Friday, April 24, 2009

Understanding Viruses

Anyone with even a small amount of computer experience has heard of computer viruses. Even with no knowledge of how a virus functions, the word strikes fear into the heart of computer owners. What exactly is a virus and how does it function?
What is a Virus?
A virus is a computer program designed to enter your computer and tamper with your files without your knowledge. Once the program containing the virus is open, the activated virus can not only infect other programs and documents on your computer, it can duplicate and transmit itself to other computers that are connected to yours, just like a physical virus can move from one human host to another.

Viruses began in the late 1980s as personal computers and electronic bulletin boards became more common. Back then, operating systems, word processing programs and other programs were stored on floppy disks. Hidden viruses were programmed onto these disks; as the disks were transferred from person to person, the virus spread.
Who Creates Viruses?
Where do viruses come from? Every virus is created by an author with a different motive—but all virus builders feel their actions are justified. For some, a killer virus is the ultimate technical challenge, like climbing a mountain. For others, creating viruses is a form of self-expression. Some disgruntled employees, consumers or citizens turn to virus building as revenge for perceived injustices. And though it’s a frightening thought, some viruses are built and aimed by legitimate (but disreputable) businesses to weaken competitors. Other virus authors want to make their mark in Internet history; these writers get a thrill out of seeing their virus cause damage enough to attract news headlines both online and on the evening news.
What Do Viruses Do?
Today’s viruses are far more potent than the beginner versions we saw several decades ago. Viruses may be sent by opening email attachments, clicking on spam, visiting corrupt websites and links online, opening spreadsheets or even the original method—infected disks. But the Internet is now the superhighway for virus transmission.
Some aggressive viruses—such as the Melissa virus—automatically duplicate copies of itself to the first 50 people in your computer email address book. A frightening prospect—opening an email from someone you trust to be greeted by a virus, and that’s exactly what the author is counting on, your trust.

The damage caused by these viruses varies from minor delays in computer function to complete destruction of your hard drive. For companies, the price is far higher. A downed website can cost a company millions of dollars a day.
How does the virus infect your computer? Because floppy use is nearly extinct and the majority of CDs that change hands cannot be altered, you will most likely bump into a virus through online activity.

Some viruses attack your boot sector, the start up section of your hard drive. Other viruses infect executable program files, activating each time the program is started. The virus travels into the memory and further copies itself.
Macro-viruses are the most common type of computer virus. This type of virus attacks data files containing macros. Macros are lists of commands or actions found under key headings. The virus resembles a macro but when the file is opened, the virus is activated.
Multi-partite viruses are a combination of the boot sector and file virus. These begin in the boot sector and affect both your boot records and program files.
Is My Computer Infected?
How can you tell if your computer has a virus? There are warning signs that your computer may be infected with a virus. For minor viruses, you may encounter strange messages, images, noises or music on your computer. An infected computer may have less memory available, or you may notice name changes. A computer infected with a virus may be missing programs, or files may malfunction. If you encounter any of these characteristics on your computer, you are most likely experiencing an attack from a virus.

Is there any hope? How can you protect your computer from viruses? If you do not have any virus software on your computer now, consider installing some soon. Be sure to update your anti-virus software regularly; this way you’ll be protected from new viruses that crop up.
Use your software to scan for viruses weekly. Don’t open emails from unknown sources, and be cautious when opening attachments—even attachments from people you trust. Hyper vigilance requires you to contact the sender and confirm the attachment before you open it, but this is too much. Just be aware. It Aunt Gertrude typically includes a newsly, well-written letter with the jokes she sends, and this attachment email from her comes with: “Open this now, baby!” alarm bells should go off. Don’t open it.

Constantly back up your data in case a virus attacks your hard drive and you need to reformat. Better yet, set up your computer to automatically back up your data weekly so that you don’t have to worry about this chore.
What Should I do if I have a Virus?
What do I do if I find out that I have a virus on my computer? Know that it’s not the end of the world. As a courtesy, contact everyone (by phone, preferably) you have been connected by email to warn them possible exposure to the virus right away.
Clean your computer with anti-virus software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software, and a technician with a lot of experience in data recovery.
As a last resort, reformat your hard drive, even if it means destroying all of the information located there. Reinstall the software and data using your backup files.

