Tuesday, November 30, 2010

The importance of a DNS server addresses

DNS stands for Domain Name System. This is the entire system of web sites that allows the name to something like site.com web browser and easy to find. DNS Server on any computer or Web server running the software that allows access to, and an IP ( Internet Protocol). There are the main DNS server that contains all the DNS information and IP. These constitute the highest level of the system, while lowerBranching levels and should include all Internet service provider servers and server farms are used by large companies, all different DNS addresses and IP addresses.

If you want a domain name for the site, I really do not know any of this information. You do not know what a DNS address, which is the IP address of your computer, or other similar situations. But understanding how it works can help you if you have technicalproblems. Well, you have some understanding of what a technician can tell when troubleshooting.

Understand, in general, as the DNS addresses of work can also help solve your home computer. Sometimes the browser will refuse to specific websites or on websites and is a problem of DNS address in your system. Your browser is actually working and what is known as a DNS resolver or DNS client when you use itsurf the Internet. You send a request to the server owned by your Internet service provider to bring to a particular site and the provider sends the information to you.

If your ISP is not directly related to the site you are trying to reach a site hosted somewhere else, then it is a DNS resolver, which sends the request to another server for reporting information. When the information in your browser the words such as site.com,It seems that the numeric IP address of the site and make requests based on that number.

The site is created with your domain name, IP address, DNS servers and clients that allow users to view the site. If you're browsing and you are having trouble taking on some sites, the Internet service provider can help you giving the IP addresses of DNS servers, so you can verify that your browser is configuredgood.

The DNS name is basically the name you type to get a website. The DNS system uses this name as possible, so you do not have to type the website of the IP to access each track. 'S one of those little things that you do not really need to know, but that makes it possible for people who use the Internet without any technical knowledge.

Tags : Fabulous Super Store Blu Ray Disks

Monday, November 29, 2010

What happens when the DNS cache is poisoned

Within each IT organization structure, there are usually one or more domain name server, depending on the size of the organization. 'S target server that will address the translation of a domain name of an order for IP to communicate with resources on the Internet. Since every domain name and IP address is unique in nature, no two alike, provided they are connected to the Internet. If a server method to improve the efficiency of the DNS, each with a caching translated information. The principle applied is that if a user is assigned a domain name, it is likely the possibility that he will visit the site again in the future. Therefore, the cache is to speed things up immediately in the translation, instead of repeating.

When the software is a DNS error or server is not well managed and left vulnerable to malicious attacks, the risk of DNS cache poisoning. This means thatServer> can return an IP address does not match the actual possession of the domain name. As such, when a user in a domain name, he is redirected to another domain or is left with a message that the server can not be found. This is due to glitch IP address. If an organization is supported by a number of DNS servers in a parent-child relationship, a parent allows his child server compromised servers in danger.

More often than not, the objective ofcache poisoning is to provide users with an updated website to lead to a counterfeit version. Some attackers can get to the point of recreation near exact replica of the real version to trick unsuspecting users. Once sensitive and confidential information is captured, users abandoned their bank account or credit card abuse. Other forms of fraud, the incentive for the user to export the virus or worm or a computer to download to your computersystems. Once you penetrate the corporate firewall security, these applications annoying then wreck havoc within the organization.

Once DNS cache poisoning has been found, close to mitigating must be taken immediately. Since most of the unauthorized access through unlocked back doors, is of the utmost necessity to continually update their computer system on the client and the server level. Trust relationships defined between the servers should be strengthenedto eliminate the spread of fires. Even if the random source port for the use of encryption is an excellent method of prevention and their effectiveness may be reduced due to the operation of other devices in connection with Network Address Translation. Emptying the cache of a domain name server is also a way to get rid of bad DNS entries.

See Also : Linux Server Handbook Store Save! Acer Aspire One AOD150-1920 Store Can Liners

Sunday, November 28, 2010

How to prevent pharming attacks, and DNS

I had the "privilege" of seeing a scary exploit the other night .....

Basically it was a variation on the idea of 'pharming', where a hacker tries to redirect traffic to another site legitimate, fraudulent, the website - the most common use of this exploit is to redirect traffic destined on-line financial site to collect user names, passwords and security credentials. There are a number of ways in which this type of attack can be executed.

The first,and simplest method is to compromise the hosts file on your PC. The hosts file is a remnant of the ARPANET, the precursor of the Internet that do not have a system of domain names to resolve network names. Instead, each node has its own administration of the other nodes that needs to know and that is what is included in the hosts file. An entry in the hosts file overrides the need to address using the Domain Name System.

To make an attackattacker to modify the hosts file, something that can be achieved by inducing users to download a small piece of malware on your computer - This malware can then modify the hosts file with the name of the site they wanted and directed false IP address they wanted to fold at.

The second way to run a pharming attack using a technique called DNS cache poisoning - this is where the attacker to compromise a DNS server, exploiting a bugThe DNS server software and make sure that the DNS server information to accept false. By the DNS server will also be an incorrect IP address for a particular name, and users to the website of the attacker's site.

The third method, the malicious code back to the router's DNS settings you a home, this is called a "drive by" pharming attack. If you look at the configuration of the router somewhere in the houseconfiguration is usually references to primary and secondary DNS server - these parameters are usually set according to what your ISP, but even if your ISP has provided the configuration, you can change these settings.

