How to Get your Outlook.com Email Address

Microsoft has just announced Outlook email service which will be replacing Hotmail soon. While you can keep using your current email id, you also have an option of creating a new [email protected] email alias that you can use alongside your current email address. This a tutorial on how to do that (if you have a generic name, you better hurry up before someone else gets it).

To upgrade to Outlook from Hotmail, login to Hotmail. Click  Options and select Upgrade to Outlook.com .

You will be automatically upgraded to the new Outlook. You will find a welcome mail with a link to get a new alias as shown below.

Alternately, you can also create an alias from the settings page.

Once you are in the new Outlook, click on the gear icon on the top right corner of Outlook and select More Setting option. You will be taken to the Settings page.

Now click Create your Outlook alias from under Managing your account section.

After entering your desired alias, click Create alias button and you are done.

You can now send and receive emails using your new outlook mail id.

Creating a “Loading…” Animated GIF Using Photoshop [Video Tutorial]

In web designing, it is very much necessary for designers to be creative and use different techniques to attract a viewer, and we have seen most websites using animated GIF images to drive attention. In this tutorial, we’ll take a look at the Photoshop animation feature which can be used to create animated GIF image.

Note: In this tutorial, I am using Photoshop CS 5

Final Preview

Here’s a final preview of what you will be creating –

"Loading..." Photoshop Tutorial

Step One:

Draw the outline (circumference) of a circle, like the one shown below.

"Loading..." Photoshop Tutorial

Step Two:

Using the Polygon Lasso tool, slice a part of the circle. In other words, create an arc. You should obtain the following shape:

"Loading..." Photoshop Tutorial

Once done, delete the rest of the circle. We don’t need it anymore.

Step 3:

Create three additional copies of the arc (i.e., by duplicating it) by pressing Ctrl + J. Arrange the four arcs in such a way, that it appears like a (broken) circle. Go to Edit > Transform > Rotate 180/90 CW/90 CCW

"Loading..." Photoshop Tutorial

Step 4:

The steps from here are quite tricky and confusing. Hence, the rest of this tutorial is shown in the video below:

Gradient Color used:  b2e10f

I hope you have followed the tutorial carefully and  accomplished  the end result. After you saved the file, make sure you open it in the browser to view it.

TweetMeme Announces Pro Retweet Buttons

Here is some good news for bloggers who use the Tweetmeme button for promoting their blog posts on Twitter. Tweetmeme has recently added a pro feature, you can now upgrade to Tweetmeme pro for $1000 a year and get added features on the Tweetmeme Retweet button.

According to Tweetmeme, here are the added features in Tweetmeme pro buttons:

  1. You can add up to 10 UTM tracking tags within the pro retweet button, this will be useful when you want to track Twitter traffic in a variety of more ways.
  2. The design of the button can be customized to match with your site’s template.
  3. You can further customize the design of the pop up box, the one which opens when someone clicks the Retweetbutton on your blog posts.
  4. Better performance, dedicated servers to ensure your button is up and working.
  5. Accurate Retweet counts.
  6. Support for hash tags and URL shortener, this includes integration with Bit.ly Pro much awaited.

Here is an example image of the Tweetmeme pop up box, the logo really adds the branding you have always wanted.

new-tweetmeme-pro-buttons

There are 3 pricing plans to start with, the basic plan will cost you $1000 a year and up to 500,000 buttons served every day. The Pro plan will cost $2000 which will serve up to 2,000,000 buttons every day. The enterprise plan is $5000 a year, will serve unlimited number of buttons every day.

I think the regular Tweetmeme button does a fine job, however if you need all the advanced customizations and URL tracking with UTM tags you may switch to Tweetmeme pro. I am quite surprised to see that there are no monthly plans for Tweetmeme Pro, this would have allowed publishers with a small budget   test the advanced buttons.

More information is available at the Tweetmeme blog.

How To Create Your Own Private IRC Channel/Room

222271430_d833395bd1 Before the world went crazy about Twitter and Google Wave, there was something called IRC (Internet Relay Chat). In this post, I am not going to tell you how I used to enjoy IRC so many years agoor how things have changedsince then, because last week was the first time I experienced IRC to a considerable extent.