Thursday, April 23, 2009

Why Choose Cisco

The Value of a Systems Approach

A systems approach begins with a single, resilient platform such as the Cisco integrated services routers. A systems approach combines packaging with intelligent services within and between services, and weaves voice, security, routing, and application services together, so that processes become more automated and more intelligent. The results are pervasive security in the network and applications; higher QoS for data, voice, and video traffic; increased time to productivity; and better use of network resources.

With the integrated services router, Cisco offers a comprehensive, future-proofed solution that minimizes network outages and ensures access to the most business-critical applications. Cisco's focus on integrating new infrastructure services with performance enables companies to create networks that are more intelligent, resilient, and reliable. For organizations of all sizes that need fast, secure access to today's mission-critical applications as well as a foundation for future growth, Cisco routers:

Provide the industry’s first portfolio engineered for secure, wire-speed delivery of concurrent data, voice, and video services Embed security and voice services into a single routing system
Use an integrated systems approach to embedded services that speeds application deployment and reduces operating costs and complexity Provide unparalleled services performance and investment protection Unlike specialized niche products, Cisco Integrated Services Routers embed security and voice services as a single resilient system for ease of deployment, simplified management, and lower operating costs. Cisco routers provide the secure communications solutions you need today, while laying the foundation for tomorrow's Intelligent Information Networks.

In addition, Cisco Integrated Services Routers:
Provide fast, secure access to mission-critical business applications and unmatched investment protection for future growth, enabling organizations to easily deploy and manage converged communications solutions with end-to-end security for maximum end user productivity
Feature industry-leading services densities, bandwidth, availability, and performance options for maximum configuration flexibility and scalability for the most demanding networking environments Provide a broad range of voice densities and services, allowing customers to easily enable end-to-end, best-in-class IP Communications solutions, while providing a foundation for future growth and investment protection Are the only routers that allow organizations to build a foundation for an intelligent, self-defending network, featuring best-in-class security services and routing technologies for the lowest total cost of ownership and highest return on investment.

Monday, April 13, 2009

VOIP Solutions

VOIP has evolved greatly in the recent years and it has advanced the internet based telephony system. It assures revenue saving for the organizations that require internet telephony solutions. VOIP stands for voice over IP and it is used for making the phone calls over the internet. It converts the voice signals into the digital packets. VOIP technology supports the two way conversation by using the voice over internet protocol. Many businesses around the world have been implementing VOIP solutions due to its great features and low price.

This technology provides the scalable, mobile, reliable and secure voice communication solutions to the small, medium and large enterprises around the world. The calls over the internet can be made by using the services of the VOIP provider, computer’s audio system and headphone. The other methods of placing the calls are by using the VOIP telephone and by using the normal telephone with the VOIP adapter. The users can make the calls in very easy way. This technology offers great saving over the conventional phone calls. Due to the recent advantages of the voice over IP technology like low cost and increased reliability has made it the best voice solution over the internet.

Businesses and call centers around the world require more bandwidth, scalability and secure infrastructure for the implementation of the VOIP solutions. Some broadband service providers have less bandwidth than required. Before getting the VOIP services from the service providers, heck its features and make sure whether they suite your business requirements or not. Sometimes due to the low bandwidth, network latency, packet loss and jitter the users get the unsatisfactory voice quality.

VOIP Features

Voice over IP technology provides the following features for the businesses.

Voice Mail
Call Waiting
3 Way calling
Caller ID with name
Enhanced voice mail
Anonymous call blocking
Speed dialing
Call transfer
Phone to phone option
Repeat dial
Call logs
Conference calling
Customized ringing tones
SMS delivery solutions
Call back facility
Secure calls by using the standardized protocols.

