Monday, August 30, 2010

Wireless Network Trouble Shooting

Wireless Network Trouble Shooting

1. Wireless Adapter - First check to see if your wireless adapter is on and working properly. If you are using a PCMICA wireless adapter ensure that the card is pressed completely in. If the wireless adapter card was not plugged in when you started your laptop you may want to restart your computer for a fresh start. If you are using a laptop with a built in wireless adapter. What Wireless Network - Check the bottom right hand task bar to see if you are connected to a wireless network. Many people are connected to the wrong wireless network with a weak signal or hardly any connectivity. You want to change your wireless adapter setting to choose Infrastructure access points only so you're not connecting to rogue wireless access points.

3. SSID and ME - Next check your wireless settings for the following: DO you have the correct SSID typed in, is your encryption key typed in correctly, does your wireless router and wireless adapter have the same security settings.

4. DHCP ME - If you don't have a manual TCP/IP address then your wireless router needs to have it's DHCP server turned on. Connected to your web interface and turn on your DHCP server. Next go to your wireless network icon in the bottom right hand corner and disable your wireless adapter and then enable it. This will renew your DHCP request to the routers DHCP server.

5. PING!- Next we will use a command line function called PING. Type "cmd" in the run box, this will bring up your DOS window. Now type in ping and then type in the TCP/IP addressof your default gateway. If you have not changed it your default gateway's ip address should be 192.168.1.1 or 192.168.0.1. If you receive a reply then you know that you are connected properly to your router.

6. WWW...WHAT - Now try and surf the web. Go to google.com or another simple page. If nothing comes up then you might have a manually configured IP address with the correct DNS servers entered. Connect to your wireless routers web interface and check the status. You are looking for the multiple DNS server IP address. Copy these IP addresses into you adapters TCP/IP settings and hit ok.

7. Google ME - Once your DNS servers are entered you should be able to surf the net. If you still can't surf the net try restarting your computer and check you cables again to make sure you haven't missed something.

Thanks To : Blu Ray Disks Sony Bravia Save! Store

Saturday, August 28, 2010

Setup DHCP on a Windows Server

DHCP as you may know is Dynamic Host Configuration Protocol and it gives hosts on a network all of the IP information they need to communicate. IP Address, Subnet Mast, Gateway Address, DNS servers and WINS server addresses. For ease of administration DHCP is a great feature for small businesses to help setup their computer network quickly and easily without a lot of hassle. If you are using a Windows server for a file server, domain server, application server, or for pretty much any other reason you can add DHCP functionality for no cost.

First lets quickly go over how DHCP works because it is very simple in the flow and functionality of it. First we configure the server and we create a "pool" of IP addresses, normally this will be something like 192.168.1.100 to 192.168.1.200 depending on how many computers you are going to potentially have connect. As you can see with the IP addresses we specified we can have 100 computers connect using DHCP. Then we specify on the server what the subnet mask, gateway, and DNS addresses are going to be. Now when a client computer connects to your network via wire or wireless his computer will send out a "packet" basically saying "hey are there any DHCP servers out there to give me an address?" and obviously the server will respond back with a packet "yes, here you can use 192.168.1.105" and now the client computer has a working IP address and can communicate on the network. The DHCP server keeps track of what IP addresses it hands out based on the clients MAC address.

Now that we have an understanding of how DHCP works lets talk about configuring it on a Windows server. First thing is to make sure that the DHCP feature is installed and you can check this by seeing it Windows will allow you to configure DHCP, if not then you don`t have it installed. To install DHCP simply goto "Control Panel" then "Add Remove Programs" and on the left side select "Add/Remove Windows Components". Scroll down until you see "Networking Services" highlight it and click the details button. Then scroll down until you see "Dynamic Host Configuration Protocol (DHCP)" and check the box to the left and click "OK" then click "Next" and DHCP will be installed on your server. One thing to remember is if DHCP is not installed on your server already you will need the Windows Server CDs to install DHCP.

Now that we have DHCP installed on our server we can configure it by simply using the console. So click "Start" then "Run" and type "MMC" in the text box and click "OK" and a Console window will appear. Click "File" "Add/Remove Snap-in" or simply press CTRL+M and then click "Add..." and a list of all the services you can configure will show up and you want to select."DHCP" and click "Add". Once you do that you can back out by clicking "Close" and then "OK" and you should now see a DHCP menu on the left side of the console.

Double click on DHCP on the left side and choose your server. Now we need to create what is called a scope since you can actually run multiple scopes on a single DHCP server. Right click on your server under DHCP on the left hand side and choose new scope. You will be prompted with a "New Scope Wizard" to walk you through everything. Choose a name for your DHCP scope and then click next and choose your range of IP addresses you want to use and define you subnet mask. Default subnet mask is usually 24 in length or 255.255.255.0. Next you can choose addresses to exclude, this is a good idea if you are going to have some equipment with static addresses set within your IP range. Next you will want to select how long you want your lease to be and the default is 8 days. If you are going to have a few computers that will always be connected then 8 days is probably fine. If you are setting up like a wireless hot spot where a lot of different clients will be connecting you probably want to make the lease about 8 hours instead of 8 days. Click next and then click next again and you scope has now been created and your clients can get an address via DHCP.

Tags : Cool Cell Phones Store Save! Wireless Barcode

Friday, August 27, 2010

Before You Register a Domain Name, Know These Facts First

Let me tell you a story before I go into details about how to register domain name. There was a certain businesswoman who owned a small shop in the center of a populated town. Her business was to sell cakes. Her cakes of different shapes were the hottest sale in town.

She had many buyers but there was something she lacked. Guess what she lacked. Oh! You can't guess the correct answer? Let me help you. Her shop had a name but it was not a catchy one. It was not only a long one but also difficult to pronounce.

Just a name denied her the return of customers to buy her cakes. Distance customers did not trace her shop again. Even recommending it to people was difficult since recalling and pronouncing the name was not easy.

Like this businesswoman, many websites have lost quite a number of their surfers. Websites owners make a mistake when registering domain name. They select poor quality domains. I mean they fail to register the ones that are catchy and easy to memorize.

A domain name is the one that will identify your website from your competitors. If you register a good quality domain name that surfers are able to remember any time, then be assured of getting new traffic each day.

Surfers will recall the name easily when recommending your website to their friends. Once these friends go ahead and click your website and indeed find your website content is useful to them, they go and recommend it to their friends and even family members. This process goes on and on till your website suffocates from surfers.

Let's say you have five thousand surfers who remember your website name and actually recommend it to their friends. Once these friends visit it and find that it's useful they go ahead and recommend it to five thousand more friends. At the end of the day you will find that you have almost fifteen thousand surfers.

That is really wonderful! Is it? Then make no mistake when registering your domain name for your online business.

Tags : Online Fax Service

Wednesday, August 25, 2010

IPv6 (Cisco) Training - Using the "dns-server and Domain-name (IPv6)" Commands

Well, since this article is sort of lengthy I'm going to get right down to it; so without far ado let's begin.

The "dns-server" (IPv6) command, is a Cisco IOS "DHCP for IPv6 pool configuration" mode command that is used to specify the Domain Name System (DNS) IPv6 server(s) available on a network.

Below is the correct syntax and example of the "dns-server" (IPv6) command:

Syntax: router(config-dhcp)#dns-server ipv6-address
Example: router(config-dhcp)#dns-server 2001:0DC8:3000:3000::42

Notice, that the router's prompt is in "DHCP for IPv6 pool configuration" mode and the ipv6 address argument is the IPv6 address of the available DNS server.

Now, just in case if you were wondering; you can use (configure) the "dns-server" (IPv6) command multiple times on a router, if you have multiple DNS servers on your network. And, the new ipv6 addresses will not erase (overwrite) the existing (previous) ipv6 addresses.

Also, if you need to remove a specific DNS server from the DNS server list; all you need to do is type the word "no" in front of the command like you see below:

Syntax: router(config-dhcp)#no dns-server ipv6-address
Example: router(config-dhcp)#no dns-server 2001:0DC8:3000:3000::42

Ok, that pretty much sums up the "dns-server" (IPv6) command; so, let's move on to the "domain-name" (IPv6) command.

The "domain-name" (IPv6) command, is also a Cisco IOS "DHCP for IPv6 pool configuration" mode command; but it's used to configure a domain name for a DHCP for IPv6 client, which is also known as a Requesting Router or RR.

Below is the correct syntax and example of the "domain-name" (IPv6) command:

Syntax: router(config-dhcp)#domain-name domain
Example: router(config-dhcp)#domain-name ittechtips.com

Notice, that the router's prompt is once again in "DHCP for IPv6 pool configuration" mode and the domain argument is specifying the domain name to be used by the client. So, in the example above the router (client) is going to use the domain name ittechtips.com.

And, just like the "dns-server" (IPv6) command; the "domain-name" (IPv6) command can be used (configured) multiple times on a router. And, the new domain names will not erase (overwrite) the existing domain names.

Lastly, if you need to remove a domain name from a DHCPv6 client (RR); you must type the word "no" in front of the "domain-name" (IPv6) command like you see below:

Syntax: router(config-dhcp)#no domain-name domain
Example: router(config-dhcp)#no domain-name ittechtips.com

I hope this article was very informative and helped you quickly understand the usage of the "dns-server and domain-name" (IPv6) Commands. If you need to learn more; I suggest you visit my website, were you'll find the latest information regarding Cisco IPv6 Design and Implementation Techniques.

To your success,

Related : Wireless Barcode Herniated Disc Neck HDMI Cables Store

Tuesday, August 24, 2010

Your VPN Doctor for Virtual Private Network Troubleshooting VPN Guide

Here are some troubleshooting guides for particular topics.

