Category Archives: Information technology

ip address IPv4 IPv6 public ip private ip APIPA Static Dynamic ip classes

Structure of IP (Internet Protocol) addresses (IPv4, IPv6).

Systems that have interfaces to more than one network require a unique IP address for each network interface. The first part of an Internet address identifies the network on which the host resides, while the second part identifies the particular host on the given network. This creates the two-level addressing hierarchy.

The leading portion of each IP address identifies the network prefix. All hosts on a given network share the samenetwork prefix but must have a unique host number. Similarly, any two hosts on different networks must have differentnetwork prefixes but may have the same host number.

An IP is a 32-bit number comprised of a host number and a network prefix, both of which are used to uniquely identify each node within a network. A shortage of available IP addresses has prompted the creation of an addressing scheme known as Classless Inter-Domain Routing (CIDR). Among other capabilities, CIDR allows one IP address to designate many unique IP addresses within a network. In addition, the current version of the IP address, IPv4, is being upgraded to IPv6. The latter uses a 128-bit address, allowing for 2128 total IP addresses, as opposed to IPv4’s 232.

Internet Protocol version 4

IPv4 addresses are 32 bits in length. To make these addresses more readable, they are broken up into 4 bytes, or octets, where any 2 bytes are separated by a period. This is commonly referred to as dotted decimal notation.

Here’s a simple example of an IP address:

An additional value, called a subnet mask, determines the boundary between the network and host components of an address. When comparing IP addresses to other protocols’ addressing schemes, TCP/IP addressing seems the mostcomplicated.

Internet Protocol version 6 (IPv6)

Whereas IPv4 addresses use a dotted-decimal format, where each byte ranges from 0 to 255.
IPv6 addresses use eight sets of four hexadecimal addresses (16 bits in each set), separated by a colon (:),

like this: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx (x would be a hexadecimal value).
This notation is commonly called string notation.

  • Hexadecimal values can be displayed in either lower- or upper-case for the numbers A–F.
  • A leading zero in a set of numbers can be omitted; for example, you could either enter0012 or 12 in one of the eight fields—both are correct.
  • If you have successive fields of zeroes in an IPv6 address, you can represent them as two colons (::). For example, 0:0:0:0:0:0:0:5 could be represented as ::5; andABC:567:0:0:8888:9999:1111:0 could be represented as ABC:567::8888:9999:1111:0. However, you can only do this once in the address: ABC::567::891::00 would be invalid since :: appears more than once in the address. The reason for this limitation is that if you had two or more repetitions, you wouldn’t know how many sets of zeroes were being omitted from each part.
  • An unspecified address is represented as ::, since it contains all zeroes.

Classful IP (Internet Protocol) Ranges and Their Subnet Masks

When dealing with IP addresses, the address is broken into two components:

Network component Defines on what segment, in the network, a device is located

Host component Defines the specific device on a particular network segment

The network number uniquely identifies a segment in the network and a host number uniquely identifies a device on a segment. The combination of these two numbers must be unique throughout the entire network. TCP/IP uses the same two components for addressing, but it adds a twist by breaking up network numbers into five classes: A, B, C, D, and E. Each of these classes has a predefined network and host boundary:

  • Class A address,The first byte is a network number (8 bits) and the last 3 bytes are for host numbers (24 bits).

  • Class B address ,The first 2 bytes are a networknumber (16 bits) and the last 2 bytes are for host numbers (16 bits).

  • Class C address ,The first 3 bytes are a networknumber (24 bits) and the last 1 byte is for host numbers (8 bits).

  • Class D and E ,addresses Class D Used for multicasting and Class E addresses are reserved.

What distinguishes the different classes of addresses are the settings to which the first bit to 5 bits are set:

  • Class A addresses always begin with a 0 in the highest order bit.
  • Class B addresses always begin with 10 in the highest order bits.
  • Class C addresses always begin with 110 in the highest order bits.
  • Class D addresses always begin with 1110 in the highest order bits.
  • Class E addresses always begin with 11110 in the highest order bits.

