Wednesday 24 June 2020

What Is Computer Network

Computer networks allow users to connect over distances. They also enable file sharing, hardware sharing and instant communication, making them a convenient tool for the home and a necessity for offices and organizations like universities. A computer network consists of several components, each of which is important to making the network function properly.

Computers
The purpose of a network is to join computers together. For this to work, the first step in setting up a network is to identify computers and users who may wish to participate in the network. The computers will also need to include software than enables them to connect to the network. Not every computer on the network needs to be running the same operating system. This is true even if users of different types of computers plan to share files, as long es each computer has the appropriate software for opening that file type.

Modems
Modems are devices that enable computers to interpret data they receive from a network, and also allow them to send information in the proper format to be read by other computers on the network. The term modem actually means modulator/demodulator, referring to the two jobs the device performs.

Routers
Routers, also known as hubs, are another link in the network chain. A router, as its name implies, routes the network signal from the modem to the computer. In some network designs, routers may be unnecessary. But in other instances, such as home and office networks with multiple computers, they are essential.

Also read : network security level

Tuesday 23 June 2020

Open Source Support Providers

It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.

Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Friday 19 June 2020

What is information Security Management Framework

candidates should note that even though most frameworks for information security show the development of an IS program as starting with risk assessment and identification of control objectives, this may change depending on organizational objectives, and may be tailored to achieve the desired outcome, as discussed in ISG.

Candidates will be tested on operational components of a security program. They should have a solid grasp of the various components, including standard operating procedures, business operations security practices and maintenance of security technologies.

Candidates will also be tested on their ability to manage operational components. Sometimes these components fall outside of the information security domain (for example, operating system patching procedures). As such, the ability to communicate with IT, business units and other organizational units will be a plus for candidates. Examples of operational components that candidates will be tested on include:


  • Identity management and access control administration
  • Security event monitoring and analysis
  • System patching procedures and configuration management
  • Change control and/or release management processes
  • Security metrics collection and reporting
  • Maintenance of supplemental control techniques and program support technologies
  • Incident response, investigation and resolution.
know more : level 3 network

Wednesday 17 June 2020

Windows Server Upgrades

Windows Server upgrades are never simple. There are lots of connections and dependencies, and everything needs to be handled correctly to avoid introducing problems that turn an upgrade into a nightmare. With upcoming Windows end of life dates in mind, let’s take a look at one of the services you need to upgrade: DHCP.

DHCP Defined
DHCP stands for Dynamic Host Configuration Protocol. All devices on a network need an IP address to access the network and services; DHCP makes managing those addresses automatic. This eliminates manual effort that would be required to assign address, modify them when a device is moved to another subnet, and reclaim them when devices are removed. Along with eliminating the manual work, DHCP eliminates the inevitable configuration errors when addresses are managed manually, such as two computers being assigned the same address.

Using DHCP requires a server that owns the pool of addresses and assigns (“leases”) an address to clients on the network.

Upcoming Windows Server End of Life Dates
Understanding how to upgrade DHCP is particularly important if you’re running Windows 2008 or Windows 2007; the end of support date for both is January 2020. That means Microsoft will no longer provide security updates for that version after that date, so not upgrading exposes you to ongoing, increasing security risks.

Which version should you use?
Although extended support for Windows 10 is available until late 2025, mainstream support ends late 2020, so it’s worth beginning to think about upgrading that version now, rather than making it your new target. Similarly, Windows Server 2012 is already in extended support, so it’s not a good choice for your new version. 
read more : windows 7 hash

Tuesday 16 June 2020

What is Route Redistribution

What is Route Redistribution?
The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.

What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Read more: windows 7 lanmanserver

Monday 15 June 2020

what are the ways to Find My Security Key for My Router

Wireless and grounded Internet connections offer quick Internet service for a consumer and their family. To protect their service from any intruders attempting to steal Internet, many people set up security keys for their routers. Unfortunately, security keys can sometimes be easily forgotten, restraining you from connecting to your own router. Gain entry to it by finding your original security key and recording it later in a safe place.

Step 1
Ensure that the connections on your router are all correct and secured. Make sure that your computer indicates it is connected to the router.

Step 2
Open the folder containing the network connections for your computer. For Windows users, click the "Start button," then click "Control Panel," and then select "Network Connections." Right-click on the icon for your router and click on "Status." Click the "Support" tab. Write down the number given as the default gateway. This will be an eight digit number with periods after the third, sixth and seventh digits.

Step 3
Open a web browser window.

Step 4
Type the default gateway number into the address bar of your browser window and hit "Enter." You may or may not use the prefix "http://," either way will work. This will bring you to the router configuration page. Search through the router settings listed for an entry titled "Security Key" or something similar. This will reveal the security key for that router.

Step 5
Contact the customer support number for your router's manufacturer if you still cannot locate your security key. Ask a customer service representative for any options you have for security key retrieval. In many cases, it may be easier to restore the factory settings on your router and set up the network again.

find more : network security level

Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...