How to setup Out of office or vacation reply

Are you Going on vacation? Will you have No access to the Internet? Use Gmail’s vacation responder to let people know that you won’t be able to get back to them right away. While your vacation responder is turned on, Gmail will send your reply to people who email you.

Below is how to setup Out of office or Vacation Reply for your Gmail account on the various :

  1. Open Gmail.
  2. In the top-right, click the gear Settings.
  3. Select Settings.
  4. Scroll down to the Vacation responder section (stay in the “General” tab).
  5. Select Vacation responder on.
  6. Fill in the date range, subject, and message.
  7. You can limit who can see your vacation response:
    • Check the box next to Only send a response to people in my Contacts if you don’t want everyone who emails you to know that you’re away from your mail.
    • If you use Google Apps, you’ll also see an option to only send a response to people in your domain. If you check both of these boxes, only people who are in your contacts and your domain will receive the automatic response.
  8. Click Save Changes at the bottom of the page.
  1. Open the Gmail app.
  2. Touch the menu Menu.
  3. Touch Settings.
  4. Choose your account.
  5. Touch Vacation responder.
  6. Fill in the date range, subject, and message.
  7. Switch OFF to ON at the top.
  8. Touch Done.

Your vacation responder settings are synced with the desktop version of Gmail.

  1. Open the Gmail app.
  2. Touch the menu Menu.
  3. Touch the gear Settings.
  4. Switch Vacation Responder from OFF to ON.
  5. Choose start and end dates.
  6. Fill in the subject and message.
  7. Touch Save.

If you have multiple accounts, make sure you’re in the right account before you touch the gear Settings.

Your vacation responder settings are synced with the desktop version of Gmail.


If you get to Gmail using the web browser on your phone or tablet, this information is for you.
  1. Open Gmail.
  2. Touch the menu Menu.
  3. Touch the gear Settings.
  4. Switch Vacation Responder from OFF to ON.
  5. Choose start and end dates.
  6. Fill in the subject and message.
  7. Touch Apply.

If you have multiple accounts, make sure you’re in the right account before you touch the gear Settings.

Your vacation responder settings are synced with the desktop version of Gmail.

Contact Us for more tips


Top Post Last Weekend(How To find PC Mac Address)

I investigated these post, What will I want to know my PC MAC Address or Called Physical Address in Windows 7.

No matter what the answers where!
Here is How TO WIN 7:

1. Click the Run button in the Windows Start Menu.

2.Type cmd in the Open prompt of the Run menu and click OK to launch a command promptwindow.

3. Type ipconfig /all at the command prompt to check the network card settings. The IP number and MAC address are listed by ipconfig under IP Address and Physical Address.

4. Your Physical Address is the computer MAC Address.

Securing your ID on your PC

Computers can be enormous timesavers and powerful financial tools. Using budget tracking software, paying bills online and buying items more cheaply from wholesale or auction sites can make a lot of sense.

Secure your ID on your PC

  1. Using passwords and profiles
  2. Getting your guard up
  3. Upping the anti with software
  4. Running scans to stay current
  5. Taking wireless precautions
  6. Pumping up passwords
  7. Doubting downloads
  8. Avoiding public computers
  9. Watching smart phones and PDAs
  10. Scrubbing files

But before you load up your computer with sensitive information about yourself, you’ll want to take the necessary steps to ensure your personal finances stay personal. Here’s how to keep your computer on lockdown and off limits to identity thieves.

  1. Use passwords for protection

You wouldn’t leave sensitive documents laying out for prying eyes; likewise, you need to put away the information stored on your computer in a safe place: locked behind a password in your own user account.

Even if you are a true Luddite and never intend to go online, you’ll still want to password protect your computer. That’s because if you have a snoopy houseguest or if a thief picks up your laptop, they could get at your information as you sleep if it’s not password protected.

Set up a separate user account for others to surf on so you keep your sensitive information private.

