Posts

Showing posts from 2011

Windows exchange Server 2007 installation Steps

Error: Embedded data could not be displayed.

List of 802.1X standards

Standard Description 802.1B-1992 LAN/MAN Management 802.1k-1993 Discovery and Dynamic Control of Event Forwarding (Amendment to 802.1B-1992) 802.1D-1990 MAC Bridges 802.1i-1995 FDDI bridging (see ANSI X3T9.5) 802.1j-1996 Managed objects for MAC Bridges P802.1p Traffic Class Expediting and Dynamic Multicast Filtering 802.1D-1998 MAC Bridges (rollup of 802.1D-1990, 802.1j, 802.6k, P802.12e and P802.1p) P802.1r GARP Proprietary Attribute Registration Protocol (GPRP) 802.1t-2001 Technical and Editoral corrections for 802.1D-1998 802.1w-2001 Rapid Reconfiguration of Spanning Tree P802.1y Maintenance to 802.1D-1998

ISC DHCP 4.1, Solaris 10, Sun Cluster 3.2 1/09 and... Solaris Containers

I’ve been trying to compile ISC DHCP 4.1 and to get it installed on a Solaris 10 u6 (11/08) zone for a few days. Compiling ISC DHCP is a simpler, as long as you are using gcc and not Solaris cc The issues have arisen when it has come to run ISC DHCP in a Solaris 10 zone . Read further to know more about setting a Solaris Container SunCluster resource to run ISC DHCP in a zone! ...

Console Settings for Linksys - SRW224G4

Default serial console settings for  Linksys  Switch SRW224G4 (can be changed): Bits per second: 38400 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None Works great in  PuTTy , just set connection type to 'Serial' and set speed manually (38400). You'll need a "console" cable for this, but its not a rollover - it's a DB9F to DB9F straight through. Default settings info Default IP: 192.168.1.254 username: admin password:  (password is blank) To reset to defaults  ( from  homecommunity.cisco.com ) : Connect to the console port using terminal emulation parameters (see above) Reboot switch Hold down Ctrl+U while rebooting Menu will be displayed Select > [D] Delete file Type startup-config (be sure that this is the ONLY file that you delete – if you delete other files, you will have to reload the firmware) Now you have erased the configuration file and you should be able to reboot and login with the default username and password.

Integrating Mac OS X Server 10.5 Open Directory with Active Directory

Integrating Active Directory into Open Directory is now so easy you could probably do it with blink of your eyes (well, that may be a exaggerated statement, but you could probably do it in under 5 minutes). 10.4  & older MAC releases Active Directory integration was horrific most of the time. The last 10.4.11 server that I tried to join to Active Directory (just join, not even integrate) failed to login ever again.  I’m sure that I could have troubleshooted the problem and fixed it, but it was easier for me to just upgrade the server to 10.5.

How to Find Your WEP Key

What is a WEP Key? Wired Equivalent Privacy  ( WEP ) is a weak security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools. Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards such as WPA2. In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 "have been deprecated as they fail to meet their security goals".

Top 4 Packet Crafting Tools

Packet crafting is a technique that allows network administrators or hackers to probe firewall rule-sets and find entry points into a targeted system or network. This is done by manually generating packets to test network devices and behaviour, instead of using existing network traffic. Testing may target the firewall, IDS, TCP/IP stack, router or any other component of the network. Packets are usually created by using a packet generator or packet analyzer which allows for specific options and flags to be set on the created packets. The act of packet crafting can be broken into four stages: Packet Assembly, Packet Editing, Packet Play and Packet Decoding. Tools exist for each of the stages - some tools are focussed only on one stage while others such as Ostinato try to encompass all stages .

Top 10 Password Crackers

Password cracking  is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

APIPA - Automatic Private IP Addressing

Definition:  Automatic Private Internet Protocol Addressing (APIPA) is a common alternative to the use of the Dynamic Host Configuration Protocol (DHCP) to request and retrieve an Internet Protocol (IP) address for a host. APIPA simplifies the assignment of IP address and subnet-mask configuration information to hosts in small networks. When APIPA is used, the operating system allows the assignment of a unique IP address to each station on a small local area network (LAN). This avoids the administrative overhead of running a DHCP server or manually setting IP configuration information. APIPA is a procedure and set of guidelines for performing these configuration functions, not an actual protocol. It first appeared on the Windows platform in Windows 2000.

