Sponsor

filtering and activity reports in Windows Parental Controls

Looking for web filtering and activity reports in Windows Parental Controls?
by : http://windows.microsoft.com


You might have noticed that in Windows 7, web restrictions and activity reports aren’t included in Parental Controls. You can still restrict the sites your kids can visit and see reports of their online activity by adding a service provider in Windows Parental Controls, such as Windows Live Family Safety. With Family Safety, you can set up web filtering and activity monitoring for your kids.

Family Safety Filter
The Family Safety Filter monitors your child’s computer activity and filters the content they can see on the web. It needs to be installed and set up on each computer your children use. To see if you already have the Family Safety Filter installed on your computer, click the Start button, type Windows Live Family Safety in the search box, and see if it appears in the results. If not, you can download and install Windows Live Family Safety a part of Windows Essentials for free.
Picture of screen where you choose Windows accounts to monitor

In the Family Safety Filter, you choose which Windows accounts you want to monitor.

Windows Live Family Safety website
Once you’ve installed the Family Safety Filter, you can use the Family Safety website to do the following, and more:
-Get detailed activity reports. See what websites each of your kids visited (or tried to visit), what programs they used, and how much time they spent on the computer.
Picture of an activity report

See what websites your kids visited, or tried to visit.

-Choose your children’s web filtering level. When you first set up the Family Safety Filter, your child's web filtering level is automatically set to basic. You can change it to strict or custom, and block or allow specific webpages or websites.
Picture of the screen kids see when a website is blocked

Instead of a website with inappropriate content, your child will see this webpage where they can ask permission to see the website.

0 comments:

What happened to Windows Security Center?

What happened to Windows Security Center?


Action Center replaces Windows Security Center in this version of Windows.
Action Center manages firewall settings, Windows Update, antispyware software settings,
Internet security, and User Account control settings. Action Center also monitors computer
maintenance settings and provides links to troubleshooters and other tools that can
help fix problems.
Open Action Center by clicking the Start button Picture of the Start button, clicking Control Panel, and then, 
under System and Security, clicking Review your computer's status.








by : http://windows.microsoft.com/

0 comments:

Allow a program to communicate through Windows Firewall

Allow a program to communicate through Windows Firewall

To allow a program to communicate through Windows Firewall

  1. Open Windows Firewall by clicking the Start button Picture of the Start button, and then clicking Control Panel
    In the search box, type firewall, and then click Windows Firewall.
  2. In the left pane, click Allow a program or feature through Windows Firewall.


    Picture of the left pane of Windows Firewall in Control Panel
    Left pane of Windows Firewall
  3. Click Change settingsAdministrator permission required If you're prompted for an administrator password or confirmation, 
    type the password or provide confirmation.
  4. Select the check box next to the program you want to allow, select the network locations you
    want to allow communication on, and then click OK.

    by : http://windows.microsoft.com/

0 comments:

Remove spyware from your computer

Remove spyware from your computer


If you have spyware or other potentially unwanted software on your computer, you should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually. You might need to use both of these methods more than once to completely remove the spyware or other potentially unwanted software.

Use an antispyware scanner and removal tool

Windows Defender is a feature in this version of Windows that can help prevent spyware and other potentially unwanted software from infecting your computer. When Windows Defender is on, you're notified if spyware and other potentially unwanted software tries to run or install itself on your computer. You choose whether to ignore, quarantine (move to a different location on your computer where it can't run), or remove each item that's detected. For more information, see Scan for spyware and other potentially unwanted software.

Spyware scanners are also frequently included in antivirus programs. If you've already installed an antivirus program, check to see if that program includes spyware protection features or if you can add them as an update, and then scan your computer regularly. For more information about spyware, go online to the Microsoft Security website.

Remove spyware manually

Spyware can sometimes be hard to remove. If an antispyware program notifies you that it can't remove spyware, follow the instructions provided by the antispyware program. If that doesn't work, try these options:

Try installing an antivirus or another antispyware program. Many antivirus programs also come with antispyware protection.

Check Programs and Features for items that don't belong on your computer.

Use this method with extreme caution. Control Panel lists many programs, most of which are not spyware. Many spyware programs use special installation methods to avoid showing up in Programs and Features. Occasionally, a spyware program will offer an uninstall option and can be removed with this method. Only remove programs that you can positively identify as spyware, and don't remove programs that you might want to keep, even if you don't use them very often. For more information, see Uninstall or change a program.

