Wednesday, 14 April 2021

Friday, 26 June 2020

EXPERIENCE ON STEPS TO INSTALLATION OF IP CAMERA

(1) Needed power gadget is 2.4KV inverter (Radiant v 2000), that Convert DC to AC with a socket is used to drawn current from two 12 volts battery making it 24 volts.

(2) Laying of about 305 meter Ethernet cable underground to connect the cameras from their distant to the server room, when the distant is less than 100 meter range, but if it is more than 100 meter range, the cameras are set wireless.

(3) Example using two Ethernet cable to connect 2 cameras and a power cable for the switch at the base of the camera, these three cables have to go through white 25MM Pipe to shield it from rusting underground. In order to achieve this, use fishing tape to pass through the laid pipes attaching the cables along may be comprising four  Ethernet cables (one for the radio, two is for the cameras and one for power surge or switches.

(4) Drilling the wall where the fishing tapes will go through with concrete beats and first passing through the white 25MM pipes which is easily bent as well as climbing the tower to mount cameras in case of a farm or field but in case of a building, the camera are positioned at the top most floor to capture scene as well as record and store events for future reference.

(5) On the server, connect the RJ 45 multi - link Ethernet modem

(6) Using a laptop to configure Data to the main server by connecting with crimped RJ 45 pin head Ethernet cable to the RJ 45 port that is already connected to the server and the internet.

(7) Open the internet page and type from the Google.com to get the ping "window/system32 page.exe"

(8) go to network settings on the desktop of the server and change the network settings by entering the LAN (local Area Network) IP (internet Page) address and the subnet.

(9) Entering the LAN IP address to be: 192.168.98.1
Entering the subnet to be: 255.255.255.0
Enter the server IP to be: 192.168.98.2, then followed by each configured IP address of the cameras on the network will follow serially 192.168.98.2, 192.168.98.3, 192.168.98.4 etc depending on the number of cameras configured.

(10) On the server, we have to first run manual IP, by going to my network places through the icon the shortcut of the desktop of the server computer and get local area connection. Then type in your DNS  IP address as follows:

Preferred DNS Server: 192.168.98.1
Alternate DNS server: 8.8.8.8

Now ping "8.8.8.8" with 32 bytes at command prompt on the server to see if it is through.
Still ping yahoo.com on address bar to see that the internet connection is through or confirm network connection.

(11) Visit google.com on the laptop to check if there is network connection as well.
(12) Go through online port scan with the laptop to get Host name or IP version4 address: 82.128.54.35. This IP address is for the radio, which links the wireless cameras to the internet. Now, we still have to ping this host name on the server to see if it goes through and this is done at the command prompt.

(13) Default IP address that came with the package of the radio is 192.168.1.20 and this is used to configure the radio for internet network example:
Username: Ubnt
Password: Ubnt

(14) To find out Host DNS: connect to the laptop and ping internet IP address: 192.168.98.1 to get the router status. Also going through untitled Note pad and type:
DNS Primary A: 82.128.127.4
DNS Secondary A: 82.128.12i8.3
 on the server, then confirm by clicking ok.
As well as typing these into the LAN DNS address.

(15) To install DVR
  (i) click on the internet address bar and type "http //dvr-sss-3rdeye.com"
(ii) It will display "DVR setup zip" on the server. Then click on it to set up the file on the server, after downloading but before then you have to click add, then, set it up. And every time you download it, make sure you delete it after setup.
(iii) But before downloading, you have to seek authorization from 3rdeye Company to make use of that backup server for IP camera.

(16) In terms of system architecture, 3rdeye have two types of server:
(A) BACK IN SERVER that gives authorization
(B) DVR: which is for their customers

(17) Now, visit the system properties of your server and change the domain name as well as assigning IP address, subnet and DNA. Also assigning numbers to the computer and camera on the network through the IP address; so that when one pings the IP address of a particular camera on his/her phone on the internet address bar, he will be monitoring what is happening on the scene any where all over the world.

(18) Restart up the 3rdeye from the windows icon and after restarting, flemlet numbers are changed.

USING TRENDNET IP CAMERAS A CASE STUDY FOR CONFIGURATION OF AN IP CAMERA

NOTE: while opening the camera, make sure you don't touch the head because it will affect the product of the image. The camera is purchased with the mounting brackets in carton.

SETTINGS ARE:
(1) Fix the antennae to the Trendnet camera
(2) plug in the RJ 45 crimped pin connector to the camera. Now connect to the power adapter needed depending on the voltage and plug in the other head of  RJ 45 pin connector to modem port.

(3) Now, insert the IP camera CD on the laptop to install it. Then set it up from the setup wizard as stated in the installation guide booklet. After the setup, it will demand to rescan, if it cannot rescan the camera, unplugged from the modem and select the camera. After which you can connect back to the modem.