About four years ago, when I started using the Internet, Yahoo messenger was ruling the roost in Internet chat.  Everyone used it, so did I. I did hear of IRC back then, but ignored it, just because of the fact that it was old’. Although I got a taste of it when I tried out Ubuntu, I didn’t quite get the hang of it at that time. GTalk and Twitter triumphed.

We, the authors at Techie Buzz, frequently have conferences and group chats. Almost everytime, we create a room at TinyChat and hop in. It’s quick and easy, but the room had to be created everytime and it was not password protected. Moreover, there were not enough controls to please the geeks.  Move on, think of an alternative, we thought. Then it struck me, old is gold! IRC! I went ahead and got a private room which no one but the right people can join, and believe me it was easy. I’ll tell you how you can also create your own private room on IRC in a few minutes:

Choosing an IRC Client

Before we go ahead, you’ll need to download an IRC client. If you use Firefox, ChatZilla is a Firefox add-on that will allow you to perform chats using IRC from within the browser. If you prefer to use IRC from your desktop, Nettalk is the preferred alternative. These are two of my recommended clients for IRC. You can find more options for your own operating system in this list of IRC clients.

Selecting a Server

The next step involves setting up servers/networks. Think of a channel  as a small room, among many rooms in a hotel. To create a channel, you will need to enter a server first. You can create as many channels on a server as you wish, of course, rules and regulations for each server are different.

For this guide, we will be using Foonetic as our network/server. You can use any other server, depending on their rules.

greenshot_2009-10-09_23-32-39

Create and Register a Nickname

Let’s get it going. Pull up your geek socks. Open up Nettalk and enter /server irc.foonetic.net. The program will open the foonetic IRC server for you. Now you’ll need a nickname, just like you’d need one for twitter and email. To create your nickname, type  /nick nickname and press Enter. Replace nickname with your desired nickname. If the nickname is not available, try a different one.

greenshot_2009-10-09_23-37-42

Just like the government keeps a record of all newborn babies, an IRC nickname server will keep record of all the registered nicknames. This prevents users from registering duplicate nicknames on the same server. You can register your nickname so that no one else can grab it when you log off.

In IRC world, the ministry of nicknames is called NickServ. To register your nickname, type /msg nickserv register password email. Replace password and email with your desired values. The server will reply with a confirmation. In a short while, you will receive an email at the email address you registered. The email will contain a confirmation code from the server.

To verify your email address, type the command as it appears in the email message in the IRC server window. When that is done, the server will give a confirmation that your email has been verified. The next time you wish to login with your username, type /msg nickserv identify password and replace password with your password.
greenshot_2009-10-09_23-42-36

Create and Register a Room

Give yourself a pat on the back, you just created your username!  To start chatting on IRC, you need to create or join an existing room.  Think of a name for you room, and type /join #channelname. You will need to add a “#” before the channelname. If the room you want to join already exists, you will be entered into the room. However, if the room does not exist, the server will create a new room with the name you provided.

Congratulations, you have just created a functional room in IRC. You can now invite your friends and chat with them. However, like Tinychat, this room is not reserved permanently. You will have to register this room with ChanServ, a service that handles channel registrations.To register your channel, type /msg chanserv register #channelname password description. Replace channelname with the name of your channel, which you created earlier, and replace password and description with obvious values.

greenshot_2009-10-09_23-54-15

The password you set here will give you founder-level rights when you log in next time. Note, this password doesn’t password protect the room. It just recognizes you as the founder of the channel and assigns the channel to your nick (It will make you the channel operator). Initially, you will be logged in automatically. The next time, use /msg chanserv identify #channelname password and the server will give you founder-level access to your room.You can enter your room by typing /join #channelname.

The channel is now ready for regular use. Invite your friends and have a blast, but it is still not restricted. Until you set a password for the room, any user will be able to access it by typing /join #channelname. So let’s make it password protected.

Password Protecting Your Room

You can set a password for your channel by using /mode #channelname +k password. People can then join the channel with /join #channel password. If you login as the founder of the channel, as explained in the last step, you won’t need to use the password now.

Although the channel is password protected now, it is visible in the rooms list of the server. Set your new channel to secret by typing /mode #mynewchannel +s. If you don’t mind your new channel being public, don’t do anything. All new channels are automatically public.