Reinstall Windows.

Some spyware can hide itself so well that it can't be removed. If you still see evidence of spyware after trying to remove it with an antispyware program or after trying to uninstall it using Control Panel, you might need to reinstall Windows and your programs.

Warning
Reinstalling Windows will remove spyware, but it will also delete your files and programs. If you have to reinstall Windows, make sure that you back up your documents and files, and make sure that you have access to the installation discs you'll need to reinstall your programs.

by : http://windows.microsoft.com/

0 comments:

How do I remove a computer virus?

If your computer is infected with a virus, you'll want to remove it as quickly as possible. A fast way to
check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a
free online service that helps you identify and remove viruses, clean up your hard disk, and generally 
improve your computer's performance.
If you're not sure whether your computer has a virus, see How can I tell if my computer has a virus?
to check for some telltale signs. To try a different online scanner, follow the links to other companies
that provide them on the Windows Security software providers webpage.

If you can connect to the Internet

If you can reach a website using your web browser, run an online scan.

To run the Microsoft Safety Scanner

  1. Go to the Microsoft Safety Scanner webpage to download the scanner.
  2. Click Download Now, and then follow the instructions on the screen.

If you can't connect to the Internet

If you can't get to the Microsoft Safety Scanner online, try restarting your computer in safe mode
with networking enabled.

To restart in Safe Mode with networking enabled

  1. Restart your computer.
  2. When you see the computer manufacturer's logo, repeatedly press the F8 key until the
    Advanced Boot Options screen appears.
  3. On the Advanced Boot Options screen, use the arrow keys to highlight Safe Mode 
    with Networking, and then press Enter.
  4. Log on to your computer with a user account that has administrator rights.
  5. Follow the steps above to run the Microsoft Safety Scanner.
For more information about different startup modes, see Start your computer in safe mode.
If you still can't access the Internet after restarting in safe mode, try resetting your
Internet Explorer proxy settings. The following steps reset the proxy settings in the
Windows‌ registry so that you can access the Internet again.

To reset Internet Explorer proxy settings

  1. In Windows 7, click the Start button Picture of the Start button. In the search box, type run, and then,
    in the list of results, click Run.
    -or-
    In Windows Vista, click the Start button Picture of Start button, and then click Run.
    -or-
    In Windows XP, click Start, and then click Run.
  2. Copy and paste or type the following text in the Open box in the Run dialog box:
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" 
    /v ProxyEnable /t REG_DWORD /d 0 /f
  3. Click OK.
  4. In Windows 7, click the Start button Picture of the Start button. In the search box, type run, and then,
    in the list of results, click Run.
    -or-
    In Windows Vista, click the Start button Picture of Start button, and then click Run.
    -or-
    In Windows XP, click Start, and then click Run.
  5. Copy and paste or type the following text in the Open box in the Run dialog box:
    reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" 
    /v ProxyServer /f
  6. Click OK.
Restart Internet Explorer and then follow the steps listed previously to run the scanner.

Remove a virus manually

Sometimes a virus must be removed manually. This can become a technical process that
you should only undertake if you have experience with the Windows registry and know
how to view and delete system and program files in Windows.
First, identify the virus by name by running your antivirus program. If you don't have an
antivirus program or if your program doesn't detect the virus, you might still be able
to identify it by looking for clues about how it behaves. Write down the words in
any messages it displays or, if you received the virus in email, write down the subject
line or name of the file attached to the message. Then search an antivirus vendor's
website for references to what you wrote down to try to find the name of the virus and
instructions for how to remove it.

