Tuesday, 12 June 2012

How to install and configure the Apache Web server on Windows

Method step by step installation and configuration of Apache so easy, just copying and pasting the basic parameters so that we can have entire websites in our PC and access them the same way as on the Internet. Method that allows those who do not possess advanced knowledge, to have your own web server on your local computer.
Installing and configuring the basic parameters and basic Apache server that allow its use and then add modules and other features according to the needs and purposes of those who are ready to use. 
How to access the server from other computers on a local network, how to connect to internet through Apache, save web pages in cache and finally serve your web pages on the Internet and allow access to the server from the outside.
What is a web server?
A web server as its name implies, is software installed on a computer with all the necessary conditions to serve or deliver web pages that are requested by a browser, ensuring that display and represent all the elements necessary for proper operation and display. 
There are several types of web servers, Apache is an open source software, free to use and fully configurable, is now the most used in the network, either Linux or Windows. When installed on our PC will have a complete server with all the requirements to run locally.
Advantages it brings to install the Apache server on your computer
With the installation of Apache is possible to have in our PC for a small server that will enable us among other things: 
1 - Try and see web pages as they truly are to be displayed from the internet before uploading to a host or server on the network. Useful and necessary if you have or you will create your site however modest it may be. 
2 - Create Virtual Host module by multiple websites on our PC, we can download with wget and access them like on the net but this time locally. 
3 - able to see locally made ​​web pages in PHP. 
4 - Serve our website pages or directly to the Internet, you can access and connect every person from outside, in this case obviously the server performance will be limited while we run the PC and the possibilities of our connection. It can be a very encouraging experience for any fan, this possibility has the advantage that it is not necessary to rely on any company or remote server to upload content to the network we want to show. It's like riding a small radio station and start broadcasting (similarity) but in this case the scope is global. 
5 - can act as an intermediary between our computer and internet which gives us several advantages in the field of security. 
6 - Through internet it can serve several computers connected in a local network. 
7 - It is possible to activate a module that allows to cache all pages loaded which will improve the performance of our navigation.
How to install Apache
Installation is simple, download Apache.org. the latest version for Windows, you can use the following link. http://httpd.apache.org/download.cgi apache22 #
Create two folders on drive C, the first and second name servidor_web Apache. Unzip the downloaded file and run it, follow the installation steps and data that ask you just pick the destination of the facility, which will be the folder you created in C: \ Apache, the other data leave them the default for configure later. 
the installed program creates an icon in the notification area that lets you: start, stop and restart Apache, you should keep in mind that any changes you make to the configuration file will not take effect until you restart the server.
How to configure the Apache
All configuration for running Apache is stored in a text file named: httpd.conf which is located in C: \ Apache \ conf, you can edit in any text editor such as Notepad but a recommended program is Notepad + +, free software that is unbeatable. 
can download Notepad + + from here. 
You have two options here: 
1 - First option, the simplest, download at the following link a copy of the httpd.conf file, unzip it, copy it or move it to the C: \ Apache \ conf and replaces the original file, and have ready to run the server. 
2 - The alternate advanced but not difficult, open the httpd.conf file and manually edit the lines indicated: 
All Lines beginning with # are comments in each section explains the various options but are in English.
Listen Line 52 indicates the IP address and port that the server will receive requests, you can use in the following ways: 
1 - The server will receive requests only from the same PC: Listen localhost: 80 
2 - receive requests other machines on a local network: Listen 80
In line 149 DocumentRoot to specify the path to the local folder containing the pages and files to serve, in your case will be the folder you created in C :/ servidor_web, would be as follows: 
DocumentRoot "C :/ servidor_web"
Line 177 sets <Directory> permission to the directory above, would be: 
<Directory "C:/servidor_web">
This is the essential configuration parameters to start using Apache. Saves changes and reboots the server by clicking the notification area icon.
Start using Apache
Copy the folder C :/ servidor_web any website or any files and access it by typing in the address bar of your browser 127.0.0.1 or localhost.If it is a website you're designing the show will see how Internet really. 
Any problems will be reflected in the server logs stored in C: \ Apache \ logs, you can open with notepad, in access.log file records all disclosures made ​​to the server, both your PC and Internet, in error.log records all operation errors, analyze them regularly will help a lot.
Access the Apache server from LAN
To access the server from another computer connected over a local network only need to type in the address bar the IP address of the computer that hosts, ie the one with the Apache server installed. 
To know the IP address need only open CMD window by typing Start> CMD, type in the window that opens IPCONFIG / ALL and press Enter, find the line Gateway, then the number is the IP address of the proxy. 
If the server listen on a different port to 80 (default) writes: "ip address: port", eg 192.168.1.3:8080 
In case of conflicts in trying to connect to a computer using a local network, check the following: 
• The IP address the computer you want to connect. 
• If Apache is listening on the port to which the request is made. 
• If the Windows firewall is blocking the connection. 
• If you receive an error message with code 403 means that there are no with the necessary permissions to access the directory, then establécelo as follows: <Directory "path to directorio"> Options Indexes FollowSymLinks AllowOverride None Order allow, deny Allow from all </ Directory> 





