Posts

Showing posts from August, 2010

Outlook Express 6 Options

Image
Changing Your View There are several default View settings used by Outlook Express that you might want to change. 1. Select  View / Layout 2. From here you can select what options you want to see each time you start Outlook Express 3. You can also change the Preview Pane. Due to some of the newer viruses being spread via e-mail, I would recommend turning this off.

TCP/IP INVENTION ON JANUARY 1, 1983

TCP/IP,  a milestone invention leading to the modern Internet Internet protocol  suite is the set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. It has also been referred to as the  TCP/IP  protocol suite, which is named after two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two  networking protocols  defined. Today's IP networking represents a synthesis of two developments that began in the 1960s and 1970s, namely LANs (  Local Area Networks ) and the Internet, both of which have revolutionized computing.  The Internet Protocol suite—like many protocol suites—can be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user a

DNS devolution

Image
What is the scope of the advisory?   This advisory provides   notification that updates are available that help define an   organizational boundary for systems that are domain joined but do not   have a DNS suffix list configured.   What is a top-level domain (TLD)?   The   top-level domain (TLD) is the last part of an Internet domain name.   These are the letters that follow the final dot of any domain name. For   example, in the domain name wpad.western.corp.contoso.co.us, the TLD is   ".us". TLDs can be primarily split into two types: country code and   generic. Country code TLDs are two letter abbreviations for each   country. In this example .us is for United States. Generic TLDs are the   more traditionally recognizable three (or greater) letter abbreviations   such as .com, .net, .org, etc. For a full list of all available TLDs,   refer to the following list at IANA.What is a Primary DNS Suffix (PDS)?   This   is the domain name appended to the right of a computer'

How to connect Laptop to more than one IP network

Query: How to create dual hardware profile in windows xp pro. Or How to assign two different class ip addresses to single Ethernet card. I have two branch offices with two different ip class. Some of users are roaming (with laptop) and they use to visit both the branch offices frequently. Presently they are manually changing ip address (along with DNS IP) respected with branch ip. Can anyone suggest to get rid of this manually changing process?? The solution which I am looking for is the user can select profile (no windows user profile) and accordingly automatically ip can change. without use of DHCP. Solution: Mobile Net Switch  This program enables you to use your computer on more than one network with the click of a button. All changes are made instantly, and no reboot is required. The program lets you automatically select the correct drive mappings, printer settings, IP addressing. It's the ultimate tool for laptop users on different networks. This version adds support for manu

What is DHCP Snooping

When DHCP servers are allocating IP addresses to the clients on the LAN, DHCP snooping can be configured on LAN switches to harden the security on the LAN to only allow clients with specific IP/MAC addresses to have access to the network.   DHCP snooping is a series of layer 2 techniques. It works with information from a DHCP server to:           * Track the physical location of hosts.           * Ensure that hosts only use the IP addresses assigned to them.           * Ensure that only authorized DHCP servers are accessible.   In short, DHCP snooping ensures IP integrity on a Layer 2 switched domain.   With DHCP snooping, only a whitelist of IP addresses may access the network. The whitelist is configured at   the switch port level, and the DHCP server manages the access control.   Only specific IP addresses with specific MAC addresses on specific ports may access the IP network.   DHCP snooping also stops attackers from adding their own DHCP   servers to the network. An attacker-cont

Solaris Commands

Starting, Stopping and Rebooting Boot solaris from ok prompt boot Boot Solaris and reconfigure from ok prompt boot –r Boot Solaris from CD / Install Solaris boot cdrom Boot Solaris from network boot net Install Solaris from network boot net - install Shutdown machine to OK prompt init 0 Shutdown and power off machine init 5 How to interrupt bootup STOP key and A key together or send from terminal emulator BREAK signal Boot solaris in single user & system maintenance mode init s or S Shutdown with grace time shutdown -y -g5 -i6 Rebooting to Default Runlevel init 6 If system has 2 Solaris OS say 8/9 to boot in OS us eeprom Installing and Managing software Display list of all installed packages pkginfo Display patches installed showrev –p Install a package in file fcaw.pkg pkgadd –d fcaw.pkg Check the install of package JNIfcaw pkgchk JNIfcaw Display version / info etc of package abc pkginfo –l abc Remove a package JNIfcaw pkgrm JNIfcaw Find what package a file called

Nessus : Premier UNIX vulnerability assessment tool

Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free “registered feed” version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

What is hacking?

The terminology, hacking, was initially used to refer to the process of finding solutions to rather technical issues or problems. These days, hacking is used to refer to the process whereby intruders maliciously attempt to compromise the security of corporate networks to destroy, interpret or steal confidential data; or to prevent an organization from operating. Different terminology is used to refer to criminal hacking: Cracking Cybercrime Cyberespionage Phreaking To access a network system, the intruder (hacker) performs a number of activities: Footprinting:  This is basically the initial step in hacking a corporate network. Here the intruder attempts to gain as much information on the targeted network by using sources which the public can access. The  aim of footprinting is to create a map of the network to determine what operating systems, applications and address ranges are being utilized, and to identify any accessible open ports. The  methods used to footprint a network  are lis

Understanding Network Attacks

A  network attack  can be defined as any method, process or means used to maliciously attempt to compromise the security of the network. There are a number of reasons why an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as  network attackers or hackers or crackers. A few  different types of malicious activities performed by network attackers and hackers are summarized here: Illegally using user accounts and privileges. Stealing hardware. Stealing software. Running code to damage systems. Running code to damage and corrupt data. Modifying stored data. Stealing data. Using data for financial gain or for industrial espionage Performing actions that prevent legitimate authorized users from accessing network services and resources. Performing actions to deplete network resources and bandwidth. A few reasons  why network attackers attempt to attack corporate networks  are listed here: Individuals seeking fame or som