Tuesday, July 6, 2010

Installing a Wireless Router

First, turn off the PC and modem, then remove the Ethernet cable from the PC and plug it into the router's WAN port. Install a second Ethernet cable between the PC's Ethernet port and one of the router's Ethernet ports. Power the modem, router and then PC, waiting for the system to boot and initialize before attempting an Internet connection.
Most routers are programmed with the manufacturer's default settings, including the network's name or service set identifier (SSID), channel and sign-on password. These default settings generally may be changed using included software or an online setup utility provided by the router's manufacturer.
Configure the router by entering the router configuration IP address at the URL provided, followed by the configuration utility ID and the default password. To find your router's default IP address and the default login info, refer to the owner's manual. If you own a Linksys router, a popular brand, the IP address is usually 192.168.1.1. Two other popular brands, D-Link and Netgear, generally use 192.168.0.1.

Connecting Two Wireless Routers

Bridging two wireless routers involves configuring both networks manually. Visit each network location - which should be recognized by your computer automatically - and configure the appropriate Service Set Identifier (SSID), Wireless Encryption Protocol (WEP) or WiFi Protected Access (WPA) key and authentication information. Make sure you know the SSID and WEP or WPA key ahead of time.

Connecting an Xbox 360 to a Wireless Router

Connecting an Xbox 360 to a wireless router allows you to use Xbox Live without physically connecting your Xbox to a cable. Power up your Xbox system and the router, then plug the wireless networking adapter into the two slots at the Xbox's rear. Unplug any existing Ethernet cables and connect the USB connector to the port adjacent to the adapter. Use the system area of the Xbox dashboard to adjust your network settings. This should connect you to the wireless network

shutdown and boot vista faster

Before we really get started, it is entirely possible to mess up your Vista install very royally if you don't know what you are doing. We recommend that only power users or those on the level of Sys Admins attempt these steps. Proceed at your own risk and always create a restore point before you modify any part of the system. All the programs used for purposes of this post are freeware applications.
Vista is not XP (thankfully) but like XP it has a lot of startup processes that are, well, pretty much useless. Though beware, you might actually need some of these if you are on a network or require remote assistance features. If not, then go ahead and turn them off.

Right click on Computer, go to manage and go to Services and Applications then Services (the Standard View makes it easier to manage but that is not a necessary step). You'll see a list of applications and services in this list, thing is, you don't need quite a few of them. Some may have already been disabled or are set to manual, that's fine, leave them like that, Vista has decided on its own they are not needed or will be activated when required.

We want to look at the ones that are set on Automatic. You can organize the list either by name or startup setting, for me, I have them organized by name since it makes it easy to compare to other lists. I have used this process list for disabling items, each one is described for you so you can decide if you need it or not. Note that disabling the IKE and AuthIP Service will disable just about every single networking and network connection process on the computer. It serves you better NOT to disable it, you will still be able to connect to networks if you do but you want be able to monitor them or switch networks, best to leave that one on.

Here is list of services that are completely safe to disable (for most users):
Telephony (keep enabled if you use a modem)
SSDP Discovery
Shell Hardware Detection (disables autoplay events)
Server
Remote Access Connection Manager
Program Compatibility Assistant (face it, this service is useless, if you've ever tried it, you know what I'm talking about)
Portable Device Enumerator Service (if you use Windows Media Player with your MP3 device, keep this service on)
Perclilint
IPSec Policy Agent
IP Helper
Internet Connection Sharing (leave on if you have shared resources on a network)
Distributed Link Tracking Client
Diagnostic Policy Service (who pays attention to Windows Diagnostics anyway?)
Then there is msconfig, Vista users have the luxury of simply typing msconfig in the Start menu search box and launching it that way. Go to the Startup tab and select items you don't need, Java Update, Adobe Reader, any toolbars, iTunes helper and such are prime examples of things you can get rid of, they will start when/if they are needed. If you aren't sure about an entry, use a search engine to find out what the entry is.
If you don't want to use the built-in tools of Vista to do that then I recommend CodeStuff Starter, which has the msconfig features as well as the Management features so you can access everything from one program. CodeStuff also makes it easier to restore your system if you messed up.
It has been a dream of many to control exactly how their computer boots, granted msconfig, computer management and CodeStuff certainly make that process more manageable but it can get better and it does. Last on our list (but certainly not least) to tell Vista that you are the boss is Vista Boot Pro 3.1. The primary function of Vista Boot Pro 3.1 is to control the boot cycle if you have a second operating system installed, sure you could rely on the Vista Boot Loader but whats the fun in that?
Vista Boot Pro edits the Boot Configuration Files in the registry for you, without fail or flaw. The other way to edit the BCD file is well, to go into the registry and even I am leery about that.
Vista Boot Pro allows you to manage the Vista Boot Loader itself, edit which operating system boots first, configure the way Vista starts up and features its own Backup and Restore Center, just in case, you never know.