How to connect internet through Apache from your PC
For your internet connection goes through the server you configure it as a proxy for that fordward the configuration file httpd.conf uncomment (remove the #) the following lines: 
LoadModule proxy_module modules / mod_proxy.so 
modules LoadModule proxy_http_module / mod_proxy_http.so 
then adds at the end of file line: ProxyRequests On 
Close and save the changes. 
Access Internet Options via Control Panel, click the Connections tab LAN Settings button and check the box Use a proxy server, type in Address: 127.0.0.1 and Port: 80 or you will be using. OK in all windows. Restart the server. 
This applies if you use Internet Explorer and Google Chrome, if you use Firefox the above options you have to enter them in: 
Options> Settings> Set as Firefox connects to Internet. 
From now on all your connection goes by Apache, whether local or external address.
As cacheable Web server pages
To save to cache web pages web server do the following: 
Create a folder on drive C CacheRoot name, which will store the files in the cache, you can create on another drive, then you would have to indicate their path in the configuration file. 
In the httpd.conf file uncomment (remove the #) the line: 
LoadModule expires_module modules / mod_expires.so 
And add the following lines: 
LoadModule cache_module modules / mod_cache.so 
disk_cache_module LoadModule modules / mod_disk_cache . so 
copy and paste the following lines of code at the bottom:
<IfModule Mod_disk_cache.c> 
CacheRoot c :/ CacheRoot 
# CacheEnable disk / 
CacheDirLevels 5 
CacheDirLength 3 
86400 CacheDefaultExpire 
CacheIgnoreNoLastMod On 
CacheStoreNoStore On 
CacheStorePrivate On 
CacheEnable disk http:// *
</ IfModule>
<Directory "C:\cacheroot"> 
Options Indexes FollowSymLinks 
AllowOverride None 
Order allow, deny 
Allow from all 
</ Directory>
<IfModule Mod_expires.c> 
ExpiresActive on 
ExpiresDefault A604800 
</ IfModule>
The value specifies the time ExpiresDefault A604800 seconds persist in your cache, you can modify it according to your needs. All other values ​​you can adjust it at your convenience. 
Read the following pages in the manual folder: C :/ Apache / manual / mod / mod_disk_cache.html C :/ Apache / manual / mod / mod_expires.html

Restart the server.
Serve your pages on the Internet and allow access to the server from the outside
To serve your web pages on the internet you must first set the ServerName line 147, name server, you have the following options:
1 - You have a fixed internet connection, replace localhost with the IP address you assigned followed by a colon and the port to use, the default http protocol is 80. If you connect through a router would be the IP address of this because yours is a local address in this case. 
2 - You have an internet connection dynamics, the most common means that each time you connect your service provider Internet you are assigned a different IP address. In this case each time you need to install in your httpd.conf file enter the IP address assigned at the time, which is quite uncomfortable. 
3 - The other option is to access the DynDNS service offering that will synchronize the IP address you assigned to your server. Read more below an extract from Wikipedia.
Using DynDNS Service
DynDNS (Dynamic Network Services, Inc.) is a U.S. Internet solutions dedicated to DNS dynamic IP addresses. Offers free subdomains IP redirection to a long list of names available, giving individuals the opportunity to create a free web server with an address like 'wikipedia.dyndns.com', should be updated by a client on the machine the client, such as that the same company offers.
DynDNS can access the following link: DynDNS, you must register and then choose a domain name through which you can access your server from the internet, you have to download an update client https://www.dyndns.com/support / clients.html they give you (it's easy only weighs about 700 KB) and install it on your PC. In this case in your httpd.conf file do not have to change anything left intact with the value ServerName localhost: 80, from DynDNS will now synchronize your IP address.