In this attack, the hacker changes the DNS settings so that any attempt to resolve names not be sent to the DNS server of the ISP, but to a DNS server controlled by hackers. Thus, the attacker is ableto provide all the address you choose and redirect traffic to another server under his control. So an attempt to) access to the site Natwest (www.natwest.com may involve the user is redirected to a fake server provides Web pages that superficially resemble the real site - which allows the attacker to collect the testimonies of online banking.

This attack the user should be prompted to download some malware on their PC - either via built-in JavaScripte-mail or a Web site compromise. In many cases also require a username and password for administration of the router at home, even if many users are not the standard speed and a session with a search engine usually reveal the user name and password by default for most popular home routers . Alarmingly, there are a number of home routers out there that allow the user / password validation for administrative access can be bypassed.

So, what can you do to protect yourself - heresome simple tips.

The site in the browser look real? If something sensitive like online banking site is the use of HTTPS (the lock symbol appears on most browsers).

If your site uses HTTPS, a certificate warning? If you have a certificate warning you should never go.

The site seems to be asking for too much information? Most financial institutions have an online user name, password and memorable pieces ofinformation. If the site has been connected you want to record the information at once, is not the genuine article. Similarly, if the site you're connected, you can request a password when you would normally complete the specified characters from a drop down list or click buttons on a keyboard on the screen to select, not the real article.

Change the default administrative user name / password on the router at home.

Good luck - and staySafe.

Friends Link : Vulnerability Security Spark Energy Corrugated Plastic

Saturday, November 27, 2010

Understand your home network

A home network is a very complex issue. Taking information from one place to another, which might not eve on the same continent is a pretty big deal. This article will not go into too much technical jargon, but it will be an in-depth answer to the general (and some complex) questions about networking, especially wireless networks. We see the most fundamental aspects of a wireless network in a question / answer format.

How does the signal get my computer to myrouter, Internet, and vice versa?

When a computer user is connected to the Internet are almost constantly sending signals to multiple locations. The way this is done from binary code. Any user is not divided and transmitted in binary code (in this case, wireless) to the router and then to the destination that you gave. In the case of a wireless connection, the card is sent to the wireless router using a protocol called CSMA / CA (CarrierSense Multiple Access with Collision Avoidance) that allows only one node (or computer) access to the router at once. If a computer uses the router and a second computer may also use the second system is sent a "busy signal" and must wait a certain period of time. When time expires, the request of the computer. For reference, a cable connection using CSMA / CD (Carrier Sense Multiple Access with Collision Detection), which allows the computer to sense whenanother node is using the router. In this way the request is sent in the first place.

This, of course, makes more sense, but it is not possible with a wireless connection, since there is no permanent connection to the router. Connections involving stops when the request is met, unlike the cable connection that is always the cable. The router is now based on the OSI 7-layer model (which is too large and sophisticated to fit in this article, but Google can andfriend) host.Basically to receive information to and from the destination, the router (which by the argument will run as a DNS server in this scenario) is the IP address assigned by Google and launches its request Google for their web server . The link is at the door 80 for accessing a Web page and then processed by a web server for Google. The signal is sent in the same way it was sent from the computer. When it comes toback, the user sees on the display of Google. This process is done very quickly if you see sometimes a matter of less than one second. If you live in the U.S. and the Web server in China (again, just for the sake of argument), the speed with which this happens is quite impressive to the uninitiated. This is a brief description of how the process works.

What protection is available for wireless networks?

There are some optionswireless encryption. Encryption is very useful because it helps to get people out of your wireless network, if they should not. This is basically a password protection for the connection. Some of the most popular choices are:

WEP (Wired Equivalent Privacy)

WEP uses a 128-bit encryption system using a series of 26 hexadecimal (base 16) characters. 256-bit is available, but historically it is quite unusual. This encryption method is a bit 'datedbut it is still used by some. This is replaced by safer WAP and WAP2 discussed below. The way in which a computer is checked by receiving a clear challenge to the router for encryption and the challenge of delivery.

WPA and WPA2 (Wi-Fi Protected Access)

WPA2 is preferred by many because it is probably the safest available for home users. A 256-bit key used to encrypt all network traffic. There are two types of WPA, TKIP and PSK. Let usdiscuss this a bit ':

TKIP

Temporal Key Integrity Protocol (TKIP) was designed originally designed to replace WEP WEP without replacing the hardware. The repaired many of the flaws of WEP, but has had its problems, including the ability to be decoded by others in short bursts. This was a problem with the WEP, which is passed, TKIP.

PSK

Pre-Shared Key mode (PSK) is designed for those who do not need sophisticated security, such as home users. A number of minorCompanies use this as well. It offers a password-protected security is in decent though not as strong as a large company can have. Many home users to implement this because of its ease of use. The only real weakness of this protocol that a user at home should be concerned about a weak password. weak passwords are the main reasons that sometimes lose some effectiveness.