(1) Your Virtual Network Connection

(2) VPN Troubleshooting Error Messages

(3) VPN Modems Troubleshooting Guide

(4) VPN ISP Troubleshooting Guide.

(1) Your Virtual Private Network Connection

Having trouble connecting to the Internet at home try these steps before calling for help.

1. Do you have an IP address? Try ipconfig /all. If you do not have an IP address reboot your PC. If that doesnt work power cycle your Cable/DSL modem and routers and reboot your PC again after the network devices are up and stable. Be sure all of your network cables are plugged in tight.

2. After your PC reboots check that your network adapter is active and packets are flowing. Perform the ipconfig /all check again.

3. Check your connectivity by pinging several Internet sites. If that does not work, ping the loopback address 127.0.0.1. If that fails, your adapter may not be working or it is not properly configured.

To check your IP address. From command prompt enter ipconfig /all (as shown in the picture) you should see an IP Address and several DNS Server addresses. The domain name system (DNS) is the way that Internet domain names are located and translated into IP addresses and is required for browsing the Internet.

Ping 127.0.0.1 - loopback Test (as shown in the picture). The loopback test is used to check if the IP stack is responding. If it times out or you get an error the problem may occur if any one or more of the following conditions is true:

*The TCP drivers are corrupted

*The network adapter is not working

*Another service is interfering with IP

Check your network adapter, click the Start menu, Settings, Control Panel, and select Network Connections. Double click on the Local Area Connection or the Wireless Adapter whichever one you are using. Be sure its Connected. If you have multiple network cards disable the one you are not using.

There should be Packets displayed in both the Sent and Received counters. If the Received counter is 0 check that the adapter has an IP address. Select Properties.

Click the check boxes for Show icon and Notify me below. A twin PC icon will appear on the lower right portion of the taskbar in the tray area and will flash while sending and receiving packets. You can place your mouse over the icon to get the status and click on it to get more details.

Tracert displays the connection path to the target location and the number of hops. Each hop is the trip from one router to another. Tracert is a handy tool both for understanding where problems are in the network and for determining latency between hops.

Ping is used to determine whether a host exists and is active on the network and can determine the round trip time to the device. You can enter a host name or an IP address if you know it. If the request times out then the host is not reachable because it's offline or there is a problem with the connection. Try several sites, if none work then ping the loopback address 127.0.0.1 Also, if your DNS is not working or properly configured you can only ping the host with an IP address and you will not be able to browse the Internet.

If you are having intermittent problems, perform a ping -t for 5 to 6 minutes then hit CTRL C to see the results of the test to determine if you are dropping network packets (lost packets). If you are, this usually indicates an ISP problem or Cable/DSL modem problem. See VPN ISP Troubleshooting Guide

(2) VPN Troubleshooting Error Messages

Q1 Error Message: Remote Host not responding: or Unable to Resolve the IP address of the Remote Server

Cause: This indicates that the Contivity VPN Switch never responded to the connection attempt. The problem could either be with the Contivity switch itself, (switch may be down) or your machine may be having a problem resolving the IP address.

Action: Try pinging your destination name (Example: VPN.something.com). If you received a message that says "Request Timed Out" from the ping command, call your ISP to make sure that their DNS is functioning correctly.

Q2 Error Message: Maximum number of sessions reached

Cause: This indicates that the maximum number of users for the account you are using are currently logged on.

Action: If you are the only user with VPN to your account, it is possible to get this error if you restarted a connection immediately after losing the dial-up connection to your ISP. This is because the Contivity VPN Switch takes up to one hour to determine that your connection has been dropped and log you off from your account.

Q3 Error Message: Login failed, Please consult the switch log for further information

Cause: The User Name or the Password is incorrect for the user name entered.

Action: Verify that the User Name you entered is correct and retype the Password before trying the connection again.

Q4 Error Message: The physical connection has been lost

Cause: Your connection to your ISP was disconnected.

Action: Re-establish your connection to your ISP before you re-establish the Contivity connection to the remote network.

Q5 Error Message: The secure Contivity connection has been lost

This message can result due to a number of different reasons, and there are several recommended actions you can take to try and re-connect.

Cause(s):

If you receive this error before the client connects then something is blocking a necessary port (such as ESP port 50). This can result if your firewall is not configured properly and is restricting the necessary port(s).

If you receive this error during a connection and you suddenly get the error it may mean one of the following:

1. Something closed the connection;

2. The VPN Contivity switch where you were trying to connect to thought your client was down or timed out;

3. Your local ISP did something that interrupted your network connection long enough for the VPN Contivity switch to identify your client was not responding;

4. The VPN Contivity switch that you are connected to has either logged your connection off or the Switch is no longer responding, or a device that does not support IPSEC NAT Traversal is causing the connection failure.

Action(s):

1. Try re-establishing the Contivity connection by clicking the Connect button. If this works, the connection was probably lost due to the Idle Timeout configured on the Contivity VPN Switch. If no data is transferred through the Contivity connection for a long period of time, 15 minutes or more, the Contivity VPN Switch automatically disconnects the connection;

2. If you were unable to successfully re-establish the Contivity Connection, the dial-up connection may be preventing data from traveling between the Contivity VPN Client and the Contivity VPN Switch. Hang up the dial-up connection and reconnect before you try to re-establish a connection to the Contivity VPN Switch;

3. If you are still unable to connect to the Contivity VPN Switch, open a Command Prompt and try pinging the Contivity VPN Switch using the host name or address that you specified in the Destination field.

(a) If you receive a "Destination Unreachable error" there is a routing problem at the ISP.

(b) If you receive a "Request Timed Out" error message, the Contivity VPN Switch is probably not available, and you should contact your Network Administrator.

4. If you keep getting this message and are unable to connect, then it may indicate that the Contivity VPN Switch is unable to communicate with the client because it is behind some kind of NAT (Network Address Translation) device. NAT (Network Address Translation) Traversal allows a number of devices on a private network to access the Internet simultaneously without each requiring its own external IP address. Most hotels and airports that provide Internet connectivity use NAT to connect to the Internet.

Q6 Error Message: Cannot Alter Routing Table

Cause: Message means the you the user, an application on your machine, or your ISP attempted to change the routing table via an ICMP redirect attempt and it was not successful. The client detects the attempt to make the change, determines it's a security breach and shuts down the client's connection. Any time you make a VPN connection, you cannot change the routing table, because the VPN Client views this as a security risk and you will get disconnected.

Some applications require an ICMP redirection in order to work such as a game or other third party software.

Action: If you receive this error and cant connect due to an ICMP redirect attempt, shut down any other applications you are using which may be causing the ICMP redirect attempt. If it is the ISP that is doing it, you will need to block the ICMP redirect request. You can identify that ICMP redirect has occurred, by seeing a message saying there has been an IP address routing table change.

Q7 Error Message: Receiving Banner Text Information

Cause: Message means you are experiencing a Banner Sock issue, and will see a window displaying the "Receiving Banner Text" message and then gets disconnected.

Actions:

1. Disable the firewall completely to test. This is a port 500 issue and often means that the you have a personal Firewall that is blocking port 500 or you have a router that does not support IPSEC pass-through, and the you are connecting to a VPN switch that does not have NAT Traversal enabled.

2. If using wireless, temporarily remove Wireless from the picture and focus on the Ethernet card. Check the Ethernet card speed and duplex parameters and then make sure that the hub, switch, or router that is on the other end has the same parameters. If not, the VPN connection will drop as the link goes up and down, or due to a large number of errors on the port from a duplex and or speed mismatch.

3. Firewall that blocks the connection, such that system will crash. (This will rarely happen) NSDF (Norton Symantec Desktop Firewall) and NSPF (Norton Symantec Personal Firewall) can do this though, if you do not trust the IP address of the VPN connection.

If you do not trust the VPN address of the VPN client, the firewall will cause you to crash. In your Internet browser click on "Tools > Internet Options > Security > Trusted Sites > Sites" and add the destination VPN address(es) to your trusted sites.

Q8 Error Message: You already have the maximum number of adapters installed

Cause: You may have installed to many virtual adapters in your IP Stack

Actions:

1. Remove any unnecessary adapters;

2. Create multiple boot scenarios disabling the adapters that are not required for that function;

3. You may also get Banner Sock errors on Win 95 & 98 units with this condition;

4. For more information, see this Microsoft article: KB217744: Unable to Bind Protocols to More Than 5 Network Adapters (copy and paste into the search tool bar > enter).

Q9 Upgrade Errors: The following are some errors that may occur when trying to upgrade / install the Nortel VPN Client 4.65

Error (1): Failed to get Registry key value for NT_IPSECSHM

Cause: This is caused because an important registry key that cannot be found in the system registry.

Actions:

1. Uninstall and Reinstall the VPN Software

Error (2): Login Failure due to: Driver Failure

Cause: This is generally caused by either not having Admin rights to the PC or by trying to install/use a Nortel VPN client that predates the operating system.

Actions:

1. Ensure that you have admin rights to the PC.

2. Update/Install the most current version of the Nortel VPN client.

Error (3): Create socket failed with 10048.

Cause: This problem generally will occur whenever you have another VPN client software installed on the system. The most noted conflicting clients are: AOL, Cisco VPN Client(s), SSH Sentinel and PGP.

Actions:

1. Removing these clients will in most cases, resolve the issue.

(3) VPN Modems Troubleshooting Guide

Q1 Are Cable Modems supported for VPN Access?

Yes, you can use cable modems for VPN access. However you must be aware of the following conditions and be able to work within them:

*Some cable modems require that you log into an NT network to get authenticated.

*Some cable modems use a client similar to the Extranet Client for VPN and both will not run at the same time.

