answersLogoWhite

0


Best Answer

You need the install disk / program. You must re-install them.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: If the games on my gateway computer have been taken off how do i put them back on?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How do you find your gateway computer model?

its normally on the back or on the side of your computer or laptop or it will be in my computer under start menu.


How do you play games while the teacher is distacted?

turn your computer where the back is facing the teacher then play games


What state is called the gateway state?

Missouri has sometimes been called the "Gateway State". This probably dates back to the middle of the 19th century, when St. Louis was considered the gateway to the West.


Why does my LCD monitor plug doesn't fit the back plugs of my Gateway 450 MHz computer?

Without seeing either of them, a good assumption is that you are using a monitor with a newer DVI input as opposed to a VGA input. You can purchase an adapter to connect the monitor to the older computer.


How do I re-start my Actiontec 54Mbps Wireless DSL Gateway again?

Sometimes I start my computer in the morning and I'm not getting my wireless Actiontec signal on my computer. After trying different things I got it back to working. I had my computer on. I unplugged the Actiontec. I took the green phone line out of the wall plug. I plugged the Actiontec back in again. I plugged the phone line in the wall again. It started working again!


6 How can a computer use ARP to break security?

But if the gateway computer's knowledge of the destination computer's MAC address is either missing or too old and expired, it must send a broadcast to all of the computers on the LAN network asking which specific computer is assigned to the IP address of the packet the gateway is trying to forward. To do this the gateway broadcasts an ARP Request that will be received by every computer on the Ethernet LAN. The request simply asks for a reply from the one machine that is currently assigned to the IP contained in the request. Each computer on the LAN checks to see whether the IP is (one of) its own. The computer finding a match with (one of) its own IPs will send an ARP Reply back to the requesting device. When the gateway computer receives the ARP Reply, it has the MAC address of the replying computer along with the replying computer's IP address, contained in the reply packet. The receiving machine enters this information into a "cache" of all similar IP-address-to-MAC-address pairings which is maintained for every machine it has communicated with on the LAN. This is known as the machine's "ARP Cache" since it retains the history of all previous unexpired ARP Replies which it has received. Every computer participating on the LAN maintains its own similar ARP cache containing the IP-to-MAC relationships that allow them to properly address IP packets with Ethernet MAC addresses.Notice that in this example, our gateway computer added this new entry into its ARP cache upon the receipt of an ARP Reply packet. The ARP protocol is so simple - just asking who has the IP and replying "I have the IP" - that there is no provision for any sort of security or authentication of the replying computer. In other words, any computer on the LAN could claim to have the IP in question. The implementation of the ARP protocol is so simple and straightforward that the receipt of an ARP reply at any time, even when there are no ARP requests outstanding, causes the receiving computer to add the newly received information to its ARP cache. Consequently, if the gateway computer were to receive a SPOOFED ARP REPLY from an attacking computer claiming that it was assigned an IP that belonged to some other computer, the gateway would trustingly and blindly REPLACE its current correct entry with the maliciously misleading replacement! If at the same time the malicious attacking computer were to send a similar ARP reply to the computer being hijacked, maliciously replacing the ARP cache entry for the gateway computer, then any subsequent traffic bound for the gateway would instead be sent to the attacking computer. If the attacker forwards any of the redirected traffic it receives onto the proper original computer - after inspecting and perhaps even modifying the data - neither of the intercepted computers will detect that all of their communications is now being relayed through an unknown and probably malicious intermediary computer. By merely injecting two ARP reply packets into a totally trusting LAN, any malicious computer is able to receive all traffic going back and forth between any two computers on the LAN such as any target machine and the LAN's gateway.


What is the falling action for the book the hunger games?

When Peeta and Katniss are coming home from the games. The capitol interviews, trainride back, returning to district 12 and the are getting taken care of.


How does a computer read bar codes?

It 'scans' the barcode with a laser beam. The beam is reflected back to the reader, and hardware calculates the time taken. The wider the bar, the longer it takes for the beam to be reflected back. The time intervals are interpreted by the computer, and compared to a stock list.


How is a computer tracked using Internet?

Every computer connected to the internet has an IP address (such as 1.2.3.4) that is shared with the other computers on the same connected through a router, modem, gateway, etc.Then when you use your internet connection that IP number is like you online number and is completely unique to you so things can be traced back.


How do you turn back computers to normal after already spoiled because of playing games?

call a computer engineer a fix it for you dummy


Can you put a game on your computer with a xbox 360 disc?

You can legally back up your Xbox 360 games, however playing the copied game is illegal because you will need to mod your Xbox 360. You can get a piece of software which will rip games to your computer.


A computer sends packet transport layer to another computerthere is no process with destination port address running at destination computerwhat will happend?

The destination computer will likely send back an ICMP Destination Unreachable message to inform the source computer that there is no process listening on the specified port. The source computer can then take appropriate action based on this response, such as notifying the user or terminating the connection attempt.