Sunday 29 November 2020

What is the importance of Routing?

 The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.


What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Tuesday 24 November 2020

how to fix Security Key for My Router

 Wireless and grounded Internet connections offer quick Internet service for a consumer and their family. To protect their service from any intruders attempting to steal Internet, many people set up security keys for their routers. Unfortunately, security keys can sometimes be easily forgotten, restraining you from connecting to your own router. Gain entry to it by finding your original security key and recording it later in a safe place.


Step 1
Ensure that the connections on your router are all correct and secured. Make sure that your computer indicates it is connected to the router.

Step 2
Open the folder containing the network connections for your computer. For Windows users, click the "Start button," then click "Control Panel," and then select "Network Connections." Right-click on the icon for your router and click on "Status." Click the "Support" tab. Write down the number given as the default gateway. This will be an eight digit number with periods after the third, sixth and seventh digits.

Step 3
Open a web browser window.

Step 4
Type the default gateway number into the address bar of your browser window and hit "Enter." You may or may not use the prefix "http://," either way will work. This will bring you to the router configuration page. Search through the router settings listed for an entry titled "Security Key" or something similar. This will reveal the security key for that router.

Step 5
Contact the customer support number for your router's manufacturer if you still cannot locate your security key. Ask a customer service representative for any options you have for security key retrieval. In many cases, it may be easier to restore the factory settings on your router and set up the network again.

find more : network security level

Monday 23 November 2020

Maintenance support in open source software projects

  It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.

Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Sunday 22 November 2020

Upcoming Windows Server End of Life Dates

 Windows Server upgrades are never simple. There are lots of connections and dependencies, and everything needs to be handled correctly to avoid introducing problems that turn an upgrade into a nightmare. With upcoming Windows end of life dates in mind, let’s take a look at one of the services you need to upgrade: DHCP.


DHCP Defined
DHCP stands for Dynamic Host Configuration Protocol. All devices on a network need an IP address to access the network and services; DHCP makes managing those addresses automatic. This eliminates manual effort that would be required to assign address, modify them when a device is moved to another subnet, and reclaim them when devices are removed. Along with eliminating the manual work, DHCP eliminates the inevitable configuration errors when addresses are managed manually, such as two computers being assigned the same address.

Using DHCP requires a server that owns the pool of addresses and assigns (“leases”) an address to clients on the network.

Upcoming Windows Server End of Life Dates
Understanding how to upgrade DHCP is particularly important if you’re running Windows 2008 or Windows 2007; the end of support date for both is January 2020. That means Microsoft will no longer provide security updates for that version after that date, so not upgrading exposes you to ongoing, increasing security risks.

Which version should you use?
Although extended support for Windows 10 is available until late 2025, mainstream support ends late 2020, so it’s worth beginning to think about upgrading that version now, rather than making it your new target. Similarly, Windows Server 2012 is already in extended support, so it’s not a good choice for your new version. 

read more : windows 7 hash

Thursday 19 November 2020

Rainbow cracking technology works on simple concept

 Gone are the days when we have to wait for the days together to recover the Windows account password. Thanks to the rainbow crack technology, now we can crack the passwords in few seconds with 100% success rate.


This Rainbow cracking technology works on simple concept. Instead of computing the hashes for each password dynamically and comparing with the correct one during cracking, password hashes are computed in advance for all character sets. These hashes are then stored in datasets called rainbow tables.

So cracking involves just comparing the current password hash with the pre computed hashes within the rainbow tables and get the associated plain text password. Hence it takes very less time compared to the traditional method of brute force cracking. Setting up the rainbow table for various character sets is just one time activity and may take days or months based on the character set and speed of the machine. Once the rainbow tables are ready, you can feed the password hash to it and get your password cracked in seconds.

In order to recover your Windows user password, first you have to get the LM hash for the target user account. This can be done in many ways. You can use any of the tools such as pwdump, cain&abel or LC5. You need to have administrator privileges to dump the hashes using these tools. If you have lost administrator password itself, then you can boot the system using BackTrack live cd or Windows restore CD and then copy the SAM & SYSTEM hive files (which is located in c:\windows\system32\config folder. Note that your system drive may be different). Next feed these files to Cain & Abel tool to get the LM hashes for the target account.

Read more : lm password cracker

Sunday 15 November 2020

How to Uninstall Local Area Connection

 Before we start haphazardly changing our Local Area Connection Properties, let's see what is the difference between enabling or uninstalling the connection properties.


Disable a Property Item:
Disabling a property item means it's no longer binded to the connection you're adjusting. This is the preferred method as opposed to full uninstallation since you can easily re-enable a property item if it's needed in the future - such as; you install a local network to share files from one PC to another and need File and Print Sharing enabled. If you just use your PC to access the Internet and never intend to create or join a network, consider uninstalling some items.