Vista Boot Pro is also available for Windows XP (Home, Pro, MCE 2005 and x64), Windows 2003 or Longhorn Server. Options may vary depending on operating system installed.
By disabling some processes and startup items, you are also on your way to a more secure installation of Vista but that's not everything you can do to maximize your Vista experience. This will be a continuing series of posts for optimizing Vista so stay tuned for the next one.

On Screen Keyboard

IF Your Want to Use Keyboard On Screen, Use Keyboard Keys Through Your mouse Click...

Know More About Winxp

You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.

Nokia Mobile secret Codes

Nokia 3210 Codes  ( *#06# -IMEI)
Software version       (*#0000#)
Simlock info               (* # 9 2 7 0 2 6 8 9 #)
your no. will not be showed to others when you make a call     ( **31# (call))
Restore factory settings (*#7780#)
displays serial number  (9268)

Aobo Software Aobo Blocker Porn Filter v3.14

 Aobo Software, the global award-winning company of spy and access control software, announced the release of Aobo Porn Filter 3.0, an internet filter and application filter. It can be used to block porn websites, block applications, games to keep your computer clean and safe.

What can you do with Aobo Porn Blocker?
- Block Porn to Protect your children:
Children are often curious for sexually-explicit content. Now with Aobo Porn Blocker you can keep them away from online porn stuff.

- Block Porn Keep your PC clean and Safe:
Porn websites always have virus or adware, by blocking porn websites, you can keep your PC clean and safe.

- Block games or any other applications.
Sometimes you don’t want to someone else to open a program on your computer, or you want to restrict the kids’ computer use of the applications. There is no way to do that without installing a third party software on Windows. So Aobo Blocker is the suitable utility for you.
 
Download ==>Clich HEre 

Mobile phone viruses, simple measures to protect yourself

The Australian Mobile Telecommunications Association (AMTA) has developed consumer tips to assist users to protect themselves against the risk of mobile phone viruses.
This guide explains what viruses are, how they spread, and what can be done about them.
 What’s a mobile phone virus?
A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.
A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves. 
What can I do to protect my phone?
The following tips can help prevent problems with viruses on your phone:
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.
2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.
3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source. 
4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.
5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.

Mobile Tips and Tricks

Mind Your Mobile Manners   
The mobiles industry wants as many people as possible to enjoy the benefits of mobile telecommunications and encourages individuals to use their mobile phones in a responsible manner and to be considerate and aware of situations where using their mobile phone might annoy others.
 1. When in doubt, always go out
When possible go outside or to another room to make your call if your call might disturb others. Also, features such as text messaging answering services, call diversion and vibration alert can be used to receive important calls without disturbing others.
 2. If you can't turn it off, use silent mode
If you need to keep your phone on for important calls, then turn it to silent or vibrate mode. It�s the ring of a mobile phone in inappropriate places and times such as at the tennis or in restaurants which annoys people the most.
3. When required turn your phone off and check its off
There are some places where people should never talk on a mobile phone or send text messages and where the ringing of a mobile phone or message alert is considered highly unacceptable, such as: movies, stage shows, weddings, funerals, concerts, speeches, classrooms and lectures. In these cases, turn your phone off and remember to check its off before you enter the venue. You can always check your voicemail, text messages or your answering service afterwards.
4. Keep your conversations private
People's sense of personal space varies in each situation. Making a call in a busy pub may be okay, but talking loudly in a confined space like a lift or on a train tends to infringe on others personal space. Be aware of where you are and who you are with and what others are doing before deciding to make or accept a call. In some situations it might be better to send a text message.
5. Speak softly
Mobile phones have very sensitive microphones that can pick even the softest voice, so there is no need to shout. If you are having trouble hearing the other caller, check that you have the volume on your phone set high enough.
6. You don't always have to answer- use your messaging service
It's a natural reflex to answer your phone if it rings, however, if you forget to put your phone on silent or vibrate mode and it rings at an inappropriate moment, send the call to voice mail or your answering service (usually by pressing the hang-up key).
7. Talk to the one you're with
If you receive a call during a conversation, send the call to your voicemail or answering service. Your first priority should be to the person you are with. However, if you are expecting an important call let the person you're with know before the call arrives and excuse yourself before accepting the call.
8. Don't send inappropriate messages
Messaging is a great way to communicate, but don't send offensive or threatening text, voice, picture or any other sort of message, because it is a criminal offence to use a mobile phone to menace or harass someone. Also receivers can save messages and easily identify you as the sender.
9. Respect others' privacy when using in-phone cameras
In-phone cameras shouldn't be used anywhere a normal camera would be considered inappropriate, such as in change rooms or toilets. You should ask for permission before you take someone�s picture. Also bear in mind that some venues do not allow the use of cameras and may refuse entry to anyone with one.
10. Ban the ring: not the phone
Wherever conversations are normally acceptable, venues can help by asking people to turn their phones to silent or vibrate mode rather than turning it off. This approach will help with compliance, especially for people who need their phone for important calls. Venues can also assist by reminding people to set their phones to silent mode, before they enter

USB 2.0 - Hi-Speed USB - FAQ

As an aside, USB mice and keyboards need only 1.5Mbits/s to function. That performance level is also named 'USB' by the USB Promoter Group.