(4) Don't use high voltage as this will damage the Trendnet camera switch or power socket. Always use a step down, if necessary step down from 320 - 300 volts up.

(5) It is during setting up that one specify whether to run the camera wireless or not. It also demands for ID and Password example ID:Admin and Password: Admin

(6) Note: when the distance of a camera to the server exceed 100 meter, the network goes by wireless setting but when it does not exceed 100 meter, the network goes by Ethernet cable connection.

(7) This comes after setting up the internet and type the IP address in internet website address bar which may be for example: 192.168.98.0/image/jpeg to display the camera on the internet globally. So each camera has a unique internet address to access what is happening. Even in your house where you mounted it. LAN IP V: 192.168.98.10.80

the Trendnet camera configuration settings comprises:
(A) System setting
(B) Audio setting
(C) Video setting
(D) wireless setting
(E) Network setting
(F) User setting
(G) Data setting

Now we need to set up the Trendnet cameras on the server by connecting the camera with RJ 45 Crimped  pin head to the modem and clicking on 3rdeye Icon on the desktop shortcut of the server computer. Now, when it opens, click add IP, on the package carton of the camera is boldly written the IP address of the camera, you are installing, now, begin to add them one after the other. Example is http://192.168.98.9/image.jpeg or http://168.98.10/image.jpeg.

(8) Now, you have to create two folders for recording events on the server, the need for this is, should in case server fails. Folders like (i) AVi (ii) AXY

(9) After which you click on the browse on the AVI to set up its folder as well as on the AXY on the 3rdeye setting environment, this is where the cameras will record events.

SETTING THE IP CAMERA NETWORK WITH A CISCO SWITCH

(1) Using a CISCO switch that has 8, 16 or 32 RJ 45 ports for receiving its crimped pin heads. But let us deploy 8 ports switch as it is connected to power.

(2) The switch is connected to a multi link modem for internet access as well as to the server. The frame rate of the cameras is 1/2 per second which is minimum it can run i.e. it captures per seconds.

(3) One DVI can only capture maximum of 9 cameras while the minimum installation is 4.

CONFIGURATION OF RADIO WITH THE TRENDNET CAMERAS FOR STEADY INTERNET ACCESS

(1) connect the RJ 45 crimped pin head to the RJ 45 port of the radio as well as the other head connected to the laptop port, then start your configuration.

(2) Attach the radio to its antennae example is Bullet ubiquity network radio.

(3) Type the IP address of the radio which is found written on the follow come carton example: 192.168.1.20/index.cgi
LAN IP Address: 192.168.1.20
Base station SS ID Example: Emeka Farm LTD
Frequency: 247 HZ
Channel: 8
Host Name: UBNT

(4) The basic wireless settings required are:
Now, you can still ping 192.168.1.20/network.cgi to get the basic settings which are:
IP Address: 192.168.1.20
NETMASK: 255.255.255.0
GATEWAY IP: 192.168.1

(5) Advanced CGI required are:
Ping 192.168.1.20/advance.cgi or ping http://192.168.98.5 to get advanced wireless which are the following:
Host Name: 3rdeye video network
Administrator or Username ID: Admin
Current password:
New password:

(6)Now, Reboot after setting by typing: http://192.168.98.10/reboot.cgi at the command prompt.

Note: The radio is connected to an Adapter that bridges the power line and the data.

(7) Each camera must have its own IP address. Remember that the last number on the IP address is the host number for the camera

STEPS TO SETTING EACH CAMERA

(1) Double click the Trendnet camera icon on the server Desktop
(2) Enter the IP address for the camera,  together with the ID and Password and click next.
(3) Modify the IP, subnet, net mask etc and click next
(4) Select wireless or not depending on the distant position of the camera to the server base
(5) For wireless setting, complete the following options:
SSID: EMEKA FARM LTD
COUNTRY: Nigeria
TEEE_: BO2.11 Mode: B/G Mixed
Web Key Length: 128 bit
Channel Shifting: disabled
Web Key: 1234567890
Note: you are the one to assign the web key as you like. It is network security key.
WPA Preshared key : Your state.

AFTER SETTING UP THE CAMERA; THE NEXT IS TO MOUNT IT

The main controller which is the main 3rdeye server: http://backend.sss-3rdeye.com/list_Clients.php
http://backend.sss--3rdeye.com/change-servers

Anytime, you use switch to configure Network, it is called star topology.

Bus topology uses looping box on the wall, if one is affected, it affects others.

SECOND PHASE: The second phase activities during the installation are:
(1) Crimping the Ethernet cables with the crimping tools known as Oubau tool to an RJ 45 pins according to their specified distance from the server room or base to the position of the cameras.

