Simple File Sharing In Windows 10 In Simple Steps

Windows 10 has several ways of sharing files and folders over a local network. Simple File Sharing is the most convenient and easiest option to create shared folders and it only takes a couple of minutes to get it configured.

Simple File Sharing
Simple File Sharing

While it may not be the most secure means of sharing folders over a network, it is a viable solution if you trust the devices connected to your home network. It is worth noting that as of Windows 10 build 1803, the way Windows handles file sharing over a local network has changed, making it a bit more secure.

Simple File Sharing On Windows 10:

To share files and folders in Windows 10 you need to do the following:

  1. Go to Windows File Explorer. Open it from the Start button or press and hold the Windows key then press and release the “E” key.
  2. Go to the folder you want to share. Right-click on it. In the menu that popped up, click on “Properties”. It should be the last option.
  3. A new small window will appear. It will have 5 tabs at the top. Click on “Sharing”. It should be the second one.
  4. In the “Sharing” tab, click on the “Share…” button.
  5. A new window will appear. From the drop-down menu, select the users or groups you want to share the folder with. For a home network, where user management across multiple devices is not possible, select the “Everyone” group.
  6. Below the drop-down menu, you should be able to see the newly added “Everyone” group. Next to the group, you will see the permission column. Select the kind of permissions you want to give everyone accessing the folder.
  7. Once done, click the “Share” button at the bottom right of the window, then click close.

This simple file sharing in Windows 10 is not the most secure way to share folders. There is an option to use “Advanced Sharing” options but they do not add much in terms of security or sharing features.

A good practice is to use permissions wisely when sharing files and folders. Since it is possible to have unauthorized or guest devices connected to the network, they will have access to the shared folder. To ensure that they do not delete or change files, the “Everyone” group should have only “Read” permissions.

Enable password protected sharing:

Another security option for simple file sharing is to enable password protected sharing. This can be done as follows:

  1. Go to Control Panel. Search for “Network and Internet”.
  2. Go to the “Network and Sharing Center”. You should see a link named “Change advanced sharing settings” on the left side of the window. Click on the link.
  3. Click on “All Networks” in the newly opened window and expand it. You should see one section called “Password protected sharing”. Turn it on. You will be prompted to set a password.

Password protecting your shared folders will be applied to all users. This feature only protects you from unauthorized access. It does not protect the files from accidental file deletes. Accidental deletes of files can be prevented either by setting up scheduled backups of the shared files or by allowing everyone to just read the files.

{ Add a Comment }

The Need of a 64-bit Operating System

When you set up a game or an app is downloaded, you will notice a selection of 32 and 64 bit. The majority of the latest PCs have a processor of 64-bit. What is a 64-bit operating system? The 64-BIT OPERATING SYSTEM makes use of 64-bit data in pieces, implying the processing of data is done quicker, and this increases the system performance.

64 bit operating system
64 bit operating system | Image by xresch from Pixabay

What is the advantage of a 64-bit operating system?

There is a practical benefit with 64-bit OS, and that is it offers greater RAM. The majority of the latest processors are designed on 64-bit architecture. The good news is a system with 64-bit OS is compatible with 32-bit OS as well. However, the converse is not possible.

System requirements of 64-bit os for windows 10

  • SoC processor or a processor of 1 GHz or faster
  • 2GB RAM (or 1GB RAM for 32-bit)
  • 20 GB space of hard disk (16 GB space of hard disk for 32-bit OS)
  • Graphics card with DirectX 9 or later and WDDM 1.0 driver

Features of a 64-bit os

The following features make 64-bit os advantageous:

  • No. of bits- 64
  • Software and architecture- 64-bit register-based architecture and data buses or address bus of 8 octets or 64-bits.
  • Compatibility- 64-bit cpu and applications that need 64-bit cpu and os
  • Systems available- windows 10, windows xp professional, windows 7/8 and windows vista