*Some cable modem Contracts/Acceptable Use Policies specify that you cannot use them for business purposes or they want to charge you another fee to use them for business purposes. Make sure you read your contract thoroughly.

*Your Cable modem provider is your ISP. Please see the VPN-connection-guide.html">ISP Troubleshooting Guide for more information.

Q2 Why does my modem seem to perform erratically?

Always make sure that you do not let the operating system select a generic modem. If required, go to the appropriate web site for the vendor of the modem and get the updated INF file so that the proper parameters are configured for the modem.

Q3 Why do I always seem to get a slower connection speed than others with the same modem?

1. Always check the modem configuration to verify that its maximum speed has been selected.

2. It is common when auto-installing modems that the highest speed is not selected automatically.

3. Do not check the box that says run at maximum speed only.

Q4 I plugged my modem into the phone line at the hotel or customers office and now it does not work.

Always make sure that the phone line you are plugging into when visiting somewhere is an analog line not a digital one. Plugging into a digital line can permanently damage your modem, requiring a replacement unit. To avoid these situations please contact the local site phone support personnel.

Q5 Why cant I get a 56Kb V.90 connection from some locations that I go to?

Here are some of the reasons why you might not get a 56K connection:

1. You are located more than 3 ½ miles from your telephone companys central office (CO).

2. A SLICK or Subscriber Loop System is used in your area.

3. You are calling from a digital PBX system, which creates a Digital to Analog conversion and then an Analog to Digital conversion.

4. Your line contains digital pads or Robbed Bit Signaling (RBS), which can degrade your connection speeds.

5. Your wiring may be of poor quality.

6. Your modem's firmware may not be up-to-date. Check that your modem has the newest V.90 code installed with all the patches from the vendor's web site.

Q6 Why cant I get higher speed on my 56K v.90 modem into some NAG?

Here are some possible reasons:

1. A 56k v.90 modem is asymmetric by design where download speed can be as much as 56k but upload speed will be up to 33.6bps. For 56k to work, there must be only one analog-to-digital (A/D) conversion in your local phone loop. Thus when modems at both ends are analogue, 56k speeds will never be achieved as most PSTN exchanges run digital routing between the exchanges.

2. Some NAG sites use analog phone lines with Cisco and standard 56k modems, and most PC's dial-ups use a similar modem. Between the two modems, it limits the download speed to about 33.6kbps maximum.

3. Also, many users might experience lower connection speeds due to other reasons, such as more poor line quality. These factors will also contribute to the quality and speed of the line.

(4) VPN ISP Troubleshooting Guide

Q1 If you are getting the message "Unable to Resolve the IP address of the Remote Server. Verify the Host Name in the destination field is correct." when trying to connect with the Extranet Client.

Try pinging your destination name (Example: VPN.something.com) and if it fails call your ISP to make sure that their DNS is functioning correctly.

Q2 Why do I get No Domain Available when dialing my ISP?

On your Internet Service Providers (ISP) dial connection. Right click the mouse and select the properties button. Click on the Server Type tab and make sure that the Log On To Network box is unchecked.

Q3 Why do I seem to be running slowly through my VPN connection?

Try turning off the Software Compression option on your Internet Service Providers (ISP) dial connection as the VPN client has it's own compression. Right click the mouse and select the properties button. Click on the Server Type tab and uncheck the

Q4 I keep getting busy signals when trying to connect to my ISP, what should I do?

Contact your ISP giving the numbers you are trying to connect to. Many times you will find that can give you an alternate number not published yet that will work just fine. If not you may need to find another ISP that provides better service.

Q5 When configuring the dial icon for my ISP what should I put in the DNS/WINS settings?

Your ISP should supply you with the DNS/WINS settings of your dial connection. Most only give you DNS, in this case just leave the WINS settings blank.

Q6 Why when I load the Extranet Client on my PC and Winpoet is installed on my machine it crashes or does not work properly?

There are issues running Winpoet software on the PC with the Nortel Extranet (VPN) Client.

To repair your system, boot in safe mode and uninstall the Winpoet Software.

A simple solution is to install the Linksys BEFSR41 hardware router. It has a firmware PPPOE connector, which eliminates Winpoet from the PC and provides the added benefit a NAT firewall with the ability to hook up to three other PCs.

A second option is to find a PPPOE Client that does not interfere with VPN Clients.

Please See Your VPN Doctor for Picture Guide and further Details.

Need a Qiuck Fix, Tool, Trick or Tip? Your VPN Doctor has the Cure!

See Also : Mechanic Gloves Cool Automotive Save Price! Store

Monday, August 23, 2010

Optimize Vista 1 - Speed Up Internet Performance Dramatically

Many Vista users have faced slow Internet connection problems, and the cause is most probably by unsupported hardware or ISP itself. To counter this problem, you need to optimize your Vista for better compatibility and speed. I will show you 6 ways to repair your connection:

Method #1 - Disable TCP Auto Tuning.

Vista is intelligent enough to be constantly automatic adjust Its' TCP configuration for maximum throughput, however, this advanced feature has introduced too many overheads for some unsupported hardware, some time you should manually configure the TCP settings with SG TCP Optimzer and disable Vista TCP Auto Tuning.

Method #2 - Install web accelerator.

You can try Google Web Accelearator or other commercial web accelerators such as Nitro or OnSpeed. Web Accelerator is basically a web proxy with server site compression. It will create a tunneling connection between your computer and the web server, compress every item before sending to you, hence improves the surfing speed.

Method #3 - Use static IP.

This method doesn't improve your speed, but it will speed up the time takes by your computer to establish a connection to the router.

Method #4 - Use OpenDSN.

You ISP DNS server might not response fast enough, try OPENDNS to improve your Internet web site response.

Method #5 - Increases DNS Cache.

You need to know the DNS registry before you can increase the cache. What this does is caching every query you make to the DNS server, so next time when you revisit the web site, the response will be instantly . Therefore, the more web site you cache, the faster when you revisit them.

Method #6 - Disable IPv6 and other protocol.

You should disable all unused protocol, do not let the extra overheads slow down your Windows.

To learn more about the detail tuning, please download a copy of "Unleash Vista Power Express Guide" and register for a 3 day mini-course.

(C) Copyright 2008 Kok Choon - Feel free to reprint this article in its entirety as long as all links and author resources box in place.

Recommend : Buy Cheap God Of War 3 | LOWER Prices

Sunday, August 22, 2010

Tweaking DNS Setting - A Way to Speed Up Internet Connection

Mostly people expect a fast response when they browse the internet, but it doesn't always run as mostly people expect. Typically there are many factors that contribute a slow internet connection such as: a bad line from the customer premises to the nearest central office of the service provider, Central office problems, buggy software, and mostly due to the Web farm servers you browse to at the other end of the connection. So how do you speed up internet connection?

Generally when you sign-up the internet connection, there should be such kind of a service level agreement at least we know the bandwidth rate they provide the services to the subscriber. If you use traditional dial-up connection the maximum bandwidth will be 56Kbps. You cannot speed up internet connection exceeding the

architecture limitation. DOCSIS 3.0 Cable architecture probably can provide you faster speed up to 300 Mbps - but depends on the infrastructure the ISPs have built.

Definitely it is beyond our control when the bottom lines of the problems come from the ISP, the central office equipment, and slow web servers. But basically you can tweak the computers to get them in high performance in browsing the internet. The following guidelines will help you manipulate the computers to speed up internet connection.

How to tweak DNS setting to speed up internet connection

When you type in the hostnames in the browser such as cisco.com, the DNS resolver needs to translate it into the corresponding IP address such as 55.125.102.113. DNS servers provide that name resolution automatically and behind the scenes as you surf the Web.

Editing Host File

A very simple way to speed up internet connection regarding the DNS setting is by editing the computer local hosts file. It takes time to send your request to a DNS server, have the server look up the proper IP address to resolve the name, and then send the IP address back to your PC. You can eliminate that delay by creating or

editing a local HOSTS file on your own PC that contains hostnames and their corresponding IP addresses.

Windows will first lookup the entry in the HOSTS file to see if there's an entry for the hostname, and, if it finds it, it will resolve the address itself. That way, you won't have to go out to a DNS server and wait for the response before visiting a web site. You can edit the HOSTS file with the notepad editor and you can create lists of most frequent web sites you visit.

You'll find an existing HOSTS file in C:\System32\Drivers\Etc\HOSTS. Open it in Notepad and enter the IP addresses and hostnames of your commonly visited web sites with the following format:

65.301.110.37 sysneta.com #example of the entry

67.101.200.107 computer-network.net

Each entry in the file should be on one line. The IP address should be in the first column and the corresponding hostname in the next column. At least one space should separate the two columns. You can add comments to the file by preceding the line with a hash (#),

Adjust the Computer DNS Caching Settings

You can also adjust the DNS Caching setting to help speed up internet connection. When you visit a site, Windows puts the DNS information into a local DNS cache on the computers. When you browse a website, your Computer first looks in its local DNS cache, called the resolve cache, to see whether the DNS information

is already in there. If it finds the information locally, it doesn't have to query a remote DNS server to find IP information. The cache is made up of recently queried names and entries taken from your HOSTS file.The cache contains both negative and positive entries that we can hack to help speed up internet connection.

Positive entries are those in which the DNS lookup succeeded, and you were able to connect to the web site. When XP looks in the cache, if it finds a positive entry, it immediately uses that DNS information and sends you to the requested web site.

Negative entries are those in which no match was found, and you end up getting a "Cannot find server or DNS Error" in your browser. Similarly, when the computer looks in the cache and finds a negative entry, it gives you the error message without bothering to go out to the site.

