Friday 16 November 2018

The easy way to activate Windows 10 for free using CMD

प्रिय दोस्तों।।।
 मै काशिम टेक्निकल सपोर्ट इंजीनियर, अपने साइट में हार्दिक स्वागत करता हु। 
मेरा पेज अगर अच्छा लगे तो तो इसे सब्सक्राइब और शेयर जरूर करे। धन्यवाद। ।

Hey, do you want to activate Windows 10 for free?
I had been using Windows 10 for a year now but I had the annoying activation watermark. However, I found a super quick way to activate Windows 10 using CMD and no activation key is required.

In this guide, I will show you one simple trick to activate any Windows 10 versions. Remember, I installed the latest Windows 10 Professional from Microsoft’s Download Tool which is considered the safest.
I recommend you not to download Windows from third party sites or torrent sites. They are not safe and why would you do that? You’re getting it for free from Microsoft.
I spotted some major differences between the pirated Windows 10 and the original which I downloaded from Microsoft. Anyway, let’s talk about how you can activate your Windows 10 PC.

How to activate Windows 10 for free?

You can do this in a number of ways. I found the batch file technique really fast. You just create a .bat file and run it as administrator. You then restart your computer and bim-bada-boom. 😉
I’m telling you the fastest way to install and activate your Windows 10 without any activation key. However, it’s so simple that even a kindergarten kid could do this.
  1. Open Notepad.
  2. Paste the code provided below.
  3. Save the file as a .bat file.
  4. Run the file as administrator.
  5. Restart your PC                     Download Bat File 
You need to wait for about 10-15 seconds. Once you see the message which asks to restart your PC, you know it’s done. Simply type Y and press Enter.
Once you have restarted your computer, you no longer have to see that annoying activate Windows watermark. This is how you can activate Windows 10 without a key. 😀

Wednesday 31 May 2017

Reset manual EPSON PLQ-20 Passbook printer

प्रिय दोस्तों।।।
 मै काशिम टेक्निकल सपोर्ट इंजीनियर, अपने साइट में हार्दिक स्वागत करता हु। 
मेरा पेज अगर अच्छा लगे तो तो इसे सब्सक्राइब और शेयर जरूर करे। धन्यवाद। ।

Reset Passbook Printer EPSON PLQ20

  • Press & Hold F1 and F2 then switch on the Passbook printer of EPSON PLQ-20.
  • Then follow the steps of below attached video to reset the Passbook Printer

Thursday 28 July 2016

Panache Air PC is a Intel powered PC-on-Stick loaded with Microsoft Windows 10 operating system


प्रिय दोस्तों।।।
 मै काशिम टेक्निकल सपोर्ट इंजीनियर, अपने साइट में हार्दिक स्वागत करता हु। 
मेरा पेज अगर अच्छा लगे तो तो इसे सब्सक्राइब और शेयर जरूर करे। धन्यवाद। ।

 
  Panache launches Air PC with Windows 10 at a starting price of Rs 9,999

Panache Air PC is a PC-on-stick powered by Intel Atom processor and starts at Rs 9,999
Panache has launched Air PC, a compact PC-on-stick device that can convert any LED, LCD or projector into a fully functional PC using the HDMI port. Air PC is the first pocket PC to launch with Windows 10 pre-installed on it.
The Air PC is powered by a quad-core Intel Atom processor clocked at 1.33GHz coupled with 2GB RAM and 16/32GB internal storage. The memory is further expandable up to 128GB via microSD card. The device supports Wi-Fi 802.11 b/g/n and Bluetooth 4.0 connectivity. It also comes with a microUSB port and two USB 2.0 ports for connecting additional peripherals.
“We at Panache are very excited to introduce this revolutionary gen-next PC with Windows 10 for Indian consumers. Air PC is ideal for people who love to be mobile, as it empowers them with the flexibility to set up their own personal computer as and when they need it,” said Amit Rambhia, Founder and Managing Director, Panache.

