How to Troubleshooting ADSL Router

August 17, 2006 Add Comment

How to Troubleshooting ADSL Router


There is a common trouble on ADSL router, that my be easy to solve without contact any technical support from ISP provider or hardware vendor. 
Below is common troubleshooting you can use to solve your ADSL Router problem before you contact any technical support

The ADSL Router Is Not Functional


  1. Check to see that the power LED is green and the network cables are connected correctly. Refer to the Quick Installation Guide for more details.
  2. Check to see that the ETH/LAN and PPP/WAN LEDs are green.
  3. Check to see that the DSL LED is green.
  4. Check the settings on your computer. Again, refer to the Quick Installation Guide for more details.
  5. Check the ADSL router’s settings.
  6. From your computer, can you PING the ADSL router? Assuming that the ADSL router has DHCP enabled and your computer is on the same subnet as the gateway, you should be able to PING the gateway.
  7. Can you PING the WAN IP? Your ISP should have provided the IP address of their server. If you can ping the ADSL router and your protocols are configured correctly, you should be able to ping the ISP’s network. If you cannot PING the ISP’s network, make sure you are using the correct protocols with the correct VPI/VCI values.
  8. Make sure NAT is enabled for your connection. If NAT is disabled, the ADSL router
  9. will not route frames correctly (except in Bridge connection).


I Can’t Connect To The ADSL Router.


  1. Check to see that the power LED is green and that the network cables are connected correctly; see the Quick Installation Guide for more details.
  2. Make sure that your computer and the ADSL router are on the same network segment. The ADSL router’s default IP address is 192.168.1.1. If you are running a Windows based computer, you can open a DOS window and type IPCONFIG; make sure that the network adapter that is connected to the gateway is within the same 192.168.1.x subnet.
  3. Also, your computer’s Subnet Mask should match the gateways subnet mask. The gateway has a default subnet mask of 255.255.255.0.
  4. If this still does not work, press the reset button for 10 seconds. This will place the gateway into its factory default state. Go through the previous configurations again.
  5. Make sure NAT is enabled for your connection. If NAT is disabled, the ADSL router will not route frames correctly (except in Bridge connection).


The DSL Link LED Continues To Blink And Does Not Stop


  1. This means that the ADSL is trying to train but for some reason it cannot establish a valid connection. The main cause of this is that you are too far away from the central office. Contact your ADSL Provider for further assistance.
  2. Verify that the telephone cable is connected directly to the telephone wall socket and to the DSL input on the ADSL router.
  3. Make sure that for every parallel phone line connected to telephone or fax is installed with a micro-filter.


Common Problems and Solutions

The DSL Link LED Is Always Off


  1. Make sure you have a ADSL service. You should get some kind of information from your ISP that states that the ADSL service is enabled. You can usually tell if the service is enabled by listening to the phone line; you will hear some high-pitched noise. If you do not hear high-pitched noise, contact your ISP.
  2. Verify that the telephone cable is connected directly to the telephone wall socket and the DSL input on the ADSL router.

Blogger Meta Tag Issue

August 02, 2006 Add Comment

Blogger Meta Tag Issue

BLOGGER LOGO

A couple of comments came in on my post Important Notice to Blogger Blog Owners that made me realize I hadn't included a full description of what I ended up doing.

As a reminder the problem is that Blogger had inserted:
<meta name="ROBOTS" content="NOINDEX,NOFOLLOW"$gt
This tells the Google spider not to index this page.

To get rid of it, you can remove:
<$BlogMetaData$>

However, this also removes a few other lines from your file that includes your autodiscovery of RSS feeds. So, what you really want to do is:



  • Go to your blog
  • View Source - Original
  • See if you have the NOINDEX, NOFOLLOW
  • If you do, then keep that View Source window open
  • Go to Blogger
  • Edit your template and remove the BlogMetaData tag
  • Preview your Blog
  • View Source - with it removed
  • Copy all the lines in the Original that it had been inserting except for the ROBOTS
  • Paste those into your template manually
  • Preview
  • Save

Unfortunately, this means that future changes by Blogger to Meta Data you won't get automatically. Of course, getting NOFOLLOW was a great new feature for them to add.

Note: Blogger logo use to identifications, Learning Purpose, Attractive view purpose.. if blogger.com having objection to use it.. blogger.com have a rights to delete logo without any information or warming. 

Know about Google Robots sites

June 05, 2006 Add Comment

Know about Google bot sites 



Search Engine Roundtable has published a list of bots that belongs to Google. Bots, or robots is a software agents to gather information. Bots and robots from Google are also called web crawlers or spiders in which they are web robots that recursively gather web-page information, as does the bot used by Google (“GoogleBot”).