Advice on network security

There are some things that the average home user can do to ensuretheir network and your computer from intruders. The network, set a strong password is essential. This should be placed at the top of someone. Second, by hiding the router Service Set Identifier (SSID) works very well. If the hacker can not find the network, can not penetrate the network. What if one of the personal computer, immediately change the Administrator account a different name. Hackers try this account most of the time, in order to gain administrative access onuser. If the user name is still responsible for the potential attacker has won half the battle. The only unknown is the password. However, if the FozzyBear administrator user name or user name or password is known and the attacker has to spend much more time and will probably just give up, even if they manage the network. As a side note, a good anti-virus and firewall are not forgotten. These are vital for information security generally.

If you havequestions, please contact me via my website below and I'll gladly answer.

Friends Link : Memory Module

Friday, November 26, 2010

DNS names like Lost

DNS translates the name of the site in an Internet address. When a user requests a URL you type into your browser and return to the website on the screen, in fact, a DNS server receives a request from a URL and translate it into an IP address, which is the address of the site. Because it is much easier for the human mind to remember a name rather than a long track that is why the use of DNS to translate the site name to an IP address from an Internet actuallyunderstand and be able to deal with.

DNS can answer three types of queries that a user can do to a DNS server recursive, iterative, and inverse. The principal of a DNS server can server a resolution system (which would normally call a customer / user) or a different DNS.

DNS names like Lost?

1. The DNS resolver sends a recursive query to the local DNS server asking for IP address of the requested site.The local name server is responsible for name resolution and can not refer the resolver to another name server.

2. The local name server to check the areas and found no areas corresponding to the requested domain name.

3. The root name server is authoritative for the root domain and responds with the IP address of a name server. Com TLD.

4. The local name server sends an iterative query for the name of the siteL '. com name server.

5. L '. Com name server responds with the Internet address of the nameserver maintenance of the domain name requested.

6. Then the local name server sends an iterative query to the site on name server.

7. name server of the site meets the Internet is the name of the site.

8. The local name server sends the IP address of the site's name back to the original requestedresolver.

Thanks To : Standard Error Formula Blu Ray Disks

Thursday, November 25, 2010

The speed of the computer by changing the DNS settings

The DNS server at your Internet Service Provider does not give you what you need to use to connect to the Internet. DNS stands for Domain Name Server. In reality it is a machine on the Internet that translates the website that you type into your browser address IP of the server where the Web is actually located. DNS server can be problematic and should be continuously monitored and maintained. If the DNS you are using is bad orproblem, you may have problems with certain websites, while the load of other purposes. Another problem may be that the DNS is hard, so your internet connection slower than usual. So if you try to access certain Web pages in case of problems with pages not loading, change the DNS settings and see if that solves the problem.

Change DNS settings on the router

Changing the DNS settings may be useful to you, soIt will apply to any computer on the network. Each page of the router's configuration is different, so you may need to lock your router documentation to find the DNS settings and change these settings. First you need to access the router through your web browser. If you do not know how to do this, just do a Google search on "login to the router via a Web browser." It 'important that you write down your current DNS numbers, so if you have problems, you can returnthe old settings.

Follow these steps:

1. Log in to your router
2. Find your DNS settings
3. These settings for the following

Public DNS server

Google DNS

8.8.8.8

8.8.4.4

OpenDNS

208.67.222.222

208.67.220.220

DNS Advantage

156.154.70.1

156.154.71.1

Every one of those DNS servers. OpenDNS is a service that gives you morefeatures such as sites for monitoring and control. These are all free, so do not worry about getting the cost for its use. Try to experiment and see what works for your computer.

Related : Space Gravity

Wednesday, November 24, 2010

Finding the MAC address on wired and wireless network cards

The response of the Media Access Control Question

In recent weeks I have a lot 'of e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC). I think the main reason that I have received many questions about Ethernet cards, and MAC addresses is people trying to own wireless home networks and their desire to use the MAC address filtering to secure. This type of filter in wireless networks can be configured toAllow or deny use of specific computers or connect to the wireless network based on the MAC.

My first thought was that of a single article on wireless Ethernet MAC addresses and write. After thinking, I decided to expand on this and to move some specific information about Ethernet cards and communication.

Different ways to find your MAC address and much more

There are several ways to Ethernet protocol and communication and information. Many Ethernet cardmanufacturer's proprietary software that can reveal this information, but behave differently depending on the manufacturer. So we'll use the Windows 2000 and XP "ipconfig" utility since this is available in most Windows operating systems.

First, go to "Start" -> "Run" and type "cmd" without quotes. Then press the Enter key. At the command prompt type "ipconfig / all", again without the quotes. In fact, just typing ipconfig without the '/ all will work, but it will onlyprovide summary information of network adapters. An example of what one might see by typing "ipconfig / all" command is below each said in green:

Fault Tolerant and High Availability Computer Systems

There are several ways to Ethernet protocol and communication and information. Many software vendors Ethernet card owners who can reveal this information, but behave differently depending on themanufacturer. So we'll use the Windows 2000 and XP "ipconfig" utility since this is available in most Windows operating systems.

First, go to "Start" -> "Run" and type "cmd" without quotes. Then press the Enter key. At the command prompt type "ipconfig / all", again without the quotes. In fact, just typing ipconfig without the '/ all will work, but provide only summary information of network adapters. An example of what one might see by typing"Ipconfig / all" command is as follows:

Output of "ipconfig / all" command

Windows IP Configuration

Host Name. . . . . . . . . . . . : Home Computer

This is the name of the computer, usually defined during the installation of Windows. However, it can be changed after installation.