Accessing the Private Room

Voila! You are done! Your password protected and secret IRC channel has just been made. Your friends might ask how they open it, right? Give them these three points:

  1. Type the command  /server irc.foonetic.net [or the server you chose]
  2. Get a nickname with /nick nickname. Also consider registering it with /msg nickserv register password email.
  3. Join room with /join #channelname password (append password if you password protected it, if not, just drop the value.)

What do you think of it? Will you start using IRC (again)? Or do you think this is too geeky? Let me know your comments below! I am looking forward to them!

(Image Courtesy: Flickr user Mammal)

More Resources:

Wikihow | IRC Help | Wikipedia | NickServ Commands | ChanServ Commands | List of All Commands

Tutorial: How To Flash DD-WRT Firmware On Your Wi-fi Router

A few days ago I had told you guys about running  OpenSource firmware on your Wi-Fi router. Here are the steps you should follow to flash DD-WRT Linux Firmware on your Wi-fi router. Please keep in mind that here I am using a Linksys WRT-54G2 Wifi router which is completely compatible with DD-WRT firmware. Before proceeding with the steps please make sure that your Wi-Fi router is completely compatible with the DD-WRT firmware from  here. I would also like to notify my dear readers that they should follow the steps as I have said and if by chance they brick their Wi-fi router I should not be held responsible for it.

Step 1: Set your PC static IP to 192.168.1.10 and Subnet Mask to 255.255.255.0

image

Step 2: Install Linksys tftp. You can download it from befsx41_Tftp.

Step 3: Disable your Anti virus and Firewall even the inbuilt Windows Firewall.

Step 4: Reset your router and plug in the ethernet (LAN) cable at the back of the Router in any of the provided slot except for the ‘Internet’ port.

Step 5: Start the Linksys Tftp utility and set the Server IP to 192.168.1.1. Then set the password to admin or you may leave it blank. Try either of them, if one fails, try the other one.

image

Step 6: The first file you need to flash is the VxWorksPrep-G2V1.bin file.

Step 7: It will take some time for the flashing to complete, after its complete, your router should reboot, if it does not then do a manual reboot. Wait for atleast 2-3mins before doing a manual reboot.

Step 8: Again start the Linksys tftp.exe utility and now flash the VxWorksKiller-G2V1.bin. After flashing the file, again wait for 2-3mins for the router to reboot on its own and if it does not, do a manual reboot.

Step 9: Now flash the latest DD-WRT firmware available for your model. After the flashing is done, wait for atleast 4minutes so that the router sets itself up and reboots atleast twice. If the router does not reboot automatically, do a manual reboot.

7_dd-wrt_iterface

Step 10: After that hard reset the router. Now go to 192.168.1.1 via your browser and setup your new powerful Wifi router. Don’t forget to change back the static IP of your PC back to default.

After this if you ever need to upgrade to the latest DD-WRT firmware, you can use the web interface to do so.

To download the latest DD-WRT firmware for your model, please check  www.dd-wrt.com. If you face any other problem, please feel free to ask here and I would be happy to help.

Cross posted from the Gadgets Buzz blog.

WiFi Demystified – Part II

In the first part of Wifi Demystified we explained the basic and advanced Wifi configuration and settings. In this section, we will get acquainted with the various security configurations in a typical WLAN network.

Security mode disabled

Now it is perfectly alright to disable your Security mode (set the option on the gateway to “None”), but that will allow any Wifi client to connect to your AP and utilize it’s bandwidth thus hampering the performance of the intended audience. However, it is observed that most APs in India have no security mode set against them are vulnerable to attacks.

WEP security

Wired Equivalent Privacy, is the basic security mode in all the APs. It consists of 64-bit or 128-bit encrypted passkey. The next part is a little confusing : A 64-bit WEP key in Hexadecimal format is 10 characters long while in the normal ascii (or alpha-numeric) format is 5 characters long. The more secrure 128-bit key in 26 characters in Hexadecimal format and 13 characters in ascii format. Now, some routers may not even have an option for both 64-bit as well as 128-bit keys, or they might display something like WEP-40 or WEP-104 (since 64-bit key is actually derived from a 40 bit key and a 128-bit key is derived from a 104-bit key). I have also seen some routers which will not thrown an error if you do not put more than 5 or 13 characters for the respective mode, since they probably account for the user’s ignorance and truncate it internally.

