Earn money by working online at the comfort of your house.

Do you wanna earn extra money by working online?

The following are the top websites where you can work as a freelancer and earn big.

  1. Fiverr
  2. Etsy
  3. Upwork
  4. Swap.com
  5. Cardpool.com

Now you can visit the above sites (any of your choice, but i prefer Fiverr) and signup for a user account.

In the case of fiverr, what you shall do is create gigs (jobs) in the profession you’re best at and start selling by offering your gigs to buyers (that’s your clients).  with time you will build your reputation and get enough clients as well as reviews.

Kindly, check my account and the services i offer on fiverr on the link below.

martin10111

I wish you all the best in your freelance online jobs.

“It is better to fail in originality than to succeed in imitation.”

 

Advertisements

ICT Course specialization projects.

Dear ICT student, I know you love coding, developing complex algorithms for your computer program. But you might be stuck somewhere in your coding, therefore, stop worrying for I am here to give you a helping hand.

I’ve knowledge in various notable languages; for websites I shall develop you a catchy one, if it is a windows based application, I’m good in visual basic for apps (I.e VB), C, C++ and Python.

Kindly let me know what kind of a project you’re tackling, and how best I can help you. Remember you shall pay me a small fee, which we shall negotiate for the work to be done.

Basically, coming up with a Management Information System requires you to work together with other people closely, and that’s where I come in.

If interested, email me: martinphilip85@yahoo.com or app me via 0706519512

The screenshots below is a proof of work in progress.

Sajiloni girls

Stock control MIS

Tackling Computer projects in Access with VBA.

Hello dear form four computer student, are you stuck in your computer project?

I am willing to help you tackle your project easily, kindly email me, text or call me via 0706519512 martinphilip85@yahoo.com

your exam question (451/3). I shall do this job at a small fee which we shall agree before i commence my job.

I’m  good at creating user interfaces for applications as well as writing program codes.

you can check some of works i have done here.

fig 1. Login Screen

Login form/screen

Login

switchboard

Switchboard

Above are some of input screens i created for a computer project (Mwanzo Baraka MIS) last year. If you are interested, holla me.

Thank you.

Business Plan/ Project Proposal writing Services.

Hello reader,

Are you stressing on how to write a business plan or a project proposal? then worry not since i shall offer you a better solution.

I am a professional business plan/Project Proposal writer; having done hundreds of business plans and Project Proposals for clients (both in colleges and Universities).

I shall write you a business plan or Project Proposal of any nature, I am here for you.

HOW TO PLACE AN ORDER

  1. Make An Enquiry

    Email me or call me with your full work or order requirements.

  2. Confirmation

I Shall confirm if i can complete the order within the stipulated time-frame and send you the order quotation

3. Make Payment

Send payment via Mpesa to 0706519512 and work on your order will commence immediately.

4. Order Completion

After order completion, I Shall email you the order. Thereafter, you have a 3-week period to request for revisions.

Below are my email addresses and Mobile number:

Email: martinphilip85@yahoo.com

OR mutieloafer@gmail.com

Mobile Number: 0706519512

Kindly visit my fiverr site to see other gigs (services) i offer. https://www.fiverr.com/users/martin10111/

Gallery

Desktop Virtualization

I love this piece of information about desktop virtualization

Martin's Blog

What is Desktop Virtualization?

This is a virtualization technology that separates a normal computer desktop environment  from the physical computer.

Basically, in this scenario, one centralized computer that runs the server software is accessed by Virtualized Desktops which are also stored in the server computer and accessed through network.

The Computing model used in this nature is the, Client-Server.

The most common technology used in desktop virtualization is Ncomputing, which uses VSpace Server. Its most affordable technology you can find in the market.

Multiple users (Maximum of 100) can login into the server simultaneously, the VSpace Server software divides a computer’s resources into independent virtual work-spaces that give each user their own rich PC experience

What are the Advantages of desktop virtualization?

  • Flexibility.
  • Desktop security
  • Reduced costs.
  • Ease of maintenance
  • Secure, mobile access to applications.

Check the images belowncomputing-in-hindi

enterprise-vdi-vs-vspace

View original post

Desktop Virtualization

What is Desktop Virtualization?

This is a virtualization technology that separates a normal computer desktop environment  from the physical computer.

Basically, in this scenario, one centralized computer that runs the server software is accessed by Virtualized Desktops which are also stored in the server computer and accessed through network.

The Computing model used in this nature is the, Client-Server.

The most common technology used in desktop virtualization is Ncomputing, which uses VSpace Server. Its most affordable technology you can find in the market.

Multiple users (Maximum of 100) can login into the server simultaneously, the VSpace Server software divides a computer’s resources into independent virtual work-spaces that give each user their own rich PC experience

What are the Advantages of desktop virtualization?

  • Flexibility.
  • Desktop security
  • Reduced costs.
  • Ease of maintenance
  • Secure, mobile access to applications.

Check the images belowncomputing-in-hindi

enterprise-vdi-vs-vspace

How to hack remote computer using IP address.

CYBERCRIME

AUTHOR: MARTIN PHILIP

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, http://www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.