When talking about the highest order bit or bits, this includes all 32 bits. Therefore, this would be the very first bit on the left of the address (the most significant bit). If the first octet contains 1000001, this represents 129 in decimal, which would be a Class B address. Given these distinctions with the assigned high order bit values, it is easy to predict, for a given address, to what class of network numbers it belongs:

Class A addresses range from  1-126:   00000001-01111111
Class B addresses range from 128-191:  10000000-10111111
Class C addresses range from 192-223:  11000000-11011111
Class D addresses range from 224-239:  11100000-11101111
Class E addresses range from 240-254:

0 is reserved and represents all IP addresses;
127 is a reserved address and is used for loop back tasting:
255 is a reserved address and is used for broadcasting purposes.

Given these restrictions with beginning bit values, it is fairly easy to predict what address belongs to what class. Simply look at the first number in the dotted-decimal notation and see which range it falls into.

When you are dealing with IP addresses, two numbers are always reserved for each network number:

The first address in the network represents the network’s address, and the last address in the networkrepresents the broadcast address for this network,called directed broadcast.

When you look at IP itself, two IP addresses are reserved: (the very first address), which represents all IP addresses, and (the very last address), which is the local broadcast address.

Purpose of subnetting.

Subnetting allows you to break up and use an addressing space more efficiently. Basically, subnetting steals the higher-order bit or bits from the host component and uses these bits to create more subnets with a smaller number of host addresses in each of these subnets.

Subnet masks are 32 bits long and are typically represented in dotted-decimal (such as or the number of networking bits (such as /24). The networking bits in a mask must be contiguous and the host bits in the subnet mask must be contiguous. is an invalid mask. A subnet mask is used to mask a portion of the IP address, so that TCP/IP can tell the difference between the network ID and the host ID. TCP/IP uses the subnet mask to determine whether the destination is on a local or remote network.

Advantages of subnetting a network include the following:

  • Reducing network colision by limiting the range of broadcasts using routers
  • Enabling different networking architectures to be joined

Differences between private and public network addressing schemes.

As to assigning addresses to devices, two general types of addresses can be used: public and private.

Public addresses

Public addresses are Class A, B, and C addresses that can be used to access devices in other public networks, such as the Internet. The Internet Assigned Numbers Authority (IANA) is ultimately responsible for handing out and managing public addresses. Normally you get public addresses directly from your ISP, which, in turn, requests them from one of five upstream address registries:

  • American Registry for Internet Numbers (ARIN)
  • Reseaux IP Europeans Network Coordination Center (RIPE NCC)
  • Asia Pacific Registry for Internet Numbers (APNIC)
  • Latin American and Caribbean Internet Address Registry (LACNIC)
  • African Network Information Centre (AfriNIC)

Private Addresses


Within the range of addresses for Class A, B, and C addresses are some reserved addresses, commonly called private addresses. Anyone can use private addresses; however, this creates a problem if you want to access the Internet.Remember that each device in the network (in this case, this includes the Internet) must have a unique IP address. If two networks are using the same private addresses, you would run into reachability issues. To access the Internet, your source IP addresses must have a unique Internet public address. This can be accomplished through address translation. Here is a list of private addresses that are assigned in RFC 1918:

  • Class A:– (1 Class A network)
  • Class B:– (16 Class B networks)
  • Class C:– (256 Class C networks)

IP (Internet Protocol) addressing methods:

Static /Dynamic

Each device in an IP network is either assigned a permanent address (static) by the network administrator or is assigned a temporary address (dynamic) via DHCP software. Routers, firewalls and proxy servers use static addresses as do most servers and printers that serve multiple users. Client machines may use static or dynamic IP addresses. The IP address assigned to your service by your cable or DSL Internet provider is typically dynamic IP. In routers and operating systems, the default configuration for clients is dynamic IP.


DHCP stands for Dynamic Host Configuration Protocol. This protocol assigns network IP addresses to clients on the network at startup. With DHCP, each client workstation does not need to be set up with a static IP address. DHCP is recommended on large networks. It would be very time consuming to manually assign a static IP address to every workstation on your network.