Mr. Vineet Durani, Microsoft India, said, “Microsoft has been offering highly personalized computing experiences across different form factors to the consumers enabling them to achieve more, be more productive. This innovation has been brought forth to the new concept of PC-on-a-Stick as well and we are excited to drive affordability in this segment. The Panache Air PC allows any device with a HDMI-sporting display to have an access to the premium Windows 10 computing experience,” said Vineet Durani, Director, Windows Business Group, Microsoft India.
The Air PC is 4 inches long and comes with one year free subscription to F-Secure Internet Security. The 16GB variant will be available exclusively on HomeShop18 while the 32GB version will be available through distribution channels.

Monday 20 June 2016

Network troubleshooting tools

प्रिय दोस्तों।।।

 मै काशिम टेक्निकल सपोर्ट इंजीनियर, अपने साइट में हार्दिक स्वागत करता हु। 
मेरा पेज अगर अच्छा लगे तो तो इसे सब्सक्राइब और शेयर जरूर करे। धन्यवाद। ।



Network troubleshooting tools are a necessity for every network administrator. When getting started in the networking field, it is important to amass a number of tools that can be used to troubleshoot a variety of different network conditions.
While it is true that the the use of specific tools can be subjective and at the discretion of the engineer, the selection of tools in this article has been made based on their generality and common use. This article reviews the top 10 basic tools that can help you troubleshoot most networking issues.

10. Ping

The most commonly used network tool is the ping utility. This utility is used to provide a basic connectivity test between the requesting host and a destination host. This is done by using the Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. Simply stated, if the requesting host receives a response from the destination host, this host is reachable. This utility is commonly used to provide a basic picture of where a specific networking problem may exist. For example, if an Internet connection is down at an office, the ping utility can be used to figure out whether the problem exists within the office or within the network of the Internet provider. Figure 1 below shows an example of the ping utility being used to obtain the reachability status of the locally connected router.
ping
Figure 1: Ping utility

9. Tracert/traceroute

Typically, once the ping utility has been used to determine basic connectivity, the tracert/traceroute utility can used to determine more specific information about the path to the destination host including the route the packet takes and the response time of these intermediate hosts. Figure 2 below shows an example of the tracert utility being used to find the path from a host inside an office to www.google.com. The tracert utility and traceroute utilities perform the same function but operate on different operating systems, Tracert for Windows machines and traceroute for Linux/*nix based machines.
Figure 2: Tracert/traceroute utility

8. Ipconfig/ifconfig

One of the most important things that must be completed when troubleshooting a networking issue is to find out the specific IP configuration of the variously affected hosts. Sometimes this information is already known when addressing is configured statically, but when a dynamic addressing method is used, the IP address of each host can potentially change often. The utilities that can be used to find out this IP configuration information include the ipconfig utility on Windows machines and the ifconfig utility on Linux/*nix based machines. Figure 3 below shows an example of the ifconfig utility showing the IP configuration information of a queries host.
Figure 3: Ifconfig utility

7. Nslookup

Some of the most common networking issues revolve around issues with Dynamic Name System (DNS) address resolution issues. DNS is used by everyone using the Internet to resolve commonly known domain names (i.e. google.com) to commonly unknown IP addresses (i.e. 74.125.115.147). When this system does not work, most of the functionality that people are used to goes away, as there is no way to resolve this information. The nslookup utility can be used to lookup the specific IP address(es) associated with a domain name. If this utility is unable to resolve this information, there is a DNS issue. Along with simple lookup, the nslookup utility is able to query specific DNS servers to determine an issue with the default DNS servers configured on a host. Figure 4 below shows an example of how the nslookup utility can be used to query the associated IP address information.
Nslookup
Figure 4: Nslookup utility

6. Netstat

Often, one of the things that are required to be figured out is the current state of the active network connections on a host. This is very important information to find for a variety of reasons. For example, when verifying the status of a listening port on a host or to check and see what remote hosts are connected to a local host on a specific port. It is also possible to use the netstat utility to determine which services on a host that is associated with specific active ports. Figure 5 below shows an example of the netstat utility being used to display the currently active ports on a Linux machine.
Netstat
Figure 5: Netstat utility