If you configured the server name added to the end of your httpd.conf file the following line: 
Listen 80 to access through port 80 which is the default web browsing. 
There are ISPs that close this port, you can try if that If yours is accessing this page: https://www.dyndns.com/support/tools/openport.html entering your IP address and port, if so change testing another port, eg 8080 and specify it in the httpd.conf file like this: Listen 8080 is all, and if they work for outside access to your page, they should write to the browser: tudireccionIP: 8080 / If you installed the DynDNS update client would not necessarily be the IP address if the address assigned by the service.

How to install and use Smart Cache proxy to view pages without connection

How to use a web proxy on the computer, to save and store the entire contents of the websites and can view them later offline browser with no network connection. Explore and extract files from the contents of the cache.
Web proxies are widely used in network connections, to keep in cache, a kind of temporary memory, the contents of pages and thus make the users in their browsers load faster, consume less bandwidth band and streamline Internet connections. 
Thus working the famous Apache, IIS and others.
Using a proxy in our local computer, advantages
also have the option of using a proxy on our team, in this case the small proxy SmartCache. 
This proxy in addition to the above options to improve and streamline our connection, we provide access to content of stored pages, offline without connecting to the network. 
words, if we have limited connection time, the speed is bad or need to review the content that interests us later, SmartCache keep the content of web pages to load up with the browser cache on the application.

Why use the proxy SmartCache?

There are many network applications that can make this task possible, but in this case in a local team, the ideal option is to install the proxy SmartCache. 
Besides being an open source software, free, be free to use and small , possesses the following characteristics.

Features and Benefits of Smart Cache proxy

• It is fully configurable. 
• You may decide to keep cached pages, which are not and for how long. 
• All types of documents can be cacheable, even those with the directive "uncacheable". 
• Works even if you're not connected to the network and relatively not see the difference. 
• You can manually search for files in the cache, organized by easy-access directories. 
• Provides the ability to manually remove the cache images or other files downloaded by the browser. 
• Although it stops loading a page in the browser, continue cacheándola. 
• Especially useful when downloading multiple small files, without using the "Save As". 
• Contains a small additional program to maintain the cache file. 
• You can compress the cache to save disk space. 
• Completely portable, we can use a flash or portable hard disk and then (optional) to transfer the files to the cache on the PC. 
• Very simple yet robust. 
• Blocks unwanted URLs. 
• Replace the blocks 404 with the image we choose. 
• Open source software, free and free to use.
If with these characteristics and the advantages it provides you dare to try, you can download it here, weighs only 250 KB:
Install and configure the proxy Smart Cache
The main prerequisite for this program is that it needs to function in our system have Java Runtime Environment, also known as JRE or JDK 1.5. If you do not have it you can download free from the Java Web is essential to use other web applications and will be useful. Smart Cache requires no installation, just copy the file to download to the root of your C drive and extract it to your folder. 
Inside there are two configuration files, and gc.cnf scache.cnf . 
The first is the configuration scache.cnf the program itself, to facilitate your operation you can download a file with the standard configuration below or you can manually edit as shown below, follow these steps:
1-Open the scache.cnf with Notepad, Notepad + + or other text editor, find the following lines to change their values: http_port 8080 is the port that the application is listening, you can use 80 but it can cause conflicts with other applications, always use 8080.
cache_dir G: \ OTHER \ scache
path to the folder that will contain the files in the cache (this route is just an example) you can use any location, but we recommend using a separate physical drive to the disk operating system, which will increase performance as well choose a drive with enough free space in that directory and will accumulate lots of files consecutively with time usually occupy enough space.
http_proxy 127.0.0.1:80
client If you use a dynamic IP address update DynDNS style, so you can connect to the internet, if it does not have to manually enter your IP address.
No_cache http://www.google.com.cu/ * 
no_cache http://images.google.com.cu/ *
This feature is optional but very useful, you can add the addresses you do not want to cache, for example in http://www.google.com.cu/ my case included * and http://images.google.com.cu/ *, which are websites that I go often and it is unnecessary to have them taking up space in cache. 
With time You can read the entire help file, there are many parameters that can adjust to your needs, but are essential only those shown to function properly. 
Close the file and save changes scache.cnf.
The other file to configure is gc.cnf, is the adjustment of Garbage, the maintenance program that gives your cache file, only one parameter necessary to adjust for the moment. cache_swap_size 500MB Here you define the size of the cache, in my case I use 500MB, but you can set it to 100MB or 2 or 4 GB depending on your needs, 500MB is a good start, you can modify in the future if you continue using the application. Close the file and save changes gc.cnf.

