Posts

Showing posts from September, 2020

Broadcast domain vs Collision domain

  A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. Let’s say you have several computers connected to a Layer 2 switch. The reason the device is called a Layer 2 switch is that the hardware learns and stores the MAC address (also known as the physical address) of a device’s network cards. By storing those hexadecimal numbers, the switch can make intelligent decisions about how to route packets to and from a specific device. Layer 2 switches can also be configured with VLANs to service multiple networks. Since the switch has learned about the devices that are connected, it also knows (from the switch configuration) what network those devices are connected to. What exactly a broadcast domain does From our definition of a broadcast domain, we can also state that a broadcast describes a process that forwards packets to all machines on the network. Only devices communicating within a given network wil

What’s New in Windows 10 Deployment?

Computers in the enterprise world require being up-to-date. This means IT teams need to be able to have a solid OS deployment plan for all the employees. With so many scenarios, it’s important that the plan be flexible as well as functional. Luckily, Microsoft offers many options of deployment to help cater for the wide range of scenarios. This post will briefly discuss the comparison between some of traditional deployment methods: WDS, MDT, SCCM. WDS Windows Deployment Services is a feature installed on Windows Server OS that gives the capability to push a Windows OS image to a computer. It’s a good foundation to have set up to start your deployment methods. This option has the quickest initial setup to get up and running but does require more manual configuration when it comes to building the OS image to your liking. MDT Microsoft Deployment Toolkit takes WDS take it to one big step further from WDS. It actually requires WDS to work but implements Lite Touch Installation. This would

Prevent Network Downtime

  Your network is probably the least visible piece of your infrastructure, but network outages can cause highly visible problems for your business. In one study, 90 percent of businesses had at least one network outage during the past year, with many experiencing two or more. The costs of those outages are high. It’s hard to pin them down exactly, but some estimates have them running over $9,000 every minute the systems are down. With more than half of outages lasting over an hour, that’s a significant cost. And the cost of the outage can linger even after systems are back up, due to overtime needed to catch up on the work delayed during the outage, the need to pay for expedited shipping to fulfill orders, damage to your company’s reputation, and loss of customer trust and future business. Address the Causes of Downtime Most of that downtime is due to equipment failures, followed by human errors. Reducing downtime and its associated costs requires addressing both the technical and peop

Bridging Network Connections

  There are several ways to hook up individual computers into a network. One is to use hardware routers to link up the network segments. If you buy hardware bridges, those will also connect the computers with each other. In Windows XP, simply clicking the "Bridge Connections" icon joins parts of a network together, even if the parts use different media to link their segments. Advantages Using a router or a hardware bridge requires buying more equipment to connect your computers. With a wireless router, each computer and network segment needs its own Internet Protocol (IP) address in order to direct data to the right computer. Both methods may require an IT professional or experienced amateur to connect everything properly. With Windows XP, building a bridging connection requires just a few clicks of your mouse in the right places. Bridging To make a bridge, you must log in as an administrator on your network or your computer. Click the computer's "Control Panel,"

What is PC Repair Software

  ou will be able to bring back your PC to a like-new state and rid yourself of those problematic and lingering errors. Of all the PC optimizers we tried and tested, WiseCare 365 delivered full repair every time. It does an incredible job of finding errors that are well hidden deep within the Windows operating system. What's not to like here, perfect repairs on a smooth running machine that stays that way, as any future slowdowns and problems are immediately nipped in the bud. WiseCare 365 solves stubborn PC problems that many other optimization programs overlook. That is its' true strength, full and extensive repair with advanced optimization to improve PC and Internet performance. Let me explain how many PC problems manifest themselves. Annoying errors are sometimes caused by weak uninstalls by shoddily programmed software. The leftover remnants in the Windows registry can cause corruption affecting your system speed and stability. By running the comprehensive WiseCare 365 re

Why internet systems important to businesses

  Virtually every business today requires at least minimal investment in technology and infrastructure to work with strategic business information and enable operations that depend on it. Today everything in business is or tends to be integrated and demands connectivity and web services. Therefore, it is important to invest in good internet systems in order to enable and manage this entire operation more effectively. But what are they for? Discover the importance of internet business systems and see why it is worth being a qualified professional in the field. 1- Internet systems encompass a number of factors essential to the functioning of the business IT environment. The Internet, as a conglomerate of globally connected communications networks and devices, allows information to come and go with ease. Internet systems can more easily organize this data stream, allowing access to information correctly and securely. In addition, a professional in this area contributes to the creation of

