Posts

Showing posts from November, 2014

8 pair usage for data in Cat 6 Wire in Networking

Image
Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

Incoming Mail (POP) Server - Requires SSL

Image
How Setup Pop Mails Server Yhaoo,like other Site , Incoming Mail (POP) Server - Requires SSL Server - pop.mail.yahoo.com Port - 995 Requires SSL - Yes Outgoing Mail (SMTP) Server - Requires TLS Server - smtp.mail.yahoo.com Port - 465 or 587 Requires SSL - Yes Requires authentication - Yes If your POP client doesn't offer TLS, you'll still be able to use SSL. Login info - Requires authentication Email address - Your full email address (name@domain.com.) Password - Your account's password. For additional assistance, or complete instructions on setting up POP, review th

Who Used Your Pc In Your Absence & what Did He Do?

Image
U Konow use your pc in our Absence , How To Check ,Let See just follow these simple steps start > run >eventvwr.msc Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off. double click on the eg: info n it will show u the detail. You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.