idea

While there are a few variations on hosting solutions that are available, most are built around the models explained above. At Domain.com, we aim to help you find the best solution to fit your needs and your budget. This is why we offer a wide array of web hosting packages at competitive prices.

Cited from Domain.com and approved by the technical department

Read More internet,

May 2020: Are you worried about what your kid would watch on Youtube? Not anymore read this below to get solution

Introducing YouTube Kids which is an app specifically designed for kids, makes it easier for children and parents to find the content they are interested in. The child-friendly video-sharing app is free to download for Android and iOS.

The app will feature popular local children’s brands like Morph, Teletubbies, Wallace & Gromit, and The Magic Roundabout. While YouTube hasn’t indicated a specific age range for the app, it does appear to be suitable mainly for children aged 3-8 years old.

Parents should be aware the app does feature advertisements. The video-sharing app has insisted that the advertisements selected for the site go through a review process to ensure they are age-appropriate.

However, if you or your child come across any inappropriate content you can flag it in the same was you would on the original YouTube app. For more info on flagging videos go to google.com/youtubekids

Getting Started

Parental setup is required to ensure the best experience possible for your child. The app doesn’t require a sign-in or Google account. Once the app is downloaded, YouTube will ask parents/adults to insert a code to ensure you are an adult, it will then check what settings you would like to use.

These settings include restricting your child’s experience by turning search off. This means your child can’t search for content, which reduces the chances that they will encounter a video you don’t want them to watch.

Another option offered for parents is the timer function. Parents can limit screen time by telling kids when it’s time to stop watching. The timer will display a friendly alert and stop the app when the session is over. For more info on the timer function go to support.google.com/youtubekids/

These settings can be easily updated once the app is live. Parents simply tap the lock icon on the app screen.

Once set-up, users can view videos via four categories on the homepage  (Shows, Music, Learning and Explore). When the account has been active for a certain period of time users will also be given recommendations on what to watch based on previously viewed content.

There is also a search option similar to YouTube, however, if users insert any inappropriate terms the app will simply suggest they try searching for something else.

For more info go to the YouTube Kids parental center: google.com/youtubekids/

Updated New features: Collections, Parent Approve Mode, Search Off Corpus

YouTube Kids has made a series of improvements, making it a safer experience for young children. Parents can now choose collections of programmes created by YouTube Kids and trusted third-party partners. YouTube Kids has also made improvements to the ‘search-off’ feature in order to offer a more contained experience. YouTube Kids are also working on a parent-approved content option that will allow parents to select every channel and video available in the app later in the year. You can read more about it in this blog post.

Parental Sign-In in EU

YouTube Kids will also be shortly launching a sign-in feature for parents on the YouTube Kids app. Signing in will enable parents to customize content their kids can see in the app and set this across all devices. If a parent blocks a video, that specific video will no longer be shown/viewable the YouTube Kids app when signed in. If a user is signed in when they report a video, that video will also be blocked from the YouTube Kids app when signed in.

Additionally, parents will also soon have the ability to set up a customized user interface for each child in their family. The app will allow signed in parents to create a separate experience for each child in their household. Each can have a separate set of viewing preferences and recommendations, allowing multiple children to get the most out of the YouTube Kids app. This is especially handy on a shared device that more than one child uses. Please take a look at the YouTube Kids parent guide for more information.

Compiled by:

Technical Support Department and cited from webwise.ie 

Read More security,

April 2020: 5 ways you can help keep your children safe online during Lockdown

1. Keep them safe with open communication

Have an honest dialogue with your children about who they communicate with and how. Make sure they understand the value of kind and supportive interactions and that mean, discriminatory or inappropriate contact is never acceptable. If your children experience any of these, encourage them to tell you or a trusted adult immediately. Be alert if your child appears to be upset or secretive with online activities or if they are experiencing cyberbullying.

Work with your child to establish rules on how, when, and where devices can be used.

2. Use technology to protect them

Check that your child’s device is running the latest software and antivirus programs, and that privacy settings are on. Keep webcams covered when not in use. For younger children, tools such as parental controls, including safe search, can help keep online experiences positive.

Be cautious of free online educational resources. Your child should never have to provide a photo or their full name to use these resources. Remember to check the privacy settings to minimize data collection. Help your child learn to keep personal information private, especially from strangers.

3. Spend time with them online

Create opportunities for your child to have safe and positive online interactions with friends, family, and you. Connecting with others is more important than ever at the moment and this can be an excellent opportunity for you to model kindness and empathy in your “virtual interactions”.