With static IP addressing, the IP address that you assign to a device never changes. A DHCP server contains a pool of IP addresses that it can draw from to assign to devices that are connecting to the network. Other TCP/IP properties, such as default gateways, DNS servers, and subnet masks can also be assigned automatically.

Self-assigned (APIPA (Automatic Private Internet Protocol Addressing))

Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.

Using APIPA, a Windows based client assigns itself an IP address from a range reserved for authorized private class B network addresses ( through, with a subnet mask of A computer with an authorized private address cannot directly communicate with hosts outside its subnet, including Internet hosts.

APIPA is most suitable for small, single-subnet networks, such as a home or small office. APIPA is enabled by default if no DHCP servers are available on the network.

Note APIPA assigns only an IP address and subnet mask; it does not assign a default gateway, nor does it assign the IP addresses of DNS or WINS servers. Use APIPA only on a single-subnet network that contains no routers. If your small office or home office network is connected to the Internet or a private intranet, do not use APIPA.

Leave a comment

Posted by on November 13, 2011 in Information technology


How to Remove XP VISTA Window7 Server 2003 Server 2008 Password step by step guide

Remove XP VISTA Window7 Server 2003 Server 2008 Password and Syskey

How many times you have to reinstall window due to forget password of administrator or syskey? In lab scenario it’s very common. Consider a situation where students form one batch was doing the practical on Server. They have setadministrator password in all system and left the lab after the practical without telling you the password of Syskey and administrator. What will you do now? Format all systems No. we are telling you the way to reset the password and Syskey on window again.

For demonstration purpose we are setting Syskey and administrator password on one computer.

To set Syskey password


Open window and click on start button and go to run options

Type Syskey in run menu and press enter. This will invoke new windows.

set syskey password

Now click on update button and set the desired passwords.

set syskey password

Click on apply and ok.

set syskey password

Remove Syskey and administrator passwords form XP VISTA Server 2003 and Server 2008.

  • Download this software
  • Extract this winrar files. It’s a image file.
  • You can write this image with any image burning software. We are using our traditional software Nero.
  • Now go to the system and boot form this CD.

Press Enter on boot options.

remove syskey and administrator password

This window bootable Linux scripts will search your entire hard disk and show all the available partitions on hard disk.

remove syskey and administrator password

Select your windows partitions.

Now it will locate windows registry and sam files paths.

remove syskey and administrator password

Press enter to accept the default value.

Now you four options to do

  • To reset windows user passwords press 1
  • To reset Syskey press 2
  • To use recovery console to repair windows press 3
  • To reset registry press 9
  • To quit for selection windows press q

We will first reset Syskey so press 2 and enter.

remove syskey and administrator password

Scripts will confirm to disable Syskey. Press y and enter to confirm.

remove syskey and administrator password

Now we will reset windows administrator password.

To reset administrator password press 1 and enter.

remove syskey and administrator password

Select the user to whom password you want to reset. In our example we are resetting user Vinita’s password.

remove syskey and administrator password

Now press 1 and enter to clear the user password.

remove syskey and administrator password

Press ! sign and enter to come back on pervious menu.

remove syskey and administrator password

Press q to quit form menu.

Whatever change you have made till now will not save by defaults. To save these change scripts will drop in step4.

remove syskey and administrator password

Press y and enter to save the change you have made so far.

Now press ALT + CTRL + DEL to restart the system.

Leave a comment

Posted by on November 11, 2011 in Information technology


How to Create Answer File for windows xp pro unattended cd

Step by Step Guide to

Makes Answer File For Windows XP pro Unattended CD

At several points during a standard installation, Setup requires that the user provide information, such as the time zone, network settings, and so on. One way to automate an installation is to create an answer file that supplies the required information. Answer files are really just text files that contain responses to some, or all, of the questions that Setup asks during the installation process. After creating an answer file, you can apply it to as many computers as necessary.
To create answer files you need Setupmgr.exe The Windows Setup Manager Wizard tool.