HOW TO: For Windows-based machines, go into the control panel, choose user accounts and follow the instructions. Mac users must create a password upon using the computer for the first time and they can change their password settings by going into system preferences. There they can disable automatic login. (If you get stuck, ask a trusted techie for assistance. That goes for all these tips.)

  1. Get your guard up

Before merging with the information superhighway, you’re going to want to make sure that all the existing security settings your computer comes with are turned on. If you want to go out and buy added protection later, that’s great. Just make sure you have basic protection enabled before going online.

First, fire up the firewall. Your computer should come with a firewall, or perhaps a software package came bundled with your purchase that includes a firewall. It’s basically a set of programs that work together to enforce the safety rules you outline when you choose a security level. The firewall is the gatekeeper for Internet activity.


The default setting is usually on, but you’ll want to verify that it’s on if you don’t see the firewall icon when you turn on the computer.
Go into the control panel to find the security settings, says Jennifer Leach, a consumer education specialist with the Federal Trade Commission.

The higher you set your security, the more you are going to screen out, dangerous and harmless. According to Leach, medium to medium-high is fine for most people.

“If you’re extremely cautious and you want to set it high, your friends might start telling you you’re not getting their e-mails or you might see Web pages aren’t loading. I think if you set them pretty low, a lot of stuff’s going to creep through,” she says.

3. Up the ‘anti’ with software

Next, up the anti — antivirus and antispyware. These can be packaged separately or together. Spyware is software installed surreptitiously by outsiders on your computer that stealthily collects information as you navigate the Internet. Only some spyware is actually malicious; the spyware that marketers use is sometimes calledadwareViruses are pervasive and pernicious. More than 90 percent of all viral attacks go after the consumer, according to David Miner, senior director of Financial Services Industry Solutions at Symantec. “One out of every 233 e-mails that comes in is going to carry some kind of malicious code. With odds like that stacked against you, you can’t afford to go out without protection.”

Immediately download or activate antivirus and antispyware software, he advises.

“Often the way computers are sold these days, it comes bundled with software with a free 30- or 90-day trial. If you don’t already have other antivirus software, you should click it on — you can shop during the free trial period, but you should make sure that you have something running before you start surfing the Web,” says Dan Salsburg, assistant director in the Division of Marketing Practices at OnGuard Online.

“If your computer doesn’t come with anything, you can try free shareware while you are deciding. Look to something like Zone Alarm, Ad-Aware, or Spybot Search & Destroy,” suggests Miner.

4. Run scans to stay current

Unlike fashion, keeping up with computer security trends is easy. Just set automatic updates and let them run.

“Having the best security system in the world doesn’t do you any good unless you keep it current,” Miner says.

From the time the computer is boxed until you bring it home and plug it in, a lot can change: Either new threats arise or security flaws are detected in the software, so it is important to get the updates immediately.


“New attacks are being created daily,” warns Miner. Set your protection updates to run regularly: daily is best. Then run your full system scans regularly against viruses and spyware.

5. Take wireless precautions

Even if you’re a giving person, you can’t afford to share your wireless connection with the neighbors. Letting people piggyback on your connection sucks up bandwidth, slowing you down. Worse: They could potentially see everything on your computer.

“It’s been my experience that most people will connect in an insecure manner and end up exposing most of the information that is on their drive,” says David Marcus, security research and communications manager at McAfee. “You don’t want just anyone to connect to your documents folder if it has all your passwords on it.”

If you don’t turn on wireless encryption, a neighbor who’s only halfway computer savvy could easily put something on your PC that would track your keystrokes, warns Mark Sunner, chief security analyst at MessageLabs. This means that even if you’re logging onto a secure site, they would be able to record the keystrokes and go back and log in later.

It’s very tempting to buy a wireless router, plug it in and be up and running within a matter of minutes, but realize that by default the firewall component of that router might not be on. Encryption is almost certainly not on, says Sunner.