(2) After the crimping, deploying LAN tester Remote to test the crimped pin heads of each cable to see if the data are transmitting accurately,  the LAN tester remote indicator light will prove it, now if it is not well crimped, the data transmission will be obstructing and it will show on the indication light movement on the remote LAN tester. That means you have to cut off the crimped RJ 45 pin head and repeat the process of crimping the cable, until you get it correct.

(3) During testing, the correct cable that is well crimped with the RJ 45 pin heads will indicate through the 8 lights of the Remote LAN tester without jumping their serial protocol movements on the indicator, but if it does jump one or two, it means that the data is not transmitting well because of wrong crimped RJ 45 pin arrangement.

(4) The 8 Light on the LAN (Local Area Network) Remote Tester represents the 8 pins on the Ethernet cable connecting the RJ 45 pin head, on successful indication of these lights during testing with the remote tester shows that the pin heads arrangement are well crimped and the data are transmitting very fine. So, you need not repeat the process. So you do this for all wired Ethernet Cameras, Radio, Computer etc that are on the network of any type, not limited to the camera alone.

THIRD PHASE: The 3rd phase activities comprises
(1) The arrangement of the network radio by building of Mast, but where there is no mast or tall building, we can use long pole arrangement to set the radio for internet network signals. So, getting  100 meters long pole with a clip that binds them together and an iron clip binder that comes with radio.

(2) Now, look for an elevated surface that will help the pole go higher, climb there and mount it.

FOURTH PHASE: The fourth phase activities are:
(1)The arrangement of the cameras the protectors and other gadgets.

(2) Using step down adapter as it will match the voltage amp of the camera to connect power.

(3) As well as connecting the RJ 45 connector with wire through the protector of the cameras to the RJ 45 port of the camera for data transmission.

(4) Using concrete drilling beat according required specification to drill four holes on the wall base the cameras at each strategic point, the four holes will hold the camera to stand as you fix and tighten the stand faced up with bolt nut. The stand and the camera positioned inside its bracket locked with small keys for security purpose. Then, hang the brackets and its camera on the drilled position on the wall.

RJ 45 PIN HEAD CONNECTOR ETHERNET WIRE ARRANGEARRANGEMENT

To learn this in full details, visit www.wikihow.com/Crimp-Rj45?amp=1

And for further Trendnet camera settings, visit www.trendnet.com

Written by:

ONYIA EMEKA HEATH
+2348186388641

Saturday, 10 June 2017

EXPERIENCE: HOW I FIXED MY DESKTOP COMPUTER OF DELL MODEL OPTIPLEX GX 620 AFTER MANIPULATIONS OF HACKERS:


My system having been hacked already to the extent that they disabled the TPM (Trusted Platform Modules) which is a chip attached to the mother board that helps to regulate the system Bit locker security at default from the system BIOS, so that I cannot be able to activate bit locker keys to protect my system. I have to press F2 key to run utility setup from BIOS and I have to venture to security option and press enter to display options. After which I began to scroll down with the arrow key on the keyboard to view the status of TPM and it was deactivated. I have to activate it once more. And exit and save the BIOS settings.

Next I have to wait to boot to desktop, and hold down ALT + SHIFT+ ESC keys to pump up the task manager to disengage intrusions on my system through the PID (Process Identification) and other identity as well as their capacity size dominating my system. I will do this often whenever I boot to desktop by right clicking on the suspected and identified intrusion to end their process. Once I have achieved terminating their discovered intrusions.

I have to proceed to control panel and click system and security. Then Bit locker on my hard drive. And I also opened windows explorer or file explorer and right clicked to select turn Bit locker which generated the keys and demanded for external drive to save the keys and as I did saved the keys. The bit locker started automatic encryption and it continued for an hour plus before it could complete the process, even after the power went off, and turned on the system, it resumed where it stopped the encryption automatically. These steps gave me hedge against intruders who now ceases gadgets like Victual cards, Data cards, Plug-in to bypass the process and still gain access to my computer and Data.

After a long period of trials on how to end the operation of these hackers who now has finally gained full entrance to my data through above mentioned gadgets. I have to delete the plug-in folder through Corel File on program (x86) file folders.

I also have to go back to BIOS and activate the Default setting when I noticed projection of virus to my computer registry which makes some consistence interval cracking noise of movement on my hard disk as well as deactivate and activate back TPM. This new setting got me locked out as well as the whole hackers and requested for my Bit locker 48 keys number which I provided and gain back access to the operating system. Now getting the system to boot to windows became a problem as the incessant attacks of the projection continues which make the system very slow. When it get to the point where I scheduled Check disk, I noticed that It could not proceed to check the disk because already they have deleted a short code on the registry that connect the operating system to the hard disk. Just as they previously disabled the codec that regulates my DVD Player sounds from the registry. At this point, trying to repair with my DVD Installation Disk became a problem because whenever I insert a DVD, they will use their magnetic device and Delete the content, before I know it the DVD I bought N400.00 becomes empty. It may sound funny but it was a reality, even the Computer Engineer that repaired my system asked my how possible, and I told him that is why you should upgrade you Knowledge to international standard and not to limit yourself to ESUT (Enugu State University of Science And Technology, Nigeria) Level of Engineering.