What is Setupmgr.exe ?

Setupmgr.exe stands for Windows Setup Manager.
Its provides a wizard-based interface that allows you to quickly create an answer file for an unattended installation of Windows XP Professional. Windows Setup Manager enables you to create scripts to perform customized installationson workstations and servers that meet the specific hardware and network requirements of your organization.

Creating Answer File


  • Create a new folder and rename it with deploys tools
  • Insert the Windows XP Professional CD in the CD-ROM drive.
  • If the Welcome To Microsoft Windows XP screen is displayed automatically, click Exit to close that screen.
  • Now go on my computers select CD drive and choose open options from right clicks

locate the \Support\Tools\ files on the Windows XP Professional CD-ROM
deploy tools

Copy this file and paste it in deploy tools folder created in first steps

Now right click on it and select extract all options
extract deploy tools

Delete all other files expect Setupmgr.exe

Double click on Setupmgr.exe

Windows XP Professional starts the Windows Setup Manager Wizard. Click Next.

Select Create A New Answer File options and then click Next

Select Windows Unattended Installation and then click Next

Select Windows XP Professional and then click Next

Select Fully Automated, and then click Next

Select No, This Answer File Will Be Used To Install From A CD, and then click Next

Select I Accept The Terms Of The License Agreement, and then click Next

Type your name in the Name box and your organization in the Organization box, and then click Next

Leave the default settings on the Display Settings page, and then click Next

Select the appropriate time zone, and then click Next

Type in the appropriate product key and Click Next

In the Computer Name text box, type a name for the computer, and then click Add. Repeat this step to add additional computers to the installation and Click Next.

Gives Administrator Password In Answer File, and then click Next

Select Typical Settings and Click Next

Select Workgroup and Click Next

Leave default setting and click next

Leave default setting and click next

Leave default setting and click next

Leave default setting and click next

Leave default setting and click next

Leave default setting and click next

Leave Blank and click next

Leave Blank and click next

Leave Blank and click next

Give the location of desktop and click next

Congratulations ! you have successfully created the answer file. In our next step we will learn how to make windows XP pro unattended CD from this answer files.

Leave a comment

Posted by on November 11, 2011 in Information technology


How to Configure Outlook Express With Hotmail Accounts

Configure hotmail account with outlook.

Only paid Hotmail accounts work correctly with Microsoft Outlook Express. Outlook 2003 and Outlook 2007 can use the Outlook Connector to access a free Hotmail account.After you configure Microsoft Outlook Express or Microsoft Outlook to access you…After you configure Microsoft Outlook Express or Microsoft Outlook to access your Hotmail account, you receive the following error message when you try to download your Hotmail folders or when you try to send and receive e-mail messages:

Unknown Error

If you click Details, the following error details appear:
HTTPMAIL: 10:09:18 [rx]

HTTP/1.1 402 Access to Hotmail via Outlook & Outlook Express now requires a subscription. Please sign up at If you are running Outlook Express on a Microsoft Windows XP Service Pack 2 (SP2)-based computer, you receive the following error message:
Could not connect to Hotmail as

Hotmail no longer allows email access via Outlook Express for free Hotmail/MSN accounts.

To resolve this issue

  • Use Method 1 for Outlook Express.
  • Use Method 2 for Outlook 2003 and for Outlook 2007.

Method 1: Use Windows Live Mail instead of Outlook Express

Windows Live Mail is an e-mail program that you install on your computer. Windows Live Mail stores messages on your computer. This means that you can access, read, and compose e-mail messages even when you are not connected to the Internet. After you connect, Windows Live Mail will send and receive messages and update your accounts. Windows Live Mail works with popular Web-based e-mail services such as Hotmail, AOL mail, Google mail, and Yahoo! mail. Windows Live Mail is built to automatically configure many popular e-mail services. To install Windows Live Mail, visit the following Microsoft Web site:

Method 2: Use Outlook 2003 and Outlook 2007 together with the Outlook Connector

  • Exit Outlook.
  • Download and install the Outlook Connector
  • When prompted to open or save the file, click Open.
  • When prompted to run the software, click Run.

out look connector

You may see a security prompt, depending on which operating system or Web browser you use. If you see such a dialog box, you must click the option to continue with the installation.