5. PuTTY/Tera Term

When connecting to a variety of different types of equipment, a telnet, SSH or serial client is required; when this is required both the puTTY and Tera Term programs are able to provide these functionalities. The selection of one over the other is strictly a personal preference. Figures 6 and 7 below show both puTTY and Tera Term being used to connect to a host via SSH.
PuTTY
Figure 6: PuTTY
Tera Term
Figure 7: Tera Term

4. Subnet and IP Calculator

One of the most important tools in the belt of a junior network engineer is an IP network calculator. These can be used to unsure a correct IP address selection and with this a correct IP address configuration. While this type of tool is used by senior level network engineers, much of the information obtained from the tool becomes simpler to calculate the longer and more experience you have in the field. Two of the more commonly used free IP calculators include Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced Subnet Calculator which can be found at the links below.
http://www.bitcricket.com/downloads/IPCalculator.msi
http://downloads.solarwinds.com/solarwinds/Release/FreeTool/SolarWinds-Subnet-Calculator.zip
Subnet and IP Calculator
Figure 8: Subnet calculator

3. Speedtest.net/pingtest.net

A very easy test that can be used to both determine the Internet bandwidth available to a specific host and to determine the quality of an Internet connection is the use of the tools available at the speedtest.net and pingtest.net websites. The speedtest.net site provides the ability to determine the amount of bandwidth that is available to a specific host at a specific point in time; this is often a good tool to use when measuring how long it is going to take to upload or download information from a local to remote host. This measurement can also be used to determine whether the connection is offering the amount of bandwidth that was purchased from the Internet provider; keep in mind however that some amount of bandwidth difference is expected between the quoted bandwidth purchased and the measured bandwidth. The pingtest.net website is used to determine the quality of the connection by measuring the ping response times and jitter amounts over a short period of time. This information can be used to determine a likelihood of how well the measured connection will deal with certain types of high demand traffic like Voice over IP (VoIP) or gaming. Figure 9 and 10 below show example output from both of these sites.
Speedtest
Figure 9: Speedtest
Pingtest
Figure 10: Pingtest

2. Pathping/mtr

In an effort to take advantage of the benefits of both the ping and tracert/traceroute commands, the pathping and mtr utilities were developed. Both of these tools take the functionality and information that can be obtained from these types of tools and provide a more detailed single picture of the path characteristics from a specific host to a specific destination. Figure 11 and 12 below show examples of these two tools and what information they provide.
Pathping
Figure 11: Pathping
Mtr
Figure 12: Mtr

1. Route

The last of the tools covered in this article is the route utility. This utility is used to display the current status of the routing table on a host. While the use of the route utility is limited in common situations where the host only has a single IP address with a single gateway, it is vital in other situations where multiple IP address and multiple gateways are available. Figure 13 below shows an example of the route utility being used on a Windows machine.
Route

Networking Devices...........

प्रिय दोस्तों।।।

 मै काशिम टेक्निकल सपोर्ट इंजीनियर, अपने साइट में हार्दिक स्वागत करता हु। 
मेरा पेज अगर अच्छा लगे तो तो इसे सब्सक्राइब और शेयर जरूर करे। धन्यवाद। ।




HUB

Hub
Hub is one of the basic icons of networking devices which works at physical layer and hence connect networking devices physically together. Hubs are fundamentally used in networks that use twisted pair cabling to connect devices. They are designed to transmit the packets to the other appended devices without altering any of the transmitted packets received. They act as pathways to direct electrical signals to travel along. They transmit the information regardless of the fact if data packet is destined for the device connected or not.
Hub falls in two categories:
Active Hub: They are smarter than the passive hubs. They not only provide the path for the data signals infact they regenerate, concentrate and strengthen the signals before sending them to their destinations. Active hubs are also termed as ‘repeaters’.
Passive Hub: They are more like point contact for the wires to built in the physical network. They have nothing to do with modifying the signals.