Recovery and prevention

After the virus is removed, you might need to reinstall some software or restore lost information.
Doing regular backups on your files can help you avoid data loss if your computer becomes
infected again. If you haven't kept backups in the past, we recommend that you start now.


by : http://windows.microsoft.com/

0 comments:

What should I do if Microsoft Security Essentials detects malicious


If Microsoft Security Essentials detects malicious software or potentially unwanted software
on your PC (either when monitoring your PC using real-time protection or after running a scan),
it notifies you about the detected item by displaying a message in the notification area to the right
 of the taskbar.
In some cases, Microsoft Security Essentials takes automatic action to remove malicious software from
your PC, and will notify you that it is doing so. In other cases, Microsoft Security Essentials will show
you a notification that malicious or potentially unwanted software has been detected.
Click Clean computer to remove the software, or click Show details to open
the Potential threat details window and get additional information about the detected item.
If you need help determining which action to apply to the detected item, use the alert level
that Microsoft Security Essentials assigned to the item as your guide (for more information,
see Alert levels in Microsoft Security Essentials).
Alert levels help you choose how to respond to viruses, spyware, and other potentially unwanted
software. While Microsoft Security Essentials will recommend that you remove all viruses and spyware,
not all software that is flagged is malicious or unwanted. The following information can help you
decide what to do if Microsoft Security Essentials detects potentially unwanted software on your PC.
Depending on the alert level, you can choose one of the following actions to apply to the detected item:
  • Remove—This action permanently deletes the software from your PC.
  • Quarantine—This action quarantines the software so that it can't run.
    When Microsoft Security Essentials quarantines software, it moves
    it to another location on your PC, and then prevents the software from
    running until you choose to restore it or remove it.
  • Allow—This action adds the software to the Microsoft Security Essentials
    allowed list and allows it to run on your PC. Microsoft Security Essentials
    will stop alerting you to risks that the software might pose to your privacy or to your PC.
Caution:
If you choose Allow for an item, such as software, Microsoft Security Essentials will stop
alerting you to risks that the software might pose to your privacy or to your PC.
Therefore, add software to the allowed list only if you trust the software and the software publisher.

http://windows.microsoft.com/

0 comments:

Alert levels in Microsoft Security Essentials


When Microsoft Security Essentials detects a potential threat, it uses the associated definition file to assign an
alert level to the threat. It then applies the default action associated with that threat level.
Alert levels help you choose how to respond to viruses, spyware, and other potentially unwanted software.
While Microsoft Security Essentials recommends that you remove all viruses and spyware, not all software
that is flagged is malicious or unwanted. The information in this table can help you decide what to do
if Microsoft Security Essentials detects potentially unwanted software on your PC.
1.Alert level :Severe

What it means :These are widespread or exceptionally malicious programs, similar to viruses
or worms, which negatively affect your privacy and the security of your PC, 
and can damage your PC.

What to do :If you're prompted, remove the detected software immediately. Unless you've 
changed the default settings, Microsoft Security Essentials will attempt to remove malicious 
software automatically, helping protect your computer from potential infection. 
(After automatically removing malicious software, Microsoft Security Essentials might 
also reset some Windows settings, such as your default home page and search provider.)

2.Alert level  : High

What it means  : These are programs that might collect personal information and negatively 
affect your privacy or damage your PC. For example, the program collects information 
or changes settings, typically without your knowledge or consent.

What to do : If you're prompted, remove the detected software immediately. Unless you've 
changed the default settings, Microsoft Security Essentials will attempt to remove malicious 
software automatically, helping protect your computer from potential infection. 
(After automatically removing malicious software, Microsoft Security Essentials might
 also reset some Windows settings, such as your default home page and search provider.)

3.Alert level  : Medium

What it means  : These are programs that might affect your privacy or make changes to your 
PC that could negatively impact your computing experience. For example, the program 
collects personal information or changes settings.

Review the alert details to see why the software was detected. If you don't like what the 
software does or if you don't recognize and trust the publisher, consider blocking or removing 
the software.

4.Alert level  Low

What it means  : This is potentially unwanted software that might collect information about 
you or your PC or it might change how your computer works. However, the software 
is operating in agreement with the Microsoft Software License Terms displayed when 
you installed the software.

What to do : This software is typically benign when it runs on your PC, unless it was installed 
without your knowledge. If you're not sure whether to allow it, review the alert details, 
or check to see if you recognize and trust the software publisher.

