Microsoft Access tips: Opening hyperlinks #microsoft #access,followhyperlink,hyperlink #error,hyperlink #warning,special #characters,vba,access


#

Provided by Allen Browne, January 2008

Hyperlinks: warnings, special characters, errors

The GoHyperlink() function (below) performs the same task as FollowHyperlink(), with improved control over the outcome. Like FollowHyperlink, you can use it to:

  • Open a browser to a webpage (http:// prefix)
  • Send an email (mailto: prefix)
  • Open a file, using the program registered to handle that type (Word for .doc, Notepad for .txt, or Paint for .bmp, etc.)

Why a replacement?

FollowHyperlink can be frustrating:

  1. Security warnings may block you, or warn you not to open the file (depending on file type, location, Windows version, permissions, and policies.)
  2. Files fail to open if their names contains some characters (such as # or %.)
  3. Errors are generated if a link fails to open, so any routine that calls it must have similar error handling.

GoHyperlink addresses those frustrations:

  1. It prepends file:/// to avoid the most common security warnings.
  2. It handles special characters more intelligently.
  3. Errors are handled within the routine. Check the return value if you want to know if the link opened.

It cannot solve these issues completely:

  1. If your network administrator will not allow hyperlinks to open at all, they will not open.
  2. If a file name contains two # characters, it will be understood as a hyperlink. Similarly, if a file name contains the % character followed by two valid hexadecimal digits (e.g. Studetn%50.txt), it will be be interpreted as a pre-escaped character rather than three literal characters.

These are limitations relating to HTML. But you will experience these issues far less frequently than with FollowHyperlink, which fowls up whenever it finds one of these sequences.

Using GoHyperlink()

To use GoHyperlink() in your database:

  1. Create a new stand-alone module in your database. Open the code window (Ctrl+G), and the New Module button on the toolbar (2nd from left on Standard toolbar.)
  2. Paste in the code below.
  3. To verify Access understands it, choose Compile on the Debug menu.
  4. Save the module, with a name such as ajbHyperlink .

You can now use GoHyperlink() anywhere in your database.

For example if you have a form with a hyperlink field named MyHyperlink, use:
Call GoHyperlink(Me.[MyHyperlink])

To open a file, be sure you pass in the full path. If necessary, use:
Call GoHyperlink(CurDir \MyDoc.doc )

The PrepareHyperlink() function can also be used to massage a file name so it will be handled correctly as a hyperlink.

The code


Android apps: IM for Android, iDisplay, Mobiscope, Business Card Reader, RDM: Remote Desktop #im+,skype,facebook,idisplay, #mobiscope,


#

IM+ All-in-One Messenger for Android

Chat within Facebook, MSN/Live Messenger, Google Talk, Yahoo. AIM/iChat, ICQ, Fetion, RenRen, Jabber, mig33, SINA Weibo, VKontakte, Odnoklassniki.Ru, Mail.Ru Agent and Yandex IM in a single app.

  • Chat with all your friends in a single buddylist
  • Optimized for both Android smartphones and Android tablets
  • Send text messages, photos, and voice notes
  • Chat history
  • Group chats in MSN, AIM, ICQ
  • Typing notifications

What’s new in version 6.6.5? You can see the changelog here

iDisplay for Android

Connect your Android tablet or smartphone to your Mac or Windows PC and turn it into the secondary monitor! iDisplay is a universal app designed to increase your productivity by maximizing the viewable area of your main monitor.

iDisplay is ideal for multi-taskers and those who want to increase their efficiency. It expands the viewable area of main monitor by moving other running programs like IM, Twitter and news widgets to an external display on their Android tablet or smartphone. Works via Wi-Fi and USB connections.

What’s new in version 3.0.1?

  • Option “Start application” which allows to start an application directly on iDisplay
  • Option to move windows to iDisplay with one tap with “Show windows” feature

iDisplay consists of 2 parts: mobile app for your Android tablet or smartphone and the FREE desktop app which you can download at getidisplay.com from your desktop computer.

RDM+ for Android

RDM+ is an easy-to-setup and reliable application providing fast and secure remote access to your Mac or Windows computers. Send and receive emails, edit documents, surf web, manage files and do hundreds of other things that you usually do on your home or office computer.

What’s new in version 2.1.2?