According to the article, current Google robots that are active including the common GoogleBot (compatible; Googlebot/2.1; +http://www.google.com/bot.html) which is the main spider for the search engine, MediaBot (Mediapartners-Google/2.1) which analyzes web pages with Google AdSense ads to determine relevant ads, ImageBot (Googlebot-Image/1.0) which crawls for the Image Search, AdsBot (AdsBot-Google) which checks Google AdWords landing pages’ quality, Feedfetcher (Feedfetcher-Google) which retrieves rss feeds when users explicitly added them to their Google homepage or Google Reader, Generic Mobile Phone (compatible; Googlebot-Mobile/2.1; +http://www.google.com/bot.html) which translates (or “transcodes”) these pages by analyzing the original HTML code and converting it to a mobile-ready format.

Other robot is Google WAP Proxy (Google WAP Proxy/1.0) which is a bridge for mobile phones to access and adapting to normal web pages via the wap protocol by converting .html to .wml.

ASK Search Engine

June 02, 2006 Add Comment

ASK Search Engine...


Ask.com, formerly Ask Jeeves, is an Internet search engine which also owns variety of popular web sites including country-specific sites for Germany, Italy, Japan, The Netherlands, and Spain plus askforkids.com, teoma.com, excite.com, myway.com, iwon.com, bloglines.com and several others. The combined traffic to its properties places Ask.com in the top ten parent web companies in the US.

Ask.com features support for search based on variety of user queries in plain English (natural language), as well as traditional keyword searching and aims to be more intuitive and user-friendly than other search engines. Ask.com also utilizes technology from teoma.com which clusters web sites according to topic communities, using unique technology which Ask now calls ExpertRank. ExpertRank enables you to, for example, find sites related “ozone layer” when you search for “global warming”.

CNNMoney analyses the business and search functionality of Ask.com and reviews the search engine capabality. It concluded that, in financial effect style, “Ask.com will increase its 6 percent share in the search market, and quickly. IAC/InterActive, whose stock has only suffered while Ask.com has been transforming itself, will likely see that trend reverse as this superb business surges. And finally – while I won’t foreswear Google (or count it out), I will start using Ask.com a lot.”

how to Change or reset Mysql Password

June 02, 2006 Add Comment

how to Change or reset Mysql Password




Other then the ways specified here to reset and change the root password for mySQL database in the case that the password is forgotten or lost, the following instructions explain in details the alternative way at the last part of the guide, where no additional file needs to be created:

Login as root to the Windows or Unix-like (Unix, Linux or BSD) machine with the MySQL server.
Stop the MySQL server by using either of the following command:
Linux: /etc/rc.d/init.d/mysql stop
FreeBSD: /usr/local/etc/rc.d/mysql-server.sh stop

Open the mysql server startup script (i.e. mysql-server.sh – the file executed to start or stop MySQL server.
Add –skip-grant-tables to the end of the line that contains the mysqld_safe command as its parameter.
Start MySQL server with the following command:
Linux: /etc/rc.d/init.d/mysql start
FreeBSD: /usr/local/etc/rc.d/mysql-server.sh start

Alternatively, start the MySQL server directly and skip the editing with the following command:
mysqld_safe –skip-grant-tables &

Depending on your path environment, you may need to point to the correct directory where mysqld_safe is instead.

Run the following commands to login as the mysql user and connect to mysql user/permission database:
# mysql -u root mysql

Run the update queries to change the MySQL password:
mysql> UPDATE user SET Password=PASSWORD(‘newrootpassword’) WHERE User=’root’;
mysql> FLUSH PRIVILEGES;

Note: Replace newrootpassword with the new root password for MySQL server. Flush Privileges is needed to making the password change effect immediately.

Exit mysql database client by typing exit.
Stop MySQL server with commands listed at step 2.
Open the mysql server startup script edit in step 3 again and remove the –skip-grant-tables parameter that has been added.
Start MySQL server by using command from step 5 or 6.
For Redhat Linux users, use the following instructions as the root user of Redhat Linux machine:

Stop MySQL process by using command:
# killall mysqld

Start the MySQL server with following options:
# /usr/libexec/mysqld -Sg –user=root &

Start the MySQL client:
# mysql

You should see the following message:

Welcome to the MySQL monitor. Commands end with ; or g.
Your MySQL connection id is 1 to server version: 3.xx.xx

Type ‘help;’ or ‘h’ for help. Type ‘c’ to clear the buffer.

mysql>

Use mysql database:
mysql> USE mysql

You should see the following message:

Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A

Database changed

Then, update the password for the root user with the following command:
UPDATE user SET password=password(“newpassword”) WHERE user=”root”;

Replace newpassword with your desired password. You should see the following message:

Query OK, 2 rows affected (0.03 sec)
Rows matched: 2 Changed: 2 Warnings: 0

Rows affected may be different, but the Query OK should be there.