How is 64-bit processor/os more capable when compared to a 32-bit processor/os

  • It is capable of handling extensive data at one time.
  • It is more capable of storing a larger number of computational values like memory addresses. This implies that it is capable of providing physical memory access to 4 billion times that of a 32-bit.
  • They can utilize more RAM as compared to a 32-bit processor. With a 64-bit processor, Windows 10’s latest version suits best to make the best use of this RAM.
  • The upgraded versions of OS make use of the overall capacities of a 64-bit OS/processor.
  • THE LATEST 64-BIT OS VERSIONS CAN ENHANCE THE PROCESSOR CAPABILITIES DRASTICALLY.
  • THE SOFTWARE IS DESIGNED WITH 64-BIT ARCHITECTURE IN PERSPECTIVE.
  • Video games, applications, protection, and memory need a high performance of OS. This is perfectly met with a 64-bit OS.
  • A 64-bit OS is compatible with even 32-bit run applications. So, having a 64-bit OS/processor is a plus to run both applications.
  • 64-bit OS has more access to RAM as it is capable of 2^64 memory locations.
  • It is more efficient and high performance.
  • It has more allocation of virtual memory of 16 TB with 8TB for processes for users, and for kernel processes, the other 8TB is utilized. Games, photos, video, and editing require more RA, which a 64-bit OS is rightly suitable.
  • It also has a lot more safety features and not limited to DEP, improved drivers for the device, and kernel patch.

CONCLUSION

A processor informs us about the memory that a processor can access through a register of a CPU. The latest computers use 64-bit OS/processors. They are available in quad-core, dual-core, 6-core, 8-core versions. These versions are meant for home computing. A 64-bit OS/processor allows you to run the latest software programs that need lots of calculations quickly, efficiently, and smoothly. This 64-bit operating system gives a high-performance operation.

{ 1 Comment }

File Analyzer Tool

Have you ever heard of the Windows file analyzer tool? Many people haven’t, which is a shame because it has so much to offer. The program is free to download. And once you install it, you can use it to decode and analyze your operating system’s files.

File Analyzer Tool
File Analyzer Tool | Image by Gerd Altmann from Pixabay

The program doesn’t permit you to save the reports it generates. But you can print them out. For some people, this is advantageous because they prefer to handle physical reports. For other people, this feature is restrictive because it doesn’t provide additional options.

Regardless of your opinion on this particular issue, it is difficult to deny the effectiveness of the windows file analyzer.

Why You Need the Windows File Analyzer Tool?

As was noted above, Windows Filer Analyzer decodes and analyzes files. But why is this important? Better yet, why does it matter to you? Analytical tools of this sort are perfect for people that need to look for malware on their system.

The program will also appeal to individuals that want to monitor the actions that were performed on a particular computer. You can achieve similar results by investing in active monitoring programs. However, it is difficult to use applications like ‘Event Monitor’ without revealing your intentions to your target, especially if you want your analysis to go unseen.

This is where the windows file analyzer tool comes into play. It will paint a detailed picture of a person’s computer usage. While a logging application is limited because it can only tell you what happened on a computer from the day it was installed, the windows file analyzer has far greater reach. It can tell you what happened on a computer in the last few days.

What Does the Windows File Analyzer Do?

If you still have questions regarding the effectiveness of this analyzer, this is what you need to know about its capabilities:

  1. It will read thumbnail database files; though, you must first identify the location of the thumbnail database to proceed.
  2. It will read the files in the prefetch folder but only if prefetch is enabled. For some people, prefetch is disabled. You have to remedy this issue beforehand.
  3. The tool can analyze shortcuts. Though, you have to manually review all the information it provides (which is a lot) because the tool doesn’t offer any mechanisms that you can use to perform automated searches.
  4. All your internet explorer and Microsoft Edge data is stored in the index.DAT file. The analyzer can scan this file to retrieve and display the relevant data.

The analyzer can even explore the recycle bin to locate the information you have deleted. This allows you to either restore these files or to remove them completely from the system.

The file analyzer tool can show you the last time a file was accessed, the number of times it has been opened, and its contents. It will give you all the information you need to understand the habits of the computer’s user. The program won’t benefit everyone. It is primarily useful to people that want to deploy it for forensic purposes.

{ Add a Comment }

How to extract a zip file on windows?

How to extract a zip file on windows will guide you in the process of extracting compressed files. You can extract one or more files from zip files.

How to extract a zip file on windows
How to extract a zip file on windows

How to extract a zip file on windows? This is a question that plagues many novices that are just starting to understand computers. Fortunately, Windows 10 is a straightforward operating system that was designed to simplify processes such as the extraction of zip files.

What is a Zip File?