  • RDM+ is ultimate remote control tool for both Windows and Mac OS X.
  • Support of hotkeys combination for best Android remote control experience.
  • RDM+ Desktop application can be installed on as many computers as you want at no additional cost.

Note, that RDM+ consists of 2 parts: the mobile client for your Android tablet or smartphone and the FREE desktop service which you can download at www.rdmplus.com from your desktop computer.

Mobiola Video Studio


Contact Us #access #credit #management


#

Contact Us

Why wait to solve your financial headaches? Contact us today – our friendly staff will be happy to discuss your needs and offer up to the minute, professional advice on how to progress. For general enquiries or to request a FREE QUOTATION fill in the form on the left or call us now on:

International: +44 (0)207 305 5059

Call Access Credit Management Head Office: +44 (0)114 24 999 70

Call Access Credit Management UK FREEPHONE: 0800 694 0484

Smart Credit Management

Smart Credit Control

Insolvency Options for Individuals Companies

No Win No Fee!

An A Credit Worthy Rated Company

ACM, established in March 2000, continues to be rated as a credit worthy business by leading providers of commercial credit information and is a member of the International Association of Credit and Collection Professionals.

Trade with Confidence

Our objective is to simply assist our clients to trade with confidence with existing and future clients on a national and international level and our continued success has been built upon providing a service that meets with client requirements.

Fully Licensed

The company is fully compliant in respect of its credit collection protocols. Access Credit Management Limited specialise in Commercial and International Debt Recovery.

Access Credit Management Limited will not accept any debt which has been authorised and regulated by the Financial Conduct Authority for accounts formed under the Consumer Credit Act 1974 (amended 2006)

Licensed by the Data Protection Act 1984.

ACM carries Professional Indemnity Cover for the security of client funds and client peace of mind.


Import Microsoft Access #import #microsoft #access, #accdb #file #ms #sql #server


#

Import Microsoft Access .accdb File to MS SQL Server

These steps are for exporting an .accdb file if it cannot be viewed as a table. This may be needed if the data file was generated by a Microsoft Access form. If the desired file can be viewed as a table in MS Access, then skip these steps.

  1. Open up the TechData .accdb file (not a form file).
  2. In Access 2013 in the database tools tab click the Access Database button under Move Data .
  3. Follow the wizard to split the database.
  4. Open the *_be.accdb file that was created to gain access to the database tables.

Import to MS SQL Server

  1. Open MS SQL Server Import and Export Wizard.
  2. For Data Source choose Microsoft Office 12.0 Access Database Engine OLE DB Provider .
  3. Click Properties enter the location of the .accdb file in the Data Source field.
  4. Under login information, choose a blank username and be sure to check Blank Password .
  5. Test the connection. If it works, click OK.
  6. For the Data Destination choose Microsoft OLE DB Provider for SQL Server .
  7. Enter the MS SQL server name or choose from the dropdown menu.
  8. Enter your SQL credentials and select the database you wish to import the data to, the database should show up in the dropdown menu if your MS SQL info is correct.
  9. Select Copy data from one or more tables or views .
  10. Select the tables you want copied and edit the mappings if needed.
  11. Continue through the wizard and hit finish to begin the import.

I adapted this to the MSSQL Import/Export wizard using this guide. The info for entering data at step 21 and at step 29 was particularly useful.

Last updated by Mark Holmes on December 7, 2015 .

2 thoughts on ” Import Microsoft Access .accdb File to MS SQL Server “


Short-Term Fellowships #science, #biology, #molecular, #career, #events, #funding, #fellowship, #phd, #postdoc, #young #investigator, #installation #grant,


#

About

Short-Term Fellowships fund research exchanges of up to three months between laboratories in eligible countries. The aim is to facilitate valuable collaborations with research groups applying techniques that are unavailable in the applicant’s laboratory. Short-Term Fellowships are not awarded for exchanges between two laboratories within the same country. Short-Term Fellowships are intended for joint research work rather than consultations. The fellowships cover travel plus subsistence of the fellow only and not of dependents.