Finally, I explored the system with my repairer together and we contributed knowledge to figure out what was actually wrong with the computer, on his own side He blamed me that it may be as a result of not shutting the system down the normal process. But I proved him wrong that not shutting the system down normal process cannot corrupting about 265500 file on my hard disk. I told him that it was a projection of virus through plug-in gadgets that damaged those file. Now getting to repair those files through MS-DOS with command “Chekcdsk /f” which took us a longer time to complete but not meeting up the demands to restore the entire file which takes a longer time to repair one makes us to format entire Hard disk and started afresh to load software, He now look for strong Anti Virus name 360 Total Security and installed for protection with Smada antivirus which is currently giving them some hedge to some extent as regarding their virus. Though I have noticed recent established virus of an intrusion in my system which I managed to use Taskkill /pid pid number command example Taskkill /pid 1245 to terminate through MS DOS but it reads access denied, now I have to use system restore to eliminate the intrusion which I gave entrance by mistakenly clicking the wrong file which they project to ask you for permission to operate in disguised.
Now I have started the whole thing afresh to maintain a good record as well as be security conscious to safe guard my data from hackers and other malicious attack.

ONYIA EMEKA HARFORD
+2348186388641


Wednesday, 5 October 2016

HOW TO ASSEMBLE COMPUTER HARDWARE PARTS TO GET A COMPLETE DESKTOP SYSTEM

My experience in ICT for 19 years till date has given me an opportunity to share my knowledge on computer Assemblage, but before I begin to explain the steps on assembling computer system Unit to work together as complete system. I will not forget to highlight the following:
1.     Computer definition
2.     Components of system units

DEFINITION: A computer is an electro-mechanical device or machine that has the ability to accept, Process, retrieve and output data. This is to tell you that computer is made up of the following:
1.     Input Devices
2.     Processing Devices
3.     Output Devices
4.     Storage Devices

THE INPUT DEVICE: The input devices are those components that we use to issue command as well as input data in to the computer to process, examples of these devices are mouse, Keyboard, Magnetic Pen, Mic Joystick etc.

THE PROCESSING DEVICES: The processing devices are those devices that acts as thinking element of computer which sometimes determines the speed limit, take for instance a man acts fast depending on the capacity of his brain: if he has lower standard of brain capacity due to malnutrition or hereditary factor; it will affect his/her productivity or action. As it tends to slow down the way of does things, now the speed of a system unit is depended on the capacity of the processing unit which is known as the micro processor. Some people call it the Arithmetic and Logical Unit or control Unit. It has direct access to the memory of the computer system known as RAM which determines its speed limit.

THE OUTPUT UNITS: The output units are those units that give the visible result or end product of the inputted data in a visual forms like hard copy and they are Printer, Digital Video Projector, Touch Screen,  Visual Display Unit or Monitor etc.

(I)        THE STORAGE DEVICES: the storage Devices are the memories of the computer system which is divided in two Storage sections:
1.     The Internal Memories
2.     The External Storage devices

THE INTERNAL MEMORIES: They are the main memories of a computer system unit like:
·        Read only memory (ROM)
·        Random Access Memory (RAM)

These two memories are classified as the primary memories of a computer system Unit. Both memories has direct connection to the Micro Processor, which is a small chip attached to a mother Board component of a system unit.

(I)                ROM:  Read Only Memory as specified comprises the BIOS information and setting used to boot the computer system. The first information you see as soon as you cool boot a system units from the power button until it boots to windows are stored  in the Read Only Memory chip, you cannot manipulate the information stored here because they enable computer to function well. Users uses the programs on the ROM to solve their own problem, they cannot change it because it is statically coded.

(II)             RAM: The Ram which is still the internal Memory of a computer system unit known as Random Access Memory is where we store the information you we input in to the computer. This is where all your works or documents prepared are stored. Any information you did not save in this memory while you are working on computer is lost when power goes off because it is volatile from the manufacturing. This is where you can save and retrieve data whenever you want. Also the higher the Ram Size become, the higher the computer system speed increases. We have two type of RAM sitting in the Mother Board and they are:

(A)SIMM: which means Single In-line Memory Module: up to 32MB

(B) DIMM: Which mean Double In-line Memory Module: more than 32MB till 588MB

The difference between the two sitting is that SIMM is up to 32 megabyte while  is more than 32MB till 588MB