Flush the database privileges to reload it in order to make the changes effective:
mysql> flush privileges;

You should get the following result:

Query OK, 0 rows affected (0.02 sec)

Exit the MySQL client by typing exit.
Kill the MySQL server process by typing killall mysqld.
Then start MySQL again:
/etc/init.d/mysqld start

Sky HD TV review

May 28, 2006 Add Comment

Sky HD TV review


Sky High Definition TV (HDTV) is a TV service that broadcast in HD quality in UK by Sky. Broadcast content will be in one of two formats, 720/P/50 for progressively scanned picture or 1080/I/25 for interlaced picture. To view Sky HD a Sky HD set-top box is needed. The set-top box is manufactered by Thompson and features Sky+PVR, has standard component (anolouge), DVI and HDMI connections to enable maximum compliance with customers’ TVs.

Among the first channels that are viewable in High Definition (HD) format, which Sky is offering the service as a premium package, are Sky Sports, Sky One, Sky movies and various Box Office screenings. Beside, the first World Cup match and live HDTV programme to be broadcast will be Germany vs Costa Rica match on 9 June, which will also include match commentary and studio coverage. The feed will come from HBS, Germany’s host broadcasters for the tournament. High-definition images will also be fed into standard digital and analogue transmissions of the game and the Wimbledon Championships, where the BBC is the host broadcaster.

informitv reviewed Sky HD service and concluded that Sky HD represents a dramatic improvement in the technical quality of television that has been long overdue. Despite having the highest penetration of digital television, now in two out of three households, the UK has been surprisingly slow in moving to high-definition.

BSkyB has again adopted a leadership position, with the traditional broadcasting establishment struggling to keep up. The BBC has a target to move all production to high definition by 2010, which does not seem far off. By then most of the country is likely to have digital television.

High-definition is likely to become the new battleground for differentiating digital services, and BSkyB has once again taken the initiative.

Google Web Toolkit Review

May 26, 2006 Add Comment

Google Web Toolkit Review


Google Web Toolkit (GWT) is a Java software development framework that makes writing AJAX applications like Google Maps and Gmail, which similar to Atlas for ASP.NET, Yahoo!’s User Interface Library and Adobe Spry. Google Web Toolkit allows programmers to write the front end in the Java programming language, and the GWT compiler will converts the Java classes to browser-compliant JavaScript and HTML.

For Ajax,Java class library gives you access to the XMLHttpRequest object normally used in AJAX applications. Beside, Java server-side code could be written in addition to client-side code, which doesn’t get converted to JavaScript, and thus the server-side code can use the full capabilities of the Java platform, and any additional class libraries you may require. Then in client-side code, classes that are able to communicate with the server-side code could be set up. When GWT compile the application, GWT will automatically generate all the JavaScript needed to communicate with the server on the client-side, and will compile your server-side code to a set of Java Servlets.

SitePoint concluded that Google has definitely put together an impressive platform with GWT, but as one would expect (especially from a beta product) it’s not perfect. But the biggest thing lacking in GWT is an example of a finished, real-world application running in the wild. No doubt Google is hard at work on its next big project using GWT, but for now at least GWT is unproven technology. The weak points include GWT detects and supports browsers by their user agent string, the bundled GWT widgets make extensive use of tables for layout, GWT was written to work with Java 1.4 or later, the development shell does not support Mac OS X and unclear best practices for security and performance.

Open office Org

May 24, 2006 Add Comment

Open office Org



OpenOffice is a open source and free office suite. Open Office is multilingual and multiplatform office productivity suite which compatible with all other major office suites such as Microsoft Office. Open Office is full-featured office suite too with word processor Writer, spreadsheet Calc, multimedia presentation Impress, graphic manipulation Draw and database application Base, all now greatly improved in features and reliability with the release of version 2.0.2.

rediff reviewed OpenOffice 2.0 and even wrote the review with OpenOffice Write and concluded that the program surely can’t do everything that the Microsoft Office suite can. For instance, there’s no online collaboration or Smart Tags, no grammar check, no highly flexible outlining, smart table formatting or decent hot keys.

Being free software, it has no tech support in the traditional sense (though given the vast Web resources, this argument does not hold much water). Besides, anyone used to Excel is bound to face difficulties with OpenOffice’s Calc.

However, these teething problems are common with any new software (how many of us can exploit even one-tenth of Excel’s features?) Finally, anyone who wants a feature-rich but free office suite should give this option a try.