A zip file is a format that allows you to compress files. People compress files to reduce the storage space they consume on their hard drives. It is also easier to send zip files over the internet. You can store anything in a zip file, including documents and pictures. You can either compress one file or multiple files in a single folder, further simplifying storage and transmission.

Creating a Zip File

Learning how to create a zip file will shed some light on the extraction process. The steps are fairly straightforward:

  1. Find the file you want to compress.
  2. Right-click the file to open a menu.
  3. Look for the ‘Send to’ option. Placing the mouse pointer over this option will open another menu. Look for ‘Compressed or Zipped Folder’. Click this option.
  4. Windows 10 will create a Zip File in the same location as the file you just compressed.
  5. You can rename this file. You can also repeat this process with multiple files.

How to Extract a Zip File on Windows?

You don’t have to extract your compressed files to use them. In many ways, a zip file acts just like an ordinary folder. You can double-click it to open it if you want to view its contents. However, in some cases, there are limitations to what you can do with compressed files.

Extracting the compressed files gives you more freedom with regards to adding new content, editing old content, and saving your altered files. Extracting a zip file involves the following:

Extracting All Files

If you have multiple files in a zip folder, it is normally easier to extract them at all once rather than one at a time:

  1. Start by right-clicking the zip file
  2. This will open a menu. Look for the ‘Extract All’ option and click it.
  3. Windows 10 will open a dialogue box. It will ask you to identify a location where it will deposit the extracted files.
  4. Click ‘Browse’ to find and select a suitable location for the extracted files.
  5. Click ‘Extract’. This will extract the files to your chosen destination.

Extracting Single Files

If you want to extra a single file, this is what you should do:

  1. Double-click the zip file to open it.
  2. Find the item you want to extract.
  3. Right-click the item to open a menu. Click ‘Cut’ or ‘Copy’. Move the mouse pointer to the location that will hold the extracted item.
  4. Right-click and click ‘Paste’. This will extract the individual item to the new location.

If that sounds unnecessarily complicated, you can try a simpler approach. Click your chosen item, drag it out of the zip file, and drop it in another location such as the desktop or a new folder.

{ Add a Comment }

Using the Free Windows Encryption Tool in Windows 10

Today we are talking about Bitlocker the free built-in Windows encryption tool. How it works and how to enable it on your system.

Windows encryption tool
Windows encryption tool

Starting with Windows Vista, Microsoft included Bitlocker for the Pro and Enterprise versions of its operating system. Bitlocker is Microsoft’s solution to drive encryption that is easy to use and just as easy to manage. As the vast majority of users have a Home version of Microsoft Windows 10, access to Bitlocker is restricted by a paywall or OS version upgrade. There is still an alternative in the form of a Windows encryption tool for Home edition that is more rudimentary but more on that later.

How Does Bitlocker Work?

Bitlocker can be used on any computer using Windows 10 Pro or Enterprise. To use it to encrypt entire drives, a TPM chip needs to be present on the motherboard of the computer. The TPM chip or Trusted Platform Module allows for authentication checks on installed hardware, being capable of detecting unauthorized changes. Bitlocker requires access to TPM but it is possible to use Bitlocker without it by editing the Group Policy.

The way Bitlocker works are straight forward. It encrypts entire drives or partitions. It cannot encrypt just folders. Once encrypted, access to the files is only possible with a PIN code or the recovery key which is stored into a file during the setup.

Enabling Bitlocker onto a Drive or Partition

In Windows 10, encrypting an entire drive or partition is very simple.

  • Go to the search bar and type Bitlocker. The search results should list “Manage Bitlocker” as one of the options. Click “Manage Bitlocker”
  • A new window will appear in the form of a wizard. Click on “Turn on Bitlocker”.
  • Bitlocker will check your system configuration to determine if it is compatible. If you have TPM on your system and it is enabled, it will ask for access to it.
  • You will then be prompted to select the drive or partition that you wish to encrypt. Select the drive and click Next.
  • Bitlocker will ask you to set a password or PIN for the encrypted drive. If this is the drive you have Windows 10 installed on, you will be requested to enter the password every time you start your computer.
  • Once the password is set, Bitlocker will ask you to save a recovery key. The recovery key is saved in the form of a file and it is recommended to store it onto a secure flash drive. It can also be printed or written down by hand.
  • You will be asked to choose if you want to encrypt only the files on the drive, without the free space or the entire drive. Choose the appropriate option.
  • Bitlocker will start encrypting the drive. It will take a while. Once done, restart your computer to finish the process.