HOW TO: The typical wireless router will have local area network, or LAN, ports in which you plug in wires connecting to your computer. That’s how you can initially install your updates to the wireless software.

  1. Usually the router will come with a CD that has installation software and the installation software should have a tab on it for security and should show you how to set up encryption. You may be able to choose from various types of encryption. If so, choose WPA, or its newer variant, WPA2, as they’re considered more secure than the older WEP encryption.
  2. Always rename your connection from the default name.Your connection is called the service set identifier, or SSID, which is the name of a local wireless area network. It’s a case-sensitive string of text with up to 32 characters. You want to call it something that won’t identify you, because this is what anyone in the area can see.
  3. Choose a strong passphrase to password-protect your router.Don’t worry about having to remember this long string of characters. You’ll log in from your computer with something shorter. But do keep the passphrase in a secure place that you won’t forget about.

“It takes a few extra minutes to set it up upfront when you do it, but it ensures that rogues are not going to connect to your wireless network without you knowing about it,” Marcus says.

  1. Pump up password protocol

We’re constantly called upon to create passwords. How many do we repeat or name something ridiculously easy to guess? “You’d be amazed at the number of people who actually use the word ‘password’ as their password,” PayPal spokeswoman Sara Gorman says.

Here are some rules for creating better passwords:

Don’t make it personal: Passwords shouldn’t be words from the dictionary, spouses’ names, birthdays, Social Security numbers, things that people think are clever because they won’t have to write them down. Once a thief gets that fundamental information, it’s easier to figure out personal passwords.

Don’t recycle: A lot of people will end up reusing a lot of the same username and password combinations, so oftentimes a hacker will gather in that information and use it successfully on other sites.

Test your strength: Miner says that Norton 360, for example, offers a password safe — software downloaded to your home computer — that also checks password strength for you. If you keep passwords in an encrypted vault, you don’t have to worry about making it easy to remember either. And, by encrypting the list, you solve the physical security problem of written lists.

Good passwords should be composed of a combination of letters and numbers, suggests Miner.

7. Attachments and downloads

If you’ve ever looked at spam and wondered how anyone could be fooled by the atrocious grammar and ridiculous promises, perhaps next time the joke will be on you. The messages are getting more polished and more targeted.

MessageLabs has seen a sharp increase over the last four years of targeted Trojans. These programs lurk inside something that appears innocuous, such as a Word document or spreadsheet. When that document is activated, the Trojan gets to work, perhaps shipping information out of the My Documents file. “These usually get sent to a single individual, so they rarely get on the radar of the broader security community,” Sunner says.

“Never open or execute any e-mail attachment if you don’t know the person,” suggests Miner. “Consumers think that they can recognize a spam attack, but the attacks are becoming very regionalized and they look just like something you might expect to get from somebody. You shouldn’t view, open, or even execute e-mail attachments unless you know the source, it’s expected and you know the purpose of it.”

Sometimes your friends are the unwitting messengers of malicious code. Even forwarded messages that legitimately come from friends might shuttle recipients to a dangerous URL where, as Miner illustrates, there’s a list of “20 ways to take your 30-year marriage and make it go to 60” and, while you’re reading it, in the background a piece of code is slipped on your computer that will start taking information.

Tip: If you enjoy sharing jokes or feel-good messages that are sent to you, copy the information into the body of a new e-mail message rather than forwarding the attachment. Learn more about surfing safely online.

8. Avoid going public

Public cafes are great for surfing, but you really need to recognize the risk of inputting confidential information. There’s not much you can do to improve information safety at a public computer. You’re at greater risk because you’re dependent upon on a third party for security.

“Someone else who came in before me might have put in a flash stick that is gathering information,” says Miner.

“I would seriously consider if you want to use a shared computer that remotely relates to confidential or identity information,” Marcus says, “simply because you don’t know if it’s got a keyword logger or if all the tracking is turned on on that machine.