5. Follow the instructions on your screen to complete the installation.
6.The next time you start Outlook, you are prompted to configure the Outlook Connector. Enter the following information:
and Click OK.

  • Your e-mail address
  • Your password
  • Your name as you want it to appear in the receiver’s Inbox


 configure outlook

After Outlook opens, your Windows Live Hotmail account appears in the Navigation Pane (Navigation Pane: The column on the left side of the Outlook window that includes panes such as Shortcuts or Mail and the shortcuts or folders within each pane. Click a folder to show the items in the folder.)

 outlook with hotmail account
Synchronize you mail Click on send/receive

configure outlook

view the status of your account click on Server status


Add an additional Windows Live Hotmail account


  • On the Outlook Connector menu, click Add a New Account.
    ( Note:- The Outlook Connector menu only appears if the Outlook Connector is installed.)
  • Enter the following information:
  1. Your e-mail address
  2. Your password
  3. Your name as you want it to appear in the receiver’s Inbox
  • Click OK.
  • A dialog box appears to notify you that you must exit and restart Outlook to see the new account. Click OK.


Remove a Windows Live Hotmail account

Follow the instructions for the version of Office Outlook you are using.

Office Outlook 2007

  • On the Tools menu, click Account Settings.
    On the E-mail tab, click the Windows Live Hotmail account you want to remove.
  • Click Remove.
  • Click Yes to confirm that you want to remove the account.
  • Click Close.

Office Outlook 2003

  • On the Tools menu, click E-mail Accounts.
  • Select View or change existing e-mail accounts, and then click Next.
  • On the E-mail tab, click the Windows Live Hotmail account, and then click Remove.
  • Click Yes to confirm that you want to remove the account.
  • Click Finish.


Update a Windows Live Hotmail account password

If you change your Windows Live Hotmail account password, you must also update the information in Outlook. You first change your password at the Windows Live Hotmail Web site, and then you update the password that is saved in Outlook.
Follow the instructions for the version of Office Outlook you are using.

Office Outlook 2007

  • On the Tools menu, click Account Settings.
  • On the E-mail tab, click the Windows Live Hotmail account you want to update.
  • Click Change.
  • On the E-mail tab, click the Windows Live Hotmail account, and then click Change.
  • In the Password box, type your new password.
  • Click OK.
  • On the Account Settings dialog box, click Close.

Office Outlook 2003

  • On the Tools menu, click E-mail Accounts.
  • Select View or change existing e-mail accounts, and then click Next.
  • On the E-mail tab, click the Windows Live Hotmail account, and then click Change.
  • In the Password box, type your new password.
  • Click OK.
  • On the E-mail Accounts dialog box, click Finish.


To remove Outlookconnector:


  • On the Start menu, point to Settings and then click Control Panel.
  • Double-click Add/Remove Programs.
  • In the list of currently installed programs, select Microsoft Office Outlook Connector and then click Remove or Add/Remove.
  • If a dialog box appears, follow the instructions to remove the program.
  • Click Yes or OK to confirm that you want to remove the program.


1 Comment

Posted by on November 11, 2011 in Information technology


How to configure Gmail With Microsoft outlook Express

How to configure Gmail With Microsoft outlook Express Step by Step Guide

Outlook Express is easily the most popular Windows e-mail program. One reason for its popularity, of course, is that it is built into every Windows operating system. Outlook Express is easy to use and easy to upgrade.

Enabling POP

You can retrieve your Gmail messages with a client or device that supports POP, like Microsoft Outlook or NetscapeMail.
To enable POP in Gmail:

  • Sign in to Gmail.
  • Click Settings at the top of any Gmail page.