Primary DNS Suffix.. . . . . . : Domain.com

If your computer has an active network, such as a Microsoft Windows domain this entry may contain the name ofdomain.

Node Type. . . . . . . . . . . . : Unknown

The node type can say unknown, or peer-to-peer, or in some cases "hybrid". It is an institution that has to do with Windows Internet Naming Services used in certain types of Windows domain networks.

IP Routing Enabled. . . . . . . . : No

This setting determines whether Windows XP or 2000 functions as an IP router. If you have two or more network cards you can configure the system to act as a router, forwarding communicationsrequests from one network to another. Windows 2000 can be configured to do this in a nice straight forward, Windows XP will need a change in the registry.

WINS Proxy Enabled. . . . . . . . : No

WINS Proxy is another institution that is linked to the "Node Type" we discussed earlier. It is not normally a required setting in a home or small office or the newer type of Microsoft Windows domains.

Ethernet adapter Wireless Network Connection 2:

If youover Ethernet (network) cards in your system, if I were in this laptop, you will have multiple listings. This is the second Ethernet card, a wireless Ethernet card inside.

Description. . . . . . . . . . . : Broadcom 802.11b / g WLAN

This is the description of the Ethernet card, usually the name / manufacturer and type of Ethernet card. In this case it is a Broadcom wireless Ethernet card built into my laptop.

Physical Address. . . . . . . . . :00-90-4B-F1-6E-4A

And here we have the MAC address. The MAC address is a 48-bit hexadecimal code and is suppose to be a completely unique address. It is 48 bits because each number or letter in hexadecimal represents 8 bits. Hexadecimal numbers range from 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, F. There are 6 alpha-numeric codes is 6 * 8 = 48 (bit). The first 3 codes identify the manufacturer of the card and the other codes are used to create a unique number. Theoretically there should never be acard with the same MAC address of a local network. However, there are some exceptions. There are software tools that allow you to change this code. In reality, this is a step some hackers take to attack other machines on a local network. I speak the local network because MAC addresses are not routable between network segments. By spoofing this address, you can impersonate another machine on the network. Traffic that was bound for the objective may be redirected to the hacker's computer. This isthe address is also possible to use a physical address or MAC address table before setting up wireless access point to support MAC address filtering to people.

DHCP enabled. . . . . . . . . . . : Yes

DHCP or Dynamic Host Control Protocol, if enabled means your computers IP address provided by a DHCP server on the network. The DHCP server can cable wireless access point / router DSL, cable modem or a network server. Although aDHCP server is enabled on the network, the computer operating system will automatically generate a random IP address within a predefined interval. This means you could network a group of interconnected, without having to manually assign the IP settings.

IP address. . . . . . . . . . . . : 192.168.0.117

This parameter allows your current IP address. The address above is what is called a "private" addresses. There are several classes of IP addressesare reserved for private use. This means that for the internal network, local or private home or office. Such addresses are not, or not, are routable on the Internet. The Internet routes called "valid" IP addresses. The cable / DSL router or cable modem has a valid IP address assigned to the "outside" of the network. The external interface of the phone or cable TV cable.

Subnet Mask. . . . . . . . . . . : 255.255.255.0

Subnet Mask is aspecial issue, or in a sense, the filter, which breaks your IP address, in this case a private IP address in certain areas. IP addresses and subnet mask can be a complicated issue and would require an entire article to be about.

Default Gateway. . . . . . . . . : 192.168.0.254

The default gateway IP addresses of the above, the IP address of the device that will route your request, such as when you try to browse a website on the Internet. It 's a bit complicatedthan that, but as a gateway or router traffic to different networks, the other private networks. At home or small office, this gateway most likely is your cable modem / DSL or router.

DHCP Server ... . . . . . . . . : 192.168.0.49

The DHCP server, remember we talked a bit 'above, the device indicates that the computer has an IP address and other information. DHCP server can assign all kinds of information, including: StandardGateway, DNS (Domain Name), IP address, Subnet Mask, Time Server, and more.

DNS Server ... . . . . . . . . : 192.168.0.49, 64.105.197.58

The DNS servers are internal or external, to fully resolve the names (FQDN), such as http://www.defendingthenet.com full domain of IP addresses. This is because computers are not really about your request using the domain, use the IP address assigned to the FQDN. For mosthome or small office, DNS server IP address from your primary Cable / DSL Router. The Cable / DSL Router to ask an external DNS server on the Internet to perform address the effective resolution of the FQDN to IP. The address 192.168.0.49 is an internal private device on my network that 64.105.197.58 is an external public Internet DNS server and is available in case my router has difficulty performing the DNSResolution tasks.

Lease obtained. . . . . . . . . . : Sunday, March 19, 2006 18:38:16

This information tells you when the computer received its IP address and other information from a DHCP server. You will notice that says "Lease obtained", it is because most of the DHCP server just give the IP address lease from a pool of addresses available. For example, the pool may be 192.168.1.1 through 192.168.1.50. So your DHCP server has 50 IP addresses to choose from whenassigning the IP address of your computer.