Browser to access Internet via proxy
The next step is to configure the web browser you use to access the Internet via Smart Cache proxy, this form will be stored in the cache all the files you need.
For Internet Explorer and Google Chrome accessed in the Control Panel Internet Options , choose the tab Connections , press the buttonconfiguration , there check the box Use a proxy server for this connection . 
Now type in the values: 
Address: 127.0 .0.1 
Port: 8080 
OK in both windows.

In the case of Firefox is via the menu Tools, Options, Advanced, Connections, Manual proxy configuration
Configuration The route varies according to version of Firefox you use, select the same previous values. 
Address: 127.0.0.1 
Port: 8080

Start Smart Cache proxy

To start the Smart Cache proxy using any of the following methods:
1 - Smart Cache folder open a command console, for that with the Shift key pressed gives a right-click the mouse and the menu that appears choose "Open Command Window Here" in the window type: scache java and press Enter. 
2 - Another way is to create with notepad a new text file, copy and paste the following code:
@ Echo off
cd 
java scache 
cls 
Save the file and rename it: scache.cmd , when you run it will open a command window, and you have minimízala running the proxy.
In the file whose download link is above, there are two batch files to launch the proxy tool Smart Cache and Garbage collector, unzip the package and copy the two files to the proxy and make a shortcut to the desktop or other easily accessible location, remember to start Garbage should not be open proxy.
From now on all web pages you load your browser will be stored in the file cache cache.Si not want anything that you visit just close the window of the proxy and surf normally.

Use Smart Cache offline, offline

To view the web pages stored in cache to be offline, just type in the browser address bar URL, or part of this and load the page as if you were connected to the network, you will not see the difference. 
Garbage collector is a small program included in the package of Smart Cache, you can use it weekly or biweekly, its use is to give maintenance to your cache, to run without opening Smart Cache in the console type the following command: java-gc scache . 
may explore the cache that you have stored and find a page or file containing, either images or documents for that do the following: 
Enter or type in your browser 127.0.0.1:8081 , press Enter, you will see an interface that lets searching and will return the list of directories where information is stored.

how to Prevent spam and chain mail or email on the Internet.

As a guard against spam, measures to prevent, reduce and minimize the detrimental effects of spam on the internet, how to identify and denounce emitting sites. 
Article dedicated to putting a small grain of sand in the fight against spam, understand their characteristics , operation and objectives.Open the eyes of users against common practices on the Internet for this purpose such as chain letters. 
Measures to minimize the impact of spam, how to track and identify the sites dedicated to this task and how and where to report them.

What is SPAM or junk mail?

Spam, now famous, also known as junk mail is just spam messages containing unwanted advertising and annoying. 
There are several ways to send spam through your phone, internet blogs, but which this article is sent via electronic mail or email. 
Here is a tool used by companies engaged in sales and online business to advertise their products and services improperly and dishonestly , or "forcibly." 
They use the spam porn sites, casinos and online gambling sites, vendors of all types and others are just scammers. It is widely used until recently for misleading job. 
Spam exists and survives on the income it generates, in part due to the unwary to fall into their nets, but were so no one would be devoted to these messages.

How do spammers obtain email addresses?

Businesses and large sites that are dedicated to spam, known as spammers have bots or spiders that constantly scan the network, identifying the email addresses that are impregnated into documents or web pages thanks to its unique format. 
also extracted from the social networks like Facebook that are full of addresses, the messages that are sent massively on the Internet with friends such as jokes, PowerPoint presentations and thanks to the famous  chain letters  that are created specifically for this purpose.

What are chain letters?

For many years are very popular calls or email chain letters, despite the illogic of what they propose, are on the naivete of some users and the good feelings of the people, the reason for being. 
They are only requests included in the emails received forward them simultaneously with other users, thus contributing to a worthy cause or to have claimed benefits, this system is also commonly found in the presentations made ​​in PowerPoint. 
Some of the messages have the following style:
Send this email to 10 people and fulfill your desires. 
Send this email to all your friends to help the girl that ... 
Send this presentation to all your friends to ...

