How to identify your device’s COM Port with Device Manager

If you’re unsure what COM port your device uses, you can use the Windows Device Manager to help you identify it (If you’re unsure about what connection method your device uses to transmit data to your PC, you can see our video on Connection Methods here).

On Windows 10 & 11, right-click on the Start button and select “Device Manager,” or find it using the search bar. The Device Manager shows all the devices connected to your PC, organized into categories.

Screenshot of the Windows Device Manager showing the expanded "Ports (COM & LPT)" List.

To see all the COM ports on your PC, look for the section titled “Ports COM & LPT.” Your RS232 or RS232-USB device should appear here with its port number labeled “(COM#).”

  • For PCs with higher Windows security settings, you may need to log in as an Administrator.
  • The “Intel” port is not a usable COM port.
  • If your RS232 device is connected to your computer via USB, you can try identifying the COM port by disconnecting and then reconnecting the cable while observing which item disappears and reappears correspondingly.
  • If there is no “Ports COM & LPT” section, then you do not have any COM ports installed. For USB-connected RS232 devices (see below), it’s possible that you do not have the correct drivers installed for the device or adapter, or that the adapter is not working properly. To remedy this, try installing the driver or contacting the manufacturer.

If you are using an adapter or USB-connected RS232 device

  • Many RS232 scales, balances, and other industrial devices connect to a USB port using a built-in RS232-to-USB converter/adapter. This converter usually comes with a driver that converts the PC’s USB port into a virtual RS232 COM port, typically with a port number above COM 3.
  • If you switch the USB port that the adapter is connected to, Windows may assign a different COM port number to it. To avoid this, we recommend keeping the adapter connected to the same USB port. If you need to change the COM port number, go to the Windows Device Manager, right-click the COM port and select “Properties.” Then, navigate to “Port Settings” > “Advanced” and change the COM port number to an available one.
  • If a driver update is available for your adapter, you can apply it here by right-clicking on its COM port and selecting “Update Driver”.
[mai mult...]

What is DDoS Attack?

A DDoS attack is essentially the legitimate use of an online service taken too far. For example, a website may be capable of handling a certain number of requests per minute. If that number is exceeded, then the website’s performance is degraded, or it may be rendered completely inaccessible. This overload may be caused by an attack or even legitimate use, such as an e-commerce site being overwhelmed on Black Friday or a ticket sales platform going down when sales for a popular event are opened.

DDoS attacks are capable of overwhelming a target at various levels. For example, a web application may have a maximum number of requests that it can handle. Alternatively, the server that it is running on may have a limit on the amount of simultaneous connections that it can manage. A corporate network likely has bandwidth restrictions that could be overwhelmed by an attacker. Exceeding any of these thresholds will result in a Dos attack — or a DDoS attack if the attack uses multiple IP addresses — against the system.

Types of DDoS Attacks

DDoS attacks are an evolving threat, and a variety of techniques can be used to carry them out. Some examples of common DDoS threats include:

  • Amplification Attacks: Some services, such as DNS, have responses that are much larger than the corresponding request. In DDoS amplification attacks, attackers will send a request to a DNS server with their IP address spoofed to the IP address of the target, causing the target to receive a large volume of unsolicited responses that eat up resources.
  • Bandwidth Saturation: All networks have a maximum bandwidth and throughput that they can maintain. Bandwidth saturation attacks attempt to consume this bandwidth with spam traffic.
  • Cloud Resource Exploitation: Scalability is one of the hallmarks of cloud computing. By exploiting this fact, DDoS attackers can perform large-scale attacks against a target system.

Cybercriminals are increasingly performing “degradation of service” attacks in which a target is sent a lower volume of traffic that decreases the accessibility of the service without knocking it completely offline. These attacks have become popular because they are more difficult for an organization to detect than a full-scale DDoS attack.

DDoS Threats

DDoS attacks pose a serious threat to companies of all sizes and in all industries. Some of the potential impacts of a successful attack include:

  • Financial Losses: A successful DDoS attack can cause decreased productivity, downtime, and potential violation of SLAs as well as costing money to mitigate and recover.
  • Operational Disruption: A DDoS attack may render an organization unable to perform core operations, or it may degrade customers’ ability to access its services.
  • Reputational Damage: DDoS attacks may cause churn as customers choose competitors if they can’t reach an organization’s website or distrust its ability to provide products and services.

In recent years, the threat of DDoS attacks has grown significantly. One contributor is the greater availability of DDoS attack tools, making it easier for anyone to carry out an attack. Also, botnets have grown more popular and powerful, enabling them to perform record-breaking attacks to take down websites or entire networks. As DDoS attacks grow more common, larger, and more sophisticated, they are increasingly difficult and costly for an organization to mitigate.

[mai mult...]

What is MAC filtering and how to disable it

To enable MAC address filtering, you need to you know your router’s admin login, as this enables you to log in to the WiFi router console. Once logged in as an admin, you can configure your MAC address whitelists and blacklists.