Another notion, present in only a few APs is the key-index. You can set upto 4 WEP keys and then decide a “key-index” or “default key” from these 4, which will be the actual key used.
Although WEP key is better than having security disabled, it is a fairly easy security to crack. Even a moderate cracker will be able to crack the WEP key in a few minutes as softwares are available for doing these. (Maybe I’ll write a separate post on just WEP key cracking next).

WPA/WPA2

This section is further sub-divided for better understanding.

Wifi Protected Access is essentially a Certification program by the Wifi Alliance which was created in response to the concerns about the weakness of WEP as a security mode. However WPA was a certification based on IEEE’s 802.11i draft which was still scrutinized by the community. When the draft was finally ready, implementing the full standards, a huge number of Wifi products based on WPA had already flooded the market and hence it came to be known as WPA2 and the new products had to be backward compatible with WPA.

TKIP /AES-CCMP : WPA uses the Temporal Key Integrity Protocol or TKIP as an encryption method which makes it a lot harder to crack then WEP. The WPA2 security however used the more advanced AES (Advanced Encryption Standard) algorithm which is used by the CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) encryption protocol. This protocol makes it impossible for crackers to crack the passphrase, unless of course, the cracker has a super computer at his disposal, in which case it’s just a matter of a few months or years :-).

Both these encryption types accept a pass-phrase (a password), of 8 to 63 characters long, the longer and more random, the better.

Personal/Enterprise mode

Both WPA and WPA2 can be configured in the Personal as well as Enterprise modes.

Personal : Personal mode is also referred to as WPA(WPA2)-PSK or PreShared Key. In this mode you simply setup a passphrase (between 8-63 characters) and share it with users who you wish to connect to your AP. This is usually the default mode to be set in home or SOHO APs since it does not require any additional infrastructure.

Enterprise : In Enterprise mode, the authentication between the Clients and APs happen over the 802.1X authentication protocol. In order to achieve this, there needs to be an external RADIUS server with user credentials in the network (or atleast reachable by the AP). Setting up a RADIUS Server and 802.1X infrastructure is complex and out of the scope of this post, but briefly this is how it works :
The client tries to associate to the AP. The AP sends the Client’s information to the RADIUS Server (this usually happens over a wired connection). The RADIUS server does the authentication and authorization of the user. If the AP gets a “Go Ahead” from the RADIUS, it allows the Client to associate.
As you can see, this is a complex procedure and usually not used in Homes or SoHo environments, which is why most APs may not even have an option to set it.

This completes the WPA/WPA2 configuration settings. Now, just to make sure we are on the same page, WPA2 uses AES-CCMP while WPA uses TKIP for encyption (WPA2 could use TKIP, but that would beat the purpose of the standard). Both WPA and WPA2 can be configured in the Personal as well as Enterprise modes, but Enterpise mode is too complex for home users and should opt for the simpler yet as powerful Personal mode.

So, if your Wifi network has some old clients (more than 3-5 years), it is best to have the security mode set to WPA-Personal and encryption to TKIP. However, if all are relatively new machines, a WPA2-Personal and AES-CCMP pair would make your Wifi almost impenetrable.

WPS

Wireless Protected Setup, is a new Security Configuration methodology. Using WPS, clients can connect to the AP by the simply the push of a button or entering a simple 10 digit Pin code. Needless to say, WPS must be supported both by the AP as well as the Client. WPS is just a convinient way to associate clients and APs and it “sits” on top of the traditional security methods, WPA and WPA2. Thus, before initiating WPS, the WPA parameters should be configured on the AP.

WPS works in two scenarios, Push button method and Pin method.

Pin Configuration method : Some APs will have a WPS pin printed on a label on the device. In other cases, the Client-side generates a unique pin everytime WPS is initiated and this pin has to be entered on the AP (Yes, you read correct. It’s NOT the other way round).