Negative entries can lead to problems. When you try to make a connection to a site that has a negative entry in your cache, you'll get an error message, even if the site's problems have been resolved and it's now reachable.You can solve this problem to speed up internet connection using a Registry hack. By default, XP caches

negative entries for five minutes. After five minutes, they're cleared from your cache. But if you'd like, you can force XP not to cache these negative entries, so that you'll never run into this problem.

Edit the registry using registry editor (Regedit from the Run command) and go to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters.

Create a new DWORD value with the name NegativeCacheTime and give it a value of 0. (The value may already exist. If it does, edit its value to 0.) The DWORD determines how much time, in seconds, to keep negative entries in the DNS cache. If you like, you can have the entries stay alive for one second by giving it a value of 1. After you're done editing, exit the Registry. To make the change take effect, restart your computer, or flush your cache by issuing the command ipconfig /flushdns at a command prompt.That command will flush your DNS cache - all the entries, both positive and negative, will be flushed, and it will be empty until you start visiting web sites. Negative entries, however, will not be added to the cache if you've given the DWORD a value of 0.

To help you speed up internet connection you can also reduce the Web Cache as small as possible. The less disk space in your computer Web Cache for internet temporary files is less data the computer needs to search through. How to do that?

From your Windows, do the following:

Click Start => Select Control Panel => double click Internet Options => and then click Settings under Browsing History. Reduce the Disk Space to Use to the minimum amount the system recommend or as low as you want. Clear Internet Temporary Files

Another good way to speed up internet connection is to clear your internet temporary files. Many files in the web cache are active such as cookies are loaded in the browsers and constantly update themselves when you are surfing the internet. The computers always search the temporary files to match the latest version of a web page. To speed up internet connection you can clear the web cache to cut down the works the computer needs to do. The following steps can be tried to delete the web cache, make sure to shutdown the browsers prior performing the steps.

Click Start => Click Control Panel => double click Internet Options => Click Delete Files under Temporary Internet Files on the General tab. => check the Delete all offline content box and then click OK.

Spyware and viruses

Spyware and any types of Internet threats can cause the computers to slow down the internet response. Some Trojan viruses can also causes slow internet connection; scan the virus regularly to help you speed up internet connection. Make sure the computers are well protected by the antivirus software.

Visit : Pocket PC Pda

Friday, August 20, 2010

CCNA - CCNP Certification - Hands-On Lab Configuring Two Cisco Routers

Objective: In this lab you will configure a simple network to allow two routers to route packets between to remote networks. The text that is in bold is the text you need to type during the lab. Requirements:


Two Cisco routers with one Ethernet port and one serial port.
Cisco IOS 10.0 or higher
One PC for consoling into routers with terminal emulation software
One serial cable
One Cisco rollover cable

Setup: Step 1: Physical Connections Connect the following interfaces:


Console: Connect your PC/terminal to the console port using a rollover cable and HyperTerminal (9600-8-N-1-no flow)
Ethernet: Connect Ethernet ports to a hub or a switch using a straight-through cable. Use a cross-over cable if going directly from the PC's NIC to the Ethernet (AUI) port on the router using a transceiver.
Serial: If going directly between two routers, don't forget to connect one port via the DTE cable and the other via the DCE cable.

Step 2: Boot up the routers Just say "no" to use the setup mode (setup dialogue). The setup mode will only allow you to configure the router with the basic features and not with any advanced features. If asked if you would like to terminate the auto configuration; say "yes". Let the routers finish booting.

Step 3: Host Name and Passwords Begin your configuration with the host name and passwords. This is to remind you of what router you are configuring and now's the time to start thinking about router security.

RouterA

router>en

router#config t Enter configuration commands, one per line. End with CNTL/Z.

router(config)#hostname RouterA (sets the router's name)

RouterA(config)#enable secret cisco (Sets the secret password for the router)

RouterA(config)#line vty 0 4 (there are five concurrent connections for the telnet ports coming into a Cisco 2500 router. We are setting the login password on all five of them)

RouterA(config-line)#login (This enables the router to require a login password for a telnet session to the router)

RouterA(config-line)#password cisco (this sets the login password for all 5 telnet sessions coming into the router as cisco)

RouterA(config-line)#exit

RouterA(config)#^Z (This is the key combination of control+z which takes you back to the privileged executive mode)

RouterA#

RouterB

router>en

router#config t Enter configuration commands, one per line. End with CNTL/Z.

router(config)#hostname RouterB (sets the router's name)

RouterB(config)#enable secret cisco (Sets the secret password for the router) RouterB(config)#line vty 0 4 (there are five concurrent connections for the telnet ports coming into a Cisco 2500 router. We are setting the login password on all five of them)

RouterB(config-line)#login (This enables the router to require a login password for a telnet session to the router)

RouterB(config-line)#password cisco (this sets the login password for all 5 telnet sessions coming into the router as cisco)

RouterB(config-line)#exit

RouterB(config)#^Z (This is the key combination of control+z which takes you back to the privileged executive mode)

FYI: Anytime you make a configuration change to a router and you come back to the privileged exec mode you need to save your changes to NVRAM. This ensures that if the router reboots, you won't loose your changes which are in the running-config which is volatile RAM. The following command(s) saves your changes to the startup-config.

RouterA#copy running-config startup-config

or

RouterA# copy run start

or

RouterA#wr me (short for write memory)

Step 4: Adding IP Addresses Adding IP addresses, is a basic function of configuring routers. Below is an example of configuring both an Ethernet and serial interface. For serial interface with the DCE cable you will need to also add the clocking with the clockrate command. Get the IP addresses from the network diagram.

RouterA RouterA#config t Enter configuration commands, one per line. End with CNTL/Z.

RouterA(config)#int e0

RouterA(config-if)#ip address 172.16.12.1 255.255.255.0

RouterA(config-if)# description LAN Network for

RouterA RouterA(config-if)# no shutdown

RouterA(config-if)#int s0

RouterA(config-if)#ip address 172.16.10.1 255.255.255.0 (RouterA will have the serial 0 with the DCE end of the serial cable. The other partner will have serial1 with the DTE end of the serial cable. Check the network diagram to confirm to see who has what interface)

RouterA(config-if)#clockrate 250000 (DCE interface only which is the s0 on RouterA)

RouterA(config-if)#no shutdown

RouterA(config-if)#description Network connection to RouterB

RouterB

RouterB#config t Enter configuration commands, one per line. End with CNTL/Z.

RouterB(config)#int e0

RouterB(config-if)#ip address 172.16.11.1 255.255.255.0

RouterB(config-if)# description LAN Network for RouterB

RouterB(config-if)# no shutdown

RouterB(config-if)#int s1

RouterB(config-if)#ip address 172.16.10.2 255.255.255.0

RouterB(config-if)#no shutdown

RouterB(config-if)#description Network connection to RouterA

Once both routers are configured properly, you should be able to use the ping command and ping the interface e0 on each of the routers from the neighboring router. If you do a show ip route on both routers and do not see the directly connected interfaces in the routing table, they are either not configured or they never came up. Confirm that the IP addressing took and the interfaces came up by using the show ip int and looking at the interfaces' status and ip address configuration. RouterA# show ip route RouterA# show ip int Do this on both routers.

Step 5a: Adding Dynamic Routing: RIP For this router to participate in a dynamic routing using a dynamic routing protocol like RIP or IGRP, you'll need to enable a routing protocol and advertise the directly connected networks that want advertised.. We only advertise the classful network address, not the subnet mask of the network.

RouterA

RouterA>en RouterA#config t Enter configuration commands, one per line. End with CNTL/Z. RouterA(config)#router RIP RouterA(config-router)#network 172.16.12.0

RouterB

RouterB>en RouterB#config t Enter configuration commands, one per line. End with CNTL/Z.

RouterB(config)#router RIP

RouterB(config-router)#network 172.16.11.0

FYI: We need to advertise the network, not any particular host. An example of that would be enabling RIP on RouterB. We want the other router (RouterA) to know that any packet destined for the network 172.16.11.0 can be sent to RouterB which has a directly connected 5 entry in it's routing table showing what interface to send the packet to; in this case its e0. If you route to 172.16.11.1, all your every going to route to, is the e0 on RouterB and nothing else. Test your configuration to ensure that it is configured properly by pinging from router to router. Check your routing table for entries that are preceded by a capital letter "R" to ensure that you are receiving routing updates using RIP. Ensure that your partner has finished configuring his router so that you can receive his updates. No updates, no ping. Do a show ip protocol to see what routing protocol is configured on the routers.

Step 5b: Adding Dynamic Routing: IGRP IGRP uses an autonomous system (AS) number or process id. This number must be the same on all routers wanting to share IGRP routing updates or they don't share. Turn RIP off before you turn on IGRP. For this lab we'll be using an AS number of 100.

RouterA

RouterA>en RouterA#config t

RouterA(config)#no router rip RouterA(config)#router igrp 100

RouterA(config-router)#network 172.16.12.0 (again, just the network portion of the IP for your Ethernet network, NO subnet mask)

RouterB

RouterB>en RouterB#config t Enter configuration commands, one per line. End with CNTL/Z.

RouterB(config)#no router rip

RouterB(config)#router igrp 100

RouterB(config-router)#network 172.16.11.0 (again, your Ethernet network IP NO Subnet Address)

Step 6: Adding Default Routes Good candidates for default routes are routers which are known as the boundary router. This is a router which is normally part of a stub network. Inside the stub network, the routers may be participating in a dynamic routing using a protocol like RIP, but only a static default route is needed to connect the stub network to the Internet.

RouterA

RouterA>en RouterA#config t RouterA(config)#ip route 0.0.0.0 0.0.0.0 172.16.10.2

RouterB

RouterB>en RouterB#config t

RouterB(config)#ip route 0.0.0.0 0.0.0.0 172.16.10.1

Step 7: Adding Static Routes A static route can be used for different reasons. One reason may be for a router to connect to another router in a lab. You'll need to turn off all routing protocols before you configure the router for static routing.