To locate your router’s username and password, check the back of your router. It should be listed there. If, however, you don’t have easy access to your router or the credentials aren’t listed there, check the master list of router logins to find your system’s username and password. You can reset you’re router password if necessary.

Once you’re logged in, you will likely see connected devices in the admin console. Most modern routers display the physical address of devices there. Then, you can go into the router’s settings and enter the MAC addresses where they belong. Though each router will have a slightly different procedure for entering and finalizing MAC address filters, this is the general process that you’ll follow.

  • To configure filtering on a Linksys router once you’ve reached the router’s settings, go to Wireless > Wireless MAC Filter.
  • To configure filtering on a Netgear router once you’ve reached the router’s settings, go to Advanced > Security > Access Control.
  • If you have a D-Link router, navigate to Advanced > Network Filter.

Again, the process for disabling media access control address filtering will vary by router or system. However, the general process for disabling MAC address filtering is as follows:

  1. Sign into your router’s administrator page using your router’s username and password
  2. Check the MAC filter settings and select Allow as the default mode
  3. Select all devices from the list of exceptions, which is the whitelist
  4. Delete the list.

Once you disable MAC filtering, your router will no longer sort traffic based on permitted and denied addresses.

[mai mult...]

How to add new user account on Mac

Adding a new user account on a Mac allows multiple users to have their own customized environment:

  1. Open System Preferences:
    • Click on the Apple menu in the top left corner and select “System Preferences.”
  2. Go to Users & Groups:
    • In the System Preferences window, click on “Users & Groups.”
  3. Unlock the Settings:
    • Click the lock icon in the bottom left corner and enter your administrator password to make changes.
  4. Add a New User:
    • Click the “+” button below the list of users.
  5. Choose Account Type:
    • Select the type of account you want to create (Standard, Administrator, Managed with Parental Controls, or Sharing Only).
  6. Enter User Information:
    • Enter the new user’s full name, account name, and password.
    • Optionally, you can add a password hint.
  7. Create the Account:
    • Click “Create User” to add the new account.
  8. Set Up the Account:
    • Log out of your account and log in to the new user account to set it up.
    • Follow the setup assistant to configure the user’s preferences.
  9. Customize User Settings:
    • Customize the new user’s desktop, applications, and other settings as needed.
  10. Set Up Parental Controls (if applicable):
    • If the account is for a child, set up parental controls by selecting the user and clicking “Open Parental Controls”.
  11. Manage Accounts:
    • Return to “Users & Groups” to manage user accounts, change passwords, or delete accounts as needed.
[mai mult...]

How to reset network settings on Mac

The first way to reset a Mac’s network settings is to delete your Wi-Fi connection and then add it again.

Macs running macOS Ventura (13) and earlier will select System Preferences Network > Wi-Fi connection > – (Minus) sign > Apply.

  • Click the Wi-Fi icon in menu bar.

Wi-Fi icon in macOS menu bar.

  • Choose Wi-Fi Settings.

You can also get to this area from Apple icon > System Settings > Network Wi-Fi.

Wi-Fi Settings option from Wi-Fi menu bar in macOS.

  1. Select Details beside the network to forget.

  2. Details button beside a network connection from Wi-Fi settings in macOS.

  3. Choose Forget This Network at the bottom left.

  4. Click Remove to confirm the deletion. Make sure that you have your Wi-fi login information. You will need to re-enter it after the next step.

  5. Finally, re-add your Wi-fi connection from the Wi-Fi menu.

[mai mult...]

How to send an encrypted mail in outlook?

  1. Create a New Email
  2. Select Options from the Ribbon
  3. Click Encrypt (or Permissions)
  4. Choose Encrypt-Only or another option from the dropdown menu

Sending with Outlook for Windows

Outlook on the Web (OWA)

  1. Create a new message
  2. Select Options from the Ribbon
  3. Select Encrypt, and then Encrypt or another option from the dropdown menu

Outlook client for Mac

  1. Create a new email
  2. Select the Encryption option from the message toolbar

Location of Encryption Button in Ribbon via Outlook Client for Mac

  1. If you don’t see the option of Encryption, select the three dots to add items to your toolbar

Location of three dots button to add more items to the message toolbar

  1. Drag the Encryption button to your toolbar and then hit Done.

Location of Encryption button to be added to Outlook's message toolbar

[mai mult...]

How to check if your computer is using all CPU cores?