Web Security Software

The web is evolving rapidly and become more dynamic with the use of the web 2.0 applications. But it has also been used to launch the various attacks. There are many threats browse the internet, check emails, transfers files and shop online. Every online computer can be infected with the viruses or spyware in only 20 minutes if the proper security solutions have not been implemented. The well known threats include viruses, spyware, adware, phishing, Trojan horses, malware, web worms, intruders and the cyber villains (hackers). If you computer is infected then all other connected computers can get infected automatically.

There are many internet bugs that can corrupt your data, degrade the performance of your system, steal your critical data and crash your system. There are many internet filtering, antivirus, anti spyware, anti-phishing and security solutions available. With the implementations of the web security solutions, you can protect your entire network from being attacked from the viruses, hackers and other online threats.

Some of the common techniques to deal with the online threats are to install an up-to-dated antivirus software, install and configure firewall, update your operating system, raise the security of your browse, never open any email attachment from the unknown source, never give away your passwords, credit card number, SSN and bank account’s details through the emails. Some of the web security solutions include the following.

Norton Antivirus


Norton Antivirus provides the complete solutions against the viruses, spyware and adware. It helps to protect your computer from the online threats. It works in the background so that you can surf the net, play games and download the software or music. Norton Antivirus automatically checks for the updates and blocks the emerging threats. There are a wide variety of the security products and you can pick the best product according to your requirements.

McAfee Antivirus Software

McAfee is a leader of the security risk management, intrusion detection and prevention. McAfee Internet Security Suite provides you the protection against the viruses, spyware, adware, Trojan horses and hackers. It helps to detect the thousands of the viruses on your computer.

GFI Web Monitor

GFI Web Monitoring software protect your computer from downloading the dangerous items from the internet, reduce cyberslacking, prevent data leakage and lower the risks of the social engineering and the phising websites and emails.

Zone Alarm Internet Security Suite

ZoneAlarm Internet Security Suite 7 provides the anti spam, firewall and antivirus capabilities and protect your computer from the well known internet threats.

Networking Tips

Computer networks are used to share the data and resources and for the communications. To get the optimized performance, data protection, maintenance, improved reliability and the security, every system administrator and network administrator should know the basic maintenance, troubleshooting and security techniques. Downtime is very dangerous for the critical network business applications and servers. In this article, you will learn some of the best networking tips and by using them you can get the optimized performance from your network.

Security
A compute network is susceptible to the internet and external security related threats, which includes viruses, spyware, adware, Trojan horses, rootkits, web worms, intruders and hackers. To keep your network secure

Firewall:
Install and configure a software/hardware firewall on your gateway and all other computers in your network. Firewall is used monitor the inbound and outbound traffic and block the unauthorized access and hackers’ attacks.
Antivirus: Install antivirus software such as Norton Antivirus, Trend Micro Office Scan, Panda Antivirus or McAfee and regularly scan your computer with an antivirus program.
Anti spyware: Install and configure an up-to-dated anti spyware software in your network.
Updated Operating System: Update your Windows based operating systems with the latest service packs, hot fixes and security patches.
Browser Security: Raise the level of security of your web browsers.

Connectivity

Computer networking sometimes considered to be complex and seems to hard to troubleshoot. The connectivity problems occur in the computer network due to the devices conflicts, outdated LAN card’s driver, faulty hardware, faulty cable or connectors and misconfigurations. To troubleshoot the connectivity related issues, you need to perform the following tasks.

Check the LEDs of your LAN card.
Update the driver of your LAN card.
Scan your computer for the viruses and spyware.
Check the UTP/STP cable, the both end of the cable should be properly inserted i.e. one end in the LAN card and one end in the hub/switch or router.
Check the configurations of the LAN card.
PING the destination computer and check the status.
If your problem is still not resolved, replace the LAN card and reconfigure it.
Maintenance
Computer network availability and security is very critical for the businesses. Maintenance include the domain setup, dealing with the internal and external security threats, assigning IP addresses to the computes, enabling/disabling network services like DHCP, FTP SMTP, SNMP, taking data backup, adding/removing users, troubleshooting the software/hardware, configuring the firewall and implementing the security in the overall IT infrastructure. To perform the maintenance related tasks in your compute network, you need the perfect tools.