What is the purpose of chain letters?

The chains have been created by spammers, your only goal is to collect email addresses that are valid and are functional. Subsequently bombarded with spam these addresses and even sold the lists to other spammers or companies engaged in the business. 
In a manner similar to spyware that reviews in our address book contacts from our friends, the chains that manage them ourselves send addresses to spammers in the most simple. 
How do they do?
When forwarding a received message simultaneously to several of our friends using the function CC (Carbon Copy) of our mail client software, these addresses are uncovered, so you can check to receive one of these multiple messages. 
It is clear as receiving one of these emails is specified:  "forward this email, including the sender's list"  , of course you are sending the spammer on a silver platter email addresses of all your friends.

Other ways to capture email addresses

Another way to provide an email address that is valid and functional, is to receive a message, relying on the option: "Give a click here to no longer receive these messages" . FALSE! , Just follow in order to verify that the address is valid and active. In response, automatically informing you that your address is valid, so we will continue to send emails and additionally sell your address to other spammers. To summarize, all style messages: Contributes to save this poor child cancer ... are FALSE!, all claiming to be forwarded, if you do you become an accomplice only in passing and can help spread some malware or viruses that are an inseparable part of spam. Keep in mind that God does miracles on the Internet, not only fulfills wishes for forwarding emails.




Common examples of chain letters

• Help a sick child. 
• Apple is giving away several IPad, go in the draw. 
• Your email address was chosen from thousands as the winner! 
• Bill Gates is giving away $ 1,000 and a trip to Disneyland. 
• This will will bring more luck or will give you a desire faster and more people will re-send. 
• Send this to many people and who sent it, to show how much you want. 
DO NOT DO COMPLICE GAME!

How to avoid spam on the email or email

Spam takes years fighting and not achieved, nor will ever eradicate it completely, but there are a number of essential measures to use them, decrease the possibility that spam affects us, are as follows.
1 - Use if possible an email client that includes a spam filter, but not totally effective, eases somewhat by removing suspicious messages.
Use it carefully and regularly review the messages that have been considered as spam, to check effectiveness. (The anti-spam filter for WordPress (Akismet) was for weeks moving all messages sent to my blog readers, to the junk box) 
2 - Do not participate in any chain mail. 
3 - Do not open any attachment from an e , especially. DOC or. EXE that are not specified in the message body. 
4 - If you participate in forums, sharing Internet sites, comment on blogs, use an alternative email address, never your principal. 
5 - Avoid subscription to receive content on sites that are not trusted. 
6 - Use an alternative email address to sign up for social networks like Facebook, automatically use the address that will be targeted by spammers which swarm in those sites. 
7 - If you own a blog or web site hidden email address, there are several methods to make it impossible for spammers to identify it, either encrypting or using an image as a substitute.

How to send an email to multiple email addresses

It may well send a message to multiple addresses simultaneously without compromising delatarlas, for that do the following:
-Rather than use the CC (carbon copy), used whenever it is available: Bcc (blind carbon copy), so you will not expose email addresses. 
'If you send an email that is not part of a chain, but was sent to multiple addresses simultaneously, before using the Forward button, delete the above addresses.

Report sites as spammers

If you think you're in the duty to report a site that is dedicated to the issue of spam, there are ways to report it and report it. 
Of checked, this site will be included in the databases and the spam filter and will not cause damage to other users.

How to report a site to Google spammer

Google is just an internet browser, but is most often used and has earned a great reputation, so it has a powerful influence on the operation of the network. 
They offer a tool to report any site engaged in practices spamming and if proven, will be removed from the search index. 
Use this tool at the following link: www.google.com / webmasters / tools / SpamReport

Black lists of email addresses

There are several public lists on the Internet known as Black list (RBL), which contain the IP addresses of sites that are considered as spammers, such lists are consulted by the mail server before sending or receiving an email. 
In case of conflicts with an email address, you can manually check is in one of these lists.

Sources of phishing sites or malware

In these sites you can check manually at any time, any suspicion that a website is sending phishing or malware.