Bitlocker encryption tool

Bitlocker is just as secure as any other encryption tool. The Windows encryption tool is quite minimalistic in terms of management and configuration options which makes it a viable choice for the ones that may not be tech-savvy or do not wish to pay for a third-party encryption solution. Windows 10 Home edition does not have Bitlocker but it does have “device encryption” which does almost the same thing. However, the Windows encryption tool in Home edition is less secure since it does not require a password. It only protects your data in the sense that it prohibits access to your files if the hard drive or SSD is used on a different computer.

{ Add a Comment }

Exploring The World Of Files? Learning About PE File Header Is A Must

PE file header indicates the windows operating system of what files need running a distinct file. It distinguishes between various forms of headers present in computer memory.

PE File Header
PE File Header | Image by 200 Degrees from Pixabay

For every executable file in the computer, there is a common object file format (COFF). It tells the user about the internal structure of the executable file. Knowledge about this assists a person to comprehend about functioning and design of the data. It helps in analyzing and segregating the folders better. There are several types of COFF. One such executable file format of COFF is PE. It stands for Portable Executable format.

PE file header:

The PE header occupies the first 64 bits of the file. It uses MZ, called as the magic number that defines the identifiable file type. PE Header helps in determining the compatible format to be used. It is an image file header that tells about the file location. The authentic structure of the PE header consists of 11 subsections. It consists of .exe construction, and the predominant parts consist of an image signature, file header, and optional header. Each of these sections has its functions and importance.

The structure:

The file header consists of MS-DOS stub, signature, COFF header, and an optional header. A sectional header succeeds in a PE file header, which helps to differentiate between different header types.

  • MS-DOS stub: The MS-DOS is a windows application that finds its use for the images. It finds its place before the .exe extension. It has a stub that tells the user if the image can be used and accessed. If the image is not accessible, it displays a message that the file is inaccessible in the DOS mode.
  • Signature: Signature of the file follow the stub. It identifies the data as an image file. It consists of 4 bytes in size. In it, the characters P and E precedes two zeros or null bytes.
  • COFF header: It is a header, i.e., present at the start of the file or the one that immediately proceeds the signature. It has a maximum limit of 96 sections and is a representative of both objects and images. It consists of different fields, including machines, number of parts, time date stamp, etc. All of these fields have different offsets and sizes.
  • Optional header: It is an optional header used in the file for image files only. It comprises standard fields that make use of the first 8 bytes. They consist of general information that determines the loading and execution of the image.

PE File Section:

The section names of the PE file header are an editable section of the file. It has to be studied well before making an edit. The edit of the header by using the ASCII characteristics is easy and uncomplicated. To every edit, there is a rule and protocol. Harming these can lead to damage to the files. With different sectors owning their importance, the PE header is an attractive field to explore. It helps a person to explore more of the world of files, its working, and execution.

{ Add a Comment }

Know All About PE File Format

To start off with, the Windows pe file format also known as the pe format is a new form of the operating system. The file format organizes and stores data.

PE File Format
PE File Format | Image by Boskampi from Pixabay

Understanding pe file format:

The executable files follow a common file format, which means, files that have extensions like .exe; .dll; .sys, etc. follow a similar, specific format of the binary structure. It is a well-structured format that is not altered and has to work the way it is developed. It is considered one of the greatest tools that have helped in being an outstanding programmer. The basic idea behind developing such a system is a common file format structure for all Windows software.

The working:

The well-defined structure of the pe file format is laid down properly that further helps in the working. The change from 32-bit to 64-bit needed a few alterations in the format. There were no major changes made other than the widening of certain fields.

One very convenient feature put forward by the format is the fact that the structure of the data on the disk is similar to the structure of the data in memory. This helps in finding your data very easily and conveniently. Once your file is loaded into the memory, it is called a Module.

This module contains all the data that is required to complete a certain process. There is also a central locator to find all the files which is termed as WINNT.H. This also makes your work so much easier.

The pe file format distinguishes data and codes up to some extent. This distinction is done in two different sections. It is easy to separate code but the data includes multiple programs of reading or write-only or both. They can even contain API tables and other related resources. The sections are further named as per the data or code that is included in them. The names of the sections are only for our reference.

