TAILIEUCHUNG - Wireless all- In-One for Dummies- P5

Wireless all- In-One for Dummies- P5:I still remember when I got my first cordless phone. Suddenly, I didn’t have to run to the kitchen when the phone rang, I just carried the phone with me. I could make a phone call from wherever I was. Wireless meant freedom, and this is just a phone that I’m talking about! | Configuring Vista 99 You have three options Home You are using this on a private network such as at home. Your computer can be discovered on the network and firewall restrictions are somewhat relaxed. Work You are using this connection at work where your computer is managed by an IT department. This location is virtually identical to the Home location except that the firewall is further tuned to allow management connections in. Public location You are using your computer in an untrusted network that s outside your control. The computer will be hidden and the firewall is very restrictive. The shields are up and phasers are set to kill 4. Select the Home option. Confirming and changing settings Figure 6-16 shows the Vista system tray. Look at the picture of the two computers with the globe. The icon indicates you are connected to a network otherwise there would be a red X on top and the globe indicates that you have a path to the Internet through this connection. Book II Chapter 6 Getting Your PC On the Net Figure 6-16 The Vista system tray. Hovering over this icon gives even more details. From the box that appears you can see that this computer is connected to the renfrew network and has access to both the local network and the Internet. The house to the left tells you that the security location is Home. Finally the signal strength is four bars out of five otherwise known as Very Good. To the Control Panel Launch the Control Panel by choosing Start Control Panel. Then choose Network and Internet Network and Sharing Center. If you haven t noticed by now everything in Vista seems much cleaner than before just harder to find The Network and Sharing Center is shown in Figure 6-17. Along the top you can see the same information you learned from the icon in the system tray. The bottom half shows you all the security settings. In Figure 6-17 you can see that this machine is configured for very limited sharing. You may click on each row to change the setting. 100 .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.