  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping http://www.google.com

will fetch the IP address of Google.com

a How to hack remote computer using IP Address

This is how we can get the IP address of the victims website.

How about your friend’s PC? You can’t do http://www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.

One of the widely used method to detect IP address of your friend is by chatting with him.

You might find this article helpful

Now you got the IP address right? Is it online?To know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and venerable ports.

b How to hack remote computer using IP Address

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.

telnet [IP address] [Port]

c How to hack remote computer using IP Address

You’ll be asked to input login information.

d How to hack remote computer using IP Address

If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.

In this way you’ll able to hack remove computer using only IP address

Local Area Network (LAN)

DSC00932                                                           25-ways-to-cut-IT-costs-bob-300x250

 

Local area network

From Wikipedia, the free encyclopedia
Jump to: navigation, search
“LAN” redirects here. For other uses, see LAN (disambiguation).
Computer network types by spatial scope

A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines.[citation needed]

ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to build LANs.

History

A conceptual diagram of a local area network using 10BASE5 Ethernet

The increasing demand and use of computers in universities and research labs in the late 1960s generated the need to provide high-speed interconnections between computer systems. A 1970 report from the Lawrence Radiation Laboratory detailing the growth of their “Octopus” network[2][3] gave a good indication of the situation.

Cambridge Ring was developed at Cambridge University in 1974[4] but was never developed into a successful commercial product.

Ethernet was developed at Xerox PARC in 1973–1975,[5] and filed as U.S. Patent 4,063,220. In 1976, after the system was deployed at PARC, Metcalfe and Boggs published a seminal paper, “Ethernet: Distributed Packet-Switching For Local Computer Networks.”[6]

ARCNET was developed by Datapoint Corporation in 1976 and announced in 1977.[7] It had the first commercial installation in December 1977 at Chase Manhattan Bank in New York.[8]

Standards evolution

The development and proliferation of personal computers using the CP/M operating system in the late 1970s, and later DOS-based systems starting in 1981, meant that many sites grew to dozens or even hundreds of computers. The initial driving force for networking was generally to share storage and printers, which were both expensive at the time. There was much enthusiasm for the concept and for several years, from about 1983 onward, computer industry pundits would regularly declare the coming year to be “the year of the LAN”.[9][10][11]

In practice, the concept was marred by proliferation of incompatible physical layer and network protocol implementations, and a plethora of methods of sharing resources. Typically, each vendor would have its own type of network card, cabling, protocol, and network operating system. A solution appeared with the advent of Novell NetWare which provided even-handed support for dozens of competing card/cable types, and a much more sophisticated operating system than most of its competitors. Netware dominated[12] the personal computer LAN business from early after its introduction in 1983 until the mid-1990s when Microsoft introduced Windows NT Advanced Server and Windows for Workgroups.

Of the competitors to NetWare, only Banyan Vines had comparable technical strengths, but Banyan never gained a secure base. Microsoft and 3Com worked together to create a simple network operating system which formed the base of 3Com’s 3+Share, Microsoft’s LAN Manager and IBM’s LAN Server – but none of these was particularly successful.

During the same period, Unix computer workstations from vendors such as Sun Microsystems, Hewlett-Packard, Silicon Graphics, Intergraph, NeXT and Apollo were using TCP/IP based networking. Although this market segment is now much reduced, the technologies developed in this area continue to be influential on the Internet and in both Linux and Apple Mac OS X networking—and the TCP/IP protocol has now almost completely replaced IPX, AppleTalk, NBF, and other protocols used by the early PC LANs.

Cabling

Early LAN cabling had been based on various grades of coaxial cable. Shielded twisted pair was used in IBM’s Token Ring LAN implementation. In 1984, StarLAN showed the potential of simple unshielded twisted pair by using Cat3 cable—the same simple cable used for telephone systems. This led to the development of 10Base-T (and its successors) and structured cabling which is still the basis of most commercial LANs today. In addition, fiber-optic cabling is increasingly used in commercial applications.

As cabling is not always possible, Wi-Fi is now very common in residential premises, and elsewhere where support for laptops and smartphones is important.

Technical aspects

Network topology describes the layout of interconnections between devices and network segments. At the Data Link Layer and Physical Layer, a wide variety of LAN topologies have been used, including ring, bus, mesh and star, but the most common LAN topology in use today is switched Ethernet. At the higher layers, the Internet Protocol (TCP/IP) has become the standard, replacing NetBEUI, IPX/SPX, AppleTalk and others.

Simple LANs generally consist of one or more switches. A switch can be connected to a router, cable modem, or ADSL modem for Internet access. Complex LANs are characterized by their use of redundant links with switches using the spanning tree protocol to prevent loops, their ability to manage differing traffic types via quality of service (QoS), and to segregate traffic with VLANs. A LAN can include a wide variety of network devices such as switches, firewalls, routers, load balancers, and sensors.[13]

LANs can maintain connections with other LANs via leased lines, leased services, or the Internet using virtual private network technologies. Depending on how the connections are established and secured in a LAN, and the distance involved, a LAN may also be classified as a metropolitan area network (MAN) or a wide area network (WAN).

See also

more pictures