Eligibility

  • Applicants must be active researchers at any stage in their career with a minimum of one year of research experience at the PhD-student level.
  • EMBO Short-Term Fellowships are awarded for research exchanges between laboratories in EMBC Member States, Associated Member States or Cooperation Partners. EMBO Short-Term Fellowships are not awarded for exchanges between two laboratories within the same country.
  • During 2017, applications for research exchanges involving Chile and one of the EMBC Member Sates or Cooperation Partners will exceptionally be considered.
  • Only in exceptional cases will EMBO Short-Term fellowships be awarded for research visits outside the countries listed above. For such cases, it is essential that a justification be provided why there is no appropriate expertise or technology in EMBC Member States, Associated Member States or Cooperation Partners.
  • Applications from outside EMBC Member States, Associated Member States or Cooperation Partners will not be considered.
  • Applications for the exclusive purpose of training in a technique rather than as a component of a wider research project, will not be considered for funding.
  • EMBO does not consider applications for Short-Term Fellowships to prolong visits begun under other auspices, or as bridging fellowships between, or prior to, long term stays funded by EMBO or other organizations.
  • Applications for fellowships to attend courses, workshops, or symposia will not be considered.

Application

There is no deadline for applications, however it is recommended to apply three months before the proposed starting date. Applications received or completed only after the start of the visit will not be considered.

Applications and supporting documentation (two references, receiving institute acceptance) are only accepted via the online application system.

Evaluation

All applications are examined at the EMBO Fellowship Office to ensure that they are complete and eligible. Receipt of complete applications will be acknowledged via email.

Applications are judged on the following criteria:

  • CV of the candidate, and in particular research experience.
  • Quality of the project to be developed in the host laboratory (novelty, feasibility).
  • The suitability of the host laboratory for the proposed work.
  • Value of the exchange for the laboratories involved (collaboration, co-publication).

As soon as a decision is reached, normally within three to four months from submission of a complete application, applicants are informed promptly.

Benefits

Duration of support

Short-Term Fellowships are intended for visits of 1 week (7 days) up to 3 months (90 days).

Travel costs and stipend

The fellowships contribute towards travel costs and subsistence of the fellow but not of any dependents. The subsistence rate depends on the country being visited.

End of fellowship report

At the end of your fellowship applicants are asked to provide EMBO with a report of their activity at the host institute. The report should be sent to This email address is being protected from spambots. You need JavaScript enabled to view it.

Please note that you need to indicate your ASTF number and your current address on your final report.

The final report must be submitted to the fellowship office within 3 months of completing the research visit. The report should be about two pages, and should summarize the results as well as possible plans for further work to be undertaken. It may include diagrams, charts or illustrations. Upon receipt of the final report, the EMBO office will send a certificate stating the start date and duration of the fellowship, the place the place where it was held, the ASTF number and the title of the project developed.

Applicants must provide a letter signed by their home institution certifying that they have returned to work there for at least 6 months after the completion of the EMBO Short-Term Fellowship.

This email address is being protected from spambots. You need JavaScript enabled to view it.

David del Álamo Rodríguez
Programme Manager
T. + 49 6221 8891 122

Inga Strazda
Long-Term Advanced Fellowships Administrator
T. + 49 6221 8891 561

Ingrid Busby
Short-Term Fellowships Administrator
T. + 49 6221 8891 409

Benardine Ngu
Finance Fellowships Administrator
T. + 49 6221 8891 107

Larisa Bulgatova
Fellowships Administrator
T. + 49 6221 8891 551


VBA Mail Merge #access # #mail #merge


#

Access Mail Merge Example

Using Access Visual Basic to perform Microsoft Word mail merge give you the ultimate control and alleviates the need to jump to Microsoft Word to perform the mail merge. To accomplish this task you’ll need to create a Word template document with bookmarks inserted in the database field locations. These bookmarks will represent the variable part of the document.

Blue Claw Database Design is your premier source of Microsoft Access programming and database support. Both small business and department-level databases. Desktop installation as well as cloud/internet based solutions.

Next create an Access form with a button called Envelope. And, create an on click event as shown below. You’ll need to customize the PathDocu line to match you particular setup.