To sum it up, USB 2.0 specification incorporates three speeds: Hi-Speed, Full-Speed and Low-Speed. You as a consumer don't need to figure out all the jargons. Just keep in mind that only 'Hi-Speed USB' and 'USB' host and devices exist.

How do I know if my PC has USB 2.0?
You can identify whether your PC has Hi-Speed or not relatively easy. Open Device Manager and expand the Universal Serial Bus section. There should be an "Enhanced" USB host controller present.

Windows 98 systems may use a different name, because Hi-Speed USB drivers in these operating systems are not provided directly from Microsoft (Windows ME, 2000 and XP get their drivers through Windows Update).

These drivers are provided by the manufacturer, and may carry the maker's name (i.e. ADS, Belkin, IOGear, Siig, etc.). There should also be two standard version USB host controllers present as well. They are embedded in the USB chip which routes the differing USB speeds accordingly without user intervention.

There are currently 6 manufacturers of the Hi-Speed USB host silicon themselves:
  • ALi (Acer Labs)
  • Intel
  • NEC
  • SiS
  • VIA
  • nVidia (shows as "Standard" controller
Any other brand name that appears in Device Manager would likely be an add-in Hi-Speed USB PCI card. The makers above do not make add-in cards, but they do make the chips that are used in them.
How do troubleshoot "unknown device" error listed in Device Manager?
  • The USB device or the USB adapter requires its own power source. If your USB device or adapter came with an AC power "brick", try connecting it.
  • Here's a likely one - the front USB ports on your PC case may be misconnected. I've seen them that way from the factory. It's a good idea to check the connections against specifications. The standard order of connection is Red, White, Green, and Black. No more than 4 wires per USB bank are needed.
  • Defective device. Do not assume that all PC components work correctly out of the box. I've seen many new USB devices that do not work. If you can, try the device on another PC.
  • All drivers are not installed. Some devices will require installing the driver package before plugging in the device. Some devices will also require basic USB files from the Windows CD before the unit will function. The general rule is to always follow installation directions precisely and to have the Windows CD ready.
How fast is USB 2.0?
USB 2.0 has a raw data rate at 480Mbps, and it is rated 40 times faster than its predecessor interface, USB 1.1, which tops at 12Mbps. Originally, USB 2.0 was intended to go only as fast as 240Mbps.
How will consumers benefit from USB 2.0?
With speed 40 times more than that of USB 1.1, USB 2.0 broaden the range of external peripherals that can be used on a computer. Even with multiple high-speed peripherals connected to a USB 2.0 bus, the system will less likely to hit the bandwidth bottleneck. The new specification also inherits the current USB's Plug and Play and hot-swapping capability as well as providing backward compatibility for USB 1.1 hardware, allowing existing user base to upgrade seamlessly.
Do USB 2.0 & USB 1.1 hardware work interchangeably?
You may have heard that USB 2.0 is "backward-compatible" with USB 1.0/1.1 (Full-Speed USB). While that's true, USB 1.1 is also forward-compatible with USB 2.0. Whenever a system has USB 2.0 ports, you'll find the "Enhanced" USB controller in Device Manager, but you will also find two other USB controllers. These two to maintain backward compatibility to USB 1.1 devices. Each USB 2.0 host actually has 3 chips onboard. The USB controller routes signals to the correct controller chip depending on how a device is recognized. Where a device is physically plugged in has no bearing on how it is routed. All ports on a USB 2.0 motherboard can host any USB devices at all as long as the system and devices are healthy.

The vast majority of USB 2.0 devices will work on older PCs and Macs. None should flat-out fail unless there are other issues with the system. Hi-Speed USB devices will revert to Full-Speed operation when connected this way. Understand that Hi-Speed is at least ten times faster than Full-Speed in actual operation, so the speed difference is quite noticeable - unless you have never experienced Hi-Speed, of course.