Troubleshooting
You can troubleshoot the computer network related problems by using the right tools and techniques. Be default, Windows based operating systems offer the TCP/IP stack, which contains the troubleshooting and diagnostic utilities such as PING, IPCONFIG, Hostname, ARP, Telnet, NSLOOKUP, Tracert and many others. Pinging a network computer is the first troubleshooting step as it checks the connectivity with the destination computer. Additionally, you can use the other troubleshooting tools such as Ethereal, IP Sniffer, LanGuard, Packeteer and many others. These tools help to diagnose the cause of the problem and troubleshoot them.

Performance
To get the optimized performance from your computer network, you need to perform the following actions on every computer of your network.

Use System Tools
Delete Unnecessary Files
Update Device Drivers
Update BIOS
Uninstall Unused Programs
Update Operating System
Wireless Networking Security Tips
The following tips are very helpful in securing your wireless computer network.

Change the Default SSID
Change the Default Administrator’s password
Disable SSID broadcast.
Enable Mac Address Filtering
Assign Static IP address to the Network devices and computers.
Turn on and configure the firewall on every computer in your network.
Enable IPSec, SSL, Encryption, WPA and WPE according to your security requirements.

Saturday, April 4, 2009

McAfee Vs. Norton


Protecting your PC is a necessity for anyone connecting to the internet. And these two releases from Norton and McAfee provide essential one-stop solutions. Each offers the core requirements and neither will be a poor choice, but your own requirements could make either one slightly more desirable.

A big complaint about previous versions of Norton was that it could be overwhelming. The updated Protection Center offers a simplified interface, with main features accessible from the front page and configuration options tucked away. McAfee’s control panel is not quite as slick, but experienced users will find it easier to locate settings they wish to modify, with essentials such as scanning and updates accessible via convenient buttons. And log files are more advanced, too.

Virus extinguishing
The core features of any internet security package remain antivirus protection and a firewall. Both products' firewalls protect users against harmful traffic. The enhanced Smart Firewall in Norton deals with a common problem for inexperienced users: how to deal with information about applications. Often files have obscure names, some of which may be necessary for the operation of essential applications.

For those who wish to have more control over their firewall settings, there are plenty of options to set up active, trusted and restricted networks. And an important feature of both applications is that they will monitor wireless networks. You can customise a list of trusted programs that are allowed to access the net.

In our advance review copy of McAfee, the firewall has to be downloaded once the suite has installed. This makes the installation more complex than necessary, but it should be rectified by the final release. As with the Norton firewall, however, it does a very good job of hiding your PC from malicious attacks. And it offers customisable control over which applications can access the web.

There tend to be more alerts from McAfee, while Norton’s Smart Firewall makes more decisions on behalf of the user. That said, McAfee's ability to police networks is simpler.

With regards to antivirus protection, maintaining up-to-date databases against potential threats is essential. McAfee and Symantec have long been major players in this field and updates are maintained extensively on a daily basis. The latest version of Norton includes an enhanced Auto-Protect component for viruses, spyware and adware, but offers IM (instant messaging) scanning and email protection too.

Enhancements have been made to such things as identifying rootkits and scan times. But despite running a system scan several times, Norton insisted that this action must be taken every time it is launched.

Norton's Bloodhound heuristics analyse executable files to find potential virus threats, even if these are not matched against any database. While the antivirus features are particularly good at locating known spyware and viruses, we didn't have the opportunity to test the effectiveness of Bloodhound itself.

McAfee VirusScan made effective work of scanning for viruses, spyware and other malicious activity on our test PC, although this was considerably slower than Norton and placed a greater burden on system resources. Like Norton, McAfee provides a heuristic engine (called SystemGuards) to monitor suspicious activity and prevent viruses that are not listed. And it uses a system called X-Ray to find and remove rootkits.

Baiting the line
While malware is the most significant component for online protection, there are plenty of other menaces – some of which can be even worse. If your privacy is infringed, or you fall prey to a phishing scam, it can be much more than just your hard drive that suffers.