                                  A RAM MEMORY

EXTERNAL STORAGE DEVICES: These are external storage devices known as secondary devices attached to the mother board through the interface cards port or an interface cable which is the IDE Cables or Ribbon used to connect the Hard disk to the Mother Board, example of the external devices are:
(1)             Hard Disk
(2)             Floopy Disk
(3)             CD ROM/ DVD DRIVE
(4)             FLASH DRIVE

(1)             HARD DISK:  A hard disk is a secondary device of a system unit which has a magnetic platter and it is fragile in according to make. This is why a system engineer should handle it with care, because if it falls on a hard surface, there is tendency that it can crash immediately. It can also fail due to continue power failure or improper shutdown of the computer system or heavy file load. The hard disk comes in various sizes starting from 2.5 Gigabyte to Terabyte, so this also help to determine the rating of a computer system unit as regarding the Pentium



                          A TYPICAL HARD DISK DRIVE
           
(2)             FLOOPY DISK: I might not discuss this device because it is outdated, due to its low memory capacity and it is easily damaged or corrupts when in use.
(3)             CD OR DVD ROM DRIVE: The CD or DVD ROM drive is also a secondary storage device that helps in computer hardware maintenance, this is an avenue for installation after assembling a system unit. This is where we insert CD or DVD disc for installation or for leisure.


                          A TYPICAL DVD/CD ROM DRIVE


(4)             USB FLASH DRIVE: The USB flash Drive is used to replace the floppy disk because of its large capacity of storage memories like 2GB, 4GB, 6GB, 8GB up to 32GB memory of storage.

A TYPICAL USB FLASH DRIVE USED AS BROADBAND MODEM

(5)             MOTHER BOARD: The mother board, as it is called is a circuit Board that harbours every connection on the system unit. This is where the whole gadget is integrated to work as one.

On the mother are the electronic components like the resistor, transistor, transformer, Diodes etc. which helps to distribute current to the buses in the system unit. There are wires on the mother board called buses and these wires on the mother board are linked to micro processor chip .We has two types of Mother Board and they are:
·        AT
·        ATX

The AT Mother Board has a separate one point socket for Power Supply Unity (PSU) while The ATX Mother Board has two socket ports for Power Supply Unit Pins which are pin 8 and Pin 9. Now let us highlights components of a mother Board:

                          A TYPICAL MOTHER BOARD

MICRO PROCESSOR: Just as I said earlier, this component is attached to the mother board, it acts as the intelligent Quotient (IQ) of a computer system by assimilating information stored in the RAM. The Micro Processor sitting or port on the mother board is of two types:
(i)                The Socket Type sitting or Port
(ii)             The slot Type Sitting or Port

This is to mean that the socket of Micro Processor is the male type while the sloth is the female. So the micro Processor act as the brain of the computer, and without it, the computer cannot work. Attached to the back of this device is a cooling fan. The capacities of processor chip are often expressed in word or sizes. When I talk of word I mean the number of bits, it has 16, 32 or 64 that the Central Processing Unit (CPU) can access at one time, The More Bits in Word, the more powerful and the faster the computer becomes.

(II)       EXPANSIONS SLOTS: The expansion slot is a sitting on the mother board where we sloth expansion or interface cards like VGA (visual Graphics Adapter) cards, Serial Cards, USB Cards, Parallel Cards etc. these expansion cards are called expansion because it has ports attached to it. So without USB expansion Cards slot to your mother board, you cannot have a port to plug in your USB devices like USB flash and USB Phones. In fact without USB card on your system, you cannot have USB plug-in connected to your system.

Now these expansion slots on the system unit are divided into three:
(i)                PCI SLOTS (White slots)
(ii)             ISA SLOTS (Black Slots)
(iii)           AGP SLOT (Brown Slots)

(i)                PCI SLOTS: The Peripheral Component Interconnect slot (PCI) is an expansion slots on the mother board which provides connections for expansion cards to the system board. The PCI is white color, you can easily identify it when you are assembling system, the cards are slots according to their fittings on the sitting sloth. It has a high speed of 32bit or 64 bit bus that is over 20 times faster than ISA buses.

(ii)             ISA SLOTS: The Industrial Standard Architecture (ISA) is an expansion slot as the name implies is expanded to 16 bits. Although too slow for many of today application. The color of the slot on the mother board is black. It is still widely used.

(iii)           AGP SLOT: The Accelerated Graphic Port Slots or Port is over twice as fast as PCI bus, while the PCI is used for a variety of purposes, the AGP is dedicated to the acceleration of graphics performance widely used for graphics and 3-D animation, The AGP IS brown in color on the mother board.

The white sloth is sometimes shorter in length and that is where we slot our network cards or expansion card or modem. Almost all the computer we see today, they have the entire required card called multifunctional board.