Click Forwarding and POP/IMAP
enable gmail forward

  • Select Enable POP for all mail or Enable POP for mail that arrives from now on.
  • Choose the action you’d like your Gmail messages to take after they are accessed with POP.

Configure your POP client* and click Save Changes

To set up your Outlook Express client to work with Gmail:


  • Open Outlook or Outlook Express.
  • Click the Tools menu, and select Accounts…
  • Click Add and then click Mail…


configure gmail with outlook


  • Enter your name in the Display name: field, and click Next.
  • Enter your full Gmail email address ( in the Email address: field, and click Next.


Enter in the Incoming mail (POP3, IMAP or HTTP) server: field. Enter in the Outgoing mail (SMTP) server: field.

configure gmail with outlook


  • Click Next.
  • Enter your Gmail username (including ‘’) in the Account name: field. Enter your Gmail password in the Password field:, and click Next


configure gmail with outlook


  • Click Finish.
  • Highlight under Account, and click Properties.



  • Click the Advanced tab.
  • Fill in the following information:
  • Check the box next toThis server requires a secure connection (SSL) under Outgoing Mail (SMTP).
  • Enter 465 in the Outgoing mail (SMTP): field.
  • Under Outgoing Mail (SMTP), check the box next toThis server requires a secure connection (SSL).
  • Under Incoming mail (POP3), check the box next to This server requires a secure connection (SSL). The port will change to 995.


Return to the Servers tab, and check the box next to My server requires authentication.
Click OK.

Congratulations! You’re done configuring your client to send and retrieve Gmail messages.

Outlook can generate a number of errors if improperly configured or not up to date. We tried to list some common error you may face while configuring the Gmail.

Gmail Error Message

Repeatedly prompted for your username and password or 'invalid credentials' error.

Enable POP in Gmail. Clear the captcha. If you’re a Google Apps user, visit
Be sure to replace ‘’ with your actual domain name.

Gmail Error Message

The connection to the server has failed. Account: 'Gmail', Server: '', Protocol: POP3, Port: 110, Secure(SSL): Yes, Socket Error: 10060, Error Number: 0x800CCC0E.

On the Advanced tab of your POP client, set Incoming mail (POP3): to 995.

Gmail Error Message

The message could not be sent because the server rejected the sender's e-mail address. The sender's e-mail address was ''. Subject 'example', Account: '', Server: '', Protocol: SMTP, Server Response: '530 5.5.1 Authentication Required f45sm8616pyh', Port: 25, Secure(SSL): Yes, Server Error: 530, Error Number: 0x800CCC78.

On the Servers tab of your POP client, Enable My server requires authentication beneath Outgoing Mail Server.

Gmail Error Message

Your server has unexpectedly terminated the connection. Possible causes for this include server problems, network problems, or a long period of inactivity. Account: '', Server: '', Protocol: POP3, Port: 995, Secure(SSL): No, Error Number: 0x800CCC0F.

On the Advanced tab of your POP client, enable This server requires an encrypted connection (SSL) for the POP server.

Gmail Error Message

Your SMTP server has not responded in 60 seconds. Would you like to wait another 60 seconds for the server to respond? A time-out occurred while communicating with the server. Account: '', Server: '', Protocol: SMTP, Port: 465, Secure(SSL): No, Error Number: 0x800CCC19.

On the Advanced tab of your POP client, enable This server requires an encrypted connection (SSL) for the SMTP server.

Gmail Error Message

The host '' could not be found. Please verify that you have entered the server name correctly. Account: '', Server: '', Protocol: SMTP, Port: 465, Secure(SSL): Yes, Socket Error: 11001, Error Number: 0x800CCC0D.

On the Servers tab, change to

Gmail Error Message

An unknown error has occurred. Account: 'Gmail', Server: '', Protocol: POP3, Port: 995, Secure(SSL): Yes, Error Number: 0x800C0133.

In your POP client, click File > Folder > Compress All Folders.

Leave a comment

Posted by on November 11, 2011 in Information technology


How to configure Remote Assistance Step By Step Guide

The days of traveling to each client system to troubleshoot problems are over. Microsoft’s native Windows XP assistance tool is all that is required. Follow these steps to configure and enable Windows XP’s Remote Assistance.