Push Button method : To support this method, both the AP and client either need to have an extra push-button on the device or a soft-pushutton clickable on the Wifi config UI, to initiate WPS.
In both the above cases the basic working is the same : Once WPS is initiated by either of the methods, the Client has 2 minutes to do the same before the session expires. For example, once the button is pressed on the AP, the user should press the WPS button(either hard or soft) on the Client within 2 minutes to get connected. No client can connect after two minutes. If requried, the process needs to be re-initiated. Similarly, once a CLIENT generates a WPS pin, it should be entered and saved on the AP within these 2 minutes for a successful association. This two minute gap is called the Walk period.
Now the attentive user will see the obvious flaw in this system : If a button has been pressed on the AP, any client with WPS capability in the vicinity can associate itself. Well, that’s true, but the other client has to do that within the Walk time. Also, WPS is meant more for convinience than for tighter security, so yeah, there is a trade-off involved here.

MAC ACL

MAC Access Control List lets an AP control which and how many clients will connect to it. However, not all APs have an option to limit the number of clients. Wifi MAC ACLs have a notion on “blacklists” and “whitelists”. When a “blacklist” ACL is applied, all the clients whose MAC addresses   are in that list will be prevented from associating with the AP. Conversely, when the ACL is of type “whitelist”, only the Clients whose MAC addresses are in the list will be allowed to associate, rest all will be rejected. This allows a more broader control on who can or cannot connect to the WLAN.

With this, we have covered the Wifi basics from a layman’s point of view. However, this information should be enough for anyone to configure a Wireless home router in a satisfactory working mode.

Creating Custom Brushes in Photoshop – Part 1

In my previous tutorial, I taught you how to load/install new brushes in Photoshop. In this tutorial you’ll learn how custom brushes are created and saved. Once again it is a very simple tutorial but if your creative enough you can create wonders.

You’ll learn to create a elliptical brush and this brush will be used in my next tutorial where you will learn to create bokeh effect in Photoshop. Its all about creation ;)

Step 1:

Open a new transparent document. Once done, select the Ellipse Tool (press U) and draw a circle.

step_1

Step 2:

Once done, in Blending Options, change Fill Opacity to 75%. Don’t get confused. Change the Fill Opacity not the Opacity. Follow the screen shot…

step_2

step_3

Enable Stroke and change the size to 10px, position – inside and color to black. Your almost done with your new brush.

Step 3:

Open Edit and select Define Brush Preset and name your newly created brush. Your new brush has now been saved. Note down the brush number displayed on the left side.

step_4

If the Define Brush Presetoption is disabled then do the following. Duplicate the layer by pressing Ctrl+J on your keyboard. Disable the old layer (make it invisible) by clicking on the small eye eye With the new layer selected, now try defining the new brush preset by clicking Edit.

Step 4:

To save a copy of your brush separately, click Edit > Preset Manager and select your brush from the list (remember the brush number?) and click Save set.

If you’ve forgotten your brush number, then keep your cursor on the particular brush to display its name and save it. Your done! :-)

Now you have learnt to create and save your own custom brush. In my next upcoming tutorial, you’ll learn how to implement this particular brush to make something creative. Stick around :-)

WiFi Demystified – Part I

Wireless LAN or WLAN or simply Wifi is a highly under-utilized technology in India. Even with the availability of cheap hardware for both the client as well as the Gateway-side, the ignorance about this technology and it’s facade of complexity has led to the under-use of this highly convinient technology.

For example, it is surprising that you can go and sit on a cyber-cafe PC and pay as less as Rs.10/- per hour for internet, but cannot go to the same facility and use your own Laptop for the SAME bandwidth. The logic here, cry the owners, is that there is no way to control Wifi connections. Sigh, if they only knew about open source HotSpot softwares like ChilliSpot.

This article, however does not deal with the nuances of WHY Wifi is so under-utilized. Rather, we are going to familiarize ourselves with some Wifi terms and configurations which maybe useful for configuring our Laptops and residential AccessPoints (or Wifi Routers). Please note that the settings mentioned here are for the Home or SOHO (Small Office Home   Office) user, rather than network administrators of Enterprises.

Quick WiFi Glossary

AP : Access Points are the “server”-side or the gateways which connect wireless clients with the Wired network-side. For Eg., A Laptop will connect Wirelessly to an AP which, in turn, will have a Wired connection to the internet infrastructure. Nowadays, most APs are just logical entities within a full-fledged home residential gateway router. For example, the D-Link and the LinkSys home routers have an AP component to let wireless clients connect to them.

