Online PC Support

OPS Technical Solutions : +1877-770-0433


How to configure Internet Connection Sharing in Windows XP

Windows XP Professional and Home Edition come with a great service, Internet Connection Sharing which allows a home user to share an always-on connection with security and without buying a license for expensive firewall software. Even a dial-up link cans providing network address translation, addressing, and name resolution services for all the computers on your network plus security.

Now this article basically describes how to set up and use the Internet Connection Sharing feature in Microsoft Windows XP. For this Internet Connection Sharing, you can use networked computers to share a single connection to the Internet.

Procedure to use Internet Connection Sharing
For use Internet Connection Sharing to share your Internet connection, you must have a host computer with one network adapter that is configured to connect to the internal network and one network adapter or modem which is configured to connect to the Internet.

In your Host Computer
Host computer, follow these steps to share the Internet connection:
1. At first log on to the host computer as Administrator or as Owner.
2. After that click on the Start button, and then click Control Panel.
3. Now click Network and Internet Connections.
4. And now click on the Network Connections, after that Right-click the connection that you use to connect to the Internet. Click Properties.
5. Now click on the advanced tab, Under Internet Connection Sharing, you have to select the Allow other network users to connect through this computer’s Internet connection check box.
6. If you want to share a dial-up Internet connection, then select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box to permit your computer to automatically connect to the Internet.
7. Finally click on the OK button and you receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address, and then your computer may lose connectivity with other computers on
your network. If these other computers have static IP addresses, then it is a good idea to set them to obtain their IP addresses automatically.
8. Now click on the Yes button

The connection to the Internet is shared to other computers on the local area network (LAN) and network adapter that is connected to the LAN is configured with a static IP address of and a subnet mask of
Now you want to view a video about how to configure the host computer for Internet Connection Sharing, then click on the Play button.

In your client computer
If you want to connect internet by using the shared connection, then you must confirm the LAN adapter IP configuration at first, and then configure the client computer. Now To confirm the LAN adapter IP configuration, follow these steps:
1. First log on to the client computer as Administrator or as Owner.
2. Then click Start, and click on the Control Panel.
3. After that, click Network and Internet Connections and click on the internet connection.
4. Then, right-click to the Local Area Connection, and click Properties.
5. Now you have to click on the General tab, click Internet Protocol (TCP/IP) in this connection uses the following items list, and then click Properties.
6. Now In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address automatically (if it is not already selected), and click on the OK button.
7. Finally, in the Local Area Connection Properties dialog box, and click OK.
8. Quit the Control Panel.
If you want to view a video about how to confirm the LAN adapter IP configuration, then click the Play button.

If you turn on Internet Connection Sharing on the host computer, then the host computer’s LAN adapter is automatically assigned the IP address of and one of the following situations may occur:
• IP address conflict
• Loss of network connectivity

How to Maintain Security and Safety of Your Computer

While connecting to the Internet, sharing your computer or your files with other persons, you should always try protecting your computer from harmful agents. Why wouldthis be necessary? This is because there are many criminals of the virtual world, also named hackers, who frequently attack other computers. They can attack directly and steal personal information through the Internet, or can attack indirectly, by using malicious software which can harm your computer.

You can always protect yourself by means of some simple precautions. The following paragraphs describe the threats your computer could be subject to and what can be done to eliminate them.

Defend your computer against threats

There are a few ways to help protecting your computer against eventual security threats:

  • A firewall will help you protect the computer by stopping the access of hackers or harmful software.
  • Antivirus software protects your computer against worms, viruses, and any other security menaces.
  • Antispyware software provides protection against spyware and potentially unwanted software.
  • Windows can routinely search for updates needed by your computer and can install them automatically.

Action Center can manage your computer’s security settings

Action Center is the central location to monitor and manage firewall settings, anti-malware software settings, WindowsUpdate, Internet security, and settings for User Account Control. It also monitors the settings for computer maintenance and can provide links to troubleshooters as well as other tools to help fix problems.

Protect your computer with a firewall

The firewall is a software or hardware component able to check information that comes from a network or from the Internet to either turn it away or to allow it to be used by your computer. Its action depends on the firewall settings. This way, the firewall can prevent hackers or harmful software from getting access to the computer. The Firewall component of Windows is a built-in element of the operating system and is automatically turned on.

Virus protection is a must

Viruses, Trojan horses, and worms are hackers created to infect vulnerable Internet-connected computers. Worms and viruses have the ability of replicating themselves from one computer to another. Trojan horses can enter a computer and hide inside a seemingly legitimate program. A screen saver is a good example of such a program. Viruses, Trojan horses, and worms can even erase information from the hard disk or disable your computer. Those who do not cause such a direct damage will surely worsen the performance and stability of your computer.

If you do not use antivirus software, your computer can be exposed to damage coming from malicious software. There is also the risk of spreading malicious software to other computers.

Do not let spyware invade your computer

Spyware is software designed to display advertisements on your computer, collect personal information, or even change your computer’s settings without your consent! Installation of unwanted toolbars, favorites or links in your browser, the change of the default home page of your browser or pop-up ads displayed frequently is signs of a spyware infection. Some spyware does not display any detectable symptoms, but can secretly collect sensitive information such as websites you have visited or text you have typed. Most of the spyware is installed when you are downloading free software or simply visiting websites.

Automatically update Windows

Microsoft offers regular updates to its operating system that help protect computers against viruses and security threats. To receive the updates as promptly as possible, you have to turn on the automatic updating. This way, you never have to worry about critical fixes that might not be installed on your computer.

Windows updates are always downloaded in the background when are connected to the Internet. They are installed at any time you can specify. If the computer is turned off before the specified time of the day, updates can be installed before shutting down or the next time your computer is started.