As extend the life of the battery of mobile phones

Steps to take to get you more time charging the battery and mobile phones. 
list you should check to make sure not improperly use the battery and charging it being on unnecessarily, which entails a reduction in time lifespan. Advice on the use of Lithium batteries that use cell phones to prevent wear and tear. 
Cell phones or Smartphone with internet connection despite having fairly efficient lithium batteries, if using them with the default settings see that the battery is consumed rapidly, can sometimes last only a few hours.
Why so little lasting battery power?
These phones have many features that are on constantly and consume energy, use or not. 
The highest percentage of the load is spent on network-related processes that run in a secondary way without realizing, however there are other causes. 
It is necessary access phone settings and disable the automatic mode all the features and characteristics that are not essential. 
Here is a list sorted by their importance, with the measures to take to achieve lower energy consumption on mobile phones.
Measures to achieve lasting longer than the battery in the cell
Turn off automatic connection to WiFi networks
WiFi or wireless networking is the most energy-intensive feature on phones, as it is constantly exploring and checking the availability of networks all around us. 
It is recommended only activate this mode by using a network and turn it off after finishing .
Cell phones now connect to the internet using different technologies: 3G, GPRS and Wi-Fi. 
By default the first attempt to connect to a Wi-Fi, if not possible try to establish a 3G connection and if not available try to use GPRS (classic telephony system).
Turn off automatic connection to 3G networks
If you have access to 3G networks, only use it when necessary as downloading files which require more bandwidth, other common tasks is more logical to make the normal connection using GPRS.
Turn off Bluetooth
Have Bluetooth enabled and not using it is one of the most common ways to consume the battery. If you do not use hands-free while driving, we recommend that you keep it off.
Disable the automatic mode in email
Be sure not to use the automatic mode known as Push, which allows you to be constantly checking for new messages, unless necessary.
Turn off vibration if not essential
Using the vibration may be necessary in many cases, but can kill the battery quickly, use it at will.
Disable GPS Location or if not needed
The location is very useful when you need, if it is enabled the phone is constantly checking the availability and location of the GPS satellites.
Adjust the screen brightness
Excessive brightness on the screen makes it unnecessarily consume energy, and reduces the lifetime of the display.
Adjust the screen lock
Blocking or the time when the screen turns off automatically when not using it, should be set to one minute or less.
Close applications manually after use
Sometimes applications do not use them to continue on, but off the screen we will notice and will continue consuming battery.
Download data into the computer and then synchronize your phone
It is advised to download Internet applications, games, music and any other information on the computer and then sync your phone and copy them.
Making full loads of battery regularly
It is recommended at least once a month to complete a full charge cycle the battery is fully discharge and then leave the phone connected to the charger for 8 hours, is what is called calibrating the battery, should be done every one or two months, ever faster.
Recommendations on the use of Lithium batteries
The phones use lithium ion batteries, also known as Li-Ion batteries are very efficient. Follow these tips to reach their average lifespan, which can be between 500 to 1000 cycles of charge / discharge (up to two or three years).
It's not recommended to fully discharge batteries often, this can make you activate a locking mechanism holding. This occurs in 80% of the batteries that is defective and sent to technical services. 
Lithium-No load requires more than eight hours. 
, you frequently recharge your charger is more efficient and provides the appropriate amperage, which that does not happen when loaded into a PC or laptop via USB cable. 
, not important to keep the phone connected to the charger after charging finish, automatically switches off and will not cause harm. 
-The battery when necessary keep it unused for a while, the ideal load that should have is 40%, should never be stored unloaded.