by : http://windows.microsoft.com/

0 comments:

started with Microsoft Security Essentials

Getting started with Microsoft Security Essentials

There’s not much to do. Microsoft Security Essentials works in the background to protect your PC. It checks for updates automatically a few times a day and doesn’t slow your PC down while it works.
Simple color-coding, simple actions
You can keep track of how your PC is doing by looking at the Microsoft Security Essentials icon in the notification area at the far right of the taskbar. Green means everything is okay, yellow means that your PC is potentially unprotected, and red means that your computer is at risk.
When you see yellow or red, click the icon and you’ll be able to see the details and take actions. Usually the best thing to do is to choose Clean computer so that the threat can be removed.
If you want to delete threats automatically whenever they are identified, open Microsoft Security Essentials, click the Settingstab and then choose Default actions.
Scanning right now
Open Microsoft Security Essentials and you’ll be on the Home tab. You can select a Quick scan or a Full scan (and then clickScan now).
The quick scan will look for viruses in all the places they are most likely to hide. It’s a good choice when you’re just checking on the health of your PC.
But if something makes you think your PC is infected with a virus or spyware, we recommend a full scan. Your computer will be a little slower while it is running, but the full scan looks everywhere for possible problems.
Scheduling scans
By default, Microsoft Security Essentials runs a scan of your PC once a week when you’re probably asleep (2:00 am on Sunday).
If you want to adjust this, open Microsoft Security Essentials and click the Settings tab. Under Scheduled scan, you’ll be able to change the day and time as well as the type of scan.
Scanning more than just your hard drive
It may be useful to scan external drives and USB drives since they can get infected too.
Open Microsoft Security Essentials and click the Settings tab. Go to Advanced and click the option to Scan removable drives. Whenever scans run, your removable drives will also be scanned (if they’re attached to your PC). If you want to run a scan right away, go back to the Home tab and click Scan now.

0 comments:

What's new in Microsoft Security Essentials?

What's new in Microsoft Security Essentials?

This version of Microsoft Security Essentials includes the following new features and enhancements to better help protect your PC from threats:
  • Windows Firewall integration. You can turn Windows Firewall on or off using Microsoft Security Essentials.
  • Network inspection system. This feature enhances real-time protection by inspecting network traffic to help block exploitation of known network-based vulnerabilities.
  • New and improved protection engine. The updated engine offers enhanced detection and cleanup capabilities with better performance.
These features are described in more detail in the following sections.
Windows Firewall integration
Windows Firewall can help prevent attackers or malicious software from gaining access to your PC. When you install Microsoft Security Essentials, the installation wizard verifies that Windows Firewall is turned on. If you have intentionally turned off Windows Firewall, you can avoid turning it on by clearing a check box. You can change your Windows Firewall settings at any time via the System and Security settings in Control Panel.
Network inspection system
When your PC connects to a network, it can become vulnerable if the network is vulnerable. Studies of network vulnerabilities show that it can take a month or longer from the time of an initial attack report before a suitable security update is developed, tested, and released. This gap in protection leaves too many PCs open to attack. The network inspection system works with real-time protection so that you’re protected hours after exploits are discovered—not weeks.
Award-winning protection engine
Under the hood of Microsoft Security Essentials is its award-winning protection engine that is updated regularly. The engine is backed by a team of antimalware researchers from the Microsoft Malware Protection Center, providing responses to the latest malware threats 24 hours a day.

0 comments:

Finding info about your subscription, provider, device, or account

Finding info about your subscription, provider, device, or account


To unlock your device for use with a different mobile operator

  1. Insert the subscriber identity module (SIM) from a different mobile operator. Your mobile operator or device retailer will give you the info to do this.
  2. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  3. Tap or click Network, and then tap or click your mobile broadband connection.
  4. Enter the unlock code from your mobile operator, and then tap or click Unlock.

0 comments:

Finding info about your subscription, provider, device, or account

Finding info about your subscription, provider, device, or account


To find subscription, provider, device, or account details

  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click your mobile broadband connection.
  3. Look under the Properties section.

0 comments:

Changing settings-windows8

Changing settings-windows8


To use a PIN, change a PIN, or remove a PIN

  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click your mobile broadband connection.
  3. Do one of the following:
    • To use a PIN, tap or click Use a PIN, enter the PIN you want to use, and then click Finish.
    • To change your PIN, tap or click Change PIN, enter the current PIN, enter and confirm the new PIN you want to use, and then click Finish.
    • To stop using a PIN, tap or click Remove PIN.

    Notes

    • If the device can't use a PIN, the Use a PIN button will be unavailable.
    • Entering an incorrect PIN 3 times can result in your account being blocked until you get a PIN unblock key (PUK) from your mobile operator. If you're connected at the time that your account becomes blocked, your existing connection will end.
    • If a PIN is currently in use, the Use a PIN button will be unavailable.
    • If no PIN is currently in use, the Change PIN and Remove PIN buttons will be unavailable. You must first use a PIN before you can change it.