Private Sub Enveloppe_Click()

Dim MyWord As Word.Application
Dim PathDocu As String

If Me.NomPers And Me.Prnom Then
Set MyWord = New Word.Application
PathDocu = C:\Documents and Settings\BENOIT\Mes documents\Word\IFFC\BaseDeDonne\Documents\

With MyWord
.Documents.Open (PathDocu Env22x10.doc )
‘.ActiveDocument.Bookmarks( date ).Range.Text = _
Format(Date, dd mmmm yyyy )
.ActiveDocument.Bookmarks( nom ).Range.Text = Me.NomPers
.ActiveDocument.Bookmarks( prnom ).Range.Text = Me.Pr�nom
If Me.Adresse Then
MyWord.ActiveDocument.Bookmarks( adresse ).Range.Text = _
Me.Adresse
If Me.Adresse2 Then
MyWord.ActiveDocument.Bookmarks( adresse2 ).Range.Text _
= Me.Adresse2
If Me.CodePostal Then
MyWord.ActiveDocument.Bookmarks( codepostal ).Range.Text _
= Me.CodePostal
If Me.Ville Then MyWord.ActiveDocument.Bookmarks( ville ).Range.Text =Me.Ville
If Me.Pays Then MyWord.ActiveDocument.Bookmarks( pays ).Range.Text = Me.Pays
‘ si vous dsirez utiliser plusieurs fois les mmes donnes, vous devez
‘ crer des signets diff�rents
.Visible = True
End With
DoEvents
Set MyWord = Nothing
End If
On Error GoTo Err_Enveloppe_Click

Exit_Enveloppe_Click:
Exit Sub

Err_Enveloppe_Click:
MsgBox Err.Description
Resume Exit_Enveloppe_Click

End Sub
Contributed by Benoit Mann

Access Mail Merge

Using VBA Only to Create a Mail Merge Report

Access mail merge to a database or spreadsheet is a very common in the RFPs we receive. For one or two page letters we recommend using Microsoft Access Visual Basic totally – bypassing the activation of Microsoft Word and performing the merge operation directly in Access.

The end result of using Access directly to mail merge is that you can provide a much simpler user interface and don’t have the complications of linking to the Access database from Word and don’t have problems having to filter the records or trying to figure out table names, query names and field names to place into the mail merge Word document. Steps are fairly simple:

1) Create a Microsoft Word document (two pages max) and format it exactly as you want the resulting letter or document to appear.

2) In Word pick the Edit menu and then choose ‘Select All’, then Edit again and select Copy. This will place of copy of the document into your clipboard

3) Open up Microsoft Access and create a new blank report.

4) With the Edit menu choose Paste. This will place a copy of the Word document into the Access report. The document will retain the formatting and other characteristics since it is still a Word Document. In the Access report the document will be an OLE field and will likely be called OLE1

5) You can then assign the record source for the report using either a table or query.

6) After the record source is defined you then can select the database fields and simply drop them on top of the text in the Word Document. Setting the Background field property to Normal will completely hide the Word document text underneath the database field.

7) After aligning and sizing the database fields appropriately you are ready to run the report.

Usually you want to filter to select some subset of your database table. We use a little parameter form and filter a query or the report itself.

Use the Site Search menu choice at the top of the page to locate examples of Using Form Fields to Filter Reports. To see an advanced technique try search for Using Global Variable as Parameters .


Microsoft discontinues Forefront Unified Access Gateway (UAG) #tmg, #uag, #forefront #unified #access #gateway, #on-premises #security


#

Microsoft discontinues Forefront Unified Access Gateway (UAG)

And so it comes to pass. TMG was canned by Microsoft in September 2012 yet it was the more popular, cheaper, and in the eyes of many, the better product. UAG was kept then but is now being discontinued. No tears are shed here as Microsoft continues to refine its on-premises security portfolio to concentrate its resources on the cloud.

The news (December 17 ) that Microsoft had decided to discontinue Forefront Unified Access Gateway (UAG) came as no shock. The writing was on the wall that UAG would follow TMG into product oblivion as soon as TMG was canned in September 2012 to allow Microsoft to focus on cloud-based security services that they need to support Office 365 .

The announcement said:

We will continue to provide maintenance and support for Forefront UAG through the standard Microsoft support lifecycle, with mainstream support continuing through April 14, 2015 and extended support continuing through April 14, 2020.

I was always confused by the fact that Microsoft shipped both TMG and UAG to replace the much-used but often detested ISA Server. There didn t seem to be a wide enough product space for the two to generate separate and obvious value. Despite the best efforts of Microsoft personnel to explain the difference (like this blog looking at how the two products dealt with different Internet publishing scenarios), I never felt that clarity existed.

UAG never had the same kind of contended following as TMG attracted, perhaps because TMG seized the close working relationship with products like Exchange Server that ISA Server once had, a relationship that persists for Exchange 2013 even after TMG was canned. UAG is universally deemed to be more complex, less flexible, and more expensive than TMG. UAG never created the same feeling of value and it was surprising that Microsoft choose TMG when the time came for engineering expenses to be reallocated. I would have cheerfully shot UAG and kept TMG, but now both are past their best-by date and the discussion is moot.