To determine if your computer is effectively utilizing all CPU cores, you can use several methods depending on your operating system:

Windows:

1> Task Manager:

  • Right-click on the taskbar and select “Task Manager” or press Ctrl * Shift * Esc
  • * Go to the “Performance” tab
  • * Under “CPU,” you should see a graph showing usage for each core. If all cores are active, you’ll see activity across multiple graphs (one per core)
  • 2> Resource Monitor:
  • * Open “Resource Monitor” by searching for it in the Start menu
  • * Navigate to the “CPU” tab
  • * Look at the “CPU Usage” section to see how much of each core is being utilized.
  • macOS:
  • 1> Activity Monitor:
  • * Open “Activity Monitor” (usually found in Applications > Utilities)
  • * Click on the “CPU” tab
  • * You’ll see a graph displaying CPU usage. Each core is represented separately. If all cores are in use, you’ll see activity across multiple cores.
  • Linux (using command-line tools):
  • 1> htop:
  • * Install htop if it’s not already installed (sudo apt install htop on Debian-based systems).
  • * Launch htop from the terminal.
  • * You’ll see a detailed view of CPU usage, including individual core usage.
  • 2> top:
  • * Run top in the terminal.
  • * Press 1 (the number one) to display individual CPU core usage.
  • Checking in all cases:
  • * Activity Indicators: Most monitoring tools will show real-time activity for each core. If you see spikes or sustained usage across multiple cores, it indicates that your system is utilizing all available CPU cores.
  • * CPU Load: A high overall CPU load (close to 100% across all cores) during intensive tasks like rendering, compiling, or running multiple applications simultaneously suggests that all cores are actively used.

By using these methods, you can effectively determine if your computer is utilizing all CPU cores and monitor how they are being utilized. This information is particularly useful for ensuring that your system is performing optimally under heavy computational loads.

[mai mult...]

How to add an Email Account to Microsoft Outlook?

Add an Email Account to Outlook (New Outlook)

  1. Select View settings from the View tab
  2. Select Email accounts under Accounts
  3. Select Add Account and then type in your email address and click Connect.

Add an email account to outlook

4. If requested, enter your account password and click Done.

Add an Email Account to Classic Outlook

1. Go to File > Add Account

add an email account to classic outlook

2. Click Connect after entering your email address.

click connect after entering your email address

3. If asked, reenter your password and choose OK > Finish to access your Outlook email account.

Link Email Account in Windows

Microsoft enables you to link your iCloud, Google, Yahoo,Outlook, and Office 365 accounts in Windows.

1. Navigate to Settings > Accounts > Email & accounts. Then, choose Add account.

link email account in windows

2. Microsoft enables you to connect your Office 365, Google, Yahoo, and iCloud accounts. Select the service you wish to add, then enter your username and password to sign into the account.

add an email account to your outlook

3. Windows will display the data that the Mail, Contacts, and Calendar Windows programs require access to. To allow the required permissions, click the Agree button.

add an email address to outlook

[mai mult...]

Create custom resolution in Nvidia

To create custom resolutions for your display

  1. From the NVIDIA Control Panel navigation tree pane, under Display, click Change resolution

  2. Click the image that represents the display you want to affect

  3. Click Customize, then from the Customize dialog box, click Create Custom Resolution

  4. (Quadro and NVS products only) In the Select displays section of the Create Custom Resolution dialog box, select any additional connected displays to which you want to apply the change

  5. Complete the information in the Custom Resolutions dialog box. For more information on custom resolutions, see Create Custom resolution dialog box

  6. Click Test, then if the test passes and you want to save the new mode, click Save.

Note: You can also create a custom resolution for your HDTV by using the Desktop Resize control.

[mai mult...]

How to add gifs on Discord

Discord taps into Google’s own GIF search engine, Tenor, to offer up an endless collection of GIFs. These can be easily accessed and shared to any text conversation or Channel.

1. Open up a Direct Message thread or Text Channel. You’ll find all your Direct Message threads on the left side of the app’s home screen. Text Channels are visible on the left sidebar within a Server, preceded by the “#” symbol.

2. Click the GIF button in the message box at the bottom. In the Discord mobile (iOS, Android) app, you can tap the emoji icon and switch to the GIF tab.

Discord GIF picker

3. Select one of the many pre-made categories from the resulting pop-up or simply enter what you’re looking for into the built-in search bar.

4. Click on any of the listed GIFs to instantly share them to the thread. You can also click the star icon in the top-right corner to add individual GIFs to your Favorites, displayed at the top of the GIF box.

You could, of course, share GIFs from anywhere else on the web as well. If you ever feel the need to do so, simply right-click the image, copy the image address, paste it into the message box, and hit enter.

If you have GIFs downloaded to your computer, you can upload these to a thread by double-clicking the plus (+) button inside the message box or clicking the button once and selecting Upload a File.

You don’t have to make do with the GIFs baked into Discord. A custom GIF is likely to get more traction within conversations. Imagine sharing a looping clip of your very own gameplay, for example, or a screen recording guiding your friends through the solution to a problem they’re facing.

Now, there are more than a few ways you can record your screen and export the clip as a GIF. If you’re looking to go from recording to sharing in the fewest steps.

Here’s how to record your screen to a GIF with Jumpshare.

1. Download the Jumpshare desktop app, install it, and sign up for an account if you don’t already have one.

2. Launch Jumpshare and click the GIF button along the top of the interface or hit the Record GIF shortcut (Alt + Shift + 3 on Windows and Command + Shift + 8 on Mac by default) at any time with Jumpshare running in the background.

[mai mult...]