STAs : Wireless clients, like a Laptop or a Network printer are also called Stations or STAs in short. This term is used interchangeable with “Clients”

WLAN : Wireless LAN refers to a LAN network with all the nodes connected to the gateway Wirelessly

Beacon : In brash terms, this is the wireless packet advertised in the air so that clients can sniff it and connect to it.

Scan : Scanning refers to “sniffing” the surrounding to see if any APs are present and advertising any beacons. It basically displays all the SSIDs

Wireless LAN’s Basic Configuration Parameters

SSID : A Service Set Identfier,   is the name given to a particular WLAN network. Unlike a wired connection, where a client physically connects itself to the Gateway, wireless clients “associate” themselves to a network name or SSID. This name is present in the AP’s beacon. Thus, when a client is asked to “scan” the network, it shows a list of all the SSIDs in the surrounding area. The SSID can be as absurd or as intuitive as the user wishes. Ex. “Accounts”, “RaseelWifi” or “PirateofArbian” , as long as it’s within 32 characters.

Mode : Wifi operates in 3 different modes referred to as the “a”, “b” and the “g” mode , corresponding to the 802.11a , 802.11b and 802.11g IEEE specifications respecticvely. Mode “a” operates on the 5 Ghz frequencies with a Transmit Rate of upto 54 Mbps and most modern clients may not have support for this mode. Mode “b” and “g” operate on the 2.5 Ghz frequency range and have transmit rates of upto 11 Mbps and 54 Mbps respectively. Mode “b” is a legacy mode and is present in the most APs for backward comptability. The AP can be configured to set in a “bg” mode so that most clients will work without any issue. However, if you are sure that your client supports “g only” mode, it is advisable to set the router in “g” mode.

Channel : Wifi networks operate on the 2.4Ghz and 5 GHz range. The actual frequency consists of upto 14 channgels separated by 200 MHz starting from 2.412 Ghz. and 4.9 GHz respectively. Some of these channels are overlapping (2, 3,4, etc.) while some are the primary channels like (1, 6 and 11). However, it is sufficient to configure the channels to “Auto” mode and let the AP intelligently decide on which channel to operate on. It takes this decision based on minimum interfernce on that frequency.

Max Transmit Rate : This is the Maximum Transmit Rate between the AP and the client. This parameter too can be set to “Auto” mode so that the AP can decide on the optimum rate. This is especially useful when your network may have Clients with “b only” mode which transmit at a max rate of 11 Mbps, as well as clients with “g only” mode with a max transmit rate of 54 Mbps. However, in order to manage bandwidth effectively and to limit interference, some network administrators might limit the rate to a lower value like 5.5 Mpbs or 36 Mbps.

Power : The power unit for transmission in Wifi can be dBm or mW (milliwatts). A dBm is a standard unit for measuring levels of power in relation to a 1 milliwatt reference signal. Most APs have a max power value of 20 dBm or 100 mW which covers an area of 100 meters without any obstructions. Again, this parameter can be set to “Auto” in some APs so that maximum througput can be achieved.

Advanced Wifi Configurations

Now, let’s look at some more advanced configuration and terms regarding Wifi which a user can feel free to tamper with. However, leaving these values to the default ones should be fine for most users.

DTIM Period : Delivery Taffic Indication Message Period is the interval in which DTIM message will be included in the beacon. This helps to have minimum collision and in effect, increased throughput. In cases where there is not much interference, or where the number of clients is limited, the DTIM interval has little or no significance. Usually a value of 1 or 2

Hidden SSID : You can enable this option to hide the SSID of your network so that unauthorised clients will not be able to “see” your network when they scan. However, an autorised user having the correct security credentials and knows the hidden SSID, will be able to enter it in his Wifi configuration utility and connect directly to the AP without seeing it in the list after scanning.

Country and Regulatory domain : Different countries have different rules and regulations regarding Wifi. Hence it is mandatory for the APs to include this information in the beacons. For example, the United Stated supports only Channels 1-13 while Mexico might support 1-14. These are Specification nuances and the user need not be bothered. And in some cases, the APs will come pre-configured with the country setting and there might be no option to change this on the APs config UI.