On-premises software products dubbed with the Forefront moniker seem to be unfortunate. It almost seems like the application of the family name is tantamount to condemnation at a later date. If this continues, then what future exists for Forefront Identity Manager (FIM)? Perhaps as the sole survivor FIM is the king of the heap and will continue to prosper. We shall see.

As to Microsoft s overall security strategy, it seems that it is increasingly cloud-centric and that they are leaving the on-premises market to third party software vendors such as TrendMicro and Symantec. Customers who want to buy everything from the one vendor will be disappointed but at least you can justify Microsoft s decision on the basis that they are facilitating choice, however unwelcome that choice might be.


WinGate Proxy Server #wingate #proxy #server, #qbik, #web #cache, #access #control, #socks, #vpn, #mailserver, #windows


#

WinGate Proxy Server

WinGate Proxy Server is a highly capable HTTP Proxy server, SOCKS server, integrated Internet gateway and communications server designed to meet the access control, security and communications needs of today’s businesses. In addition to a comprehensive range of features, WinGate Proxy Server’s license options provide you the flexibility to match your needs to your budget, whether you need to manage an enterprise, small business, or home network.

Key Functions

WinGate Proxy Server allows you to:

  • Provide secure and managed Internet access for your entire network via a single or multiple shared internet connections
  • Enforce advanced and flexible access-control and acceptable use policies
  • Monitor usage in real time, and maintain per-user and per-service audit logs.
  • Stop viruses, spam and inappropriate content from entering your network
  • Provide comprehensive internet and intranet email services.
  • Protect your servers from internal or external threats.
  • Improve network performance and responsiveness with web and DNS caching
  • Ease administration burdens on your internal networks.

Key Benefits

Using WinGate Proxy Server to actively manage the use of your Internet and network resources can provide many benefits, including:

  • Improved Employee productivity through reduced time wastage
  • Reduced time and resources required to maintain network integrity
  • Reduced Employer liabilities
  • Improved efficiency, responsiveness and reliability of network access

Internet Sharing

WinGate Proxy Server will share most types of Internet connection, allowing multiple users to simultaneously surf the web, retrieve their email, or use other internet programs, as if they were directly connected to the Internet. Whether it is a simple dialup modem or high speed fibre, WinGate Proxy Server can help to make the most out of the connection. WinGate Proxy Server supports a wide variety of Internet protocols, allowing applications such as Web browsers, messaging software, FTP and SSL. WinGate Proxy Server also supports DirectPlay Internet games and Real Time Streaming Audio/Video.

Control Internet Access

With WinGate Proxy Server’s user database and policies, administrators can limit and control user access to the Internet. With logging, auditing, and a real time activity and history viewer, detailed records of user activities can be easily examined. This makes WinGate Proxy Server ideal for companies, schools, Internet cafes or any environment where Internet access needs to be monitored closely.

Built-in Security

WinGate Proxy Server comes with a built-in packet-inspecting firewall. Your network safety can be further enhanced with optional plug-in components, available seperately, which will scan incoming data for viruses, or filter out inappropriate content in web traffic. Read how WinGate Proxy Server has helped some of the 750,000 + registered customers to make the most of their Internet connection.

2017 Qbik New Zealand Limited
WinGate is a registered Trade Mark of Qbik IP Management Limited. All other trademarks and copyrights are owned by their respective owners.


Security and Fire System Design and Installation #intelligent #security #and #fire, #install, #repair, #upgrade, #maintenance


#

Intelligent Security & Fire Ltd

Security and Fire System Design, Installation, Maintenance & Repairs

Intelligent Security and Fire provide a complete range of security and fire alarm services including: burglar alarms, intruder alarms, CCTV systems, door entry or intercom systems, access control systems, fire alarm systems, fire risk assessments, fire extinguishers, alarm monitoring, automated gates, security roller shutters, security lighting, emergency lighting, site security, locks and safes, home automation and data networking.

Intelligent Security and Fire are an accredited independent security systems company based in West London with over 20 years experience providing installation, maintenance, repairs and monitoring of high quality security and fire detection systems for residential and business properties. Our alarm systems are Police recognised and Insurance approved. View our services .

