Download  |  Register Online  |   Plan & Pricing  |   Access Numbers   |  Web Mail  |   Login  |  Take A Tour  |   My VIP










Q.1) What modem do I have installed in my computer?
To see what modem(s) in installed on your computer, follow these steps:
1. Click on Start button at the lower left corner of your screen.
2. Go to Settings and select Control Panel.
3. Double-click on Modems.
4. The "Modems Properties" window will open and list the modem(s) currently installed or connected to your computer.

Q.2) What if I have more than one modem listed in my Modem Properties?
Select one and attempt to connect. If it doesn't connect, try another. If none of them work, contact your modem or computer manufacturer.

Q.3) What if I don't have anything listed under Modem Properties?
Please contact your modem or computer manufacturer for further instructions.

Q.4) How can I get the latest version of VIP PowerNet's Internet Service software?
You can click Menu Options and then go to Help and click on About Browser (F1). A small window will pop-up in front of the screen, then click on Update icon from that window. You can also click on Start button and go to Programs then go to VIP PowerNet and select LiveUpdate.

Q.5) Why can't I connect at 56K?
FCC regulations prevent all devices attached to the telephone network from exceeding a certain power output. As a result, VIP PowerNet has scaled back the output, which has a direct effect on the speed at which we can transfer data. Currently, we have the server modem limit set to 53333Kbps. This does not mean that people will be unable to hit the higher speeds, it just decreases the likelihood of it. In addition, there are other factors that can influence the connection rate and the speed at which you transfer data. Even though one end of the connection is pure digital, there are things that can hamper a V.90 connection without preventing it altogether. Essentially, the quality of the phone line plays a key role in the connection speed.

Q.6) What is a Virus?
Virus Information Simply defined, a virus is a piece of software that is configured to harm your computer by altering the way it works. There are many different types of viruses, which behave and affect your computer differently. They may be as simple as a message imbedded in a window or as destructive as corrupting your hard drive. Usually, a virus will spread itself from one file to another without your input or knowledge, because they encrypt themselves or mutate slightly each time that they replicate. They spread differently depending on what kind of virus they are. Boot sector viruses append themselves to floppy disks. When you turn your system on or reboot it, the virus copies itself onto the boot sector of your hard drive. You cannot get this virus from sharing files or by executing a program - only from an infected disk. Program sector viruses fasten themselves to executable files with other programs. Most will piggyback on EXE or COM files, but they can infect any file that your computer runs when it launches a program. Macro viruses affect the template used to create documents or spreadsheets, thereby infecting every document or spreadsheet opened with the program. E-Mail viruses can infect your computer before you even open an e-mail. For example, a virus named "Bubble Boy," which targets Outlook and Outlook Express, can be launched even if it only opens up in the preview window. Just highlighting the subject line in the preview window activates the code. It starts sending messages to everyone in your address book in an attempt to overload and crash the e-mail server. An ounce of prevention is worth a pound of cure Taking defensive action is the best solution to protect your computer from the wiley viruses that loom in cyberworld.

The following steps may not completely protect you from viruses, but they may help reduce your chances of encountering them.
1. Install antivirus software. No antivirus software is capable of protecting you from all viruses, but they act as a resourceful companion by helping you to scan incoming files and shared floppy disks and will keep you abreast of the latest viruses. NOTE: Ensure that you update your antivirus software on a monthly basis.
2. Use diligence with all disks. Always scan disks from unknown sources with your antivirus software, especially disks that are shared by several people.
3. Download with care. Download all files from disks or shared files on a network into a special folder on your hard drive and scan them with your antivirus software.
4. Before reading attachments, scan them. Some e-mail programs will automatically open an attachment with the appropriate program. Disable this function so that you can scan attachments before they are opened.
5. Save shared files in RTF or ASCII format. Saving shared files in RTF or ASCII format will help prevent macro viruses, because neither format saves macros and formatting information. WARNING! It is important to note that you will lose all of the format, so you may wish to consider the importance of the document before taking this course of action.
6. Back it up! Back up everything in a safe place that is separate from your hard drive.

Helpful links for virus information: McAfee Anti-Virus Information Site ? http://www.mcafee.com/centers/anti-virus/ Dr. Solomon's Virus Central ? http://www.drsolomon.com/vircen/index.cfm IBM Anti-Virus Home Page ? http://www.av.ibm.com/current/FrontPage/ Quarterdeck Anti-Virus Research Center ? http://www.quarterdeck.com/quarc/VirusHandbook/TOCVirusDescriptions.htm

Q.7) How do I check a file attachment for viruses?
Instead of opening the attachment, save it on your computer and scan it with your antivirus software. A file containing a virus can't do any damage until you open it, so saving the file isn't dangerous in itself.

To save an attachment:
1. Double-click on the attachment that you're interested in. Juno will ask you whether you want to save the file or open it.
2. Click 'Save File'. A Save Attachment dialog box will appear.
3.
In the 'Save in' box, select the location where you'd like to save the file. This may be on your hard drive or on a floppy disk.
4. When you've specified where the file should be stored, click 'Save'. The file will be saved to the folder you selected.
5. Check the file with the antivirus software of your choice.
6. If no viruses are detected, or if they are and your antivirus software is able to clean the file, double-click on the file to open it. If you believe your computer may have been infected, please run a virus scanning program and then follow the advice of your anti-virus software on how to remove it.