As such, protecting personal information is a key feature for both of these security programs.

Norton has several features to protect users from fraudulent sites. The most obvious is the Toolbar, which is displayed by default in your browser. Usually this appears as a large green button at the top of the browser, indicating that fraud monitoring is on. But if you encounter a web page masquerading as another, Norton prevents the page from being displayed. This does involve a slight performance hit, but is extremely useful against links in scam emails.

Norton can use advanced heuristics to check that sites are what they claim to be. By breaking down URLs and analysing the format and content of web pages, it can have a decent stab at telling whether a website is official or not.

McAfee’s protection features are, as far as the browser is concerned, less ostentatious. A SiteAdvisor button sits in the toolbar, informing you whether sites are safe or not. When confidential information is sent out, the privacy service can block the information and alert the user. This can easily double up as a parental control, an area where McAfee is particularly strong. The program can analyse web pages for inappropriate content and images and then block any offending material.

The improvements to Norton Internet Security have been made primarily in terms of firewall and antivirus protection. In this version, you won't find advanced parental controls, for example. Nonetheless, for the security-obsessed, there are very good logging features and a comprehensive virus encyclopedia.

By contrast, McAfee's suite provides several extras. As well as the parental controls already alluded to, Spamkiller will block unwanted email, while Data Backup allows you to protect your data in case files are lost or damaged. After the initial run, McAfee can back up files the second that they're updated. As well as ensuring maximum security of files, this cuts down on those annoying moments when the PC embarks on a 20-minute backup job, just as you're in the middle of an important assignment.

And if you fancy getting hold of even more features, there is a Total Protection suite that includes password protection for crucial data and file shredding. You will, however, have to pay more for it.

Cisco Router Technology Overview

Network Router: An Integrated Services Approach

The network router is quickly evolving from a device dedicated to connecting disparate networks to an integrated services device capable of multiple functions beyond routing. Cisco customers are increasingly deploying integrated services routers, or sophisticated network routers that can deliver voice, video, data and Internet access, wireless, and other applications.

Benefits of the Integrated Services Network Router
Growing companies, especially those opening new offices, can take advantage of integrated network router solutions that are highly secure, flexible, and built to be compatible with future technologies.

One Device, Multiple Functions: An integrated services network router enables organizations to take advantage of numerous built-in technologies such as voice, wireless, and advanced security systems while ensuring the quality of service (QoS) prioritization their network applications demand. Because the network services are built in or can be easily added to the integrated services network router, companies can install one sophisticated device rather than purchase separate products to provide each individual function.

Same Access at Headquarters and Remote Sites: An integrated services network router gives all workers—even those at branch offices or remote sites such as a home or hotel room—the same access to business applications, unified communications, and videoconferencing. Modular solutions allow you to install the features you need for a particular office, and upgrade equipment when needs change or an office expands.



Centralized Management: An integrated services network router approach means technical staff at headquarters can manage the network from a central location. This allows technical departments to allocate resources to priority projects while providing reliable service to employees in all locations.

Integrated Network Security: An integrated services network router, with its systems approach, allows companies to transfer responsibility for security and reliability from individual computers and users to the network itself. This helps protect companies from the influx of viruses, malicious code, and other infections that end users’ laptops might unknowingly acquire.
By installing a complete solution and managing it centrally, companies can protect valuable corporate data using multiple types of protection, such as encryption, firewall filtering, antivirus protection, and intrusion detection and prevention.

Reap the Rewards of a Network Router
From reduced capital and operating expenses to increased productivity, the advantages of integrated services apply regardless of the size of company. A small company with two offices can benefit as much as a company with hundreds of branch offices.

What's the difference between a Hub, a Switch and a Router?

In a word: intelligence.

Hubs, switches, and routers are all devices that let you connect one or more computers to other computers, networked devices, or to other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection. Varying degrees of magic happen inside the device, and therein lies the difference. I often see the terms misused so let's clarify what each one really means.

A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others. That's it. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks.

A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. On busy networks this can make the network significantly faster.