Ethernet Hubs

It is a device connecting multiple Ethernet devices together and makes them perform the functions as a single unit.  They vary in speed in terms of data transfer rate. Ether utilizesCarrier Sense Multiple Access with Collision Detect (CSMA/CD) to control Media access. Ethernet hub communicates in half-duplex mode where the chances of data collision are inevitable at most of the times.
Ethernet Hubs 

Switches

Switches are the linkage points of an Ethernet network. Just as in hub, devices in switches are connected to them through twisted pair cabling. But the difference shows up in the manner both the devices; hub and a switch treat the data they receive. Hubworks by sending the data to all the ports on the device whereas a switch transfers it only to that port which is connected to the destination device.  A switch does so by having an in-built learning of the MAC address of the devices connected to it. Since the transmission of data signals are well defined in a switch hence the network performance is consequently enhanced. Switches operate in full-duplex mode where devices can send and receive data from the switch at the simultaneously unlike in half-duplex mode. The transmission speed in switches is double than in Ethernet hub transferring a 20Mbps connection into 30Mbps and a 200Mbps connection to become 300Mbps. Performance improvements are observed in networking with the extensive usage of switches in the modern days.
switches
The following method will elucidate further how data transmission takes place via switches:
  • Cut-through transmission: It allows the packets to be forwarded as soon as they are received. The method is prompt and quick but the possibility of error checking gets overlooked in such kind of packet data transmission.
  • Store and forward: In this switching environment the entire packet are received and ‘checked’ before being forwarded ahead. The errors are thus eliminated before being propagated further. The downside of this process is that error checking takes relatively longer time consequently making it a bit slower in processing and delivering.
  • Fragment Free: In a fragment free switching environment, a greater part of the packet is examined so that the switch can determine whether the packet has been caught up in a collision. After the collision status is determined, the packet is forwarded. 

Bridges

A bridge is a computer networking device that builds the connection with the other bridge networks which use the same protocol. It works at the Data Link layer of the OSI Model and connects the different networks together and develops communication between them. It connects two local-area networks; two physical LANs into larger logical LAN or two segments of the same LAN that use the same protocol.
Brige
Apart from building up larger networks, bridges are also used to segment larger networks into smaller portions. The bridge does so by placing itself between the two portions of two physical networks and controlling the flow of the data between them. Bridges nominate to forward the data after inspecting into the MAC address of the devices connected to every segment. The forwarding of the data is dependent on the acknowledgement of the fact that the destination address resides on some other interface. It has the capacity to block the incoming flow of data as well. Today Learning bridges have been introduced that build a list of the MAC addresses on the interface by observing the traffic on the network. This is a leap in the development field of manually recording of MAC addresses.
Types of Bridges:
There are mainly three types in which bridges can be characterized:
  • Transparent Bridge: As the name signifies, it appears to be transparent for the other devices on the network. The other devices are ignorant of its existence. It only blocks or forwards the data as per the MAC address.
  • Source Route Bridge: It derives its name from the fact that the path which packet takes through the network is implanted within the packet. It is mainly used in Token ring networks.
  • Translational Bridge: The process of conversion takes place via Translational Bridge. It converts the data format of one networking to another. For instance Token ring to Ethernet and vice versa. 
Switches superseding Bridges:
Ethernet switches are seen to be gaining trend as compared to bridges. They are succeeding on the account of provision of logical divisions and segments in the networking field. Infact switches are being referred to as multi-port bridges because of their advanced functionality

Routers

Routers are network layer devices and are particularly identified as Layer- 3 devices of the OSI Model. They process logical addressing information in the Network header of a packet such as IP Addresses. Router is used to create larger complex networks by complex traffic routing. It has the ability to connect dissimilar LANs on the same protocol. It also has the ability to limit the flow of broadcasts. A router primarily comprises of a hardware device or a system of the computer which has more than one network interface and routing software.
Router
Functionality:
When a router receives the data, it determines the destination address by reading the header of the packet. Once the address is determined, it searches in its routing table to get know how to reach the destination and then forwards the packet to the higher hop on the route. The hop could be the final destination or another router.
Routing tables play a very pivotal role in letting the router makes a decision. Thus a routing table is ought to be updated and complete. The two ways through which a router can receive information are:
  • Static Routing: In static routing, the routing information is fed into the routing tables manually. It does not only become a time-taking task but gets prone to errors as well. The manual updating is also required in case of statically configured routers when change in the topology of the network or in the layout takes place. Thus static routing is feasible for tinniest environments with minimum of one or two routers. 
  • Dynamic Routing: For larger environment dynamic routing proves to be the practical solution. The process involves use of peculiar routing protocols to hold communication. The purpose of these protocols is to enable the other routers to transfer information about to other routers, so that the other routers can build their own routing tables.

Brouters

Brouters are the combination of both the bridge and routers. They take up the functionality of the both networking devices serving as a bridge when forwarding data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network.
Brouters
Brouters are rare and their functionality is embedded into the routers functioned to act as bridge as well.

Gateways

Gateway is a device which is used to connect multiple networks and passes packets from one packet to the other network. Acting as the ‘gateway’ between different networking systems or computer programs, a gateway is a device which forms a link between them. It allows the computer programs, either on the same computer or on different computers to share information across the network through protocols. A router is also a gateway, since it interprets data from one network protocol to another.
LSM_diagram
Others such as bridge converts the data into different forms between two networking systems. Then a software application converts the data from one format into another. Gateway is a viable tool to translate the data format, although the data itself remains unchanged. Gateway might be installed in some other device to add its functionality into another.

Network card

Network cards also known as Network Interface Cards (NICs) are hardware devices that connect a computer with the network. They are installed on the mother board. They are responsible for developing a physical connection between the network and the computer. Computer data is translated into electrical signals send to the network via Network Interface Cards.
 card
They can also manage some important data-conversion function.  These days network cards are software configured unlike in olden days when drivers were needed to configure them. Even if the NIC doesn’t come up with the software then the latest drivers or the associated software can be downloaded from the internet as well.

Network protocols

Network protocols define a language of instructions and conventions for communication between the network devices. It is essential that a networked computer must have one or more protocol drivers. Usually, for two computers to interconnect on a network, they must use identical protocols. At times, a computer is designed to use multiple protocols. Network protocols like HTTP, TCP/IP offer a basis on which much of the Internet stands.
System requirement:
  • The bus compatibility should be verified on installing an NIC into the system. The commonly used bus system is Peripheral Component Interconnect (PCI)
  • Memory I/O addresses and IRQ are needed.
  • Need of drivers if not already installed.

ISDN (Integrated Services Digital Network)

ISDN are used to send over graphic or audio data files. It is a WAN technology that can be used in place of a dial up link. The accessibility of ISDN depends upon the provision of the service by the service provider, the quality of the line set up to your area. It surely provides higher speed than a modem and has the capability to pick up the line and drop it considerably at a faster rate.
ISDN (Integrated Services Digital Network
ISDN can create numerous communication routes on a single line. Nowadays, even faster and cheaper technologies that ISDN have found their way in the realm of technology.

Modems

Modem is a device which converts the computer-generated digital signals of a computer into analog signals to enable their travelling via phone lines. The ‘modulator-demodulator’ or modem can be used as a dial up for LAN or to connect to an ISP. Modems can be both external, as in the device which connects to the USB or the serial port of a computer, or proprietary devices for handheld gadgets and other devices, as well as internal; in the form of add-in expansion cards for computers and PCMCIA cards for laptops.
Modems
Configuration of a modem differs for both the external and internal modem. For internal modems, IRQ – Interrupt request is used to configure the modem along with I/O, which is a memory address. Typically before the installation of built-in modem, integrated serial interfaces are disabled, simultaneously assigning them the COM2 resources.
For external connection of a modem, the modem assigns and uses the resources itself. This is especially useful for the USB port and laptop users as the non-complex and simpler nature of the process renders it far much more beneficial for daily usage.
Upon installation, the second step to ensure the proper working of a modem is the installation of drivers. The modem working speed and processing is dependent on two factors:
  • Speed of UART – Universal Asynchronous Receiver or Transmitter chip (installed in the computer to which the modem connection is made)
  • Speed of the modem itself