What is Open Systems Interconnection

  Different communication requirements necessitate different network solutions, and these different network protocols can create significant problems of compatibility when networks are interconnected with one another. In order to overcome some of these interconnection problems, the open systems interconnection (OSI) was approved in 1983 as an international standard for communications architecture by the International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee (CCITT).  The OSI model, as shown in the figure, consists of seven layers, each of which is selected to perform a well-defined function at a different level of abstraction. The bottom three layers provide for the timely and correct transfer of data, and the top four ensure that arriving data are recognizable and useful. While all seven layers are usually necessary at each user location, only the bottom three are normally employed at a network node, since nodes are co

systems by disabling LM authentication

  Requiring your users to use complex passwords and enforcing that policy is useless if you authenticate and locally store easily cracked password files. By default, Windows NT, 2000, and XP locally store legacy LAN Manager (LM) password hashes (LANMAN hashes). LM uses a weak encryption scheme to store passwords, and hackers can usually crack it in a very short period of time. Windows stores LM hashes in the Security Account Manager (SAM) database. By default, clients have LAN Manager authentication enabled, and servers accept this authentication. This allows workstations to send weak LM hashes across the network, making Windows authentication vulnerable to packet sniffing and reducing the amount of effort an attacker must expend to crack user passwords. To disable this ability and better secure your workstations, follow these steps: Go to Start | Run, and enter Regedit. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\ control\LSA. Find the LMCompatibilityLevel value. Also read

local security settings to force NTLMv2

  If the NTLM authentication setting on your Windows computer is not set to NTLMv2, your computer may repeatedly prompt you for your IU username and passphrase when you attempt to access your IU Exchange account via Outlook (or any other desktop email client). Windows 8.x and later and Windows Server use NTLMv2 authentication by default, but in rare instances, this setting may become incorrect, even if the NTLM setting was previously correct. You only need to use one of the following methods. Using the Local Security Policy console is easier, but not all versions of Windows include the secpol.msc application necessary to use this method. It is usually found on business-class versions of Windows (for example, Enterprise and Ultimate). The registry option will work on all versions of Windows. Use the Local Security Policy console To use the local security settings to force Windows to use NTLMv2: Open the Local Security Policy console, using one of the following methods: From the Control

Network Downtime to Prevent Costly Outages

  Your network is probably the least visible piece of your infrastructure, but network outages can cause highly visible problems for your business. In one study, 90 percent of businesses had at least one network outage during the past year, with many experiencing two or more. The costs of those outages are high. It’s hard to pin them down exactly, but some estimates have them running over $9,000 every minute the systems are down. With more than half of outages lasting over an hour, that’s a significant cost. And the cost of the outage can linger even after systems are back up, due to overtime needed to catch up on the work delayed during the outage, the need to pay for expedited shipping to fulfill orders, damage to your company’s reputation, and loss of customer trust and future business. Address the Causes of Downtime Most of that downtime is due to equipment failures, followed by human errors. Reducing downtime and its associated costs requires addressing both the technical and peop

What is Modem Security Key

  A modem security key is used to protect users from any potential intruders that may want to use their network to connect to the Internet. Security keys can often be forgotten. Consequently, users can't connect to the Internet using their own modem. However, there are ways you can get your original security key, but you should keep it handy in a safe place. 2wire Modem Default Security Key Step 1 Grab a paper and pen. Step 2 Look on the bottom of your modem, below the serial number and bar code. Step 3 Write down the 10-digit number with brackets around it. That is your default security key. read more :  network security level

What is PC Repair Software

  you will be able to bring back your PC to a like-new state and rid yourself of those problematic and lingering errors. Of all the PC optimizers we tried and tested, WiseCare 365 delivered full repair every time. It does an incredible job of finding errors that are well hidden deep within the Windows operating system. What's not to like here, perfect repairs on a smooth running machine that stays that way, as any future slowdowns and problems are immediately nipped in the bud. WiseCare 365 solves stubborn PC problems that many other optimization programs overlook. That is its' true strength, full and extensive repair with advanced optimization to improve PC and Internet performance. Let me explain how many PC problems manifest themselves. Annoying errors are sometimes caused by weak uninstalls by shoddily programmed software. The leftover remnants in the Windows registry can cause corruption affecting your system speed and stability. By running the comprehensive WiseCare 365 r