0 comments:

Changing settings-windows8

Changing settings-windows8
To show or hide estimated data usage

  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click your mobile broadband connection.
  3. Turn Show my estimated data use in the Networks list on or off.
  4. To view estimated data usage:
    View a list of available networks by swiping in from the right edge of the screen, tapping Settings (or if you're using a mouse, pointing to the lower-right corner of the screen, moving the mouse pointer up, and then clicking Settings), and then tapping or clicking the network icon (Wireless network icon or Wired network icon).
  5. Select your mobile broadband network.

Note

  • Clicking Reset sets your data usage tracking back to zero. This doesn't affect the total amount of data you've actually used, which your mobile operator is tracking.

0 comments:

Changing settings-windows8

Changing settings-windows8

To change network selection settings

  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click the name of your mobile broadband network.
  3. Tap or click Scan.
  4. To have Windows automatically choose a network, select Automatically select (recommended). Or, to choose a network yourself, select the network name from the list, and then tap or click Register.

    Notes

    • You might incur extra charges if you allow roaming.
    • If Windows can't connect to the network you specified, it will automatically choose a network.

0 comments:

Changing settings-windows8

Changing settings-windows8

To change profile properties

To change connection profile properties such as the access point name (APN), access string, user name, password, or autoconnect settings, follow these steps:
  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click the name of your mobile broadband network.
  3. Change the access point name (APN) or access string, the user name, and the password, as needed. (You can find these in the info that came with your mobile broadband hardware or service.)

0 comments:

Make Money on the Internet

Make Money on the Internet
1. Selling on eBay
Most people today are familiar with the concept: You have things you don't necessarily need but others are willing to buy, and you can auction off the items on eBay or other online auction sites. Simply gather your goods, create a seller's profile and start selling.
Creating persuasive and legitimate product pages for the goods you're selling will help get buyers interested. It's also important reasonable minimum to ensure that people will buy.
And remember give customer service and get positive feedback ratings and to communicate with buyers to let them know you're reliable. The more positive feedback you receive, the more people will be willing to do business with you. And that, of course, means more money.

2. Blogging
blogging can pour out your heart  have a particular passion , whether it's a hobby or an obsession, and you have something to talk about it.  The key here, as with many other services on the Internet, is in selling advertising.
After starting  personal blog you can sign up for ad services like Google AdSense which  sponsored links the top and on the sides of Web sites.
The more times your blog readers click on those ads, the more money you'll get through the ad service.
This works fine  for casual blogger, and  may make some extra spending money.  If the blog consistently interesting, you may be approached by companies who want to reach your fan base with graphical advertising around your blog. Some of the more successful blogs you can see at search engine, have become culture phenomena, and their creators have been able to quit their jobs and make blog full time because of the make money from advertisers.

3. Designing and Selling T-shirts
You walk around and likely to come into contact with lots of words. But it won't be material inside textbooks and papers probably at  backpacks or sitting unfinished at home. Instead, make the simple text or logos. Most of which are amusing and printed on the T-shirts on the backs of the many people.
The growth of the Internet has made it possible for vendors to sell T-shirts all over the world. In fact, sites like CafePress.com and SpreadShirt.com allow you to set up your own store, create your own designs. If you can create your own shirt design with a clever catchphrase or come up with your own unique statement and people like it, you can start making money.
4. Freelancing
Freelancing is similar in ways to blogging. Here, you get to work from your own home or office. 
Few distinctions.... First, if you're thinking about freelance writing have more experience than the blogger. Many freelance writing positions cover specialized topics for online publications and many require expert knowledge on the subject.
However, if you're passionate about things like travel or food and know how to write, a freelancing job can provide you with a good income.
But writing's not the only way to make money freelancing, of course anyone with graphic design or programming experience can find contract jobs that pay well and provide challenging work, too.

5. Financial Services
You can create a Web site on your own or work with an existing Web-based services group. Then, you can correspond with clients through that Web site and via e-mail.
If you want to offer financial services over the Internet, first make sure you're either trained or experienced in the services you're planning to provide. For example, you're probably not an expert on preparing taxes for a small family farm unless you've done so before or had training in farm-related accounting.
In addition, make sure you know whether you'll need government licenses to offer certain services, and refrain from misrepresenting yourself or working illegally to avoid getting sued for fraud.