Help your child recognize and avoid misinformation and age-inappropriate content that may increase anxiety about the COVID-19 virus. Many digital resources from credible organizations like UNICEF and the World Health Organization are available for you and your child to learn about the virus together.

Spend time with your child to identify age-appropriate apps, games, and other online entertainment.

4. Encourage healthy online habits

Promote and monitor good behavior online and on video calls. Encourage your children to be kind and respectful to classmates, to be mindful of what clothes they wear, and to avoid joining video calls from a bedroom. 

Familiarize yourself with school policies and helplines to report cyberbullying or inappropriate online content.

As children spend more time online, they can be exposed to more advertising that may promote unhealthy foods, gender stereotypes, or age-inappropriate material. Help them recognize online ads and use the opportunity to explore together what is wrong with some of the negative messaging you see.

5. Let them have fun and express themselves

Spending time at home can be a great opportunity for your children to use their voices online to share their views and support those in need during this crisis.

Encourage your child to take advantage of digital tools that get them up and moving, like online exercise videos for kids and video games that require physical movement.

Remember to balance online recreation with offline activities, including time outside, if possible.  

Photo credit Tolu Bamwo Nappy

Compiled and approved by the technical department and its sited from UNICEF ORG

Read More security,

March 2020: What do you understand about Phishing

What is Phishing?

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords.

The information is then used to access important accounts and can result in identity theft and financial loss.

How to Recognize Phishing

Scammers often update their tactics, but there are some signs that will help you recognize a phishing email or text message.

Phishing emails and text messages may look like they’re from a company you know or trust. They may look like they’re from a bank, a credit card company, a social networking site, an online payment website or app, or an online store.

Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. They may

  • say they’ve noticed some suspicious activity or log-in attempts
  • claim there’s a problem with your account or your payment information
  • say you must confirm some personal information
  • include a fake invoice
  • want you to click on a link to make a payment
  • say you’re eligible to register for a government refund
  • offer a coupon for free stuff

Test your skills here about phishing 

Phishing Quiz

Imagine you saw this in your inbox. Do you see any signs that it’s a scam? Let’s take a look.

  • The email looks like it’s from a company you may know and trust: Netflix. It even uses a Netflix logo and header.
  • The email says your account is on hold because of a billing problem.
  • The email has a generic greeting, “Hi Dear.” If you have an account with the business, it probably wouldn’t use a generic greeting like this.
  • The email invites you to click on a link to update your payment details.

While, at a glance, this email might look real, it’s not. The scammers who send emails like this one do not have anything to do with the companies they pretend to be. Phishing emails can have real consequences for people who give scammers their information. And they can harm the reputation of the companies they’re spoofing.

How to Protect Yourself From Phishing Attacks

Your email spam filters may keep many phishing emails out of your inbox. But scammers are always trying to outsmart spam filters, so it’s a good idea to add extra layers of protection. Here are four steps you can take today to protect yourself from phishing attacks.

Four Steps to Protect Yourself From Phishing

1. Protect your computer by using security software. Set the software to update automatically so it can deal with any new security threats.

2. Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats.

3. Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. The additional credentials you need to log in to your account fall into two categories:

  • Something you have — like a passcode you get via text message or an authentication app.
  • Something you are — like a scan of your fingerprint, your retina, or your face.

Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.

4. Protect your data by backing it up. Back up your data and make sure those backups aren’t connected to your home network. You can copy your computer files to an external hard drive or cloud storage. Back up the data on your phone, too.

What to Do If You Suspect a Phishing Attack

If you get an email or a text message that asks you to click on a link or open an attachment, answer this question: Do I have an account with the company or know the person that contacted me?

If the answer is “No,” it could be a phishing scam. Go back and review the tips in How to recognize phishing and look for signs of a phishing scam. If you see them, report the message and then delete it.

If the answer is “Yes,” contact the company using a phone number or website you know is real. Not the information in the email. Attachments and links can install harmful malware.

What to Do If You Responded to a Phishing Email

If you think a scammer has your information, like your Social Security, credit card, or bank account number, go to IdentityTheft.gov. There you’ll see the specific steps to take based on the information that you lost.

If you think you clicked on a link or opened an attachment that downloaded harmful software, update your computer’s security software. Then run a scan.

How to Report Phishing

If you got a phishing email or text message, report it. The information you give can help fight the scammers.

Step 1. If you got a phishing email, forward it to the Anti-Phishing Working Group at reportphishing@apwg.org. If you got a phishing text message, forward it to SPAM (7726).

Step 2. Report the phishing attack to the FTC at ftc.gov/complaint.

Cited From 

https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams

Phishing Org

Compiled and approved by the Technical support Department

Read More security,