What is Open Systems Interconnection

  Different communication requirements necessitate different network solutions, and these different network protocols can create significant problems of compatibility when networks are interconnected with one another. In order to overcome some of these interconnection problems, the open systems interconnection (OSI) was approved in 1983 as an international standard for communications architecture by the International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee (CCITT). The OSI model, as shown in the figure, consists of seven layers, each of which is selected to perform a well-defined function at a different level of abstraction. The bottom three layers provide for the timely and correct transfer of data, and the top four ensure that arriving data are recognizable and useful. While all seven layers are usually necessary at each user location, only the bottom three are normally employed at a network node, since nodes are con

What is Windows Deployment Methods

Computers in the enterprise world require being up-to-date. This means IT teams need to be able to have a solid OS deployment plan for all the employees. With so many scenarios, it’s important that the plan be flexible as well as functional. Luckily, Microsoft offers many options of deployment to help cater for the wide range of scenarios. This post will briefly discuss the comparison between some of traditional deployment methods: WDS, MDT, SCCM. WDS Windows Deployment Services is a feature installed on Windows Server OS that gives the capability to push a Windows OS image to a computer. It’s a good foundation to have set up to start your deployment methods. This option has the quickest initial setup to get up and running but does require more manual configuration when it comes to building the OS image to your liking. MDT Microsoft Deployment Toolkit takes WDS take it to one big step further from WDS. It actually requires WDS to work but implements Lite Touch Installati

What is Bridging Network

There are several ways to hook up individual computers into a network. One is to use hardware routers to link up the network segments. If you buy hardware bridges, those will also connect the computers with each other. In Windows XP, simply clicking the "Bridge Connections" icon joins parts of a network together, even if the parts use different media to link their segments. Advantages Using a router or a hardware bridge requires buying more equipment to connect your computers. With a wireless router, each computer and network segment needs its own Internet Protocol (IP) address in order to direct data to the right computer. Both methods may require an IT professional or experienced amateur to connect everything properly. With Windows XP, building a bridging connection requires just a few clicks of your mouse in the right places. Bridging To make a bridge, you must log in as an administrator on your network or your computer. Click the computer's "Contro

Why internet systems important to businesses?

Virtually every business today requires at least minimal investment in technology and infrastructure to work with strategic business information and enable operations that depend on it. Today everything in business is or tends to be integrated and demands connectivity and web services. Therefore, it is important to invest in good internet systems in order to enable and manage this entire operation more effectively. But what are they for? Discover the importance of internet business systems and see why it is worth being a qualified professional in the field. 1- Internet systems encompass a number of factors essential to the functioning of the business IT environment. The Internet, as a conglomerate of globally connected communications networks and devices, allows information to come and go with ease. Internet systems can more easily organize this data stream, allowing access to information correctly and securely. In addition, a professional in this area contributes to

change network names on Windows 10

When you connect to a network for the first time in Windows, Windows saves the network profile and assigns a name to it. Connections using Ethernet (wired) use a generic name such as Network 7 usually while wireless networks the SSID of the Wi-Fi network the device connected to. Some users and administrators may dislike the non-descriptive nature of wired network connections on Windows. Good news is that it is possible to rename network profile names to make them more descriptive on the operating system. The following guide was written for Microsoft's Windows 10 operating system but the process should work in previous versions of Windows as well. You can check the current name in the Network and Sharing Center on Windows or in the Settings application on Windows 10. 1. Tap on Windows-I to open the Settings application. 2. Go to Network & Internet > Ethernet or Wi-Fi depending on the connection type. The name of the network is displayed at the

What is My Port Number on My LAN

Port numbers are assigned to applications and their communications on a local area network (LAN). They help to keep one particular "conversation" distinguishable from another. Default port numbers have been assigned to most applications or services. For example, standard web access (http) runs over port 80, and secure web access (https) runs over port 443. Official well-known port numbers can be found at the Internet Assigned Numbers Authority's website, which is linked in the Resources section. Many commonly known unofficial port numbers are in use by vendors as well. Step 1 Open a terminal. For Windows, open a command prompt by clicking on "Start" and typing "CMD" in the "Run" box. For a Mac, type "terminal" in the finder, or go to the Applications folder, open the Utilities folder and open "Terminal." These commands can be run from the client computer or from the server side. Oftentimes, you will not have access to the

What is Modem Security Key

A modem security key is used to protect users from any potential intruders that may want to use their network to connect to the Internet. Security keys can often be forgotten. Consequently, users can't connect to the Internet using their own modem. However, there are ways you can get your original security key, but you should keep it handy in a safe place. 2wire Modem Default Security Key Step 1 Grab a paper and pen. Step 2 Look on the bottom of your modem, below the serial number and bar code. Step 3 Write down the 10-digit number with brackets around it. That is your default security key. read more :  network security level