Opt Out of Windows Live Mail and Get Back to MSN Hotmail Interface

May 23, 2006 Add Comment

Opt Out of Windows Live Mail and Get Back to MSN Hotmail Interface



Windows Live Mail is an major interface and security update to Microsoft’s MSN Hotmail web mail interface by adopting the popular Web 2.0 technologies. Windows Live Mail has a similar user interface with Microsoft Outlook, which is organized into 3 columns, plus a big vertical banner on the right. For those on unsupported browser, there are improved Classic Hotmail version of Windows Live Mail.

If for whatever reasons (such as lack of Firefox support which only been supported from M6 release, or pissed with too much ads space, or simply don’t want to be a beta users) you want to ‘uninstall’ or leave the Windows Live Mail Beta email interface, you can get back to the old MSN Hotmail interface.

To opt out of Windows Live Mail Beta, login to your Windows Live Mail account, click on the Options in the upper right corner of the Windows Live Mail Beta interface. Once you’re in the Options page, click on “Beta opt-out” to stop using Mail Beta.

Or you can opt for Classic Hotmail View by clicking on “Choose inbox layout: Windows Live Mail Experience or Classic Hotmail View”, and then select (check on) “Always use Classic Hotmail View, which includes check boxes and does not have a reading pane. If you use a screen reader, Classic Hotmail View will work better for you.”, and click on “Save”. To go back to Windows Live Mail interface, just check on the “(Recommended) Use Windows Live Mail Experience, which has drag and drop, right click, and the reading pane to quickly view emails. Using Internet Explorer version 6.0 and higher will give you the best experience.” option and click “Save” again.

Nmap Security Scanner in Windows

May 21, 2006 Add Comment

Nmap Security Scanner in Windows


Nmap (Network Mapper) security scanner is a free and open source utility for network exploration or security auditing. Nmap can determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap is a favorite hacker tool to scan for open ports. Best of all, most operating systems are supported by Nmap, including Microsoft Windows.

Nmap was originally a command-line tool for Unix only. Since 2000, a Windows version was released and has since become the second most popular Nmap platform (behind Linux). Although it’s popular, Windows port is still not as stable or as efficent as Nmap on Unix. And Nmap on Windows has some limitations, including it’s not possible to scan host machine (where Nmap is running) by using loopback IP address or registered IP address, only Ethernet network interface is supported (although it includes support for 802.11 wireless network), version detection cannot use SSL scan-through and network scans initiated from Windows often slower than scan initiated from Unix, especially tje connect scan (-sT) because of shortcomings in the Windows networking API.

There are two ways to install Nmap in Windows operating system environment, both of which are available from the download page at http://www.insecure.org/nmap/download.html. Nmap requires the free WinPcap packet capture library which can be obtained from WinPcap. Download and install the latest version of WinPcap (version 3.1 or later). There is an executable installer which automates the installation process.

Command Line Zip Binaries

If you download latest version of Nmap in a zip file format, uncompress the zip-file into the directory you want Nmap to reside in (e.g. “C:\Program Files\”) by using any compression utility such as 7-zip, WinZip and PKZip. A directory called nmap-VERSION will be created, and Nmap executable and data files will be extracted to the folder.

After installing, optionally you may apply the Nmap registry changes for Windows for improved performance by double clicking the nmap_performance.reg file located in the Nmap directory, which will make three registry changes in order to increase the number of ephemeral ports reserved for applications such as Nmap, and decrease the amount of time before a closed connection can be reused.

To use Nmap, just go to the installation folder and execute Nmap. To access Nmap from any directory, add the path to Nmap installation directory to Windows PATH environment variables.

Executable Windows installer

There is also an executable Windows installer for Nmap which is recommended way to install Nmap on Windows machine. The installer can handle WinPcap installation, perform registry performance tweaks, and decompressing the executables and data files into your preferre location, making the installation very easy.

The installer doesn’t add Nmap shortcut to the Programs menu as nmap.exe needed to be run from a DOS command prompt. Only WinPcap appears in the Add/Remove applet in Control Panel. To uninstall and remove Nmap, run the uninstall program in the Nmap folder.

The default install directory is C:\Program Files\Nmap\ but because the installer adds Nmap to the Windows’s PATH environment variable, Nmap can be called and executed from any directory. So to run and test Nmap, open a Command Prompt window and type the following, which will scan the host scanme.insecure.org:

nmap -A -T4 scanme.insecure.org

The A and T4 options enable OS and version detection, and set the timing template to “aggressive.” There are more than a hundred command-line options for Nmap. Note that the command options are case-sensitive.

All error messages when running Nmap on Windows will be wrote into Windows event log for troubleshooting.