Uninstall a Property Item:
If you fully uninstall a Property item, the Windows queue will be reduced while accessing Internet routines. Admittedly, the speed increases of uninstallation versus disabling will be negligible. However, a property item may act as a filter or longer path for each Internet action, so there has to be something said for less computation (less error risk) while moving data to and from the Internet and your PC.

Find more information : lanman server

Thursday 12 November 2020

Open Source Support Providers for IT Managers

 It was much easier for IT managers back in the days when proprietary software was the only game in town: After figuring out what software would do the job best, all that was necessary was to license and install. Support might be included in the license or it might be extra, but either way it'd most likely be coming from the same source as the license, whether that be directly from the company developing the software or from a licensed partner.


Aside from compliance issues, with each major vendor having the contractual right to show up in the data center to perform an audit to make sure that all running instances were fully paid and in accordance with the contract, it was pretty much an uncomplicated arrangement: Pay to license the software, pay again for the support and put the software into service.

While most data centers are still licensing at least some proprietary software, much of what's running in modern data centers is open source. On one hand, the IT manager’s job is easier if it includes balancing a budget: money no longer needs to be spent on software or operating system licenses. Compliance audits are also all but nonexistent.

find more : ms lan manager

Tuesday 10 November 2020

What is Routing?

 The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.


What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.

Saturday 7 November 2020

Upcoming Windows Server End of Life Dates

 Windows Server upgrades are never simple. There are lots of connections and dependencies, and everything needs to be handled correctly to avoid introducing problems that turn an upgrade into a nightmare. With upcoming Windows end of life dates in mind, let’s take a look at one of the services you need to upgrade: DHCP.


DHCP Defined
DHCP stands for Dynamic Host Configuration Protocol. All devices on a network need an IP address to access the network and services; DHCP makes managing those addresses automatic. This eliminates manual effort that would be required to assign address, modify them when a device is moved to another subnet, and reclaim them when devices are removed. Along with eliminating the manual work, DHCP eliminates the inevitable configuration errors when addresses are managed manually, such as two computers being assigned the same address.

Using DHCP requires a server that owns the pool of addresses and assigns (“leases”) an address to clients on the network.

Upcoming Windows Server End of Life Dates
Understanding how to upgrade DHCP is particularly important if you’re running Windows 2008 or Windows 2007; the end of support date for both is January 2020. That means Microsoft will no longer provide security updates for that version after that date, so not upgrading exposes you to ongoing, increasing security risks.

Which version should you use?
Although extended support for Windows 10 is available until late 2025, mainstream support ends late 2020, so it’s worth beginning to think about upgrading that version now, rather than making it your new target. Similarly, Windows Server 2012 is already in extended support, so it’s not a good choice for your new version. 

read more : windows 7 hash

Wednesday 4 November 2020

Password Protect Folders in computer networking

 Sharing a computer with other people can be a hassle, especially when you have files and folders that you don't want others to view. You can't use a password to protect files and folders in Windows. But you can keep files and folders private by setting up separate user accounts and restricting access on individual folders.


Step 1
Right-click on the folder that you want to make a password for. Select "Properties" from the pop-up menu that appears.

Step 2
Click on the "Sharing" tab at the top of window. Click the "Advanced Sharing" button. If you are requested to enter your administrator password, enter it. The Advanced Sharing dialog appears.

Step 3
Check the box next to "Share this folder" and then click "Apply." Then click the "Permissions" button. The Permissions dialog appears.

Step 4
Select the desired group or user name in the Group or user names section. If the name doesn't appear, click "Add" to add a group or user name. The Select Users or Groups dialog appears. Add a name in the appropriate field. Verify the name by clicking "Check Names." Click "OK" to store the added name and return to the Permissions dialog.

Step 5
Navigate to the Read line and check the box under "Deny." Click "Apply" and "OK" when done. The folder is now password protected.

Step 6
If your file is zipped, then the process is a lot simpler. Double-click on the zipped folder and then click "File" and "Add Password." After filling out the request information, click "Apply." Your zipped file will always ask for a password before it can be opened. Putting a password on folders and files is a quick and easy way to maintain privacy when your computer is shared with multiple users.

Also read : lm password cracker

Monday 2 November 2020

Comcast Security Key role in wireless networks

 Wireless security is becoming more important in relation to easily available Wi-Fi. Securing your household wireless keeps you from being an easy target for hackers who could use your Internet for unsavory purposes. It's easy to get your security key through Comcast.


Step 1
Determine your router or gateway. Your manufacturer, model and number should be on the equipment. See Reference below for the list of Comcast supported equipment.

Step 2
Open your Internet browser.

Step 3
Enter the IP address in your browser's address bar. This will bring up a pop up asking for your "username" and "password." For the Linksys WCG200, for instance, the IP address

Step 4
Fill in the requested information. For a Linksys WCG200, the Comcast defaults are "username:" Comcast and "password:" 1234.

Step 5
Click on the tab marked "wireless" from your Gateway status page. This will take you to "basic wireless settings." On the toolbar, you will see a selection marked "wireless security." Click on the link.


Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...