RouterA

RouterA>en

RouterA#config t

RouterA(config)#no router igrp 100

RouterA(config)#ip route 172.16.11.0 255.255.255.0 172.16.10.2 What we are saying here is: For RouterA to route to the network 172.16.11.0, go to the next hop interface which is the serial1 (172.16.10.2) attached to RouterB. Since RouterB knows about the directed connected Ethernet network of 172.16.11.0, it will have route for it in its routing table proceeded by the letter "C". (See next example)

RouterB#sh ip route (Output omitted) 172.16.0.0/24 is subnetted, 1 subnets C 172.16.0.0 is directly connected, Ethernet0 RouterB# RouterB

RouterB>en

RouterB#

RouterB#config t

RouterB(config)#no router igrp 100

RouterB(config)#ip route 172.16.12.0 255.255.255.0 172.16.10.1

Step 8: Testing and Monitoring At this point it is a good idea to start testing your network using various commands. Perform the following on both routers.

RouterA# show ip route

RouterA# show ip interface brief (This command shows the IP and status of all interface)

RouterA# show controller s0 (Shows whether or not the serial cable is DCE or DTE.)

RouterA# ping ip-address

RouterA# trace ip-address

RouterA# debug ip rip (Remember to turn debug off when done, use undebug all, no debug all or un all)

RouterA# terminal monitor (for using debug from a telnet session, otherwise debug output will go to the console. Caution: This will cause the debug output to go to all telnet sessions on the router.)

Show commands

RouterA# terminal no monitor(To turn off monitoring during a telnet session.)

RouterA# show cdp neighbors

RouterA# show ip protocols

RouterA# #show version

RouterA# #show flash

RouterA# show ip route (shows the routing table)

RouterA# show memory

RouterA# show stacks

RouterA# show buffers

RouterA# show arp

RouterA# show processes

RouterA# show processes cpu

RouterA# show tech-support

Step 9: Finishing up Once you have your routers up and working you may wish to run some commands to make working on Cisco routers easier and to stop some of the default annoying behavior of Cisco routers.

RouterA(config)# ip host RouterB 172.16.10.2 (This configures a host table entry for the name RouterB. So instead of having to remember the IP of RouterB to ping it, you can now ping it using its name, RouterB. It's the same as using a hosts file on a computer. If you just type in RouterB and hit enter, the router will assume you're wanting to telnet into RouterB using port 23)

RouterA(config)# no ip domain-lookup (When there is no DNS server and you miss spell a single word command, it will try to do a DNS lookup using a broadcast address of 255.255.255.255. To stop this lookup of a non-existent DNS server, we can turn off the DNS lookup capability using this command.)

RouterA(config)# banner motd #!!!!Warning! Authorized Access Only!!!!# (This message will be seen by anyone trying to logon to your router. The # sign is known as a delimiting character and is used to identify the text portion of the MOTD. Notice that the actual message starts and ends with the delimiting character)

RouterA(config)# no service-config (When you reboot a Cisco router, the default behavior is to try and find a configuration file on the network using a number of methods over a broadcast address of 255.255.255.255. To stop this annoying behavior, Use this command.)

RouterA(config)#no logging console (Each time you leave one level of the router and return to the previous level or bring an interface up, you get a read out on the console screen. If you get busy typing and configuring the router this can be distracting and annoying. Use this command to stop the logging of messages to the console screen.) And don't forget to...

RouterA# show running-config

RouterA# copy running-config startup-config

Friends Link : Temperature Data Logger

Thursday, August 19, 2010

Is Your Domain Name On Someone's Wanted List?

A good domain name is, and will always be, essential for any online business. If you ask me, the internet is still only just evolving from infancy. It's a long way to maturity.

Still the world has come a long way since Ken Olson, president & founder of Digital Equipment Corp. etched his name in history, when he proclaimed less than 30 years ago, "There's no reason why anyone would want a computer in their home."

How technology has changed our lives within a span of a single generation. Sooner rather than later, more and more businesses will want to go online and cater to a global market instead of being content with the local neighborhood. And one of the first steps after deciding what business you want to do, is getting a good domain name for your business.

A domain name can make or break an online venture. A domain name is a company's identity online. It is your brand, your personality, your trademark. So, choosing the right domain isn't easy.

BuyDomains.com argues that:

"Today .COM and .NET names have established recognition and can identify your company on the Internet forever. For this reason, they have considerable resale value and serve as excellent investments.

Over time, most, if not all companies will conduct a considerable portion of their business over the Internet. A domain name that is easy for your customers and prospective customers to remember is the key factor in generating new business and conducting business on the Internet.

Having relevant "keywords" to support your domain name is also an important consideration and will enable customers to find your online business effortlessly through Web based search engines.

Another excellent marketing tactic you should consider is to have multiple URL addresses (including your domain name) point to the very same Web site. This is very simple .....This will allow you to keep your legacy domain name, while multiple new e-business names conduct commerce and are listed in the search engines, significantly increasing your Web site's overall traffic."

A web site is a worldwide advertisement that runs 24/7. For the price of one print ad, or one-tenth of a 30 second commercial, you can have a solid web site designed and running every single minute of every single day. Show a company how a few thousand dollars invested in a domain name & a web site now can translate into 100 years of sales and effective promotion, and they will all be scrambling to get in line.

Most companies, even small ones, will tell you that having a web site is no longer an option. It offers the business owners the opportunity of having potential customers view their products or services day or night, without needing to an outlay of huge sums of money.

But then, many small and medium sized businesses that are already online have poor or difficult sounding domain names. Names that they would readily change in an instant if they had the right domain name. So there will always be people and companies who will be looking at the domain resale market for a better name for their business. This is key.

When Anysoft, a Massachusetts company, acquired any.com for $30,000, their vice-president, Emily Shain, said it was worth the money because the domain name was such a vital marketing tool that would help customers find them easily.

If you are at the right place at the right time with the right name, you could find yourself pocketing some nice cash.

Even governments are getting in on the act. The New Zealand government shelled out NZ$ 1 million for newzealand.com. As a result, there was understandable criticism in the NZ parliament over the purchase as being a waste of tax payers money.

What was the government's response? Mark Burton, the NZ Tourism Minister had this to say, "There is no question that this domain will provide an invaluable portal for... commercial entry into New Zealand for those interested in tourism, commerce, and industry.

The South African Government offered US$10 million for southafrica.com. It has also been reported that korea.com was sold for US$5 million to True Net, Korea's largest Internet service provider."

Author, Tariq Ghafoor writes, "I feel that there's still reason for optimism in the domain aftermarket but in order to profit there's a crucial need to alter one's perception and strategy just like our brethren have been forced to do in other web-based businesses."

It's true. The heady days of the domain gold rush has seen its final sunset. We are seeing shifting trends in the arena. To cope with the changes, a domain speculator needs to see himself as a domain entrepreneur and begin to organize his domain names and increase their value and prepare them for prospective buyers.

Thanks To : Nikon D90 Store. LOWER Prices in The Same Item Portable Oxygen Concentrator

Wednesday, August 18, 2010

Free Windows Server Antivirus Software

Those of us in the server maintenance field know how expensive server software can be.  In many ways server software is like the restaurant industry, if you slap the "restaurant grade" label to a standard refrigerator the price goes up 300%. The same thing happens when you need "server backup" or other "server" software.  Luckily there are FREE alternatives out there.
 
ClamWin is an open source program designed to work on Microsoft Windows operating systems.  ClamWin will run on Windows 98/ME/2000/xp and 2003 versions.  ClamWin is based on the open source ClamAV engine but with a graphical interface to make it much more user friendly.  The only downside to using ClamWin is that it does not offer any real-time protection. In other words, it does not scan your system unless you ask it to.  If you have less critical systems in your server room like a backup DNS or DHCP server then this could be a possible solution for you.  As long as you schedule a scan manually as often as you feel it is needed, this could save you some bucks the next time your antivirus renewal comes up.
 
I would not recommend ClamWin for a critical production server.  You don't want to risk critical systems to an antivirus solution that doesn't scan real-time.  For all those other servers and all those older computers that are not used to access the internet (you know, the ones that are sitting in the basement, used by someone just to open that 10 year old application that no one will spend the money to upgrade), ClamWin could be the solution to save you a few licenses the next time you renew your AV software.

Visit : Spine Disc

Tuesday, August 17, 2010

Dedicated Website Hosting - Is it Your Best Choice?

If you are looking at a web hosting company that offers dedicated website hosting, it may not be what you think. There are disadvantages to dedicated website hosting. First, dedicated web hosting, also referred to as having a dedicated server or a managed hosting service is where you, the client, lease an entire serve that is not shared with any other company or if an individual, no other individual.

Server supports and updates are done by the company you purchased your dedicated hosting service from and remember, you do not own the server so beyond your server lease payment; you may have additional fees for updating and monitoring your server. Further, if you or your company has a strong IT department or person, a dedicated server where you rely on the company your leasing it from may not be a good idea-a good IT person can tell you what your best server options are. Some dedicated hosting companies won't fix your server problems as quickly as your in-house IT team.

The costs of a dedicated server can be much higher than a shared server as well if you combine your lease payment with support plans and there can be many levels of support plans so if you choose the lowest paying support plan, when you do need help, you may have to pay additional support fees. A general rule of thumb when considering the price of a dedicated hosting service is to be prepared to pay five to ten times more for having one.

Reaction time for any problems with your dedicated server is also something to watch for. Make sure the company you are purchasing your dedicated hosting server from has 24/7 support if they don't you might not be able to do anything about your downtime if their support department is not on duty to help you or your company.