Lease expires. . . . . . . . . . : Wednesday, March 29, 2006 21:38:16

If the IP address assigned by the DHCP server will attempt to lease expiring lease is the same or a different IP address. This can usually be changed on the DHCP server. For example, on some fully functional DHCP server, you can never rent due within one day and so on.

Why are so MAC addressesImportant and how they work

To jump back into the MAC address for just a bit '. You might think that IP addresses are the most important thing when it comes to network communication. The reality is, MAC addresses are very important because without them computers would not be able to communicate over Ethernet networks. When a computer wants to talk to another computer on a local network, broadcasts a query, or ask a question, who owns a particular IP address. For example,The computer can say, "Who is 192.168.0.254". Using the information above, my default gateway is 192.168.0.254 and say "I am" 00-90-4B-F1-6E-4A "192.168.0.254". You send the MAC address. That the MAC address then in what is called a (ARP) Address Resolution Protocol table on your computer. You can use this information to the command prompt like you did above and typing "arp-a". You can obtain information such as the following:

Internet Address Physical AddressType

192.168.0.49 00-12-17-5C-A2-27 dynamic

192.168.0.109 00-12-17-5C-A2-27 dynamic

192.168.0.112 00-0C-76-93-94-b2 dynamic

192.168.0.254 00-0E-2E-2e-15-61 dynamic

How can a hacker use MAC addresses in an attack

You will notice that the IP addresses and the right of their MAC addresses. Without this information, without the MAC address, it would not be reading this right now. MAC addresses are not routable, such as IP addresses. They work on localor private network. However, the devices on the Internet, to perform the same tasks. Routers and switches keep a list of their colleagues MAC address devices such as computers and devices on your home or office network. I mentioned that MAC addresses can be modified to meet demand. For example, if I'm on your corporate network and you had an internal Web server that took personal information as input, I could tell the computer to my laptop for the websitebroadcasting my MAC address with the real web server IP address. I would do if the computer asks, "Who is the" Real Web Server ". I could set up a fake web server that looks just like the real thing, and start gathering information that the real web servers normally collect. You can see how it can be dangerous.

Conclusion

There are many other simple ways to protect your MAC address, but can be a bit 'of confusion if you have more than oneinternal network. Most external USB or PCMCIA wired and wireless Ethernet cards have their MAC address printed on them. Where the wired or wireless network adapter in your computer, such as in laptops, the MAC address is sometimes printed on the bottom of the laptop. Even Desktop systems cards that are inserted in PCI slots have the MAC address printed on the Ethernet card.

You can print or publish this article free of charge as long as the bylines areincluded.

Original URL (the web version of this article)

http://www.defendingthenet.com/NewsLetters/FindingYourMACAddressOnWiredAndWirelessNetworkCards.htm

Friends Link : Network Tools Store. LOWER Prices

Tuesday, November 23, 2010

Learning to control and your IP address in Windows Vista Change

- Check whether an IP address in Windows Vista:

1. Start Windows Vista and draw on their own. If you are the only user of the computer then the computer will immediately charge your account and will probably have to look at your system administrator or change an IP address.
2. Test to make sure you have an active Internet connection to it. You can use an IP address using Windows Vista not occur without accessInternet.
3. Go to one of the tools available online that can identify the current IP of your computer. Once the site loads, you probably automatically display your current IP address.
4. Your IP manually, working with Windows Vista Network and Sharing Center. Just click on "Start" then "Control Panel" and double-click on the link "Manage network connections".
5. Click the network adapter. You'll definitely see that Windows Vista will automatically set to "Assign an IP address. "
6. Just click on "Use the following IP settings." That will allow you to configure settings for your specific needs.
7. Nature in all the IP information, including IP, Subnet Mask and Default Gateway. system administrator and / or network will have this information.
8. Just click on "OK" once you've done.
9. Groped to return to the online tool we have to verifyThe changes have been implemented. Otherwise, you are likely to view the dynamic IP address (mainly the changes) or the online tool will not load.

- Change your IP and TCP configuration on Windows Vista:

1. Go to Control Panel from the Start menu.
2. Click on "Network and Internet" and then "Network and Sharing Center".
3. Click on "Manage network connections."
4. Choose whichThe Internet is likely that you'd like to change if you have more than one. Right-click and choose Properties.
5. Click the network tab.
6th. Select Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol version 6 (TCP/IPv6).
7. Click on "Obtain an IP address automatically" to completely restore your IP automatically, then click OK.
8. Click Use the following IP address "to make its own IPinstitutions.
9. Enter your IP in the boxes marked "IP Address", "Subnet Mask" (or "subnet prefix length for IP/TCPv6) and Default Gateway. "

- Change the configuration of your DNS server:

1. Click on "Obtain DNS server address automatically" and then click OK.
2. Click "Use the following DNS server addresses" for the configurations manually change your DNS server.
3. Typeyour primary DNS server address in the "Preferred DNS Server".
4. Enter your secondary DNS server address in the "Alternate DNS server".

- Adding a new network protocol:

1. Click on "Properties" and then "Install" from "Manage network connections."
2. Click on "Customer", "service" or "protocol" based on where you want to add. Click'Add'.
3. Select the item you want to record the dialogue and click OK.

Related : Inspection Mirror Printers Store. LOWER Prices in The Same Item, Let Buy Cheap Speaker Systems | LOWER Prices

Monday, November 22, 2010

How to make your home computer network routers can be configured to help fight malware in 3 Easy Steps

We all have things we like. Often it is something we want to do or get. For some people it is something you would like to have or to have. Sometimes people seek to learn how to make someone or something. Maybe you want to protect your family from the dangers of online pornography and adult websites including, for example. Many people want. The fact is that, if you know what, that's not really difficult. To protect your family from the dangers of online pornographydestructive and other online threats by configuring the router home computer in three easy steps, this article will help you so.

To find the way to your router to OpenDNS's "Family Filter", used to combat malware to help in 3 easy steps, simply set up to find out more.

Step 1 - Open the configuration settings for the router at home.

The preferences you set in your Web browser, a URL with numbers (eg 192.168.0.1). This IP address is also knownas "default gateway", which is the first router you need to pass on the way to the Internet. Login here and enter your password .. The reason we have to do the domain name server (DNS server) that the computer to connect online to have a direct impact on the quality of your experience online .. You want to avoid this step for fear of messing up connection on-line or quality of service with your Internet Service Provider. Not to worry. Millions of peopleworldwide, including Fortune 500 companies, businesses of all sizes, schools, governments, libraries, and a growing number of home users have made the switch.

It will be very important to finish this first step with care, operate fully, efficiently and well. Failure to follow this first step will result in not being able to enjoy the benefits of OpenDNS's "Family Filter".

Step 2 - Add the OpenDNS DNS server to your list.

Analysis for 'letters DNS next to a field that the numbers two or three sets of numbers, each divided into four groups of 1-3. It would be as follows: 68.64.229.28 68.64.229.29 and the like. Be careful to avoid looking in the wrong part of the configuration settings and to obtain quickly, without double check in this position.

Step 3 - Enter the addresses of the OpenDNS servers as the DNS server settings.

The first DNSServer you want to get in is 208.67.222.123. The second DNS server that you put in 208.67.220.123. Click "Save" or "Apply". The main reason that this will be significant is that without this last step of your router searches the domain name are directed to the appropriate servers. If you configure this error, you may not be able to access the Internet at all until this is corrected.

What will be important to avoid getting in a hurry. Makerelax, and check your work. If an error occurs, start again with step 1, step 2, then Step 3, checking your work as you go. After considering a couple of times, it will become easier. Follow the above tips and you have little or no problems.

Then you configure the router network computer malware in 3 easy steps successfully and well, with the convenience and speed. And you can enjoy any advantage over the lineprotecting your family from online pornography and other malicious threats.

Related : Frequent Urination Causes Buy Chill Store

Sunday, November 21, 2010

Slow Why is YouTube? Information on how to fix If your YouTube is running slow

Many frustrated users addicted to video streaming this question. Although the abrupt deceleration of the giant video site occurs sometimes at the user side, people are clueless as to the cause of this problem. It is understood no body wants to wait long for the video to load and then watch them especially when the videos are longer and in different areas. Faster streaming is the need for any Internet user. If YouTube is slow at times there are certainly a number of reasons behindthat. Most people are not sure what to do in this situation and make the videos load faster on YouTube.

Before sharing the guidelines to address the reduction of speed, I would like to invite you to think about the reasons for the failures of YouTube, as the slow streaming, flash crashing into YouTube videos to YouTube and other errors. There are two main reasons for these annoyances. One is the problem with the speed of the end user's computer, the speed of the Internet, Windows PC errors, computer containsprograms like Flash matters of conflict, while the second reason may be caused by the server or external internet traffic load. Although the site is very effective in keeping you see some problems sometimes. This is not a serious problem because we all have confidence in the services of such a website user-friendly. The problem becomes serious when the errors and low bit rate video is routine. This should be something to do with the personal computer.

Here I amwhere a couple of tips that will help to speed up YouTube for you:

* Check to repair the Windows registry and fixing Windows errors are the cause of many browsers and application errors cause a conflict.
* Test your computer for viruses and spyware.
* Run speed test to see if you have enough bandwidth to play YouTube videos easily without the site to run slowly.
* Make your Internet and reconnectknow why YouTube is slow and if it is because of poor internet on your side.
* I Turn to some of the browser plug-in that allows you to reduce the services to run in the background while you play online video.
* Try to change your version of Flash Player. While YouTube has begun streaming video through a new technology, there is still a large number of web sites using the Flash platform. So it's a good idea to try to change the version of Flash Player to playvideo without crashing and error messages.
* Test your browser. A good browser to play videos from YouTube, Google Chrome. If you have not tried to go for it. Also check with your ISP if you restrict your bandwidth to the specific terms of the day.
* The study recommends the following procedure if your YouTube is slow due to DNS-related settings:

Click Start> Settings> Control Panel> Network Connections> LAN / Your standard InternetConnection> Properties> Internet Protocol TCP / IP> Properties, uncheck "Use the following DNS server addresses" and use this address: Preferred DNS server: 208.67.222.222 Alternate DNS server: 208.67.222.220

Tags : Playstation 3 Console Store Portable Oxygen Concentrator

Saturday, November 20, 2010

How to fix DNS problems in three easy steps

Troubleshooting DNS problems is a common challenge for web developers who just may have been exposed to challenges with the code and database. If you set up domains on a dedicated server or VPS for the first time and the challenges of the following will help.