“It’s a large risk that people really need to weigh. If there’s no other access available and there’s no other way of getting it done, you take the risk. But if it can wait until you can get home, it might behoove you to wait.”

9. Watch your phones and PDAs

Remember, smart phones and PDAs are computers too, which raises two real risks: software security breaches and physical security breaches, such as when you lose the phone. Luckily, consumers can proactively find solutions to keep cell phones safe, just as on home computers.

You should always password lock your phone in case it goes MIA. That will make it harder for a thief to get at your information. Then, call your operator to have the phone locked, if possible, or your subscription canceled.

Threats to mobile software are growing, so it’s important to protect yourself by downloading security software to your smart phone or PDA. Traditionally, crackers, the nickname for criminal hackers, haven’t been much of a threat to cell phones because older models were essentially dumb boxes, but now the devices are getting smart — and so are thieves.

“Nowadays, we are carrying around what is essentially a mini-PC that also happens to be a phone,” says Sunner. “Because it is that much smarter, it of course is that much more open to abuse. I think, from that perspective, all the same paranoia I would use with my PC, I would apply to my phone as well.”

If you’re going to engage in mobile banking, even though banks are trying to protect their customers on their end, you should have some sort of mobile security just as you have on your home computer, says Miner.

“The average consumer trusts their device. But as soon as you start putting confidential information — passwords, identifiers — that you’re then going to send to the bank, that now becomes information either on your cell phone, at risk, or over the air, at risk,” he says.

“People should know that what’s sent over to them can be pulled out of the air,” says Leach. “PDAs should never be used to send Social Security numbers or financial information. Same with cell phones, actually. I hear people all the time in public giving things, that first of all, anyone could overhear, but also that anyone with that kind of scanner could pull out of the air.”

Be aware of the kinds of information you send over a PDA because it might not have the kinds of protections that you think it does. When in doubt, get to a landline or a secure computer.

10. Clean up after yourself

Before selling or recycling your old computer, wipe the system with a file scrubber. Simply deleting files and emptying the trash bin doesn’t mean they can’t be recovered by anyone motivated to uncover them.

Free versions of file scrubbers, also called disk wipes or data scrubbers, can be found by doing a quick online search.

Read more:

Share a link to a Big file – Using Dropbox

Share a link to a file

Need to send a large file, video, or a bunch of photos? Just copy the Dropbox link and paste it into an email, chat, text message…you name it. It’s that easy!

Dropbox allow you to Share a folder from dropbox account on Windows. Go to your list of filesand folders and select the folder you want to share by hovering the cursor over the folder’s name. (Clicking on the folder name or icon will open the folder instead.) Click Invite people to collaborate to give others access to the files in your folder .

Setup your account  and download the Dropbox to start cloud saving and sharing safely

Never lost your Data easily

Mikrotik RouterOS Upgrade Version 6xx

Mikrotik RouterOS Upgrade

If you are already running RouterOS v6, upgrading to the latest version is simple. Just one click, and RouterOS will find the latest version, show you the changelog, and offer to upgrade. You can do this from Winbox, console, Webfig or QuickSet.

Simply click “Check for updates” in QuickSet, Webfig or Winbox packages menu.

  • Open Winbox
  • go to “System/Packages” menu (Step 1 and 2 from image below)
  • New window “Package List” will open. Click on “Check for Updates” button (step 3 in the image)
    Kattieh's IT&C Troubleshooting Solution


  • New window “Check For Updates” will open, where you will be able to see currently installed version and latest available version as well as latest available Changelog.
  • Click on “Download” or “Download&Install” button.

After download is complete you will see in status bar message that Download was successful.

If you clicked on “Download” button then you will need to reboot router manually to complete installation, but if “download&Install or “download&upgrade” was clicked then router will reboot automatically after files are downloaded.

Mikrotik RouterBOARD Firmware Upgrade

Next step after the RouterOS upgrade is firmware (bootloader) upgrade.

