10 Basics of the IT Professional

Knowing just how to assign Internet protocol (IP) addresses to computers, detect wireless networks, format hard drives, or install printers to a network isn’t really serious IT business. Fact is, it will be bizarre if you are unable to accomplish them, you may not be an IT Pro after all.

I have identified certain areas that are rarely mentioned but may bring your career down if you are unable to them get done. Arguably, you were not taught in your school, but these are tasks that you need to know to save the situation and your profession.

1. Map Network Drive

This is one of the easiest tasks with one of the biggest benefits (at least in the eyes of the end-user). Mapping drives makes finding data on remote locations such as the server or a PC on the network so much easier for the user. And successfully mapping drives means you won’t be called out again because the user can’t seem to locate the data on the server any longer. The drive(s) when mapped successfully will be displayed in your computer. Read the rest of this entry »

NELSON MANDELA’S ADDRESS TO RALLY IN CAPE TOWN ON HIS RELEASE FROM PRISON

11 February 1990

Friends, comrades and fellow South Africans.
I greet you all in the name of peace, democracy and freedom for all.
I stand here before you not as a prophet but as a humble servant of you, the people. Your tireless and heroic sacrifices have made it possible for me to be here today. I therefore place the remaining years of my life in your hands.
On this day of my release, I extend my sincere and warmest gratitude to the millions of my compatriots and those in every corner of the globe who have campaigned tirelessly for my release.
I send special greetings to the people of Cape Town, this city which has been my home for three decades. Your mass marches and other forms of struggle have served as a constant source of strength to all political prisoners.
I salute the African National Congress. It has fulfilled our every expectation in its role as leader of the great march to freedom.
I salute our President, Comrade Oliver Tambo, for leading the ANC even under the most difficult circumstances.
I salute the rank and file members of the ANC. You have sacrificed life and limb in the pursuit of the noble cause of our struggle.
I salute combatants of Umkhonto we Sizwe, like Solomon Mahlangu and Ashley Kriel who have paid the ultimate price for the freedom of all South Africans. Read the rest of this entry »

Cell Phone Battery Hazards

You may not think of cell phones as dangerous but as their use rises, so does the risk of fires and other unexpected mishaps. There’ve been scattered reports of cell phones exploding and catching fire and even of cell phones emitting sparks that ignite gasoline fires. In response, the industry and the Consumer Product Safety Commission (CPSC) in USA have issued some safety tips. Read the rest of this entry »

Posted in 1. Leave a Comment »

Speed Up Windows Boot Process

Your Windows box might be running slow for many reasons. Viruses, malwares and other user activities may affect the slowness of your computer

Your computer may be slow because you have inadequate RAM; perhaps your computer’s processor is not fast enough. All things being equal, your computer should not take too long to start-up.

I have done a lot of things in the past to boost the performance of my computer, it works out well, performance is improved but then you realize that, it takes a very long time for windows to start after all you have done.

When you experience this frustration, then this can really work for you. You can also try this out to satisfy your curiosity as well. Read the rest of this entry »

Full text: Obama victory speech

Tonight Minnesota, after 54 hard-fought contests, our primary season has finally come to an end.

Sixteen months have passed since we first stood together on the steps of the Old State Capitol in Springfield, Illinois.

Thousands of miles have been travelled. Millions of voices have been heard.

And because of what you said – because you decided that change must come to Washington; because you believed that this year must be different than all the rest; because you chose to listen not to your doubts or your fears but to your greatest hopes and highest aspirations, tonight we mark the end of one historic journey with the beginning of another – a journey that will bring a new and better day to America.

Because of you, tonight, I can stand before you and say that I will be the Democratic nominee for president of the United States of America.

I want to thank all those in Montana and South Dakota who stood up for change today. I want to thank every American who stood with us over the course of this campaign – through the good days and the bad; from the snows of Cedar Rapids to the sunshine of Sioux Falls.

And tonight I also want to thank the men and woman who took this journey with me as fellow candidates for president. Read the rest of this entry »

The Myth Behind Virus Attack And Hardware!

There have been talks and debates as to the extent to which a malicious code or virus can affect the computer hardware.

VirusThe debate is that, some powerful viruses when executed can crash the hardware (Hard disk, BIOS Chip, Memory etc) of the host machine and can never be repaired.

I am aware of the fact that many people have had cause to believe that viruses really destroy hardware especially the hard drive or the BIOS chip!

I disagree entirely in principle to this notion and I intend to raise the arguments for, and against this technically inclined issue so that you can judge for yourself.

As I seek to dissect this myth, I know we can all learn something new from this very important issue [I hope this article would not be too technical, I would not be making myself clear by not invoking some basic jargon]

The Virus effect

When your computer is infected with a virus and your data is corrupted, is the hardware at risk? (I will not explain the types of Viruses and their effects here since they can be ‘goggled’)

Computer virus is a term applied to any program that is designed to damage data stored on a computer system or network. The virus may infect documents, applications or worst of all system files that are essential to the correct running of the computer system. Read the rest of this entry »

Yahoo was enough for me! The ‘others’….

I am sick and tired of all these websites, social networks blog, vblogs chuchu chacha’s and the rest of them popping up in recent times.

When i was introduced to the Internet about 8years ago, I was hooked up to the most popular site Yahoo mail which still ranks the number 1 website till date. It was an ultimate mail service at that time for me and many subscribers. I had my yahoo chat which I frequently use, and other additional services which were of great benefit to me, yahoo photos and briefcase. What was sweet was the fact that, I could only log on to yahoo.com and access all I need on the internet with my user account.

As if that was not enough, my quest for more free services got me hooked to other mail services such as excite mail, killamail and Hotmail which i know have expired now! ‘I don’t need them anyway’, because all I received were junks and spams from don’t know who’s. I love the internet and the more i got involved with lots of online freebies, I’m like, ‘yeah that’s cool’. I keep following threads from inbox to sign up to lots of websites for certain bla bla and these and the gunks were in my inbox more than legitimate mail i received and I got to know they could make my Computer vulnerable to spies who create log files and send them to the programmer, then i started deleting all mails which did not know the sender without reading them. Read the rest of this entry »

%d bloggers like this: