Posts

Showing posts from December, 2020

Risk assessments in Networking

  The first domain I’d like to discuss has more to do with people and processes than it does with computers. Security management is one of the most overlooked domains, which I think is a shame because almost nothing we do in the other domains means anything without it. Security management is made up of several tasks: Risk assessments, which is the process we use to identify risks to the organization and systemically identify methods to combat those risks, usually relying on input from experts in the below domains Overseeing the processes for other security functions to ensure those align with business/operations processes Change management processes and procedures in place User security awareness training find more :  lm security

What is Ekahau HeatMapper

  A lot has changed with wireless networks this past decade. Smart devices with built-in wireless network capabilities are all around. This makes Wi-Fi quality and availability a critical resource at home and at work. But troubleshooting is an often overlooked area. Knowing how to check for interference between channels or what your Wi-Fi coverage looks like is handy. We rounded up some of the best wireless analyzer tools for 2019 that allow you to do all of this and more. Some of these tools are free, while others require a license or subscription. Let’s take a look. Wireshark: Packet Analysis Wireshark is an impressive packet-sniffing tool for general network analysis and troubleshooting. It is equally great when you need to deep-dive into wireless networking issues as well. Wireshark allows you to search through all of the traffic on your wireless network and sift through packets and headers to see what is happening. Wireshark is used primarily by professionals that know what they a

What is the use of SD- WAN

    Software defined wide area networks (SD-WAN) is a new approach to multisite network connectivity that lowers operational costs and improves resource usage. Currently all the rage in IT, large corporations are buying up established players to integrate as part of their core offerings at an alarming rate. Often buzz words and IT concepts aren’t well explained, but instead assumed understood. Therefore, I’d like to step back in order to explain and explore SD-WAN. Before we get bogged down with terms like QoS, MPLS and packet-based routing, let’s first review some general networking concepts and terms to build off of : A local area network (LAN) is a private collection of devices in a small geographic location (i.e. your office building or home) connected together in a network in order to share resources. A wide area network (WAN) works much the same way, but for devices geographically diverse. In order to ensure private and consistent communication between WAN locations, a leased, te

When does Disable Your Windows 7 PC

  The change goes live with Windows 7 KB4530734 Monthly Rollup. Microsoft has included a new version of the EOSnotify.exe program to the update package that will now display an with a full screen notification explaining why users should upgrade to Windows 10. All Windows 7 Service Pack 1 Starter, Home Basic, Home Premium, and Professional editions will the following full-screen alert when they login or at 12 PM. The text says Your Windows 7 PC is out of support As of January 14, 2020, support for Windows 7 has come to an end. Your PC is more vulnerable to viruses and malware due to: No security updates No software updates No tech support Microsoft strongly recommends using Windows 10 on a new PC for latest security features and protection against malicious software. Read more :  windows 7 hash

computer to a network with a network cable

  The network adapter is a card or built-in port on your computer’s motherboard that allows you to connect your computer to a network with a network cable. Like other hardware devices in your computer, the network adapter may require you to install updated drivers for better performance. You can download these drivers from the network adapter’s manufacturer website. Depending on the format of the driver, you may be able to automatically install the update or you may need to update through your computer’s device manager. Step 1 Click the “Start” button from your computer’s desktop. Step 2 Right-click “Computer” and choose “Properties” from the menu. Step 3 Open the “Hardware” tab if you are using Windows XP and click “Device Manager.” Windows Vista and 7 users can click “Device Manager” from the menu in the left panel. Step 4 Click on the arrow next to “Network Adapters.” Your device information, such as model number and make, will appear below the entry. You will need this information

What is Disable of Your Windows 7 PC

The change goes live with Windows 7 KB4530734 Monthly Rollup. Microsoft has included a new version of the EOSnotify.exe program to the update package that will now display an with a full screen notification explaining why users should upgrade to Windows 10. All Windows 7 Service Pack 1 Starter, Home Basic, Home Premium, and Professional editions will the following full-screen alert when they login or at 12 PM. The text says Your Windows 7 PC is out of support As of January 14, 2020, support for Windows 7 has come to an end. Your PC is more vulnerable to viruses and malware due to: No security updates No software updates No tech support Microsoft strongly recommends using Windows 10 on a new PC for latest security features and protection against malicious software. Read more :  windows 7 hash  

Windows operating system is the ability to network computers together

  A nice feature of the Windows operating system is the ability to network computers together. The default network for the Windows operating system is called "Workgroup." Often a user will set up a new network of computers, name it something else and then have difficulty deleting the original default Workgroup. Step 1 Go to the Windows desktop and click on the "Start" button. Step 2 Select "Control Panel," then "System." Step 3 Select the tab labeled "Computer Name," and then take note of the name that is next to the word Workgroup. Step 4 Close this window, go back to the Windows desktop and click "Start" again. Select "My Network Places." Step 5 The icons showing the workgroups will appear, one of them being the new one you created. Go back to the Control Panel and click on "System" and "Computer Name" again. Step 6 Click on "Change" and then change the Workgroup name to the name of th

What is Kismet Packet Analysis

  A lot has changed with wireless networks this past decade. Smart devices with built-in wireless network capabilities are all around. This makes Wi-Fi quality and availability a critical resource at home and at work. But troubleshooting is an often overlooked area. Knowing how to check for interference between channels or what your Wi-Fi coverage looks like is handy. We rounded up some of the best wireless analyzer tools for 2019 that allow you to do all of this and more. Some of these tools are free, while others require a license or subscription. Let’s take a look. Wireshark: Packet Analysis Wireshark is an impressive packet-sniffing tool for general network analysis and troubleshooting. It is equally great when you need to deep-dive into wireless networking issues as well. Wireshark allows you to search through all of the traffic on your wireless network and sift through packets and headers to see what is happening. Wireshark is used primarily by professionals that know what they a

What is portable operating system

  During this period, several operating systems were developed, like IBM's MVS operating system, which still dealt with SNA. However, the development of another operating system, dubbed UNIX, really paved the way for NOS everywhere. After a project to develop a large and complex system called Multics failed to get off the ground at Bell Labs in 1969, a group of Bell researchers, led by Ken Thompson and Dennis Ritchie, started work on a less ambitious but no less powerful computing system. After a rocky first few years, Ritchie developed the C programming language, which allowed UNIX to become the first "portable" operating system, meaning it could be implemented on any computer system. The relative simplicity of the system's design and the availability of its source code turned UNIX into a darling of the academic world and a fixture on many university computer networks. Many versions of UNIX were developed, but the Berkeley Software Distribution (BSD) version, develop

security level of networking

  ASA uses a security level associated with each interface. It is a number between 0 to 100 that defines the trustworthiness of the network that the interface is connected to; the bigger the number, the more trust you have in the network. For example, the most secure network, such as the inside LAN, should have the security level of 100. The outside network connected to an untrusted network (such as the Internet) should have the level of 0. The interface connected to the DMZ should have the security level set to somewhere between 1 and 99 (usually 50). Security levels are used to define how traffic initiated from one interface is allowed to return from another interface. By default, the higher level security interfaces can initiate traffic to a lower level. The stateful inspection determines whether the reply traffic is allowed to make it back through. The following picture illustrates the concept: level 100 for the inside network level 50 for the DMZ network level 0 for the outside ne

feature of the Windows operating system

  A nice feature of the Windows operating system is the ability to network computers together. The default network for the Windows operating system is called "Workgroup." Often a user will set up a new network of computers, name it something else and then have difficulty deleting the original default Workgroup. Step 1 Go to the Windows desktop and click on the "Start" button. Step 2 Select "Control Panel," then "System." Step 3 Select the tab labeled "Computer Name," and then take note of the name that is next to the word Workgroup. Step 4 Close this window, go back to the Windows desktop and click "Start" again. Select "My Network Places." Step 5 The icons showing the workgroups will appear, one of them being the new one you created. Go back to the Control Panel and click on "System" and "Computer Name" again. Step 6 Click on "Change" and then change the Workgroup name to the name of th

What is importance of Local Host Name ? October 14, 2020

  The default name of the local computer address is called "localhost." Therefore, the localhost is the address of the computer that an application is running on in a network. It is also known as the loopback address because it is the same address as the loopback network interface. The IP address of the localhost is "127.0.0.1." To change the localhost name, you have to edit the "Hosts" file in Windows. Step 1 Click "Start," then type "C:\WINDOWS\System32\drivers\etc" in the search bar, then press "Enter." The System 32\drivers\etc folder will open. Step 2 Click "Tools" on the main menu, then select "Folder options" from the drop-down list. Click the "View" tab, then click the check box next to "Show hidden files, folders, and drives" under "Hidden files and folders." Click the "Apply to Folders" button. The "Hosts" file will appear in the System 32\drivers\

Wireshark for Packet Analysis

  A lot has changed with wireless networks this past decade. Smart devices with built-in wireless network capabilities are all around. This makes Wi-Fi quality and availability a critical resource at home and at work. But troubleshooting is an often overlooked area. Knowing how to check for interference between channels or what your Wi-Fi coverage looks like is handy. We rounded up some of the best wireless analyzer tools for 2019 that allow you to do all of this and more. Some of these tools are free, while others require a license or subscription. Let’s take a look. Wireshark: Packet Analysis Wireshark is an impressive packet-sniffing tool for general network analysis and troubleshooting. It is equally great when you need to deep-dive into wireless networking issues as well. Wireshark allows you to search through all of the traffic on your wireless network and sift through packets and headers to see what is happening. Wireshark is used primarily by professionals that know what they a