PE File – The structure:

The structure of the pe file format is fixed. The structure of the file remains unchanged for all files. As already noted above, the possible alteration between 32-bit and 64-bit files is the fact that there is a widening of a few fields. The file begins with a header and a file signature. After that is the optional header which is then followed by the section headers and their respective section bodies. The end of the file contains little diverse information like information related to table number, relocation, line number, and other string data.

Wrap Up

The Windows pe file format turns out to be a very useful software that not just helping in keeping track of data but also helps in the proper filing of the same. With the in-built system of distinguishing and diving code and data helps in further diversification of the information that is then safely stored into respectable sections. Moreover, the central locator makes your life easy but searching through all the information stored and taking you directly to the point you need to be. A great software programmer for all your needs!

{ Add a Comment }

Discover all about the Windows Portable Executable (PE) file here

Windows Portable Executable aka (PE)

Windows operating system is the most popular one in the world. It was first produced in November 1985 under the direction of Bill Gates, founder and CEO of Microsoft. Initially, this operating system received commands and gave results using a command line interface. However, today it allows you to interact with your computer by using a Graphical User Interface (GUI). There are colorful icons to help you open files and programs.

Windows Portable Executable

The Windows operating system has been adapted for use in smartphones too. Every operating system has its own unique executable file. It is essentially a mirror indicating the capabilities of the respective operating system. Here is more about the windows portable executable file.

What is this file?

The windows portable executable (PE) file is a source of information about how the Windows operating system normally functions. This file was designed by Microsoft to be used in their x86 and x64 Windows operating systems. This file format is used for object code, DLL, executable, FON and core dump files. The PE file is essentially a data structure. It contains the information that is used by the Windows OS loader to deal with wrapped, executable code.

The parts of a Windows PE file

This file contains two main sections. They include:

• Header

• Section

Header

This section is divided into sub-sections. They include the DOS MZ Header, DOS Stub, PE File Header and the Image_Optional_Header.

The DOS MZ Header occupies the first 64 bytes of every Windows PE file. This is so that the underlying MS-DOS system can recognize this file and run it. This header sub-section is also used quite often by malware analysis tools.

The DOS Stub is another sub-section which normally prints messages indicating the status of the PE file. An example of such is, “This program does not execute in DOS mode.” The instructions which the DOS Stub should print are stored in the winstub.exe operating system file.

The PE File Header contains some information about the structure of the file. You can learn about the location of the file and its size too. This file essentially performs memory mapping.

Section

This is the main part of the windows portable executable file. It holds the main content of the file. Examples of this include the data, resources, code and executable files. A windows application normally has 9 parts. They include .idata, .pdata, .bss, .rdata, .rsrc, .edata, .text, .data, and .debug. The Section part of the PE file interacts with these parts. It can work with all or just some of them when the application is executed.

Conclusion

The windows portable executable is an important part of the operating system. It can be considered part of firmware. It is important for you not to edit or delete it. This can cause adverse effects across your entire system. The file is portable because you can use it in compatible operating system versions.

Examples of these are Windows 95, Windows NT, Windows 2000, Windows XP, Windows Vista and more. The windows portable executable is one of the unique characteristics of this operating system. It exhibits the characteristics of Windows and sets it apart from other operating systems in the world of Information Technology (IT).

{ Add a Comment }

Discover the features and purpose of Bitlocker windows encryption system

Do you know about the windows encryption method? Windows is the hugely popular operating system produced by Microsoft. It is used in majority of the computer systems worldwide. The latest version of this operating system is Windows 10 Pro and it has a built-in encryption system that protects your data by encrypting it with an unbreakable code. The Windows proprietary encryption method is known as Bitlocker and can be used to encrypt your entire hard disk drive. It can also be used to protect your computer against unauthorized changes occurring at the firm-ware level.

Windows Encryption

In both of these ways, Bitlocker is able to protect your computer form viruses, hackers and unauthorized access of various types. In addition to Windows 10, Bitlocker is available in Windows versions such as Windows Vista, Vista 7, Vista Ultimate, Enterprise and Windows 8.1 Enterprise and 8.1 Pro. For you to use the Bitlocker windows encryption method, your computer needs to run one of these operating system flavors. In addition to that, you need to have a storage drive which has 2 partitions and a Trusted Platform Module (TPM). Here is more about this Windows encryption method.