When it comes to USB hub compatibility between USB 2.0 and USB 1.1, here some facts:
  • A powered hub is always preferable to unpowered.
  • USB hub ports are not as capable or flexible as real PC ports so it's best not to expect the world of them.
  • USB 1.1 (obsolete) hubs will work fine on USB 2.0 ports, but they cannot utilize USB 2.0 capabilities. They will default to slower speeds.
  • Hi-Speed and Full/Low-Speed USB devices can coexist nicely on USB 2.0 hubs. Connecting such a hub to a USB 2.0 port is recommended.
  • USB 2.0 hubs can be used on older USB 1.1 computers.
  • Although it is said that you can "cascade" up to 4 hubs, problems may start to arise after two hubs, it's best to minimize hub usage if possible.
  • Many USB devices don't work well on hubs. Cameras, scanners and especially USB drives are known to have problems with hub connectivity.
  • Remember that "active USB extensions" are really just one-port hubs.
Will USB 2.0 replace USB 1.1?
Not entirely, because many products such as generic keyboards, mice, joysticks and audio speakers do not require the faster speed of the new USB 2.0 technologies. Only bandwidth-hungry devices, such as web cams and high-capacity storage systems, will need all the speed. However, next-generation systems will come with USB 2 ports rather than USB 1.1.
How do I distinguish between a USB 2.0 and a USB 1.1 devices? New logos designed by the USB Promoter Group allow consumers to easily identify the new USB 2.0 products. The new colorful logo for USB 2.0 is labeled USB Hi-Speed, and the new logo for USB 1.1 is labeled with USB Basic Speed. However, most people won't miss it as manufacturers often label USB 2.0 READY Or 40 times faster than USB 1.1, on the boxes.
Will USB 1.1 devices run any faster on a USB 2.0 bus?
No. However, the new USB 2.0 archiclecture allows more high-speed USB 1.1 devices, such as web cams, audio devices, to share the bandwidth. Developers need to follow USB 2.0 spec in order to design higher speed peripherals that can take advantage of the extra bandwidth. USB 1.1 devices still operate at 12Mbps at full-speed and 1.5Mbps at low-speed on a USB 2.0 bus. Even though USB 1.1 devices won't run any faster, they can work alongside of USB 2.0 devices on the same bus.
What are USB Hi-Speed and USB Basic Speed logos?
These logos are part of USB Promoter Group's branding program that ensures the quality of USB products. The USB 2.0 certified products would display a blue, white and red logo, bearing the words Certified and Hi-Speed. The classic USB 1.1 certified products would display a black and white logo with the words USB and Certified.
Under a license from USB-IF, products must pass the compliance tests before manufacturers can use one of the two trademarked logos. The Promoter Group will take legal actions on manufacturers that label either logo on their products, which have not passed the tests.
What happen if a USB 2.0 devices are plugged into a USB 1.1 systems?
The entire bus under the USB 1.1 root hub will slow to 12Mbps. The operating system will probably notify the user about the sub-optimal configuration and recommend for a better course of action.

If several USB 1.1 hubs are connected to a USB 2.0 bus, then each of the USB 1.1 hubs will get a full 12Mbps bandwidth.
What is the max? Length of a USB 2.0 cable?
5m. however, if you cascade 5 hubs with 5m USB cables, this will allow you to connect a device 30m away.
What do I need to use a USB 2.0 device?
The requirement is similar to that of USB 1.1, but all components will have to be USB 2.0 compliant. A successful USB 2.0 connection requires a USB 2.0 host controller card, a USB 2.0 driver and a USB 2.0 peripheral.
How much will it cost to upgrade to USB 2.0?
Around $80 to $150. Currently, Orange Micro., Adaptec and IO Gear are shipping USB 2.0 PCI cards, some of which even have FireWire ports. Interestingly, almost all USB 2.0 PCI cards include an internal port, which is probably for connecting internal USB 2.0 IDE enclosure or USB 2.0 front panel.
Will USB 2.0 arrive on mobile computers?
Yes, but not in integrated solution on laptops. You will need a USB 2.0 Card Bus card. Orange Micro. is shipping USB 2.0 compliant 4-port Card Bus card. Eventually, notebook vendors will adapt to USB 2.0 technology, and we will see USB 2.0 ports on laptops. This transition won't happen until 2002 at the earliest.
Which operating systems support USB 2.0?
Microsoft has released the official USB 2.0 driver for Windows XP and Windows 2000. The version is 5.1.2600. The software is available on-line at Windows Update website. (If you don't have a USB 2.0 card installed in your system, Windows Update won't list the USB 2.0 driver as an update.)

The software company is still considering USB 2.0 support for Windows ME, but it already has decided not to bring USB 2.0 to Windows 98 and Windows 98 SE. If you have Windows 98, you will have to rely on 3rd party USB 2.0 support from USB card manufacturer.

Do USB 1.1 cables work with USB 2.0 devices?
Ideally, yes. USB 2.0 architecture uses the same cables and connectors as USB 1.1 compliant products. Unfortunately, only 3 out of 11 cables on the market are certified as USB 1.1 compliant. You may run into the cables that cause problems connecting high-speed peripherals. To avoid negative user experience, most vendors include USB 2.0 compliant cables with their USB 2 PCI cards and peripherals.