Archive for December, 2011

Computers History-Suresh Dangi

  1. 1936Konrad Zuse – Z1 ComputerFirst freely programmable computer.
  2. 1942John Atanasoff & Clifford Berry  ABC ComputerWho was first in the computing biz is not always as easy as ABC.
  3. 1944 Howard Aiken & Grace Hopper Harvard Mark I ComputerThe Harvard Mark 1 computer.
  4. 1946 John Presper Eckert & John W. Mauchly ENIAC 1 Computer20,000 vacuum tubes later…
  5. 1948 Frederic Williams & Tom Kilburn Manchester Baby Computer & The Williams TubeBaby and the Williams Tube turn on the memories.
  6. 1947/48 John Bardeen, Walter Brattain & Wiliam Shockley The TransistorNo, a transistor is not a computer, but this invention greatly affected the history of computers.
  7. 1951 John Presper Eckert & John W. Mauchly UNIVAC ComputerFirst commercial computer & able to pick presidential winners.
  8. 1953 International Business Machines. IBM 701 EDPM ComputerIBM enters into The History of Computers.
  9. 1954 John Backus & IBM FORTRAN Computer Programming LanguageThe first successful high level programming language.
  10. 1955 (In Use 1959)Stanford Research Institute, Bank of America, and General Electric ERMA and MICRThe first bank industry computer – also MICR (magnetic ink character recognition) for reading checks.
  11. 1958 Jack Kilby & Robert Noyce The Integrated CircuitOtherwise known as ‘The Chip’
  12. 1962 Steve Russell & MIT Spacewar Computer GameThe first computer game invented.
  13. 1964 Douglas Engelbart Computer Mouse & WindowsNicknamed the mouse because the tail came out the end.
  14. 1969 ARPAnetThe original Internet.1970Intel 1103 Computer MemoryThe world’s first available dynamic RAM chip.
  15. 1971 Faggin, Hoff & Mazor Intel 4004 Computer MicroprocessorThe first microprocessor.
  16. 1971 Alan Shugart &IBM The “Floppy” DiskNicknamed the “Floppy” for its flexibility.
  17. 1973  Robert Metcalfe & Xerox.The Ethernet Computer NetworkingNetworking.
  18. 1974/75Scelbi & Mark-8 Altair & IBM 5100 ComputersThe first consumer computers.
  19. 1976/77Apple I, II & TRS-80 & Commodore Pet ComputersMore first consumer computers.
  20. 1978 Dan Bricklin & Bob Frankston VisiCalc Spreadsheet SoftwareAny product that pays for itself in two weeks is a surefire winner.
  21. 1979 Seymour Rubenstein & Rob Barnaby WordStar SoftwareWord Processors.
  22. 1981 IBM The IBM PC – Home ComputerFrom an “Acorn” grows a personal computer revolution
  23. 1981Microsoft MS-DOS Computer Operating SystemFrom “Quick And Dirty” comes the operating system of the century.
  24. 1983Apple Lisa ComputerThe first home computer with a GUI, graphical user interface.
  25. 1984Apple Macintosh ComputerThe more affordable home computer with a GUI.
  26. 1985Microsoft WindowsMicrosoft begins the friendly war with Apple.SERIESTO BECONTINUED

Fore More Info visit


Leave a comment

How to install a printer driver on a Windows XP? Suresh Dangi

To install a printer driver locally on a Windows XP  based computer, follow these steps:

  • Click Start, click Control Panel, click Printers and Other Hardware, and then click Printers and Faxes.
  • Double-click Add Printer to start the Add Printer Wizard, and then click Next. Click Local printer, clear the Automatically detect and install check box, and then click Next.
  • Click Create a new port, and then click Local Port in the Port type section.
  • In the Port Name box, type the path to the printer in the following format, where server is the name of the print server and printer is the name of the printer:
  • \\server\printer
  • Click Next, and then select a Windows 2000 or Windows XP driver for your printer.

        Click Next, and then follow the instructions to finish the wizard.

Leave a comment

How to Secure a Wireless Network from Hackers? Suresh Dangi


The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.

In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1.       Strategic antenna placement:

The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.

Use WEP:

WEP stands for Wireless encryption protocol.  It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3.       Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.

4.       Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5.       Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6.       Utilize access lists:

For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

Leave a comment