"Varying degrees of magic
happen inside the device,
and therein lies the difference."


A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle. For example, broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device. All routers include some kind of user interface for configuring how the router will treat traffic. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to point B.

A quick note on one other thing that you'll often see mentioned with these devices and that's network speed. Most devices now are capable of both 10mps (10 mega-bits, or million bits, per second) as well as 100mbs and will automatically detect the speed. If the device is labeled with only one speed then it will only be able to communicate with devices that also support that speed. 1000mbs or "gigabit" devices are starting to slowly become more common as well. Similarly many devices now also include 802.11b or 802.11g wireless transmitters that simply act like additional ports to the device.

Fiber Optic Cable

20.1 Multimode (MM) Fiber
Step index or graded index fiber. In North America the most common
size is 62.5/125; in Europe, 50/125 is often used. These numbers
represent the diameter of the core (62.5) and diameter of the
cladding (125) in microns. Multimode fiber is typically used in
applications such as local area networks, at distances less than 2 km.

20.2 Single Mode (SM) Fiber
Single mode fiber has a very small core. Typical values are
5-10 microns. Single mode fiber has a much higher capacity and
allows longer distances than multimode fiber. Typically used
for wide area networks such as telephone company switch to switch
connections and cable TV (CATV).

20.3 Loose Buffer
The fiber is contained in a plastic tube for protection.
To give better waterproofing protection to the fiber, the space
between the tubes is sometimes gel-filled. Typical applications
are outside installations. One drawback of loose buffer construction
is a larger bending radius. Gel-filled cable requires the installer
to spend time cleaning and drying the individual cables, and
cleaning up the site afterwards.

20.4 Tight Buffer
Buffer layers of plastic and yarn material are applied over the fiber.
Results in a smaller cable diameter with a smaller bending radius.
Typical applications are patch cords and local area network connections.
At least one mfr. produces this type of cable for inside/outside use.

20.5 Ribbon Cable
Typically 12 coated fibers are bonded together to form a
ribbon. There are higher density ribbons (x100) which have
the advantage of being mass-terminated into array connectors.
A disadvantage is that they are often harder, and require special
tools to terminate and splice.

20.6 Fiber Connectors
There are a lot of different types of connectors, but the ones
commonly found in LAN/MAN/WAN installations are:

FSD - Fixed Shroud Device, such as the FDDI MIC dual-fiber connector.
SC - A push-pull connector. The international standard.
The SC connectors are recommended in SP-2840A. The SC
connector has the advantage (over ST) of being duplexed
into a single connector clip with both transmit/receive fibers.
SMA - Threaded connector, not much used anymore because of losses
that change with each disconnection and reconnection.
ST - Keyed, bayonet-style connector, very commonly used.


20.7 Fiber Optic Test Equipment
Continuity tester: used to identify a fiber, and detect a break.
One type resembles a f/o connector attached to a flashlight.

Fault locator: used to determine exact location of a break.
Works by shining a very bright visible light into the strand.
At the break, this light is visible through the cable jacket.

Tone Generator and Tracer: used to identify a cable midspan or
to locate a strand at its far end. Similar in purpose to the
tone testers used on copper cable. The tone generator imposes
a steady or warbling audio tone on light passing down the cable.
The tracer detects and recovers the tone from light lost through
the cable jacket as a result of bending the cable slightly.

Optical Source and Power Meter: used to measure the end-to-end
loss through a f/o strand, or system of cable, connectors and
patch cables. Measurements are more accurate than an OTDR.

Optical Time Domain Reflectometer (OTDR): used to measure the length
of a cable, and detect any flaws in it. Can also be used to measure
end-to-end loss, although less accurately than a power meter.

Fiber Talk set: allows using a pair of f/o strands as a telephone line.

Ethernet Cable Tips:

A straight-thru cable has identical ends.
A crossover cable has different ends.
A straight-thru is used as a patch cord in Ethernet connections.
A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
A crossover has one end with the Orange set of wires switched with the Green set.
Odd numbered pins are always striped, even numbered pins are always solid colored.
Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left.
No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk.
Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components.