Now having gotten to this stage, we have heard about Pentium. The Pentium is determined by the rating of the following:
(1)             The Hard Disk
(2)             The RAM
(3)             The Micro Processor

As a Computer Engineer, the above three component is what a system engineer will check as  the rating before purchasing the computer may be for his company or other ICT purposes. We also have some recent board in the market which is called GIGAPROS Board. It has the micro Processor attached with the board, this is to mean that you cannot separate the micro processor from the system board, if the micro processor is damaged; you have to discard the board.

The above description is for DESKTOP COMPUTER, the difference between the desktop device and that of laptop are:
(1)             The laptop components are of smaller in sizes
(2)             The laptop input and output units are integrated together and made portable for easy mobility.

Now the rating of computer system based on the sizes or features of micro processor are:
·        Pentium one           -           70 -235 MHz
·        Pentium two           -           233 -400 MHz
·        Pentium Three       -           450 - 1130 MHz
·        Pentium Four         -           1200 -3000 MHz
·        Pentium Five          -           1800 MHz

From above rating, Pentium one cannot support or carry as from 20 Gigabyte of Hard Disk Drive while Pentium four can carry or support as from 4GB to 180GB

(III)            The interface cable also known as Ribbon is of two types:
·        IDE CABLE TYPE
·        SATA CABLE TYPE


IDE CABLE TYPE
The IDE cable type for mother board has its head to male or female. The male type has pins while the female type has holes. The commonly used one today is the female type which has 34 lines of wires is used to connect floppy disk while that of 40 lines is used to connect Hard disk drive. At the End of the Cable you will see a red line Mark used to observe PIN1 RULE during connection to the mother board. On the IDE Port in the mother board where this IDE Cable is plug, you will see the indication arrow of Pin 1. You will also see it written on the end of floppy and Hard disk socket port in the mother board. You position the red end of the cable to the indication point during connection to the mother board. Now concerning their power, they have direct access to power. They cannot function without that connection to power supply Unit.


SATA/ATA CABLE TYPE
On the other hand, the SATA/ATA Cable are the same but of different port with the same  function, we have SATA 0,SATA 1,SATA3, and EXTERNAL SATA, they have the same function which is to allow the user to enable or disable an ATA or SATA device such as Hard Drive, CD Drive or DVD.

                                       A TYPICAL SATA/ATA CABLE TYPE

THE POWER SUPPLY UNIT
The power supply unit or power pack supplies electric current to different part of computer directly or indirectly. Now what the power Supply Unit does is to convert the AC (Alternative Current) to DC (Direct Current) and it does the work of a transformer, it steps down the voltage to the required units to the different parts of the system unit it is being connected. We can interchange the wire to different part of computer like the mother board, Hard disk drive and CD /DVD Drive,, these are the main important places we connect the Power Supply to supply current at a very low voltage of 5 volts and 12 volts before we proceeds to other parts like the power button which gets its own power direct or indirect depending on the system make.

TWO TYPE OF POWER PACK:
The two type of power pack are decided together with the type of power supply Unit to use. We have the two as follows:

·        AT: Example PIN 8 AND PIN 9
·        ATX:

NOTE: The power Supply Unit goes together with the mother board, the type of power pack to use is depended on the type of mother board. The AT MOTHER BOARD goes with AT POWER SUPPLY UNIT while ATX MOTHER BOARD goes with ATX POWER SUPPLY UNIT

AT POWER SUPPLY UNIT
The AT power supply unit is used for mother board which has two power socket that receives power from two pins of power pack which are PIN 8 and Pin 9. So the pin 8 and Pin 9 of this power supply units, supply direct Current to the mother board at a very low voltage.


ATX POWER SUPPLY UNIT
The ATX Power Supply unit has only one connector to the mother board. So the ATX Mother board also has a single port for power supply unit connector.

Both ATX and AT have other two connectors known as the Molex and Berge that connects to the DVD-ROM and Hard Disk. When connecting the power supply to the mother board, you have to be care full or your computer will blow.

Now we are going to know steps to assemble all these parts for them to function as a system Unit:

(1)             Absorb A skeleton of  a system unit
(2)             Never connect the cable upside down
(3)             Never force your mother board or drop it
(4)             Always make sure you observe the pin 1 rule when connecting ribbons or IDE cable because incorrectly connected missing a row of pins or a pair of pins.
(5)             Now, after screwing the mother board to the absorbed skeleton using pad to shield the rear side. Now we have to know how to connect the interface cable using IDE Cable or RIBBON as a case study. The Ribbon has three connector:
(i)                The Head or Primary master
(ii)              The Middle or primary/secondary slave
(iii)            The Tail or Secondary Slave

Using the following diagram for illustration of connection of the interface cable or IDE CABLE, it will enable you to understand how to fix IDE in the system unit to function appropriately:



The primary connector master goes to the primary port while the secondary connector master goes to the secondary port. Then the primary slave connector goes to alternative like Hard Disk or floppy disk altogether like the primary connector master, the same is applicable to secondary slave.