Sending a remote assistance request

Windows XP’s Remote Assistance feature enables users to call for help. The application proves particularly helpful when clients in remote locations require support.

Before an administrator can render assistance, the end user must send a Remote Assistance request to the administrator.
Clients should follow these steps to send a Remote Assistance request:

  • Click Start.
  • Click Help and Support.

Remote assistance

Select the Invite A Friend To Connect To Your Computer With Remote Assistancelink (found beneath the Ask For Assistance heading). The Remote Assistance menu appears.

Click the Invite Someone To Help You link.

Three options appear; users seeking help can either send an invitation through Windows Messenger or Microsoft Outlook or save invitation .

Click on save invitation as a file (Advance)

You should enter your name and set the invitation’s expiration period and clickContinue.

You should specify a location for the remote assistance file and click Save.

Windows will save the remote connection file (named RAInvitation.msrcincident by default) to the location the end user species;

you will then have to forward it to the administrator or support technician.

login from your e-mail account

Aattach invitation and send mail

Administrator should login from his e-mail account

Open the mail contaning invation

Now download the invitation 

Once the remote assistance invitation is downloaded, administrators can follow these steps to render assistance:

  • To accept the Remote Assistance invitation, the administrator should double-click theattachment. Before doing so, it’s a good idea for the administrator to confirm the user, in fact, sent the request. When doing so, the administrator can learn the password the client entered for the remote assistance request.
  • Upon double-clicking the attachment, the administrator will have to supply the password and click OK


The client will receive a dialog box stating that the administrator wishes to connect to the user’s desktop. The client must click Yes to enable the connection. 

Now administrator can provide text base help 

  • If the administrator wishes to take control of the user’s system, the administrator can click the Take Controlicon that appears at the top of the Remote Assistance window.
  • Once the administrator or support technician has clicked Take Control, the end user will see a dialog box stating that the user providing the assistance would like to share control of the computer to help solve the problem. The user must click Yes to permit the support tech with access. When the remote user clicks Yes, the staff member providing support will receive a confirmation message stating the helper is now in control of the user’s desktop. To surrender desktop control, the administrator need only press the Esc key; the end user can terminate the administrator’s control at any time by Pressing the Esc key (or disconnecting the session using the Disconnect button from the Remote Assistance menu).

Having the ability to view or actually control a remote user’s desktop drastically simplifies troubleshooting and repair operations. All the end user must do is send the Remote Assistance request to an administrator. The administrator or support tech needs only to connect to the remote system and perform diagnostic actions and repairs. The user and support tech can exchange chat messages with one another using the provided window.

Confirming proper firewall configuration

Occasionally Remote Assistance connections fail to connect. A typical culprit, ironically, is Windows’ own firewall. Note that the Windows Firewall (installed by default with Windows XP Service Pack 2) must be properly configured to enable connectivity.
Follow these steps to confirm Windows Firewall isn’t blocking Remote Assistance connections:

  • Click Start.
  • Click Control Panel.
  • Click Windows Firewall.
  • Select the Exceptions tab.
  • Ensure the Remote Assistance box is checked.


Leave a comment

Posted by on November 11, 2011 in Information technology


How to configure netmeeting window net meeting step by step guide example

How to configure Configuring NetMeeting

NetMeeting 3.0 is built in to all copies of Windows XP. However, it needs to be configured to use it.
To configure NetMeeting:

  • Click Start and select Run:
  • In Run box, type conf.exe and click OK
  • In the NetMeeting window, click Next
  • Fill in your name, email address, and location info, then click Next
  • Click off “Log on to directory server when NetMeeting starts”, then click Next
  • Select the network connection you are using, then click Next (On campus, select Local Area Network)
  • Select “Put a shortcut to NetMeeting on my desktop”, and click Next.
  • In Audio Tuning Wizard window, click Next.
  • In Audio Tuning Wizard window, adjust the speaker or headphone volume and click Next.
  • When finished adjusting settings, click Finish.