How to restore or recover a locked iPhone with iTunes

Tutorial step by step guide and tips to make the restoration of an iPhone, iTouch or iPad where the device is not working, preventing conflict recovery and common error messages. 
iPhone like the iTouch and iPhone laptops are true, at times due to conflicts or deterioration of the operating system for different reasons is necessary to restore or retrieve which is the reinstallation of firmware or operating system.
When you need to restore an iPhone?
Restoration is needed before one of the following conflicts:
• Installing an application is blocked the iPhone, we tried to restart it and it did not work. 
• Accessed via SSH to the device and improperly removed or modified any files. 
• You have no idea why, the thing is not working.
Must be restored when:
• Shows the apple on the screen and does nothing more 
• No power despite having battery charging 
cable • Display on the screen asking to connect to iTunes
There are no such devices as in Windows recovery options, so the only way to solve one of these conflicts is to reinstall the system. 
This is done with iTunes and internet connection required. 
download the firmware is optional from the Apple site during the restoration process or have a setup file extension. IPSW (iPhoneSoftWare) previously downloaded to the PC, the version you want to install. 
In carrying out the process automatically, iTunes always try to install the latest available corresponding to the device, this is not recommended if you plan to do the jailbreak, because for the most recent versions like Jailbreak Liberation is not available. EYE! Apple considers some firmware as obsolete, so that you can not download and install from their servers.
How to know which firmware version I can install on my device?
The firmware version can be installed depends on the device model, or your hardware to work properly, for example:
iPod Touch and iPhone (1st generation) - Up to version 3.1.3 
iPod Touch and iPhone 3G (2nd Generation) - Up to version 4.2.1 
iPhone 3G, iPhone 4, iPhone 4S, iPod Touch (3rd and 4th generation), iPhone and iPad 2 - Up to version 5.0.1
The list of all firmwares released so far, with the characteristic of each one you can read it: IOS version history If you plan to perform the jailbreak after installation and you need to release the device, we recommend you access the website prior to  iPhone Dev -Team  to find information about which versions you can perform the jailbreak with  PwnageTool or  redsn0w  and which can be released with  ultrasn0w .

Where I can download the firmware you need to install?
On different websites are stored original copies of the firmware released by Apple, use any of the links below to download for free an installation file:
• Be sure to download the installation file that corresponds to the model of your device.
Restore your iPhone with iTunes, step by step tutorial
The steps below are the same for any iDevice, such as iPhone, iTouch or iPhone, but only mentioned in this example the iPhone, which is different is the version of iTunes to be used, logically always be used after the software version that the date of manufacture of the device.
1st choice, iTunes recognizes the iPhone
-Choose the option  "Restore" in iTunes decide that case the firmware version installed. 
'Choose the option  "Restore"  having previously pressed the Shift key, in this case iTunes will ask for the location where the file IPSW installation, or you can install the firmware version you are interested.

2nd option, iTunes does not recognize the iPhone
It is necessary to put it in restore mode, for that do the following:
-Connect the iPhone off the computer. 
, Click Start and Power buttons simultaneously for 10 seconds. 
, should appear on the screen asking the cable connecting the iPhone to iTunes. 
, follow the steps of the first option.
The 3rd option, iTunes does not recognize the iPhone and does not work restore mode.
It is necessary to put it in DFU mode, for that do the following:
-Connect the iPhone off the computer. 
, Click Start and Power buttons simultaneously for 10 seconds. 
, Release the Power button and hold Home for another 10 seconds 
, Open iTunes 
, iPhone apparently still off, but iTunes will recognize . 
, follow the steps of the first option.
Power button is located on the top of the device and enables switching on and off. 
The start button is located on the bottom front of the device.
Conflicts in trying to restore or retrieve an iPhone
Sometimes to make the restoration process, this is interrupted iTunes showing various error messages, their causes may be different, try the following:
? For any message iTunes that the iPhone can not be restored or is not compatible, for example:
"The iPHONE iPHONE not could be restored. This device is not eligible for the request build "
to install a different version of this software, even in some cases earlier. 
? The 16xx errors, ie 1600 and others, can solve the small application using:  iREB  you can download from the site of its author:  iH8sn0w
? Make sure the USB cable is in good condition (not enough to charge the battery) 
? It uses a USB port on your computer to connect the iPhone, which are in the back, that is inserted directly into the motherboard. 
? Make sure the Windows Firewall does not interfere, temporarily disable it if necessary. 
? Make sure that no antivirus program hinders the process. 
? Make sure the stability of the network connection. 
? You must select a version of firmware to install that is compatible with the model of the iPhone, the date of manufacture and the baseband.
Technical terms used
Jailbreak  is the change that takes place on the iPhone or other devices so that it can fully use and modify, install applications that are not Apple, installing pirated applications, etc.. is also known as unlocking. 
To perform the jailbreak you can use the programs:
redsn0w 
PwnageTool 
Spirit
Liberation  is the change that takes place in the iPhone to use any telephone operator on the phone and not just the next chained to buy it. 
To make the release program is used  ultrasn0w , which is downloaded and installed using the Cydia application that automatically installed when you jailbreak.

 
Design by Wordpress Theme | Bloggerized by Free Blogger Templates | coupon codes