  • Open Winbox and go to “System/Routerboard” menu (step 1 and 2 from image below).
  • New window “Routerboard” will pop up, where you can see current and latest available firmware.
  • Click on “Update” button (step 3 from the image)
    Mikrotik Firmware Upgrade

RouterOS will ask for upgrade confirmation, click on “yes”.
Mikrotik Firmware Upgrade dialog



Note: After firmware upgrade, still old version is used until you reboot the router

SwOS device upgrade

For RouterBOARD Switches, the upgrade procedure is as follows: in the System tab, scroll to “Firmware upgrade”.

Firmware can be upgraded/downgraded by selecting firmware file and pressing upgrade button. Switch will reboot automatically after successful upgrade. New firmware can be downloaded from our webpage:


Note: Manual power cycle is necessary 5 seconds after upgrade button is pressed if you are upgrading from SwOS v1.0

Hire Us


How to find a windows Computer Serial Number from the Command line(CMD)

Hello Subscribers
After receiving lot of emails from you on how to find a windows computer Serial number from the command Line (CMD).

Below is the shortcut method:

1. Click the start menu
2. Type CMD in the search box and press enter.

Type the following Command :
1. wmic and press enter
2. csproduct get name, identifyingnumber and press enter

and that’s all :
see my computer serial number below:
How to find a Serial Number




ask a question here


How to Edit the Hosts File in Mac OS X with Terminal

Over the pass week, We have received emails from subscribers on how to edit or modify the hosts file on a Mac?

This simple six step will walk you through a successful Mac Host file edit/modification.

You’ll find hosts in Mac OS X is stored at /private/etc/hosts but it can also be accessed at the more traditional location of /etc/hosts. That said, if you’re looking to edit hosts, you’ll want to target the file located in /private/etc/ though. We’ll walk through how to manually edit the hosts file in OS X Yosemite, OS X Lion, OS X Mountain Lion, and OS X Mavericks, this will be done with the command line using the simple text editor called nano. Don’t let the command line or Terminal sound intimidating though because it’s not, we’ll make the entire process super easy.

Let’s get started making some edits to /etc/hosts!

  1. Launch Terminal, found in /Applications/Utilities/ or launched through Spotlight
  2. Type the following command at the prompt:

sudo nano /private/etc/hosts

  1. Enter the administrator password when requested, you will not see it typed on screen as usual with the command line
  2. Once the hosts file is loaded within nano, use the arrow keys to navigate to the bottom of the hosts file to make your modifications
  3. When finished, hit Control+O followed by ENTER/RETURN to save changes to /private/etc/hosts, then hit Control+X to exit out of nano
  4. Quit out of Terminal when finished

You can verify your hosts modifications immediately with ping, Safari, or any other network app. Changes take effect immediately though some adjustments may need to be accompanied by a DNS flush which can be done with the following command in OS X 10.9:

dscacheutil -flushcache;sudo killall -HUP mDNSResponder

When flushing DNS cache with that command you will need to enter the admin password.


How to Flush DNS Cache in Mac OS X

Over the Pass week we have received emails on how to flush DNS cache in Mac OS X.

If you find something in this tutorial isn’t working for you and your DNS does not appear to have changed after applying the below methods, verify the version of OS X you’re running and use the appropriate commands for the latest version. If you’re still having problems after that, try a different machine ideally on a different network  to verify that it’s not an issue with the remote server or your Computer.

Whether you’re a systems administrator or a web developer, or anything in between, chances are you’ll have to flush your DNS cache every once in a while to get things straightened out server-side, or even just for testing certain configurations.