Our Mission:

Providing the most effective security and fire prevention solutions through careful design, skilled installation and a tailored maintenance schedule.

What We Do

Intelligent Security and Fire provide a complete range of security and fire prevention services that are individually designed for your specific requirements. This “one stop shop service” reduces time, costs and the complications involved using different companies for various systems & applications and ensures that when required individual systems integrate seamlessly with each other.

Where We Cover

Based in Uxbridge, West London, Intelligent Security and Fire, we operate in the following areas: London, Berkshire, Buckinghamshire, Hertfordshire, Middlesex and Surrey. For a full list of all towns and cities we cover in each of the areas, please go here .

Security and Fire System Design and Installation

In order to establish your precise requirements we need to carry out a survey of the premises you are looking to secure. A survey is carried out by one of our surveyors who will visit the premises and assess the risk, and design a system that s fit for purpose. Our in house design team is experienced in planning systems that comply with the relevant regulations. We carry out a full survey and appraisal of each customers individual requirements and then design a system that meets your need and budget. At the same time we will ensure that the installation is sympathetic to its surroundings.

  • Read more about our security system design and installation
  • Free Safety Survey

Security and Fire System Maintenance and Repairs

Our dedicated team of access control service engineers is on call 24 hours, 7 days a week. We can normally respond to an emergency call-out within 24 hours and very often the same day if contacted before midday. All engineer s vans carry a stock of the most common replacement parts so that often the repair can be completed during a single visit. Once fully repaired we offer you the option to take out a preventative maintenance service agreement to ensure that your system is properly maintained to prevent future breakdowns.

  • Go to our Maintenance Section
  • Go to our Repairs Section
  • Book an Appointment for Maintenance or Repairs

We aim to provide our customers with the highest level of service from start to finish; from the moment you meet our expert friendly surveyors for your free survey, to our highly skilled engineers, through to our dedicated customer service team who are just a phone call away.

John Reynolds, Managing Director, Intelligent Security & Fire Ltd.


Connected on wireless network but no internet acces – Forums #connected #to #wifi #but #no


#

Connected on wireless network but no internet acces

by PrPrO_ / July 30, 2012 6:14 AM PDT

Hello.
I have the network signal strength booster and it sees mine network, the signal is excellent, connected to the internet and everthing is great, but i can not open anything. Can’t open any browser.
I will try to install skype tomorrow and will try if it can load it up
The problem is on the windows xp
I have mini notebook that is connected wireless and everything works fine. 2 computers are connected with cables and the last one is connected with usb stick. so, wireless again

Can you please help me?
Thank you in advance!

Discussion is locked

You are reporting the following post: Connected on wireless network but no internet acces

This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET’s great community.

Sorry, there was a problem flagging this post. Please try again now or at a later time.

So. now it is connected but it says it has limited access or no access
Here is the ipconfig /all and some other info
Quote:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\Danko ipconfig /all

Windows IP Configuration

Host Name. Radiona
Primary Dns Suffix.
Node Type. Mixed
IP Routing Enabled. No
WINS Proxy Enabled. No

Ethernet adapter Local Area Connection:

Media State. Media disconnected
Description. Realtek RTL8139 Family PCI Fast Ethe
rnet NIC
Physical Address. 00-0E-2E-29-BE-F3

Ethernet adapter Wireless Network Connection 2:

Connection-specific DNS Suffix.
Description. Realtek RTL8187 Wireless 802.11b/g 5
4Mbps USB 2.0 Network Adapter
Physical Address. 00-0F-04-B3-37-8C
Dhcp Enabled. Yes
Autoconfiguration Enabled. Yes
Autoconfiguration IP Address. 169.254.33.49
Subnet Mask. 255.255.0.0
Default Gateway.

C:\Documents and Settings\Danko

My service provider is T-Com
Modem is: Gigaset SE555 WLAN dsl
Should I type the TCP/IP address manualy on the Windows XP? Beacause now it is on automatic
I could use little help with the DNS IP that has to be written..