Google Enhancing the Features of Collaboration Safety in Google Docs

Many of the new settings have been introduced by Google for the Google Docs, which is the software used for creating as well as editing the documents over the internet. This is used to making it easy for the control of the distribution of the files so that it should be done to the right people in any organization or the group of people.

Sharing the documents had always been a signature feature of the service of the Docs which is based on the cloud, which ties greatly with the increasing interest in the deployment of the collaborative technologies that are done in the enterprise. But while Google has been making the noticeable strides for the sake of attracting the bigger companies as well as the organizations for its applications, there remains the privacy and the security concerns related to the cloud based or for the applications of the software as a service.

Features in Google Doc

This new feature has the setting of “private” which allows the users for designating the files of Docs which could be accessible only to those people or the group of people which are being invited in the explicit manner. One other kind of setting is the “people at your organization with a link” which would allow the users for making the files of Docs to be available to any user which is a part of the domain of the company and who only knows the URL of the file. If you select the option of “allows anyone to edit” then those same users would be given the access to this particular URL for editing the files. They would also have the facility to copy and paste the link of the file into the email messages, chats or into the calendar invitations.

“People at your organization can find and access” is considered to be the broadest of all the settings that are a part of the Google Docs. This would mean that the files of Doc would be indexed with the help of the search of the Google Docs and might be opened by any person who is a part of the organization.

The users will also be able to make the file “public on the web” and this could be done by the users only if the administrator of the Google apps of the company allows them to share these documents with the outside world which is not part of the organization.

Gavin Haslam is the IT manager of the business services company called the Rentokil Initial. He has said in one statement on the Enterprise blog of Google that this new sharing setting would definitely make for the users to share the information throughout the organization. It would also allow them to save great amounts of the time when they would be rolled out across 35,000 of the users that are on the Google Apps.

Options for visibility

One new feature is the option of visibility, which would allow the users to view the complete list of the editors as well as the viewers who are authorized by the organization.

How To Stop Sharing Your Profile with Other Skype Users

You can chose to share or not to share your Skype profile with other users. Your profile would usually contain a lot of information that you do not want to expose to every other Skype user. You may need to reveal some basic entries about yourself to others, but would not want all your information easily accessed by every and any other user. There are even some personal information that you may not chose to share with friends on the Skype network. To solve this problem, simply stop others from viewing your Skype profile. It is quite easy to do and you do not have to be a computer guru nor do you need a college diploma. Simply follow these simple steps.


First you need to create a new account and then log on to it. If you already have an old account, simply log on with your user name and password. You have to be logged unto your account to be able to effect the needed changes.

The next step is to edit your present profile that others can presently see. To do these, simply click on File and then click on Edit My Profile. The list of profile information that you are presently sharing with others would be displayed. Now you need to edit your profile and delete all personal information that you do not wish to share. Simply leave those spaces blank and delete the information already there. Your email is already hidden from others by Skype so you need not bother about deleting your email address.

The profile edit section offers you the option to select what information you want to share and those you want private. Any information that you wish to share with other Skype users should be inputted in the profile, while private sections should be left blank. You can also set some profile details to Private to restrict others from viewing it. Sections set to Private can only be viewed by you and are hidden from other users.

Updating Profile

After you have finished making changes, be sure to click on Update Profile for it to take effect. Updating your profile will save all the changes made and the saved profile will now be the one viewed by other users. Once your profile has been updated you can go back to using and enjoying Skype being sure that your private data is no longer exposed.

As you must have noticed, stopping other Skype users from viewing your information is so easy to do following the steps mentioned above. The steps are quite easy and simple to follow that anyone can do them easily in no time. You can also easily decide to change your profile any time you wish and add or remove information to share with others by simply following the steps again. This time you simply add or change information on the spaces you previously left blank. At the end you click on Update Profile again and have the new profile saved again.


What’s the first thing that comes to your mind when we hear the word – ‘Facebook’? I would bet that most of us would say ‘Friends’! Facebook is one of the biggest phenomenon in this century to have taken the current generation by storm. Is it socializing with friends, sharing updates, comments, pictures and a whole lot more, including Business? Wait! Did I mention business?!  You’re right! Using Facebook, you can market your business or company in a more remarkable way! But how would you do that if you don’t have a whole lot of Facebook friends? The person who said, ‘Friends can’t be bought’ probably hadn’t heard about, a web promoter, that makes it so easy and effective to get thousands of Facebook fans at the click of a button!

The immediate target while marketing is an audience. Not just any audience, but an audience that is interested in what you’re selling! Marketing on Facebook had always been a rigorous task.  Imagine having to filter through the scores of Facebook users to finally trickle down to those small sections of people who matter to your business the most. But by the time you would find them, your target audience, the market campaign for your company or business would have lost its purpose. Hence, the pressure of finding and acquiring these fans in the fastest possible way, so that your market campaign could be launched when it is at its brightest is the hill that needs to be scaled.

With the development of uSocial’s new service, marketing on social networking sites has become easier. . You no longer have to spend countless hours, energy and resources trying to get more Facebook fans for being the audience of your marketing campaign. usocial has made Facebook marketing an absolutely effortless task. uSocial aims at getting you the scores of targeted fans using means that are not only more effective than traditional means, but also prove to be much more cost-effective.

Here’s what uSocial’s CEO, Leon Hill, says about the affordability of’s Internet marketing services: “By far the most popular of our services are our Facebook-related offerings and although they’re massively powerful, clients can invest in them for less than $200,” explains Hill. “And as the return on investment is fantastic, clients will get their money back almost immediately.”

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003