Flushing your DNS cache in Mac OS X is actually really easy, but there are actually several different commands to use, and you will find the commands are unique to different versions of OS X. We’ve got you covered regardless of what version of Mac OS X you’re running, from OS X 10.10, OS X 10.9, all the way back to 10.4. So find your version of OS X, open your Terminal, and follow the appropriate directions below to get started.
Remember, each of these commands must be entered into the command line, by way of the Terminal applications (found in /Applications/Utilities/ in all version of Mac OS X). Launch that app first and then you can just copy and paste the commands in if you’d like.

Clearing DNS Cache in OS X 10.10 Yosemite

Running the latest version of OS X? Clearing DNS caches in OS X Yosemite has changed again, split into MDNS and UDNS or combined like we’ll use below, here’s the command that is needed:

sudo discoveryutil mdnsflushcache;sudo discoveryutil udnsflushcaches;say flushed


Flush DNS in OS X 10.9 Mavericks

Rere is how to flush the DNS cache in 10.9:

dscacheutil -flushcache;sudo killall -HUP mDNSResponder

You will need to enter the admin password for this task to complete. If you notice, it combines killing mDNSResponder with the standard dscacheutil, making it a two step process to first, flush cache, then reload the DNS handling in OS X so that the changes take effect.

Flushing DNS Cache in OS X Lion (10.7) and OS X Mountain Lion (10.8)

Launch Terminal and enter the following command, you will need to enter an administrative password:
sudo killall -HUP mDNSResponder
Note the dscacheutil still exists in 10.7 and 10.8, but the official method to clear out DNS caches is through killing mDNSResponder. You can also find that process running in Activity Monitor.

One helpful trick if you find yourself flushing the DNS frequently is to setup an alias for that command string in your .bash_profile or in the profile of your shell of choice. A simple bash alias for flushing cache could be this:

alias flushdns=’dscacheutil -flushcache;sudo killall -HUP mDNSResponder’

Save that into .bash_profile, then typing “flushdns” would prevent having to use the full command string in the future.

Flush DNS Cache in Mac OS X 10.5, Mac OS X 10.6

Launch Terminal and issue the following command:
dscacheutil -flushcache
All done, your DNS has been flushed. On a side note, the dscacheutil is interesting in general and worth taking a look at, try the -statistics flag instead for some stats.

Flush DNS in Mac OS X 10.4 Tiger, & 10.3

Type the following command in the Terminal:
lookupd -flushcache

That’s it, that’s all there is to it. Now your DNS settings should be as you intended them to be, which you can easily verify with various networking tools like http, ping, nslookup, traceroute, curl, or whatever else is appropriate to your specific situation.

If you find something isn’t working and DNS does not appear to have changed, verify the version of OS X you’re running and use the appropriate commands for the latest version. If you’re still having problems after that, try a different machine ideally on a different network (like a cell phone) to verify that it’s not an issue with the remote server.


How to Lock MAC to IP Address in Mikrotik

Think you have a policy for your office local area network (LAN) which is based on IP address of the hosts or workstations inside the LAN. To make sure your policy working smoothly, one thing you have to do is to prevent users from changing their workstations IP address. So you have to lock their IP address to match with the hardware MAC address. If they change the IP address then it will not match with the MAC address set up in the Mikrotik router so they will be blocked. Before applying the below illustration we understand that you are the admin of your LAN. This tutorial shows you how to lock MAC to IP Address in Mikrotik router. Here is what you have to do.

  1. Login to the Mikrotik router via Winbox or Telnet/SSH.
  2. Run the below commands in the Terminal

/ip firewall filter add chain=input src-address= \ src-mac-address=!1A:2B:3C:4D:5E:6F action=drop disabled=no /ip firewall filter add chain=input src-address=! \ src-mac-address=1A:2B:3C:4D:5E:6F action=drop disabled=no The commands above mean that if the source IP address is but the MAC address is not 1A:2B:3C:4D:5E:6F or the source MAC address is 1A:2B:3C:4D:5E:6F but the IP address is not then drop the packet. Now you can test using your laptop / computer. Make sure to change the IP and MAC address to meet your device configurations.   Post a Question