Wednesday 29 July 2020

What is Comcast Security Key


Wireless security is becoming more important in relation to easily available Wi-Fi. Securing your household wireless keeps you from being an easy target for hackers who could use your Internet for unsavory purposes. It's easy to get your security key through Comcast.

Step 1
Determine your router or gateway. Your manufacturer, model and number should be on the equipment. See Reference below for the list of Comcast supported equipment.

Step 2
Open your Internet browser.

Step 3
Enter the IP address in your browser's address bar. This will bring up a pop up asking for your "username" and "password." For the Linksys WCG200, for instance, the IP address

Step 4
Fill in the requested information. For a Linksys WCG200, the Comcast defaults are "username:" Comcast and "password:" 1234.

Step 5
Click on the tab marked "wireless" from your Gateway status page. This will take you to "basic wireless settings." On the toolbar, you will see a selection marked "wireless security." Click on the link.

Monday 27 July 2020

How to uninstall Local Area Connection


Before we start haphazardly changing our Local Area Connection Properties, let's see what is the difference between enabling or uninstalling the connection properties.

Disable a Property Item:
Disabling a property item means it's no longer binded to the connection you're adjusting. This is the preferred method as opposed to full uninstallation since you can easily re-enable a property item if it's needed in the future - such as; you install a local network to share files from one PC to another and need File and Print Sharing enabled. If you just use your PC to access the Internet and never intend to create or join a network, consider uninstalling some items.

Uninstall a Property Item:
If you fully uninstall a Property item, the Windows queue will be reduced while accessing Internet routines. Admittedly, the speed increases of uninstallation versus disabling will be negligible. However, a property item may act as a filter or longer path for each Internet action, so there has to be something said for less computation (less error risk) while moving data to and from the Internet and your PC.

Find more information : lanman server

Thursday 23 July 2020

Best LAN Monitoring Software for 2020


some tools are best fit purely for troubleshooting, but in the case of monitoring your LAN, a little bit of awareness can go a long way towards preventing problems before they happen.

There's a variety of software for monitoring your Local Area Network, both in terms of the devices attached to it as well as the traffic traversing it!

It's invaluable when trouble stirs to quickly discover the root of the cause, but there's more to it than just that – software with predictive alerts and monitoring can help you spend less time actively monitoring and more time focusing on other technical problems without sacrificing precious up-time

On a broad scale, LAN Monitoring software is great for keeping track of all the physical aspects of your network – the various devices connected to it, the servers that rely on it, the routing equipment that makes it function, and the systems that utilize it all.

Knowing a machine or server suddenly dropped offline as soon as, or even having it predicted slightly before, it happens is invaluable.

The happiest users are those who almost never realize anything is wrong because you're using the right software to predict and prevent problems as much as possible.

Also find : lan management

Tuesday 21 July 2020

Who is lan manager


MaxCmds actually serves the same purpose as the MaxMpxCt on the Fileserver. Not surprisingly these two parameters have a special relationship. It’s like this: whenever an SMB session is setup (i.e. a shared file is accessed), the SMB session is negotiated. During this negotiation the Fileserver passes down the value of MaxMpxCt to the client (a Terminal server for example). The client then compares this value to his own MaxCmds value. The lower of the two values then is used to set a maximum on the number of outstanding client requests to the File server.

Possible values: 1-65535

MaxThreads
The MaxThreads specifies how many threads are allowed to run at once. (Each thread allows one outstanding operation.) By increasing this you can increase the amount of simultaneous work. Each extra execution thread will take 1 Kbyte of additional NonPaged pool memory.

Possible values: 1-255

MaxCollectionCount
Specifies the amount of data that must be present in the buffer of the redirector to trigger a write operation. If the amount of data in the buffer meets or exceeds this value, then it is written immediately. Otherwise, it is retained in the buffer until either more data is added or the value of the CollectionTime entry expires.

Possible values: 1-65535

Monitoring
Problems stemming from poor fileserving performance can sometimes be a bit tricky to pinpoint. One way to make sure is by using good ol’ perfmon. The problem with interpreting perfmon counters is that you can never know what the "right" value is unless you have baselined your environment properly. So what to monitor and how to interpret those values is entirely up to you. However, there are some counters you can monitor that I can give some basic tips on. Configure perfmon to monitor the following counters:

Physical Disk
You can measure this on the Terminal Server as well, but you should start at the file server. If the queue length is more than one for a sustained period of time, then your disks are hyperventilating. Give them some air: up your I/O throughput. Look on the software-side: are you paging a lot? (that'll kill your I/O throughput right there) or is your system disk heavily fragmented? Or on the hardware side: buy faster disks (15K SCSI) or upgrade your RAID controller.

know more : ms lan manager

Monday 20 July 2020

What is Password Protect Folders


Sharing a computer with other people can be a hassle, especially when you have files and folders that you don't want others to view. You can't use a password to protect files and folders in Windows. But you can keep files and folders private by setting up separate user accounts and restricting access on individual folders.

Step 1
Right-click on the folder that you want to make a password for. Select "Properties" from the pop-up menu that appears.

Step 2
Click on the "Sharing" tab at the top of window. Click the "Advanced Sharing" button. If you are requested to enter your administrator password, enter it. The Advanced Sharing dialog appears.

Step 3
Check the box next to "Share this folder" and then click "Apply." Then click the "Permissions" button. The Permissions dialog appears.

Step 4
Select the desired group or user name in the Group or user names section. If the name doesn't appear, click "Add" to add a group or user name. The Select Users or Groups dialog appears. Add a name in the appropriate field. Verify the name by clicking "Check Names." Click "OK" to store the added name and return to the Permissions dialog.

Step 5
Navigate to the Read line and check the box under "Deny." Click "Apply" and "OK" when done. The folder is now password protected.