1) The name servers are set up on a domain registrar. To see what nameservers are set to control a betterwhois.com domain (or any other service whois). For example, the domaindomain.info return nameservers DNS1 and dns2.stabletransit.net of Rackspace.

2) The correct name of the DNS server entries must be created. "One Voice", which is usually set for a host name, fields such as name and IP. An example is 174.143.155.XX subdomain.domain.info as the name and IP. IP is IP. You can trouble shoot using: zoneedit.com / lookup.html (If you use Linux you can also use the command nslookup).

Name ServerEntries are submitted with the name of the server. In the case of some web hosting companies as iweb.ca the name of the server is hosted on the same server as a Web server so that when an account is created in WHM DNS entries are set automatically. In the case of DNS Rackspace is housed separately so we have to manually set a DNS server entry in their name. To avoid the creation of many items for each subdomain, asabc.domain.info, def.lbclients.info and so on, a wildcard entry can be set to domain.info. Then each subdomain will point to the IP of choice (such as VPS).

To reiterate, when you type in your car subdomain.domain.info first to find the nameserver for domain.info, check the hostname of the nameserver IP from the server, and now the final step: as a folder on the server that will server-user point ofa?

3) In the case of a Linux Web server, the httpd.conf file (in / etc / httpd / conf) tells the web server on the server where the web site can be found. This file contains a series of "virtual hosts". It is called virtual because many hosts can be assigned to the same IP (so long ago this was not possible in Web server software, but each required a separate IP host name). Each virtual host directive will tell the web server where to uploadfile for a particular host name (server name or alias).

This virtual host directives are automatically created when you create an account in WHM, adding a parked or add-on domain. You can turn this mess shows the httpd.conf file via SSH (pico / etc / httpd / httpd.conf) and find the server name or alias.

Conclusion: If the file in a folder does not appear when you access your domain is very likely that there is a problem in one ofthe three phases. In this case, simply use the troubleshooting options as described above.

My Links : Blu-Ray Movies Store Memory Module

Friday, November 19, 2010

Websites - for absolute beginners

Chances are, if you read this, you're thinking about building your website from a template or a web site do-it-yourself or any other similar site.

Well, if you're an experienced web designer and programmer, the knowledge and tools available, and know the inner workings of how the Internet with websites, email and server, so do not bother reading this. Good on you and practice!

If you're like the rest of us who were not born with a mousein our hands, and never had any training (less formal), in technology, but perhaps smart enough to figure it out eventually, but only have a website for your company or organization, then read on.

It seems that long ... but believe me - This is for your own good.

What you should have.

Domain Name

A domain name is your address in the virtual world called the Internet. But the fact is that never get to own. It's always rent. If you do not pay the rent in time, there is no grace period. That name is now fair game, and someone else can take. The process of payment of this "rent" your domain name is called innovation.

Think like Google not to renew their domain name and someone else took it. Google no more. So you must remember to renew or someone you love and remember. Keep in mind that this rent just to rent the address and the address is mobile. Can be moved from server hosting hosting> Server.

This brings me to my next point.

Server Hosting

This server can be compared to an apartment complex. And like all the condos, you have to pay the rent for an apartment. In this building there is a list of port addresses or domain names. For each of these addresses is considered an apartment where a site is hosted. And like I said, you have to pay the rent for the apartment.

What ifwebsite?

Also on the Internet, type the address just heard was "under construction"? This is the server that hosts it says "Yes, okay, but not ready to fall again." Why do I say "down"? Because this is basically what happens. The website is hosted by the server, and back to your computer before you even get to see. You never actually get to enter the hosting server. Unless you're a cracker Course, which brings the issue of security. Make sure your website in the apartment buzzer, guard and steel fence, and not just an open door.

But the real question is: can a domain name, a website and a computer that hosts and which are not yet functional. No one knows how to reach you. Unless you have registered your domain name or the address of a Domain Name Server.

DNS Domain Name Server

Domain Name> Server is a computer that is basically a taxi that had a big huge book full of addresses or domains. Someone tell the driver where they want to go. He looks at his book and brings them to the server hosting the website they are looking for is located. They get to the website, take it "home" on your computer only to find a book.

Website

All books have pages. It would be a page of a book. Both the Home Page and will coverthe index. And the index, the list of chapters, such as about us, products / services, and contacts. And, as some books, each chapter has its own nationals. Take for example the products. Let's say you flip on the product page in the book. There's the product page of materials listed as hammers, nails, wood, etc. And each topic can have its own page, you can flip the description of the theme. Of all the parties may be right onProducts page. And like most books, the pages of text and photos. All of these pages. And as such, this is what a website.

The only difference is that it is electronic. U instead of turning over pages, text and moving images and, at times. Keep in mind, if you are trying to use a template, you get a box. Not a book. A box full of text and photos. This is important to know when you'll see a little '.

This is what you really needTo get your site found and displayed on the Internet. The website should have rented a place, and must have a specified address. And before you can view a list, you must address to register with the recruitment of good and secure it before someone else. By the way, look at this description is not e-mail. This is a different story.