We can connect up to four hard disk in a computer system, the two IDE CABLE, one connecting to Primary Master Port and the other taking the place of CD/DVD ROM Secondary Master Port.

(6)             After this we should ensure that the RAMS are properly slotted to the Ram sitting in the mother Board, because if the RAM is not properly seated, the system cannot power on rather it will be making some poor sound.
(7)             Also we should slot the micro processor properly with the cooling fan working when powered on.
(8)             The next is the interface cards like the VGA  Cards for VGA port which goes to the monitor, USB Cards, Parallel Cards for the printer and Scanner, Serial Cards, all these are embedded on the expansion sloth


Now our system is ready as soon as we finish connecting the Power pins and buttons. Now we can connect the power supply cable already installed with the power cord to the extension wire supported with uninterrupted Power Supply (UPS) while we connect to the monitor through the VGA (Visual or Video Graphic Adapter) port and cable from monitor. Now plug in the mouse depending on the type of ports we have. We can decide to use the USB Mouse and Keyboard which is more solid to others.

The next is installation of Windows, Window’s Drive and Windows software. After that the system is ready for any task.

You can send you comment on this tutorial, you comments are welcomed:


WRITTEN/EDITED BY:
ONYIA EMEKA HARFORD
+2348186388641b


Sunday, 2 October 2016

HOW I RESTORED MY SYSTEM OPTIPLEX GX 620 WITH ADVANCE OPERATING SYSTEM REPAIR TECHNIQUES

It was on the 23rd of September, after booting my system to window 7 Desktop. I decided to dis engage hackers through the task manger, having noticed that there are four established intrusion in my system through “NETSTAT –ANO” Command.

But I noticed that these intruded hackers has manipulated the task manager, that I cannot disengaged them. I have to right click on the task manager and get to click on the properties of the task manager to see security setting . I noticed that they have reset the user from permitting access to “single user”  to “Administrators”  so I have to reset it myself again. When I am done with this. I tried to reboot my system, I noticed that the operating system could not boot to windows menu which was initial problem I solved which was corrupted operating system . the problem continued.

I have to fix it, this time in advanced form, but each time I am concluding the repair, the nearby hackers who are living just close to my house on the other building and under my yard are disabling it. This the people living next to me in another yard are using a magnetic  reaver plug in device mounted to their system to magnet my wi-fi as well as disabled my repairs through MS-DOS.

The advanced repair are similar to the previous one but this time the command goes like this:

(1)       I have to repair the master Boot Record (MBR)

This I achieved through MS-DOS having launched for windows repairs and after it was completed, I click advanced repair and click next. I then entered Admin password which the system requested after clicking next and it displayed options to include windows startup repair and MS DOS. The MS-DOS I selected and type:

            C:\>Bootrec.exe /Fixmbr

The above command permit the repair of the corrupted damaged Master Boot Record (MBR). It is the first sector of your drive and its purpose is to instruct the BIOS the position  to locate the operating system on your computer

(2)       The Second step is to write a New Boot Sector

            C:\>Bootrec.exe /Fixboot

The above command /Fixboot will write a new boot in the system partition. The command will select a boot sector that is compatible with your windows version. This is not limited to window 7, but include other windows. We can use this command when the boot sector is installed with windows that is not original copy. This means low standard operating system or copyright. And we also use it when the boot sector is damaged. When the original windows is installed and use another version to replace it.

(1)           The 3rd command I used was to rebuild the Boot confuguration Data (BCD)

C:\>Bootrec.exe /RebuildBCD

This command is used to fix some error in the BCD. The BCD is where a complete list of what is being load when your state your booting. Also some booting errors are as a result of damaged or missing files in BCD which we use /Rebuildbcd to fix.

(2)           The Final Command I issued before the Hackers Disabled my repair was:

            C:\>Bootrec.exe /Scanos

This command is issued when we have multiple operating system installed in our systems but not all of them are available. This command will select the current Operating System compatible for the system which are not included in the BCD (Boot Configuration Data).

Having completed this process, the Hacker disabled it. But due to my DVD ROM was already failing still being the handwork of this particular hacker with the help of Reaver magnetic device was able to manipulate my DVD ROM by deleting things in the registry Editor. Which almost rendered the             DVD ROM ineffective. The first DVD ROM I changed it because they damaged it through the same process. The new one I replaced, yet they are struggling with it, especially when I am running installation. Is that not wickedness? Somebody that says that he or she is your neighbour?

