Connect Two Computers using a Crossover Cable

Ever needed to connect two computers together without going through a wireless network? I’ve previously written about how to connect two computers wirelessly using an ad-hoc wireless network, but it’s not as fast as being directly connected.

If your computer are on a wired network, you can network two computers and then share files and folders, but it’s a lot of work! A crossover cable is another way to connect two computers and transfer data.

In order for this setup to work, there are a few things you need to make sure are setup or configured properly. I will try to go through all the different steps in this article.

Step 1 – Configure IP Addresses

Usually, if you are using a crossover cable to connect two computers, the computers are not connected to a LAN network. In this case, you will need to configure static IP addresses for each computer.

You have to make sure that both computers have IP addresses that are on the same subnet. For example, if you give one computer an IP address of 192.168.0.1, then you should give the second computer an IP of 192.168.0.2.
If you used the above IP addresses, you should use a subnet mask of 255.255.255.0. If you use an incorrect subnet mask, the connection will not work.

Lastly, the value for the default gateway should be the same on both machines. You can pick which IP address you want to use, but use it on both computers for the default gateway. Below is how my setup looks for one computer:
Step 2 – Crossover Cable

The second thing you need to verify is that you actually have a proper crossover cable. Basically, there are a few different types of crossover cables, but it’s best to get the standard crossover cable where the green and orange pairs are swapped and the brown and blue pairs stay in the same position.

The only pins that need to be crossed are 1,3 and 2,6. So just check your cable on both end and make sure it matches the diagram.

Step 3 – Local User Accounts

If you’re having problems accessing files both ways, you may have to create a user account on each computer that has the same name and same password. This helps get past any kind of Access is Denied errors that may pop up.

Make sure the accounts are administrator accounts also! It’s best to create a new account rather than rename a current account.

Step 4 – Disable Firewalls

Finally, you should disable the firewall on both computers to ensure that none of the file sharing ports are being blocked. You can do this by going to Control Panel and then Windows Firewall. Click on Off.
That’s about it! If you follow all these steps, each computer should be able to access the other properly. If you are having problems, post a comment here and I will try to help! Enjoy!

What is Computer Network?

Two or more computers connected together through a communication media form a computer network.
The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

These are written rules used for communications. They are the languages that computers use to talk to each other on a network

Ways To Safe Your Computer From Hackers

01: Software Updates For the protection of your computer from hackers you should get the best and latest version of application which is impossible for the hackers to find it, another thing is also take place that your web browser and other programs are given best upgrades.

02: Window Updates Another way to protect and save your computer from hackers is that you should keep your operating system up to dates in for minimizing the risk of virus which is very necessary for your computer.

03: Anti-Virus Software Another way to protect your computer from hackers is that you should install best quality Anti-virus software, because with out antivirus software your computer is in the list of hackers and it is dangerous for your computer. So for protection of your computer you must do for the best.

04: Anti-Spyware Software Anti-spyware software is one of the best ways to protect your computer from hackers, Thanks to anti-spyware luminaries like Ad-Aware, the previously crippling spyware infection had dwindled down whole of year.

05: Switch to Macintosh Another best way for protect your computer from hackers is with the help of Macintosh operating system which is very secure for your computer because this fact only came about because smaller quantity hackers bother to attack this platform in the first place.

06: Hacker-controlled Websites Another way to avoid your computer from the hackers is that you should avoid for getting snared by doubtful sites committed to porn, free downloads, online games, and so on; this way, there are not as much of chances for you to be hacked.

07: Spam Email Another one of the best way to protect your computer from hacker is that you should avoid to open those websites which are doubtful if the massage is doubtful than delete the message which is useful for your computer.

08: Firewall Another thing which is very important for your computer avoid to be hacked is to install the firewall if you have not install it than I will recommend to install it. Because there are goods that even filter both incoming and out going data streams.

09: Data Backup Another thing which is very helpful for your computer to avoid from hacker is that if any data which is in your computer as well as related to computer, you should take backup of this data which is very important to save your data from crashes on internet.

10: Password Polices Another very important thing which is very helpful to protect your computer from hackers is that your password polices should be of high standard using combinations of letters and numbers, and making sure that your password is as secret as potential without necessarily making it too difficult for you to remember it.

On-Screen Keyboard In Windows

What do you do if the keyboard has been disrupted?.  Ok, there is a temporary solution which is called On Screen Keyboard. This tool of Windows XP displays a virtual keyboard on your computer screen. Open start menu click on run and type "OSK" and ok.

Basic Typing Rules

Place one space between each word, after a punctuation mark and at the end of a sentence. Always start a sentence with a capital letter. Use capitals for names, addresses, provinces and countries, places, organizations, businesses, associations, schools, colleges, universities, days of the week, months, holidays, nationalities, ethnic groups and languages.

Learning the keyboard is the first step to learning computers. Learning involves practice. It really is as simple as that. There are two kinds of typing.
The first is called Touch Typing. The Touch Typist uses the Home Keys asdf for the left hand and jkl; for the right) and all the fingers on both hands as well as the thumbs for the Space Bar while typing. There are many commercial and public domain programs that are designed to teach this method.

The other method is some times called 'Hunt and Peck' or depending on finger strength 'Search and Destroy'. This involves using one or more fingers on one or two hands to type. It is a perfectly acceptable way of using a computer and many people get along fine with this technique.

Basic Computer Operations

Input: Information and programs are entered into the computer through Input devices such as the keyboard, disks, or through other computers via network connections or modems connected to the Internet. The input device also retrieves information off disks.

Output: Output Devices displays information on the screen (monitor) or the printer and sends information to other computers. They also display messages about what errors may have occurred and brings up message or dialog box asking for more information to be input. The output device also saves information on the disk for future use.

Processing: The CPU or central processing unit is sometimes called the Control Unit and directs the operation of the input and output devices. The Coprocessor or the Arithmetic-Logic Unit does arithmetic and comparisons. The memory or RAM temporarily stores information (files and programs) while you are using or working on them. The BIOS or basic input/output system controls the dialogue between the various devices.