By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector.

How To Add / Set Up A Microsoft Access Database

The Database Manager section of the Hosting Control Panel provides you with the ability to create and manage your own data source names for your databases.


To set up a Microsoft Access Database:


1. Access the Hosting Control Panel

2. Click on the Database Manager button then click on MS Access Database

3. Click on the Add button in the upper right hand corner

4. Type a Data Source Name (DSN) in the Data Source Name text box – this is the database name you will use in your HTML code to reference the database

5. Type a database name in the Database Filename text box – the name of the Access database the DSN will be attached to; enter the entire filename, including the .mdb file extension

6. Type a username in the Username text box [optional]

7. Type a password in the Password text box and type it again in the Password Confirm text box [optional]

8. Click on the Ok button

To view the MS Access database information, select the radio button next to the Database Name, then click on the View button.

Note If you password protected your MS database, you must use the same password during the add process.

Deploying Microsoft Network Access Protection (NAP) with Aruba's Mobile Network Solutions

Introduction With an increasing trend of mobility, more and more companies outfit their employees with wireless mobile devices that leave the corporate network and attach to networks at homes, public wireless hotspots, hotels, and partner sites. When these devices return to the corporate network, any malicious software they may be carrying can be spread to other corporate systems. For this reason, ensuring that devices are properly protected from malicious software has become a key interest of IT departments Aruba Network’s user-centric architecture has comprehensive access control capabilities and is built on a standards-based architecture that can easily integrate 3rd party security vendors for functions such as endpoint compliance. Aruba has partnered with Microsoft® to support Network Access Protection (NAP) for mobile users. Network Access Protection for Windows VistaTM and Windows Server® “Longhorn” (now in beta) is a technology designed to prevent networked assets from connecting to, or communicating with, non-compliant clients. It enforces compliance to network access and health requirement policies by setting access rights based upon validated health state and by coordinating endpoint remediation services to ensure ongoing compliance.
NAP for Wireless LANs This article introduces the NAP solution within the scope of the 802.1x and 802.11i wireless security mechanisms. The full deployment document is attached.
A Simple NAP Architecture



Aruba and Microsoft Network Access Protection Architecture
Wireless Settings A general recommendation is to implement the highest level of encryption available, which, in the case of an 802.11 network, happens to be 802.11i followed by 802.1x. The SSID that is used to enable users to connect to the corporate network should support WPA2-AES / WPA-TKIP or dynamic WEP with 802.11i / 802.1x WiFi authentication methods. NAP operations The basic Microsoft NAP Solution can be illustrated by the diagram above.

The managed Microsoft clients tries to connect to the network, and is required to authenticate
The client provides its login credentials to the sever and during the login process the client’s NAP agent (system health agent), if enabled on the client, presents the client’s current health status (anti virus signatures, patch levels, firewall settings, applications etc)
The Aruba mobility controller forwards the authentication credentials and health state information using the RADIUS protocol to the Network Policy Server (a Microsoft RADIUS server). The NPS evaluates the client’s health status against a pre-defined set of policies.



Microsoft NPS validates the client’s credentials once received. If the client credentials do not match the entries in Active Directory, the authentication fails, a failed authentication message is passed to the Aruba controller, and the controller denies network access to the client.
If the authentication succeeds, but the client is not compliant with the predefined health requirement policy, Microsoft NPS sends limited network access configuration information to the Aruba mobility controller, which places the client in a “role” with restrictive firewall policies. The client has limited access to the network or any other clients, and is redirected to get updates from a remediation server. The client requests and receives the updates and starts over by reauthenticating.
If the client is compliant with the health requirement policy, it is granted access to the network according to its business needs; e.g. a sales user is granted access to sales servers while access to finance networks and servers is blocked.
Advantages of using Aruba The Aruba solution allows the network manager to further enhance the usability, scalability and manageability of this solution. By using the Aruba system’s ability to assign roles and policies to users based on their authentication state and the attributes returned, users can be dynamically classified into different user groups based on the authentication results.
 

blogger templates | Make Money Online