If you don't have a good IT person or servers are not your forte, you may not understand how it works or what to do if a problem arises so dedicated servers are generally leased by people who have a good working knowledge of servers and how they perform. If you are a beginner, dedicated hosting is not for you. Things like telnet or SSH can be hard to understand for the beginner.

Telnet is a text-based program that allows you to log into your system and is similar to DOS. Secure Shell or SSH is a network protocol where data can be exchanged using a secure channel. SSH was produced to replace telnet, which is not as considered as secure as SSH. Data transfers are not as safe using telnet compared to SSH and if you don't know or understand these, you could really hamper your server ability or problem areas. You should also be familiar with firewalls, server monitoring, back-ups and if you're not an IT person, you will have to call your dedicated hosting company if you need to reboot your server. All dedicated hosting servers are Unix or Linux based systems, another thing you should be knowledgeable about.

Basically, if you don't know how to perform administration tasks on your server, you will always have to rely on the dedicated hosting company's support service. Some of these problem issues can be handled if your dedicated hosting company offers a good and easy-to-use control panel so check that out before you buy.

Downtime is a big issue for anyone who needs to be up and running 24/7 and because a dedicated server is not at your place of business or home-based business, and you have no idea how to reboot the system, you have no choice but to call your dedicated hosting company and again, if they don't offer 24/7/365 support, you must rely on them as to when your server will be back up and running. The importance of 24/7/365 support is also important so ask about it and find out if the dedicated hosting company you have chosen monitors your system constantly at their end as well as performing daily back-ups on your behalf. If they don't provide either of these services look for another company that does.

Dedicated hosting is good for some companies and bad for others. Before you buy, talk with your company team, make lists of what you need and what you don't need and do your research on dedicated hosting companies and ask the important questions we've given you here. While dedicated hosting is not a wrong choice, it can be a hard choice once it's made and you don't know what to do if something goes wrong.

Visit : Bulk Email Friendly Spine Disc

Monday, August 16, 2010

Seven Tips for Securing Your Organization's Network from Spam and Email Viruses

Providing security against email related threats has become a burden for most IT professionals in 2006. According to a recent study by Postini, spam and email viruses now make up to 80% of all emails sent out as compared to 50% in 2000. As a result, IT professionals now face a tougher challenge in providing network security for this amount of spam. IT professionals also have the disadvantage of defending against new forms of email threats such as spam zombies, directory harvest attacks, mass mailing trojans, as well as the latest email virus.

In this article, I have listed the seven most effective spam fighting tips for organizations with in-house mail servers. These seven tips are proven techniques I have used for my customers, partners and associates who wish to tighten their perimeter (network) security.

1. Firewall:

A firewall is your first line of defense against hackers, crackers, and spammers. Without a firewall, your network is a disaster waiting to happen and could give any novice hacker free reign over your network. If your organization has multiple Internet users, this tool is essential for securing your network.

2. Block Port 25:

On your firewall, allow outbound traffic on TCP port 25 for all mail servers. Block traffic on outbound TCP port 25 for all other computers and servers. On the Internet, TCP port 25 is used for email traffic through SMTP (Simple Mail Transport Protocol). Blocking this port is a good security practice and prevents mass mailing worms and spam zombies from sending mail from your users’ computers.

3. Managed Email Filtering:

Consider using a managed filtering solution such as Postini, Brightmail, or SpamSoap. Managed Email Filtering services quarantine spam, viruses, and email threats before reaching the email servers on your network. In comparison to desktop filters and server appliances, managed filtering services provide superior perimeter (network) protection by preventing delivery of spam and viruses to your network and servers.

4. Check Relay Setting:

A mail server’s relay setting controls which computers and servers are able to send SMTP email on your organization’s behalf. Check your settings and limit the IP address range to email users on your local network. Some mail servers have settings to limit email relay through authentication. If authentication-based relay is available, setup and configure it too. NOTE: If the relay is not set properly, spammers will be able to send email from your mail server. This exploit is commonly known as an “Open Relay” or a “Spam Relay.” Use the Open Relay test at [http://www.abuse.net/relay.htm] to check if spammers can relay mail from your server.

5. Black Lists:

Setup your mail server(s) with a black list. A black list (black hole list) is a database or listing of known spam sources. Most modern email servers can be configured to query inbound email against online blacklists. Messages originating from these sources can then be blocked. I recommend configuring your email server with SpamHaus blacklist. Spamhaus.org is an excellent free service to use. Some other good blacklists are DBSL and SpamCop.

6. Reverse DNS:

Reverse DNS (rDNS) associates an IP Address with a Domain Name. Most mail servers, as an anti-spam feature, often use a reverse DNS lookup to compare an email address domain name with its IP address. If the IP address found from the rDNS lookup does not match the domain name, it is probably spam. If you haven’t done so, setup and configure reverse DNS records on your DNS server.

7. Anti-Virus Scan:

There are many tools that provide adequate anti-virus protection for desktops at the workplace. Most anti-virus software is good at detecting viral threats that proliferate email spam such as mass mailing worms, trojans, and directory harvesters. Large organizations might want to use enterprise anti-spam software with management and monitoring tools that will allow tracking of network virus outbreaks.

Recommended Links:

- http://www.spam-x.com [Postini service – managed filtering, 1 to 500 users]

- http://www.postini.com [Postini service – managed filtering, 500+ users]

- [http://www.spamhaus.org] [Blacklist]

- http://www.dbsl.org [Blacklist]

- http://www.spamcop.net [Blacklist]

- [http://www.abuse.net/relay.htm] [Open relay test]

- http://www.dnsreport.com [DNS report/open relay test]

- http://www.dnsstuff.com [Spam database lookup and open relay test]

- [http://www.cnn.com/2004/TECH/ptech/02/17/spam.zombies.ap] [Spam Zombie Article]

Email viruses and related threats delivered through spam have cost businesses billions of dollars in expenses and lost productivity. Each spam email sent or received from your domain costs your organization money and bandwidth. By implementing these seven tips, your organization can reduce spam and recover costs.

This article: © Copyright 2006 Todd Green and free for republishing.

Friends Link : Buy Cheap Logitech Keyboards | LOWER Prices

Sunday, August 15, 2010

The Dangers Of Leaving Your Wireless Network Unsecured

If you were to browse for wireless networks in a busy city you would be surprised at how many unsecured networks you will find, many people are oblivious to the dangers, however I would like to outline these.

By unsecure I am referring to a wireless network that is accessible without the need for a network key, although WEP is horribly insecure also I will not be covering its vulnerabilities in this article. Providing an attacker is in range he can connect to an unsecured wireless network and become a part of the local network. Ok so now what? The attack could then run an ip scan on the subnet to establish what is currently connected to the network. At this point the attacker could run various scans (port scans and so on) against the targets. It should be noted that this kind of scan would not be possible from outside of the network as usually a router acts as a firewall and only forwards on traffic to ports that have been assigned for forwarding.

With the above in mind you are at risk to certain exploits if an attacker becomes a part of your local area network, these however are dependent upon what services you are running and if you have any software firewall in place, however the following are more serious exploits that are the real dangers that will jeopardize your privacy and possible confidential details, and generally a software firewall will NOT protect you from these.

ARP poisoning - To put it simply this exploit enables an attacker to 'pose' as another computer or device, usually your router! This can be done simply by sending a certain amount of arp replies to the victim saying that he has the MAC address of the router. The victim then updates its ARP table and sends all traffic destined for the router to the attackers MAC address. By doing this the attack can then monitor ALL traffic coming in and out of the victim. This needs very little explanation as to why it poses a risk. A lot of confidential details (usernames,passwords) are sent over the internet in plain text or with weak encryption, thus allowing the attacker to compromise your email accounts or other websites you use. There is also the problem of the attacker being able to view pretty much everything your doing online! including all your msn conversations etc.

DHCP spoofing - This exploit requires a little more patience on the attackers behalf however if executed it can be very bad news for the victim. The attacker creates a DHCP server on their system, when a new user comes online whose adapter is set to automatically assign an ip address; the attackers DHCP server attempts to offer a DHCP packet before the router does, if the victim acknowledges the request the attacker can include any details they want, usually their own IP address as the gateway and also DNS server(s) The problems of this are explained below.

DNS poisoning - This is the most serious type of exploit, the attacker can execute this in two ways. The first is explained above, the second is for the attacker to gain access to the router (most unsecured networks are left with default settings, this means the password for the router is usually default also and can easily be found online or guessed!) and then changing the DNS server that it uses to one of the attackers (this could be a local one on the attackers machine, or a rogue one hosted elsewhere) All the attacker needs to do now is create some rogue DNS records that redirect the victim to imitations of websites, usually these look identical however once the username and password are entered and submitted, they get sent to the attacker instead of where they should be sent! The attacker can even get the page to forward the details onto the correct site aftewards, therefore the attack going completely unnoticed. Obviously this is a very big problem especially for sites such as ebay, paypal, and especially online banking.

These exploits above are the most common for an attacker to use to gain confidential information, there are many more and a lot are dependent upon the setup of the network and victims machine.

In summary, it is clear to see that leaving a wireless network unsecure can have serious implications, and gives attackers an open door for them to gain access to all kinds of confidential information. The following security precautions are advised to give optimal security for home users:

-Always secure your network with a WPA or WPA2 key, make sure that the key is long in length and also complex. Avoid WEP at all costs, it is redundant and can be broken in minutes providing an attacker has a good signal.

-Implement MAC address filtering, this only allows traffic from registered MAC addresses. While MAC addresses can be spoofed, it can be a hard process as an attacker has to sniff traffic and anaylse frame headers to see source/target MAC addresses of an authenticated client, this can be very difficult for an unassociated client.