The most painful thing I experienced from this Hackers was deleting files on my new installation disc I bought through the same mean, whenever I am running installation they will cease the MS DOS Command through the magnetic gadget to my WI-FI causing havock on my system. Sometime I will want to capture the gadget to cancel it but because they are very fast in connecting, I miss the cancellation. And whenever they connect, they must disable one thing or the other. So I bought new Avira Rescue System software; one of the powerful antivirus for wiping off virus from operating system. I insert the disc into DVD Drive to run installation through MS DOS,  when i switch from x:\> Drive which is one of my hard disk because the system has dual core but one hard disk is unfunctional  to E:\> Drive which is DVD ROM and I was successful. I then type X:\>DIR/P/W to display the directories of the Avira virus on the DVD DISK, it showed complete. When I tried to run installation I noticed that the DVD ROM was failing, I tried to know what was wrong by stopping the whole process. But it was strange because that was a new DVD.

I tried to open the disc the second time through MSDOS, behold the Avira Virus CD was empty, the files I saw initially had been wiped out by the hackers, I noticed that the hackers who I knew their locations had deleted my the file on my DVD ROM through MS DOS by connect to my wi-fi, I was mad, I have to pick up my phone and alerted the police of the incident, I told them to investigate in the matter. Because things are getting out of hand. I would have go to state CID the following day to make the official report but it was a Sanitation day which was Saturday. I suspended it. So with evidence I know I can catch up with their wickedness.

I also noticed someone organise teenage boys of 14, 15, 16 and  17 years to use the same monitoring gadget like phone and laptop, under my yard, all they do is to copy my blogging message through wi-fi whenever I am ready to send it. I wonder how people that are martured enough who knows that they cannot read and write, instead of embarking on a seroius trade that will yield them profit at the long run will cease criminality to achieve success. That does not work these days. Those things they are copying are waste, because when the original person relocate to another destination their blogs will fold up. They better start from scratch to learn how to write and type as well as the techniques to blog. This is the main thing that makes a successful blogger. And google can never approve a copyright, may be you thing they don’t know the original owner of those write up. They know. And that is their duty.

Next thing I did was to get the evidence to stop the Hackers on my system with IP addresses I copied down and their port number, I have to do this with my friend in another sytem because mine is no more working. But I first tried it in my system before proceeding to another one.

Now in achieving this I have to take the following steps:

(1)             After restarting the system and pressing F1
(2)             I choose launch for repair
(3)             After the attempted repair and it showed information that it cannot repair the system
(4)             I close the report
(5)             Click on Advance option when it showed up
(6)             I have to click Next
(7)             It requested for my Administrator password which I inserted
(8)             It now displayed five options to include:
A.  Startup Repair
B.  System Restore
C.  System Image Recovery
D.  Windows Memory Diagnostic
E.   Command Prompt

(9)              I have to choose the last option which is the command prompt, it took me to MS-DOS environment.
(10)        I have to type NETSTAT –ANO again to know the active established connections. I copied their Ip addresses from the Foreign address column and their Host ID or name from the PID column. And use the same MS DOS command to trace route location and information about them.

X:\> tracert *type ip address/Hostname*
           
The above command gives you details of the hackers and his ISP Company, what the command does is to give you the information of the source of the attacker from his system which he uses to attack both time and date. But you should know that the address listed before the final one always belongs to the Hacker’s ISP Company.

(11)        Simply Print the information from MS DOS

(12)        And use it as an evidence, report it to your local police department for further tracing route. Now the duty of the police is to contact the ISP Company of the Hacker and trace them from there.


Another thing I did was to eliminate some virus they cease to operate using MS DOS Command:
TYPE:
X:\> DIR/P/W 

and hit the enter key

X:\> Attrib –r –s –H ** /S /D
Or
X:\> Attrib –r

Once  the directories displays, delete or remove  the ones that ends with extensions like: .inf, .exe, .dll and .log

Example:
X:\> Del SETUP.EXE

But if anyone refuses to delete rename it, example rename emeka.exe with emeka.bak

I also noticed that fixmbr command can damage a system partition table if a virus is present or if a hardware problem exist. And once damaged partitions might  be inaccessible, so that data cannot be used. So I have to go and get mini tool partition wizard Bootable CD to rebuild MBR to avoid bringing dmage to data and partition. But I notice mine partition is damaged already. But I cannot penetrate the DVD ROM due to the Hacker keep on deleting the file on the disc. Though the file will be there, but access denied is showing that the files have been deleted.

So I have to remove it from that environment to repair it some other place, because I don’t have the facilities to format and reinstall programs. So I went to a road side computer engineer who aid me with his tools and we formatted the system and reinstall anti virus first before installing new windows unltimate 7 as well as copying back the files. At least the system has come back to it initial state, but the hackers are still trying on to penetrate by all means.  So it is a continuos monitoring affairs.


WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b