6. Customer Service
Many businesses support their products through a customer service department. This means people who answer phone calls from customers. A growing number of businesses  offer customer service electronically through their Web sites and  e-mail.
 In Web site, customer service might include live chat sales and support. To use this, a customer clicks a link requesting to chat, and a customer service representative answers the request and speaks with the customer.
For e-mail customer service, the customer fills out a form at the Web site or sends e-mail directly to a particular address.

7. Tutoring
Each passing year, there seems to be increasing pressure for elementary, middle and high school for students to make good grades and prepare for a path to higher education.
For some kids, this means getting help from a tutor to bridge any gaps in understanding in certain subjects.
Families have  high-speed Internet connections at home,  Internet-based tutoring and study in services are growing.
Though you could start your own online tutoring service, While many Internet-based jobs offer flexible hours or multiple shifts, tutoring services might require you to be online during a specific block of time or reward you for doing so. This encourages tutors to be available during the heaviest demand.

8.Selling Handmade Goods
Earlier, we considered using sites like eBay to sell stuff that you don't need. You can also use Web sites to sell your original creations.
If you're like most people, the word handmade probably brings to mind some traditional crafts like knitting, crochet, needlework, quilting, painting and sculpting.

You can also market woodworking, glasswork, metalwork and anything else you're capable of building at home. Be sure to focus on projects that you're already good at or that you have a passion for so you don't out producing each new item.

0 comments:

Sharing your Internet connection-windows8

Sharing your Internet connection-windows8

Depending on your mobile operator subscription, you might be able to share your mobile broadband Internet connection with other people. The shared connection is called a mobile hotspot. Other people can connect to it using Wi‑Fi. They'll need the network name and password to connect.

To share your Internet connection by creating a mobile hotspot

  1. Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.
    (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
  2. Tap or click Network, and then tap or click your mobile broadband connection.
  3. Tap or click the Share this connection slider to turn it on.
  4. If you want to change the network name or password of the shared connection, tap or click Edit.

0 comments:

Setting up and connecting to the Internet -windows8


To connect to the Internet (after your connection is already set up)

  1. View a list of available networks by swiping in from the right edge of the screen, tapping Settings (or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Settings), and then tapping or clicking the network icon (Wireless network icon or Wired network icon).
  2. Tap or click the name of your mobile broadband network, and then tap or click Connect.

0 comments:

Setting up and connecting to the Internet -windows8

Setting up and connecting to the Internet -windows8

To set up your mobile broadband connection for the first time

1.Activate your subscriber identity module (SIM) and the mobile broadband service for the SIM. Your mobile operator or device retailer will give you the info to do this.

2.If you have an external mobile broadband device, make sure it's correctly inserted into the PC according to the manufacturer's directions, and make sure the wireless switch is turned on. The wireless switch is usually found on the front, side, or back edge of a laptop or tablet.

3.View a list of available networks by swiping in from the right edge of the screen, tapping Settings (or if you're using a mouse, pointing to the lower-right corner of the screen, moving the mouse pointer up, and then clicking Settings), and then tapping or clicking the network icon ( or ).

4.Tap or click Network, and then tap or click the name of your mobile broadband network.

*Note
You might need to provide an access string or an APN to help identify your mobile network. An access string (for CDMA devices) or APN (for GSM devices) should be included in the info that came with your subscriber identity module (SIM) or subscription.

5.Change any connection settings that you want to change, and then tap or click Connect.

6.If you're prompted, choose or enter the access point name (APN) or access string, user name, password, and type of sign-in info. (You can find these in the info that came with your mobile broadband hardware or with your mobile broadband service.) You might also be able to buy a plan from the provider on this screen.

7.Tap or click Next.

*Notes
If your SIM is locked, the default PIN is set by the mobile operator. When the device is locked, it can't be used, and you need the PIN to unlock it. Check the info that came with your SIM or subscription.

Entering an incorrect PIN three times can result in your account being blocked until you get a PIN unblock key (PUK) from your mobile operator. If you're connected at the time that your account becomes blocked, your existing connection will end.

If you have trouble connecting to the Internet, contact your mobile operator.

0 comments: