Thursday, July 11, 2013

Threat of Electromagnetic Waves

Using a WiFi router, I don’t care about how much I am affected by electromagnetic waves in that I have never had a severe headache. Using WiFi, even if I have a light headache, I may not pay attention. However, one of my friends said that she has had a terrible headache, using a WiFi router. I was so surprised that I couldn't believe my ear. If it is possible, she unplugs the router and uses a cable when using the Internet. According to her, when using a cable, she is fine.   

After listening to her, I pondered how many electromagnetic waves in life I have been exposed and how much effort I have made in order to avoid them. I can’t see them with the naked eye but may be affected by them every hour and every day whether it is light or heavy. When not using the Internet, I have tried to unplug a WiFi router since then; if just turning off WiFi, I could still be affected by electromagnetic waves. In addition, in sleeping, I try to keep a cellular phone away from my bed or to unplug unused electrical goods as much as I can.

Even though technology brings convenience to us, it also does a lot of side effects. If you can’t feel free electromagnetic waves, why don’t you try to reduce them for your health? 

Friday, July 5, 2013

How to Protect Your Laptop Just in Case You Lose It

When using a laptop at a public place, such as a coffee shop or library and when going to the restroom there, you may have an experience that you ask a person to watch out your stuff. Most of the notebook users don’t want to imagine losing their laptop. If they lose it, they can buy another laptop. However, vital data on the lost laptop can’t buy with money.

Here is a way to protect your notebook just in case you lose the laptop; this is based on a Windows operating system.


1. Click “the Windows Start menu.” If you use the edition of previous Windows 7, select "Run" in the start menu tap. 

2. Type “CMD” in the search box and then press enter: CMD stands for command prompt.

3. Type “IPCONFIG/ALL” at the prompt and then press enter: IPCONFIG stands for Internet Protocol Configuration.

4. Two physical addresses are crucial. One is for wireless LAN adapter, and the other is for Ethernet adapter. Take a picture or capture the screen, and then keep it. If your laptop is stolen, you can find it with theses MAC (Media Access Control) addresses after reporting to the police. However, it is not 100% guaranteed because the MAC addresses can arbitrarily change. If its wireless LAN card or its mainboard is exchanged, its tracking with the physical addresses you have is difficult; the exchanged notebook has new MAC addresses. 




5.  Take a picture the serial number of your laptop on the bottom and keep it. It will help you to find the lost notebook.

The most important thing is that you should not lose your laptop and that you should make a periodic backup of your significant data.

Thursday, July 4, 2013

Important Elements in Setting Up a Wireless Router

When using a wireless router, you should set up a new SSID (Service Set Identifier) and a password; you can change them on the admin website your router company offers. If reading a manual, you can find the web address. Here are the steps about how to set up your wireless router with security.
  
1.  After logging on the admin page, go to the menu of wireless setting: use a ID and password written in the manual.

2. Change SSID and set up a password.

3. Choose a channel with an automatic or a manual way. If your Internet speed is slow, try to change a different channel with the manual way. Select one of channels (1, 6, and 11): the three channels are best and aren't disturbed. The U.S.A. allows channels from 1 to 11.

4. Select WPA-PSK2 (AES) because the setting of security is important: WPA-PSK stands for WiFi Protected Access-Pre-shared Key and AES stands for Advanced Encryption Standard. Security of WPA-PSK2 is more strengthened than that of WPA-PSK. If your router doesn't offer WPA-PSK2, choose WPA-PSK (AES) between AES and TKIP (Temporal Key Integrity Protocol). AES is better than TKIP in security. Avoid selecting WEP (Wired Equivalent Privacy) because its security is so weak that you can be hacked into.