How do you know if your computer system has these characteristics?

As indicated above, your computer system needs to have a TPM and a hard drive with at least two partitions. The Trusted Platform Module (TPM) is important because it can run an authentication check upon your computer hardware, software and firmware. If it detects any unauthorized changes in any of these levels, then it will boot into a restricted mode. This deters further progress by your attackers until you can eliminate the threat. Do you know if your computer system has this TPM built into it? You don’t have to worry if you are not aware. The Bitlocker windows encryption program will perform the system check for you when you activate it.

Characteristics of Bitlocker

It is proprietary in nature

This windows encryption method is proprietary. This means that it is regarded as Microsoft intellectual property. As such, it is not open-source. This means that it is impossible to look into its source code. While this indicates stability, there are some people who are concerned that Bitlocker itself is not as secure as we would want.

Some people worry that a back-door program was built into the program by Microsoft under coercion by the US government. As such, the program may not be able to protect your information from government-backed actors such as border control or the intelligence services. However, it will keep your data secure against any attackers who have stolen or messed with your computer system.

It performs comprehensive encryption

The Bitlocker windows encryption system normally encrypts the entire Windows operating system. It works on the user files, swap files, operating system files and hibernation files too. In doing so, the program protects your computer system from offline access in case your attacker gains access to your computer system. They will not be able to gain entry into your system because they do not have the Bitlocker encryption key.

How the Bitlocker encryption program works with the TPM chip

The Trusted Platform Module (TPM) is an essential part of the Bitlocker encrypting process. It stores the encryption key. This is a separate, safe location for it. This chip is located within the computer system and can authenticate the computer hardware. Moreover, it is only released after Bitlocker is able to assess and identify the integrity of the boot environment. After the encryption program deems the system stable, it releases the key and gives you access.

Conclusion

If you have sensitive information in your computer system, then it is highly advisable to encrypt it. If you are using a Windows machine, you can do so by using the Bitlocker encryption facility. The features of this windows encryption program are indicated above.

{ 1 Comment }

Windows Host File

The Windows host file has several uses that include blocking, redirecting and creating shortcuts to websites keep on and continue reading more on Windows Host File For Beginners in here.

Domain names are a common way for people to access websites. Most times, people who surf the web can use a website’s domain name to gain access to it.

Internet applications, however, do not use domain names and instead connect to sites via their IP addresses. As a result, when you input a target domain name on your system, your it has to change to an IP address to connect successfully.

In the modern world, the resolving of hostnames or domain names to their IP address is done by the Domain Name Server (DNS). Before the invention of DNS however, hosts file were used to solve this problem. The significant difference between the two is the host file can be directly controlled or edited locally by the computer user, while the DNS cannot.

The host file was used on older computer models to achieve domain to IP mapping. It is however still present on several devices today including computers and androids. It is a text file that can easily be edited using Notepad and other text editing apps but it does not carry the txt file extension.

What is the Purpose of Host File?

The Windows host file has several uses that include blocking, redirecting and creating shortcuts to websites to mention a few. It ultimately serves as a means for converting human language (domain names) to numeric addresses (IP address) that can be understood by the computer network.

By editing the host file, you can connect a domain name to an IP address, and also modify a domain name to whatever version of the name you want. The host file is sometimes the target of viruses and redirects users to a website to increase its traffic without their consent.

What is the Content of the Host File?

The host file comprises of lines of IP addresses found in the first text field and accompanied by hostname(s). White spaces separate the fields and are created using the spacebar or Tab can also be used to separate fields. Comment lines can be added using a hash symbol (#) in the first position of such lines, and completely blank lines in the file are overlooked. Sometimes several host names can be linked to an IP address. In this case, the hostname is resolved to both IPv4 and IPv6 IP addresses.

For example, a hosts file may contain the following:

127.0.0.1 localhost loopback

::1 localhost

Where is the Windows Host File Location?

The host file is located in windows\system32\drivers\etc\, for Windows Xp and Windows 7. If you cannot find it on your computer, you may need to enable the “view hidden files” feature to see it.

The host file can be a helpful tool if you gain a proper understanding of how to use it. You can customize Domain Name Resolution to suit your needs. You can also block off harmful programs from your computer.

{ Add a Comment }