Tip: If you'd like to learn more about protecting your computer with antivirus software, we recommend the CNET Virus Attack Center.

Q.8) What should I do if I think my computer has a virus?
If you believe your computer may have been infected, you should run a virus scanning program and then follow the advice of your antivirus software on how to remove the virus. If you want to learn more about protecting your computer with antivirus software, we recommend you go to the CNET Virus Attack Center.

Q.9) What hardware do I need to connect to the Web?
Besides your PC, you need a modem, various cables and a phone line. A modem translates the digital signals from your computer into analog signals that can travel over a standard phone line. Modems come in different speeds and can be installed inside your computer (internal), or connected to your computer's serial port (external). To connect an external modem to your computer, you'll need a serial modem cable. The cables are usually not included when you buy a modem because there are several different sizes available. These can be purchased at most computer stores. Finally, you'll need a standard phone cable to connect the modem to your phone line. The standard connector on a telephone cable is called an RJ-11. On the back of your modem, you'll probably have two RJ-11 jacks. One is for connecting the modem to a wall jack, and the other is for connecting the modem to a phone.

Q.10) How do I find someone's e-mail address?
Although there is no comprehensive directory of e-mail or Internet addresses, there are several search and reference tools you can consult: · InterNIC Directory Services - the place where you register your domain name also offers "white pages" services · Netfind - a simple Internet white pages directory facility · NetPages - a directory of Internet addresses of individuals and businesses either on the Net or reached through an Internet gateway · Four11 Directory Services - a free and easy-to-use directory of online users and their e-mail addresses

Q.11) What's a domain name?
It's the unique name that identifies an Internet site. The Internet is made up of hundreds of thousands of computers and networks, all with their own domain name or unique address. Domain names always have two or more parts separated by dots. A given server may have more than one domain name, but a given domain name points to only one server. For example, "whitehouse.gov" is the domain name belonging to the White House computer system. Once a system administrator registers a unique domain name, subaddresses can be assigned to the machines and people on the local network. So the President's e-mail address is "president@whitehouse.gov," the Vice-President's is "vice-president@whitehouse.gov," and so on. The machine that serves up the White House Web pages is called www.whitehouse.gov.

Q.12) What do the .com, .edu, .gov at the end of a Web address mean?
The domain name suffix is assigned based on the type of organization. For U.S. domains, the suffixes are: · .com - corporations · .edu - educational institutions · .gov - government institution · .org - non-profit organizations · .mil - military organization · .net - network provider

Q.13) What's a URL?
An acronym for Uniform Resource Locator, a URL is the address for a resource or site (usually a directory or file) on the World Wide Web and the convention that Web browsers use for locating files and other remote services. The first part of a URL tells you the type of resource (or method of access) at that address. The second part of a URL is typically the address of the computer where the data or service is located. Additional parts may specify the names of files, the port to connect to, or the text to search for in a database. Most of the URLs you'll be using start with "http" which stands for "hypertext transport protocol". Http is the method by which HTML files are transferred over the Web. For more information about URLs, read NCSA's Beginner's Guide to URLs.

Q.14) Can I find telephone numbers on the Web?
We recommend you try these directories: · BigBook claims to lists over 16 million U.S. businesses. · Big Yellow, the NYNEX yellow pages also has links to international directories. · Directory of Toll Free Numbers from AT&T means you don't have to pay $.75 for information. · InfoSpace lists residential, business and government phone and fax numbers, as well as e-mail addresses. · 555-1212.com lists national and international telephone and e-mail directories. · Switchboard locates telephone and addresses across the U.S. Who Where finds phone numbers and addresses. It's also available in Spanish and French.

Q.15) What is the quota on my current account?
When someone sends you an email message, it is stored on VIP PowerNet mail servers until you check for your mail. Then it is downloaded to the inbox on your hard drive. Your inbox can store as much mail as you have room on your hard drive, but each VIP PowerNet member has a 10MB limit for mail on our servers.

Q.16) What are the system requirements for VIP PowerNet?
Below are the minimum system requirements for VIP PowerNet Internet Service:
1. Pentium 133 MHz or higher
2. Windows 98
3. 32 MB RAM or more
4. 40 MB of free disk space
5. 28.8 Modem
6. SVGA monitor at 800x600 pixels
7. Resolution High Color [16 bit]

Q.16) Can I use my VIP PowerNet Account from more than one computer?
Yes. You can use your VIP PowerNet account on more than one computer. You will have to configure your account on the new computer through control panel in the browser.

Q.17) How do I configure my account on a new computer?
Click on Control Panel and select Configure New Account. Enter your user name and password and click on OK. It should pop-up a small message saying "Account Configured Successfully." Now you can go to the sign on screen and sign on using your screen name.

 

Copyright© 2001 VIP PowerNet Inc., All rights reserved.