-Don't broadcast your SSID, while this on its own will not stop an attacker, it is an extra layer of security.

-Use a software firewall, I recommend Agnitum Outpost.

While no system in the world will ever be 100% secure, it is important to implement as many security precautions as possible to prevent attackers from exploiting. With the above points in place an attacker would have an extremely hard time ever gaining access to your network.

Thanks To : Network Attack Case, Information Blu-Ray Movies Store

Saturday, August 14, 2010

Windows Small Business Server 2008 Standard and Premium Editions Exceeding Expectations

Microsoft recently announced the release of Windows Small Business Server 2008 Standard and Premium Editions scheduled for release on November 12, 2008.

The release of Server 2008 marks one of the most significant upgrades Microsoft has made to its server line of software. Perhaps only the release of Windows 2000 was a more significant advance to the product line. Before the release of Windows 2000, only NT 4.0 was available for servers.

The new technologies present within Server 2008 will prove to be more beneficial to businesses than previous releases.

Small Business Server 2008 Standard and Premium Editions

Server 2008 marks the first release of a new Microsoft server product since Server 2003 R2. The innovations in the new release have been well worth the wait. With the release, as with Vista, Microsoft makes full use of the 64-bit processing environment that has been around for several years now.

Some of the key advances in the new release are an upgrade to the Active Directory (AD) infrastructure, which has been around since Windows 2000 was released. However, many features within Server 2008 are quite powerful and have taken the newest Microsoft server OS in a radically different direction.

The Small Business Server 2008 Standard Edition comes bundled with Microsoft Exchange Server 2007, Windows SharePoint Services 3.0, Windows Server Update Services 3.0, Microsoft Forefront Security for Exchange Server, Windows Live OneCare for Server and Integration with Office Live Small Business.

The Small Business Server 2008 Premium Edition includes all of the products in the Standard edition plus Microsoft SQL Server 2008 Standard for Small Business.

Server Core

Server Core is one of these radically new features. Server Core allows for a minimal version of Server 2008 to be installed on machines that only need specific functionality. For example, Server Core can be configured to take on common functions that servers normally perform such as those of the DHCP server, DNS server, file server and Active Directory, as well as operations such as streaming media, print services or even Windows virtualization.

Server Core is meant for the use of network administrators and server management personnel who could develop a highly specialized and efficient computing environment utilizing Server Core. A Server Core installation is very different from other Microsoft OS installations on a PC or server. The interface is minimal - mostly by command line, though a Task Manager or Notepad window can be called up.

IT professionals will appreciate a Server Core installation where it is needed. Maintenance under such an installation is at an absolute minimum since the server on which the software is installed is only focused on one particular function rather than the multiple functions on a full installation of Server 2008. There are also inherently less vulnerabilities for a would-be hacker to exploit under this setup, so security is a breeze. The simpler installation also guarantees less software bugs arising when they are least expected - such as when an application is installed that is not fully compatible with Microsoft software.

Considering all these benefits to a minimal installation, it becomes obvious that the management time involved with these specialized servers is also considerably reduced. Less management time translates into less maintenance by IT staff or, at least, a staff that does not waste time making sure the firewall is holding up or pinpointing a problem through multiple functions on a typical server.

Hyper-V

Also in Server 2008 is the Hyper-V option, which enhances Microsoft's presence in the world of virtualization. Virtualization allows for a single machine to take on the functions of two or more machines, utilizing resources simultaneously without causing overlap or conflict. Virtualization has so many benefits to the business world that they are difficult to number. The reduced number of machines in a virtual environment can save money for a business in many different ways. Fewer machines use less power in less space and can be effectively managed by fewer employees.

Today's machines can handle the additional functionality that virtualization demands; oftentimes processor capacity, primary memory and hard drive space are wasted or never even used. Virtualizing a server environment is a trend we will continue to see over the next decade.
Microsoft's previous virtualization release, Virtual Server, uses a popular virtualization technique called "host-based virtualization" where the primary OS installation runs a service called "Virtual Machine Monitor" (VMM) that provides the virtual environment to another operating system.

Hyper-V functions in a completely different way by using a hypervisor. A hypervisor creates an abstraction layer at the boot level, performing only minimal functions of the kernel, then abstracting the environment required to run multiple operating systems and their associated applications on top of the kernel. This translates into a much faster and more scalable virtual environment than the VMM methodology.

However, an important consideration is that Hyper-V is largely hardware dependent. To fully take advantage of the speed and scalability of a Hyper-V virtualization infrastructure from Microsoft typically requires hardware acceleration. This type of hardware is not uncommon, however. Examples of such are the AMD Pacifica and Intel VT extensions of their respective Opteron and Xeon processors.

Setting up a VM through Hyper-V is a breeze with the Wizard, and console access to the virtualized environments is simple and expedient. Hyper-V is built into the Server 2008 release and is managed just as print and file services are, so configuring and management are also very simple and familiar for those experienced with previous versions of Microsoft Server.

Easier Server Management

Previous server installations had a separate management console for each role contained within the Manage Your Server dashboard. Manage Your Server was a convenient enhancement over previous server releases where management consoles were not all so neatly gathered together. However, with Server 2008, this convenience is taken a step further with the completely new Server Manager.

With Server Manager, system administrators have a one-stop shop for server management for the first time. It is very likely that for a majority of the time, IT staff won't ever need to use another tool to manage the Server 2008 system, and they will be very thankful for it. Once again, with this tool, Microsoft lessens the time it takes to perform simple tasks.

Within Server Manager are the roles and functions installed on the Server 2008 system such as the DHCP server, DNS server, file services, domain services, etc. All of them are available for management and monitoring at the click of a mouse. Very handy troubleshooting tools are also conveniently located within Server Manager such as Windows Firewall, Device Manager, Event Viewer and WMI Control. The completely new Windows Server Backup tool is also located here and will be discussed further, as it is a considerable enhancement in its own right.

Clicking on any of the management tools located within Server Manager takes the administrator to a dedicated home page, which provides pertinent information to the role in question. From here, more information can be gathered such as troubleshooting tips, further knowledge about the task or function and links to other helpful tools that help administrators in virtually any particular situation.

Terminal Services goes hand in hand with server administration. This is the capability that allows administrators to remotely configure PCs. In previous releases, Terminal Services only allowed the entire PC installation to be deployed remotely, rather than specific applications. The changes with the Server 2008 release are through the rehashed Remote Desktop client, where a user logs in to download and install the application without the administrator having to oversee the operation.

Other Enhanced Server 2008 Features

Windows Server Backup has been enhanced for faster backups with new technology. Whether servers are fully backed up or incrementally backed up, IT staff will notice the difference from earlier versions of Microsoft Server. Restoration from a backup has also been made much easier. Previously, this had to be done manually from multiple backups if an incremental backup had been performed, but now only the date of the backup has to be chosen for the restoration to occur.

Other enhancements to the backup service in Server 2008 include the ability to recover the operating system on another machine if necessary, the ability to recover applications and improved scheduling for the automation of daily backups. The backup service also allows for remote administration by adding the backup snap-in to the Server Manager console.

BitLocker is another new Microsoft technology available in Server 2008. First debuting with the Vista release, BitLocker allows for the encryption of entire physical hard drives as a first line of defense against physical theft of sensitive data that may be contained within. BItLocker provides more peace of mind for organizations that have branch offices where physical security may not be what it is at the central office.

Another new function is the Read-Only Domain Controller (RODC) that allows IT staff to configure the Active Directory infrastructure as read-only. Such a configuration keeps Active Directory replication unidirectional, rather than bidirectional, as it is normally configured. An organization could use this setup once again in the branch office location where connections back to the central office may not be as fast or as reliable. In this situation, Active Directory would be configured at the central office and then sent out to remote sites before it is accessed.
Combining configurations of Server Core, BitLocker and RODC provides a level of security in the Server 2008 release impossible in prior releases. Configuring machines as read-only guarantees the data cannot be compromised even if a hacker were able to penetrate perimeter defenses. Also, if a theft were to occur in which a server was stolen at a remote site, BitLocker guarantees the data contained on the machine to be indecipherable, while RODC controls allow for administrators to reconfigure the network with a few clicks of the mouse.

Internet Information Services (IIS) is the server-side technology that first became available with Windows NT 3.51 back in 1995. With the seventh full release of IIS available for the first time in Server 2008, the service becomes fully configurable. Web administrators specify precisely which services they would like to enable - and which services they would like to disable. All of IIS 7 is also supported by the new Server Manager console.

Versions and Licensing

Several different product editions of Windows Server 2008 are available. Depending upon the version, each type is configured for specific hardware platforms, such as 32 bit or 64 bit, and versions are available with virtualization capability built in, while others leave the function out.

It is important to understand Microsoft's different available methods of licensing when purchasing server products. The Microsoft Open License is intended for smaller customers with less than 250 desktop computers in their network. As few as five licenses can be purchased and with these licenses, the owner has the right to transfer images to different machines or transfer a license to another machine.

Microsoft Volume Licensing is intended for networks serving more than 250 computers. Within this group are several account levels that offer flexible payment scheduling. The same rights are established as with the Open License, but there are added discounts for the volume purchases.

Both types of licensing come with the option to add Microsoft's Software Assurance plan, which provides maintenance for Microsoft products.

Software Assurance includes comprehensive support including training and the ability to speak with Microsoft representatives to assist in deploying and managing Server 2008 software.
Software Assurance should not be overlooked in any Microsoft purchase. With the purchase, software upgrades are included in addition to Version Rights, which guarantees the purchaser the right, at no extra charge, to new editions of the product purchased should one become available during the length of the Software Assurance contract.