NetMeeting setup is now complete. NetMeeting will then start, and an icon will be displayed on the desktop. (During startup, if Windows XP Firewall attempts to block NetMeeting, click Unblock.

The NetMeeting main window will then appear


Finding Your IP Address

Connections in NetMeeting are done through IP addresses. You need to know your IP Address. To find out your IP Address:

  • Click on Start button, select Run
  • Type command and click OK
  • In the window that appears, type ipconfig and press the Enter key
  • Your IP Address will be displayed in the window (eg. (Write down your IP Address)
  • To close the window, type Exit and press the Enter key.

Alternatively, in the NetMeeting main window, click Help, then select “About Windows NetMeeting”. Your IP Address will be displayed in the window.

Starting NetMeeting

You can connect individually or to a group.
To start NetMeeting:

  • Click the NetMeeting shortcut icon on your desktop

The NetMeeting main window will appear.

Placing a Call

Click the Place Call button. Enter the IP Address of the person or meeting you want to connect to.


Receiving a call

When another person is calling you NetMeeting will display the following screen:
Click Accept to begin the call.

Hosting and Joining Meetings

To host a meeting:

  • In the Call menu, select Host Meeting.
  • In Meeting Name, type the meeting name or leave it set to Personal Conference.
  • To monitor who joins the meeting, click the “Only you can accept incoming calls” check box.
  • To restrict participants from inviting other people, click the “Only you can place outgoing calls” check box. and Click OK


Using Chat

With chat you can communicate with an individual or a group by text messaging. These conversations can be saved as a richtext file for later reference. Options such as “Whisper” mode allow private messages between the host and an individual during a group session. To open a chat session:

Click the Chat button.

Using Whiteboard

With Whiteboard you can review, create and update graphic information. This option allows you to load saved Whiteboard pages into a conference by dragging and dropping the saved pages into the Whiteboard window. To open Whiteboard:

Click the Whiteboard button.

Sharing Programs

Shared Programs allows meeting participants to view and work on files together even if they do not have the program. Only one participant at a time can be in control of the shared program.
To share a program:

  • Click the Share Program button.
  • Select the program you wish to share.
  • Choose who you want to share the program with.
  • Click Share.


You can also share your computer desktop in order to share your entire computer with participants. To stop sharing, click Unshare in the Sharing dialog box.

Remote Desktop Sharing

Remote Desktop Sharing allows you to access a computer from another computer at another location. To use Remote Desktop Sharing, you activate it and then close NetMeeting.

To set up Remote Desktop Sharing:

  • Under Tools on the menu bar, select Remote Desktop Sharing.
  • In the Remote Desktop Sharing Wizard, click Next.
  • In the Remote Desktop Sharing Wizard, click Yes, enable password-protected screen saver.
  • Click Finish.

To activate Remote Desktop Sharing on the computer:

  • Note the computer’s IP Address .
  • Under Call on the menu bar, select Exit.

To connect to the computer from a second location:

  • Click the Call button in NetMeeting.
  • In “To”, type in the computer’s IP Address.
  • Type in your password.

The remote desktop will appear on the second computer.

To end Remote Desktop Sharing:

  • On the computer being accessed, click Start.
  • Select either Log Off or Turn Off.

Transferring Files

Files can also be transferred in the background while in a NetMeeting conference and can be sent either to an individual or a group.
To transfer a file:

  • Click the Transfer Files button.
  • Click the Add File button.
  • Select the desired files.
  • Choose the people you wish to send the file to (if you wish to send the file to everyone in the meeting, click All).
  • Click Send All button to transfer the files.



Configuring Settings

To configure NetMeeting’s video and audio options:
* Under the Tools menu, select Options.
The Options dialog box will appear.

For video settings:

* Select the Video Tab

To configure audio options:

* Select the Audio tab

Getting help

For help using Windows NetMeeting, select Help Topics under Help on the menu bar.

Leave a comment

Posted by on November 11, 2011 in Information technology