Antetnna Diversity : This referes to the usage of Rx and Tx antennas. Some APs may have only one antenna in which case this option is either not present or of no use. In some APs, you may be allowed to use Antenna 1 for Rx and 2 for Tx. This will improve the APs performace.

80211N or MIMO : 802.11n is a new proposed specification from IEEE and as of writing this article it was due to be released “any day now”. However, the markets are already flooded with products which support the “802.11N Draft” specs. This mode increases throughput considerably (upto 300 Mbps) provided the client has 802.11N support too. MIMO stands for Multiple-In-Multple-Out and makes uses of clever ways to make use of Antenna, obstructions in the surrounding ,etc to enhance throuput. This mode works alongwith the a,b and g modes mentioned previously for backward compatibilty.

Multiple SSID : This is a very innovative use of the Wifi technology to group users. With this feature, a single AP can be configured to beacon more than one SSID with their own security, throughput and other settings. Thus, I can configure my AP to have the following SSIDs, “Guests” , “Trusted”, “Highest”. No points for guessing that I will have some low security like WEP and lower transmit rate, say 2 Mpbs and a different channel,say 2 for “Guests” SSID and better configuration for the other SSIDs. However, it must be noted that this will hamper the overall performance of the AP since the total bandwidth of the AP is divided.

WMM or WME : Wireless MultiMedia or Wifi MultiMedia Extensions is an advnaced Wireless configuration which implements the Qos functionality in Wireless. By configuring WMM parameters we can have better throughout for specific applications like Voice (over IP), Video and regulate bandwidth for other normal applications like Web surfing, etc.   I will not dvelve deeper into this since very few residential gateways will offer this as an configurable option.

UAPSD : Unscheduled Automatic Power Save Delivery is a feature that uses WMM to save the APs power depending upon the type of traffic. Again, as WMM may not be offered UAPSD also might be absent and more info is out of the scope of this document.

While the above parameters are enough to configure an AP and make it functional, there is no security associated with them. Security settings for Wifi are covered in a separate post.

Moving Your Blog To A New URL? Tell Google Webmasters Tool About The Change In Address

There may be times when you move to a newer house, in many of those cases you have to spend a whole lot of time updating your postal address for different services you use to make sure that your bills and other correspondence does not go to your old address.

webmaster tools

The web acts in a similar way, however on the web the domain name is your home, and in many cases you may decide to move to a new domain name (URL change), for example you were earlier hosted on a or Blogger blog and decided to get your own domain, or for example you decided to change your domain name altogether.

Just like you move things from your old house to your new house, you also do the same by moving content from your old blog to your new blog, however when it comes to moving your traffic from your old blog to the new one, or updating the URLs (think home address) in search engines you don’t really have much choice except for using 301 (permanent) redirects to tell search engines that you have moved.

Google Webmaster tools with the introduction of Change of address makes the transition between domain names much more easier, the process will still require you to use 301 redirects from your old domain to your new one, however Google will now allow users to specify the URL of your new domain to make the process more smoother than before.

If you are moving from one domain to another, here are some steps you can follow to make the transition smoother, this assumes that you already have a Google Webmaster account, if you don’t have one yet, you can signup for a Google Webmaster account, however you will have to add both your old site and new site to your account if you didn’t have an account earlier.

Step 1: Move all content from your old blog to your new blog (we will be writing tutorials on how to do this soon)

Step 2: Make sure you use 301 redirects to permanently redirect content from your old blog to your new one.

Step 3: Login to your Google Webmaster account and add your new domain to it and verify the new domain.

google_webmaster_change_of_address

Step 4: In your Google Webmasters account, manage your old domain and Click on Site configuration Change of address, remember you will be seeing a new interface, Google has now migrated to a newer interface for Webmaster Tools.

webmasters_change_url

Step 5: Make sure you have followed all the instructions listed there, once you are sure, select a new domain name in step 4, that you want to use a the new URL for the older one and hit on submit.

That’s it, this will speed up your move and ease the process of moving from a old domain name to a new domain name on the internet, hope you enjoyed this tip, for more tips like these visit .