Routing Protocol Comparison (table)

RIP v1 RIP v2 IGRP EIGRP OSPF IS-IS BGP Interior/Exterior? Interior Interior Interior Interior Interior Interior Exterior Type Distance Vector Distance Vector Distance Vector Hybrid Link-state Link-state Path Vector Default Metric Hopcount Hopcount Bandwidth/Delay Bandwidth/Delay Cost Cost Multiple Attributes Administrative Distance 120 120 100 90 (internal) 110 115 20 (external) 170 (external) 200 (internal) Hopcount Limit 15 15 255 (100 default) 224 (100 default) None None EBGP Neighbors: 1 (default) IBGP Neighbors: None Convergence Slow Slow Slow Very Fast Fast Fast Average Update timers 3

Rapid Spanning Tree Protocol (RSTP)

Image
The Rapid Spanning Tree Protocol (RSTP) is an optimized version of STP. RSTP allows a newly elected root port or designated port to enter the forwarding state much quicker under certain conditions than in STP, hence quicker network convergence. Although RSTP allows quicker network convergence, it has the same drawback as STP does: All bridges within a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN and the packets of all VLANs are forwarded along the same spanning tree. Network Diagram Figure 1  Network diagram for RSTP configuration

Multiple Spanning Tree Protocol (MSTP)

Image
Multiple Spanning Tree Protocol (MSTP) supports mapping multiple VLANs to one multiple spanning tree instance (MSTI) by means of a VLAN-to-MSTI mapping table. It allows data flows of VLANs to be forwarded along separate paths as defined in the mapping table, thus reducing communication overheads and resource usage. Note that one VLAN cannot map to multiple MSTIs. Network Diagram Figure 1-1  Network diagram for MSTP configuration

How to use Mail Merge option in Outlook

Image
How to send a personalized e-mail to many people at once from Outlook 2007 First of all, this post is dedicated to my aunt Gayla who runs a small business and has a lot of trouble with this feature. This post is not dedicated to spammers who might use this feature for spamming. ;) Mail merge is a feature of Outlook and Word that allows you to send a set of contacts a personalized e-mail as though they are the only person receiving the e-mail. With this feature, you can personalize the e-mail so that each of your recipients is the only person on the To: line and that the contents of the e-mail change based on information you have for each contact. Instead of starting the e-mail with “To whom it may concern,” you can have Outlook and Word automatically fill in the e-mail with your recipient’s name (e.g. “Dear Vicky,”). Mail merge in Outlook is pretty   hidden – most people don’t even know that you can send a personalized e-mail to each contact in a set of contacts the way you can print

How to take backup of outlook address from stand-alone PC

Question: How to take backup of outlook address from stand alone PC? Answer: Outlook address file is stored with  ".nk2" extension. The storage path for these files are as follow: Under Windows xp: C:\Documents and Settings\User a/c\Application Data\Microsoft\outlook\ Under Windows Vista and Windows 7 C:\Users\User a/c\roaming\microsoft\outlook\ files are *.nk2 and *.srs While taking data backup you should take these file.

CDP-Compatible LLDP Configuration Example

Image
Network diagram Figure 1-2  Network diagram for LLDP compatible with CDP configuration Network requirements l            GigabitEthernet 2/0/1 and GigabitEthernet 2/0/2 of Switch A are each connected to a Cisco IP phone. l            Configure voice VLAN 2 on Switch A. Enable CDP compatibility of LLDP on Switch A to allow the Cisco IP phones to automatically configure the voice VLAN, thus confining their voice traffic within the voice VLAN to be isolated from other types of traffic.

Link Layer Discovery Protocol (LLDP)

Image
LLDP The Link Layer Discovery Protocol (LLDP) operates on the data link layer. It stores and maintains information about the local device and the devices directly connected to it for network administrators to manage networks through NMS (network management systems). In LLDP, device information is encapsulated in LLDPDUs in the form of TLV (meaning type, length, and value) triplets and is exchanged between directly connected devices. Information in LLDPDUs received is stored in standard MIB (management information base). Configuring LLDP Network Diagram Figure 1-1  Network diagram for LLDP configuration Networking and Configuration Requirements l            As shown in  Figure 1-1 , connect NMS to Switch A over the Ethernet; and connect Switch A to the MED device and Switch B through GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 respectively. l            Configure LLDP on the interfaces of Switch A and Switch B to allow NMS to monitor the link status of Switch A.