Web Server 2008

This version is specifically configured to give a machine the ability to function as a Web server and little else. This setup does not allow the domain controller configuration and does not include Microsoft's new virtualization technology, Hyper-V. However, Web Server 2008 does support a Server Core installation. This version can be purchased either in the 32-bit or 64-bit editions and supports a maximum of four processors.

Windows Server 2008 Standard

The Standard version comes with all basic functionality of the new enhancements and technologies described in this article. It is available in 32-bit and 64-bit versions and also supports a maximum of four processors. The Standard edition can be purchased with or without Hyper-V virtualization. If the version with virtualization is purchased, it also comes with five Client Access Licenses (CALs). It is worth noting that Hyper-V is only available with 64-bit editions of Server 2008. One virtual instance can be configured with the Standard edition.

Windows Server 2008 Itanium

The Itanium edition is highly customized for specific-function servers that perform either as database or application servers. Itanium does not support Hyper-V, nor does it support Server Core. It is only available in the 64-bit edition, is purchased per processor up to a maximum of 64 supported processors and supports up to 64 gigabytes of RAM.

Windows Server 2008 Enterprise

Enterprise can also be purchased in 32-bit or 64-bit editions and with or without Hyper-V virtualization. At the Enterprise level, 25 CALs come standard with the installation and instead of the maximum of four processors, this edition allows for the support of eight. Enterprise also allows for support of a great deal more system memory (RAM) with the increased number of processors supported: two terabytes versus the maximum of 32 gigabytes in the Standard edition. Four instances are available with the Enterprise edition.

Windows Server 2008 Datacenter

Once again, the Datacenter version can be purchased to support either 32 bit or 64 bit and with or without Hyper-V virtualization. At the Datacenter level, licensing is purchased per processor and with the purchase, an organization is granted unlimited virtual instances. The Datacenter edition is purchased in conjunction with the Enterprise edition for machines that could benefit from unlimited virtualized environments. The Datacenter edition supports up to 64 processors in the 64-bit edition.

It is also worth noting that Hyper-V technology can be purchased as an add-on to editions purchased without the functionality. However, at a cost of only $28, it is almost inconceivable why anyone would choose to purchase Server 2008, at any level, without this technology.

Other editions expected to become available in the near future are Windows Small Business Server and Windows Essential Business Server. Both these new editions, no matter the specific configuration chosen, will only be available in 64-bit editions. As their names portray, these editions are targeted for SMBs with up to 50 desktops in the Small Business edition and up to 250 desktops in the Essential Business edition.

Additionally, specific functionality within each edition can be chosen with these new versions. Small Business Server Standard will come with Server 2008, Exchange Server 2007, SharePoint Services 3.0, a one-year subscription to Forefront Security for Exchange Server and Windows Live OneCare, all in one package. The Premium version will include all the above plus another copy of Server 2008 and SQL Server 2008 Standard, which allows for installation on two machines.

Windows Essential Business Server 2008 can be installed on three different machines and includes Server 2008, Exchange Server 2007, Forefront Security for Exchange Server, System Center Essentials 2007, and the next release of Acceleration Server and Internet Security when they become available. The Premium version also adds SQL Server 2008.

My Links : Port Hub Polar Heart Rate Watches

Thursday, August 12, 2010

An Introduction to Windows Dedicated Servers

Most of you must be aware that, you have direct access to the dedicated web server. Though usually most users manage their servers using the control panel of ftp (for shared hosting accounts). One has the complete access to the server, complete access would mean direct root access.

In the segment of dedicated servers, you have the option to choose between two alternatives viz Windows and Linux Dedicated Servers.

But, if your website is coded using ASP or dot NET technology, then you compulsorily choose Windows Servers as these areMicrosoft technologies and can work only on Win web server platform. Whereas if your site is developed using HTML or Flash, then you might think of choosing Linux dedicated servers as well. The servers OS platform would make difference in that case.

A web server which is Windows based, offers you an environment to host your website over IIS servers usually Windows 2003. You get to experience the IIS 7 version, whereas the Windows 2008 offers a higher version of IIS server environment. One of the benefits of using Windows server, is that it allows the developers an environment with better development tools.

Frontpage application is usually pre installed on Windows servers. With this, the website updation is much simpler and faster as well. With it you can update the website in real time. The other popular utility of Windows is ASP. This is a scripting language offered by Microsoft. It offers the feature of developing rich, attractive and dynamic websites.

My Links : Cool Phones Review Qwerty Mobile Audio Integrated Amplifier

Wednesday, August 11, 2010

Don't Risk Losing Your Business Domain Name! Or-WHOIS My Registrar?

I Can't Remember Where I Purchased My Domain Name!

It wasn't until my third client had called asking how to regain control of her domain name that I realized that it was a common problem for small business webmasters to forget where they had registered their domains. WHOIS my registrar? Why didn't I get an email about renewal? Why did my site stop working today?

People rarely realize how important it is to keep their domain registrar notified of changes to their email address and and other contact information. The registrar will send renewal notifications to the email address last on file. For most domain owners, the only time they think about contacting a registrar is the day they reserve their domain name. If they move to a new city and get a new internet service provider, it doesn't occur to them that the old email address will change and that meeans that the registrar can no longer contact them through the previous address, or phone or fax as each of them change and we rarely notify the controller of our domain of those changes.

Sometimes the first indication a business owner will have that there is a problem is the day their web site stops working. If they failed to notify their domain registrar of changed email address, they may never have received their domain renewal notice. Since many registrars honor a 30 day "redemption period" allowing expired domains to be redeemed, it may be possible to save the registration within 30 days following expiration by contacting registrars during 30 day domain redemption periods.

The following URL leads to the Internet Corporation for Assigned Names and Numbers (AKA ICANN) discussing the grace period and redemption period rules it enforces.

http://www.icann.org/bucharest/redemption-topic.htm

So how does a domain owner find out who their registrar is if they've forgotten? Simple WHOIS inquiries will tell you everything the registrar knows about your domain. Public WHOIS records show the owner's contact email, street address, phone and fax numbers. But that's not all, it also shows the current registrar, DNS servers, the creation and expiration dates of the domain name. Here is how to check your WHOIS data. Type the following into your browser address bar:

http://www.dnsstuff.com/tools/whois.ch?ip=google.com

Replace google.com with your domain name and click go. If you don't, you'll see the following contact information:

Administrative Contact:

DNS Admin (NIC-14290820) Google Inc.

1600 Amphitheatre Parkway

Mountain View CA 94043

US

*********@google.com

+1.6506234000

Fax- +1.6506188571

You'll also see the domain servers, which usually includes the host name like so:

Domain servers in listed order:

NS3.GOOGLE.COM

NS4.GOOGLE.COM

NS1.GOOGLE.COM

NS2.GOOGLE.COM

This normally shows only two servers (Google is bigger than you.)

So now that you are armed with WHOIS data, you can see:


Who the registrar is. (Hence WHOIS)

Who the Domain Administrative, technical contacts are.

Owner names, addresses, emails, phone and fax numbers.

Domain creation, expiration and "last updated" dates.

Domain servers and backup servers.

What do you do if your domain name shows expired and it has stopped working? Do that WHOIS search and contact the listed registrar at their customer support number. They'll ask you to prove who you are by verifying some registration details. If you can't remember access passwords to log in to domain management consoles, they'll often accept faxed copies of your photo ID or a some standard identification proof and reset your username and password to give you access again.

Forgetting to notify your registrar is not the only way to lose control of your domain. There are hundreds of stories of unethical hosting companies, webmasters and even spouses (since divorced) holding domain names in the name of a small business because the domain owner was not web savvy and didn't understand how important that domain name signup day was. Keep your registrar name, your log in username, password and domain management URL permanently recorded somewhere with your most important business papers. Don't allow anyone to register your domain name for you if they don't put YOUR name, email address and phone numbers in "Administrative Contact" position during registration.

Some business owners confuse their web host with their internet service provider and further confuse both with the domain registrar. Since many ISP's offer web space, or hosting, and also provide domain registration through their initial signup package, it's not easy to separate the three distinctly different entities. You needn't host with your internet service provider and they're (almost) never your domain registrar. Keep them separate and completely apart in your mind.

Internet service provider. (AT&T, Verizon, SBC Global.)

Web hosting provider. (Pair Networks, Verio web hosts.)

Domain Registrar. (GoDaddy, Register.com Yahoo Domains.)


When a client recently moved her hosting, she asked me how to make that happen and had no idea how important the details were. We first established a new hosting account, then determined new domain name servers, uploaded her web files. we made sure that account was live with the new web host, then contacted the domain REGISTRAR to change to the new domain servers in a domain management console.

This same client had nearly told her old web host to close her account before we found out that the registrar had her old, previous email address as "Administrative contact" email for her domain name. It took two days to straighten that out and make corrections. Her site would have been down for two days if she had shut down her old hosting account as she had planned before speaking with me. She had a new hosting account set up, but failed to realize the importance of the registrar change to DNS server records in the moving scenario.

We then notified the previous host of the change, only AFTER the domain was resolving to the new host so that when the site was turned off at the old host, it was already working at the new host.

Don't be caught by surprise! You can protect your domain name by registering it for the maximum time of ten years and extend it every year to that final, tenth year, rather than waiting for it to near expiration. This will prevent you losing control of the name, but shouldn't mean you can forget your registrar login details or renewal date. How likely is it that you will move, or at least change internet service providers within that ten years? Be sure to keep your registrar apprised of new email, street address, phone numbers at all times! Especially that all important Administrative contact email. "WHOIS" your domain registrar? Do you have domain name management console login details? Have you extended your registration to ten years? Your business is worth careful domain name management.

Copyright August 31, 2006 Mike Banks Valentine

Friends Link : Buy Discount Home Design Software | LOWER Prices