Step 6
If your file is zipped, then the process is a lot simpler. Double-click on the zipped folder and then click "File" and "Add Password." After filling out the request information, click "Apply." Your zipped file will always ask for a password before it can be opened. Putting a password on folders and files is a quick and easy way to maintain privacy when your computer is shared with multiple users.

Also read : lm password cracker

Friday 17 July 2020

What is NetServer Authentication


If a client provides a LANMAN and an NTLM hash, only the NTLM hash is used unless the QZLSPWDANY$ share exists (or NetServer is configured to allow LANMAN authentication). This is because the NTLM hash is more secure. If only a LANMAN hash is provided (as was done by Windows 9x), that hash is used. NetServer does not support LMv2 hashes; therefore, LMV2 always fails. NTLM and NTLMv2 hashes are always accepted (with the restrictions in the table above) unless NetServer is configured for Kerberos-only authentication.

The QPWDLVL of the system does not affect the hashes that NetServer can accept. The thing that it does do is make the NTLM style hashes work with mixed-case Windows passwords. This is possible with QPWDLVL 2 and 3 because the system password can be mixed-case.

NetServer does not indicate to Windows to send a specific type of encryption. The only thing the server tells the client during the Negotiate is if extended security is supported by the server. The client will then try to negotiate whether to use Kerberos or password hashes. At no point does NetServer tell the client what form of password hash to use nor is there any way that NetServer could tell the client what form to use.

Also find : ms lan manager

Thursday 16 July 2020

What is Password Protect Folders


Sharing a computer with other people can be a hassle, especially when you have files and folders that you don't want others to view. You can't use a password to protect files and folders in Windows. But you can keep files and folders private by setting up separate user accounts and restricting access on individual folders.

Step 1
Right-click on the folder that you want to make a password for. Select "Properties" from the pop-up menu that appears.

Step 2
Click on the "Sharing" tab at the top of window. Click the "Advanced Sharing" button. If you are requested to enter your administrator password, enter it. The Advanced Sharing dialog appears.

Step 3
Check the box next to "Share this folder" and then click "Apply." Then click the "Permissions" button. The Permissions dialog appears.

Step 4
Select the desired group or user name in the Group or user names section. If the name doesn't appear, click "Add" to add a group or user name. The Select Users or Groups dialog appears. Add a name in the appropriate field. Verify the name by clicking "Check Names." Click "OK" to store the added name and return to the Permissions dialog.

Step 5
Navigate to the Read line and check the box under "Deny." Click "Apply" and "OK" when done. The folder is now password protected.

Step 6
If your file is zipped, then the process is a lot simpler. Double-click on the zipped folder and then click "File" and "Add Password." After filling out the request information, click "Apply." Your zipped file will always ask for a password before it can be opened. Putting a password on folders and files is a quick and easy way to maintain privacy when your computer is shared with multiple users.

Also read : lm password cracker

Wednesday 15 July 2020

How to make Route Redistribution


The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.

What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Tuesday 14 July 2020

Open Source Support Providers


It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.

Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Thursday 9 July 2020

What is LAN Speed


It's often useful to test the speed of your local area network to ensure you're getting the amount of bandwidth that you need for various tasks. A LAN speed test can be useful in conjunction with an internet throughput test measuring how fast you can upload and download content from the internet at large or on its own to see how fast you can transfer files and data on your local network. You can find a variety of free apps to test the speed on your LAN.

Internet and LAN Speed Test
A local area network is a set of computers and other devices like smart phones and printers connected within a relatively small space, such as an office, a university or a home. A LAN can include devices connected wirelessly, ones connected by wired connections or a mix of the two.

Today, many LANs are also connected to the internet, and some are primarily set up simply to send local traffic to the world at large. But it's often also useful to send data between computers on a LAN, whether you're connecting to a network-enabled monitor for a presentation, storing files on a local server or sending print jobs to a printer on your network.

find more : lan management

Wednesday 8 July 2020

What is Comcast Security Key


Wireless security is becoming more important in relation to easily available Wi-Fi. Securing your household wireless keeps you from being an easy target for hackers who could use your Internet for unsavory purposes. It's easy to get your security key through Comcast.

Step 1
Determine your router or gateway. Your manufacturer, model and number should be on the equipment. See Reference below for the list of Comcast supported equipment.

Step 2
Open your Internet browser.

Step 3
Enter the IP address in your browser's address bar. This will bring up a pop up asking for your "username" and "password." For the Linksys WCG200, for instance, the IP address

Step 4
Fill in the requested information. For a Linksys WCG200, the Comcast defaults are "username:" Comcast and "password:" 1234.

Step 5
Click on the tab marked "wireless" from your Gateway status page. This will take you to "basic wireless settings." On the toolbar, you will see a selection marked "wireless security." Click on the link.

Tuesday 7 July 2020

Information Security Management Framework

Candidates should note that even though most frameworks for information security show the development of an IS program as starting with risk assessment and identification of control objectives, this may change depending on organizational objectives, and may be tailored to achieve the desired outcome, as discussed in ISG.

Candidates will be tested on operational components of a security program. They should have a solid grasp of the various components, including standard operating procedures, business operations security practices and maintenance of security technologies.

Candidates will also be tested on their ability to manage operational components. Sometimes these components fall outside of the information security domain (for example, operating system patching procedures). As such, the ability to communicate with IT, business units and other organizational units will be a plus for candidates. Examples of operational components that candidates will be tested on include:


  • Identity management and access control administration
  • Security event monitoring and analysis
  • System patching procedures and configuration management
  • Change control and/or release management processes
  • Security metrics collection and reporting
  • Maintenance of supplemental control techniques and program support technologies
  • Incident response, investigation and resolution.
know more : level 3 network

Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...