I can’t access the 192.168.1.1 from the problematic computer, and when I get in the setting for the modem from working computer it says that the problematic computer is connected, here is the screenshot: Radiona is the problematic computer, War_Machine is one of the 4 other working
http://img703.imageshack.us/img703/4887/capturetkd.jpg

Hy. here is the new ipconfig after manually giving the Radiona its IP that router sends to it

[QUOTE]Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\Danko ipconfig /all

Windows IP Configuration

Host Name. Radiona
Primary Dns Suffix.
Node Type. Mixed
IP Routing Enabled. No
WINS Proxy Enabled. No

Ethernet adapter Local Area Connection:

Media State. Media disconnected
Description. Realtek RTL8139 Family PCI Fast Ethe
rnet NIC
Physical Address. 00-0E-2E-29-BE-F3

Ethernet adapter Wireless Network Connection 2:

Connection-specific DNS Suffix.
Description. Realtek RTL8187 Wireless 802.11b/g 5
4Mbps USB 2.0 Network Adapter
Physical Address. 00-0F-04-B3-37-8C
Dhcp Enabled. No
IP Address. 192.168.1.105
Subnet Mask. 255.255.255.0
Default Gateway. 192.168.1.1
DNS Servers. 192.168.1.1

C:\Documents and Settings\Danko
[/QUOTE]

And here is one of the working PC’s(this one is wired to the router using Windows 7)

[QUOTE]
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.

Windows IP Configuration

Host Name. Matija-PC
Primary Dns Suffix.
Node Type. Mixed
IP Routing Enabled. No
WINS Proxy Enabled. No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix.
Description. Realtek PCIe GBE Family Controller
Physical Address. 00-1A-4D-4F-53-1A
DHCP Enabled. Yes
Autoconfiguration Enabled. Yes
Link-local IPv6 Address. fe80::943f:2821:def4:d307%23(Preferred)
IPv4 Address. 192.168.1.102(Preferred)
Subnet Mask. 255.255.255.0
Lease Obtained. 31. srpnja 2012. 7:08:22
Lease Expires. 6. rujna 2148. 22:00:57
Default Gateway. 192.168.1.1
DHCP Server. 192.168.1.1
DHCPv6 IAID. 184556109
DHCPv6 Client DUID. 00-01-00-01-13-29-29-67-00-1A-4D-4F-53-1A

DNS Servers. 192.168.1.1
NetBIOS over Tcpip. Enabled

Ethernet adapter Hamachi:

Connection-specific DNS Suffix.
Description. Hamachi Network Interface
Physical Address. 7A-79-05-5C-9A-1E
DHCP Enabled. Yes
Autoconfiguration Enabled. Yes
IPv6 Address. 2620:9b::55c:9a1e(Preferred)
Link-local IPv6 Address. fe80::8cdb:b1bc:bf33:c14b%27(Preferred)
IPv4 Address. 5.92.154.30(Preferred)
Subnet Mask. 255.0.0.0
Lease Obtained. 31. srpnja 2012. 7:08:22
Lease Expires. 31. srpnja 2013. 7:10:29
Default Gateway. 5.0.0.1
DHCP Server. 5.0.0.1
DHCPv6 IAID. 544897433
DHCPv6 Client DUID. 00-01-00-01-13-29-29-67-00-1A-4D-4F-53-1A

DNS Servers. fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. Enabled

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft ISATAP Adapter #2
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Tunnel adapter 6TO4 Adapter:

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft 6to4 Adapter
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Tunnel adapter Reusable Microsoft 6To4 Adapter:

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft 6to4 Adapter #2
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Tunnel adapter Local Area Connection* 15:

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft 6to4 Adapter #3
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Tunnel adapter Local Area Connection* 9:

Connection-specific DNS Suffix.
Description. Teredo Tunneling Pseudo-Interface
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes
IPv6 Address. 2001:0:5ef5:79fd:c6c:17e:a274:6fb2(Prefer
red)
Link-local IPv6 Address. fe80::c6c:17e:a274:6fb2%25(Preferred)
Default Gateway.
NetBIOS over Tcpip. Disabled

Tunnel adapter Local Area Connection* 17:

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft 6to4 Adapter #4
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Tunnel adapter Local Area Connection* 18:

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft 6to4 Adapter #5
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Media State. Media disconnected
Connection-specific DNS Suffix.
Description. Microsoft ISATAP Adapter #3
Physical Address. 00-00-00-00-00-00-00-E0
DHCP Enabled. No
Autoconfiguration Enabled. Yes

Seems like the DNS is the problem?
And yes. now I am able to get into the 192.168.1.1 router setting from Radiona
And. the computer doesn’t anymore say that it has limited access but I can’t still get any webpages to load -.- you can see that on the connection test