Yes, you have to have a website:

1. Domain Name
2. Server Hosting
3. DNS Server
4. Website.

But what you need?

What you need to have.

Email Servers

Think of a mail server like a room with a bunch of mailboxes. Now that the room is a completely different building itself as a post office. Or it could be a space on the server that hosts the mailboxes as the lower floor of a building as you walk in the door.

However, mailboxes are not included inWeb site hosting or domain name servers, you get paid. Sometimes it's free. Sometimes it is extra. However, this is all a mail server is a place where mail can be picked up or shipped. If your web site address in that apartment building [http://www.you.com] you@you.com mail is addressed to you in your apartment and website will be delivered to the mailbox or post office down. If your email program will pick upand deliver to you.

Remember, the mail server is simply a box. 'S useless, unless someone picks up the mail you want to make or deliver the mail box addressed to you.

Someone a mail program.

E-mail Program

Who usually provides the mail? A postman. This is what a mail program, e-mail, and electronic postman. More specifically, the computer program designed to provide e-mail back and forth from the mail server (mailbox) for e-mailServer (mailbox). Keep in mind that no part of the site.

Site Maintenance

Basically this is the maintenance man in the building. He is responsible for any updates or changes to the comprehensive website. He is also responsible for ensuring that the site remains accessible. This is called uptime. He must act as landlord, and keep track of your holiday! Make sure the cancellation has not expired Domain Name Registration, etc. in order to avoid

E-mailMaintenance

In practice, the boy's maintenance of the website and as a matter of whether the mail is treated in the same location as the site was the same man. But remember, this can also be separated.

Because the tasks are separated. Because he does the works mailboxes, the mail is working, and everyone has an email address that is believed to be an e-mail.

Stat tracking

These reports provide data about how manypeople came to the site, and where they are, where they had left and how long was there is gone. Something like a really curious receptionist at the apartment.

SEO Search Engine Optimization

In principle, this site was built with, someone who can be found on Google, Yahoo, etc. Let one example from the book. Imagine being entered into a library and went to the index book. Remember him? And you were looking for a book in the index but could not find it.The book can be on the shelf with all the other thousands of books, but if it is not listed in the index would have never happened, unless you have the chance to stumble upon it while browsing through the times.

For our purposes, the library and the Internet, the search engine index. You can book on the shelf, but the index unless it is built-friendly will never be included in the index. This is part of what is SEO. Build the website so that it can be absorbedand / or found by the search engine. But it is only the first part.

Library indexes are arranged in alphabetical order. But what if it was organized by popularity? The most popular book, the higher the index goes. This is the other part of SEO. And a website should be designed for optimal performance in search engines, which called Search Engine Optimization.

Now, remember when I said that a model is a profession and not a book? Put your idea here. There are boxeslibrary shelves? Oh no, the boxes in the Library / Internet, but are usually kept in the back and will never be found in the index. The idea?

So, what do you need a website:

1. Server e-mail
2. E-mail program,
3. The maintenance of the site
4. E-mail service
5. Stat tracking,
6. SEO.

What do you want for your website to be successful in reality.

Negotiable Design

A web site should be the design, layout,functions and optimizing the target audience and prospects. If a person is looking for an adventure book, you probably will not even plan to open what looks like a dictionary.

Oriented Product Design

Website should be designed with a particular product if it was assigned an employee of your organization. The difference is that the site is an employee 24 / 7 working to deliver its product to your overall goal.

The three main reasons for having aWebsite:

1. Expected. There are two worlds. The real world and virtual world. As a company, they both have.

2. You must bring the traffic you want, whether it be sales, leads, customers, partners, etc. ..

3. The most important fact. Increases the effectiveness of current marketing. If you stationery, postcards, television commercials, business cards, newspaper ads and so, your website should be all about them. At 08:00 PMWhen your customer your promo, who else is there for them, providing information, their communication sent to you, take orders, sign, give them hours or directions, view pictures, tell them about your rave reviews, etc. ?

Target Oriented Design

Website should be designed for a common purpose based on what you should do. There are only five different types of website goals.

1. Sales. The same website to sell products. that is, onlineshop.

2. Services. The site contains a list of services offered and provide contact information.

3. Leads. The site provides information and generate leads for sellers.

4. PR. The site provides general information about the organization, promotes good works and publish them.

5. Instructional. The website educates ordinary.

Now your website can be a combination of these, but there is always a goal that must prevail.

So make sure that all Have,Necessary, and for the above are expressly included in your website.

I'm sure if you're a first timer and are on a budget you look at the "Build It Yourself" websites similar model to cost about as much for a steak dinner. But not really.

Let's say you wanted to buy a car and the dealer said:! "Great is the gearshift in a car with front pocket We give you the right parts and you can easily build yourself course, musttrain as a mechanic, but this is easy! Oh. You do not have the tools? Well this is extra. "So buy some tools from the man. Only to discover that the tools are not only poor but also not enough to finish the job." Oh. Want a bike? Well this is more. "So you buy the engine. Of course you should be able to install the engine." Oh. Do you want a transmission? Well this is an option. "

She bought the car and, of course, you need to reinstall themselves, using theOf course I'm a trained technician who knows how to use the tools you bought. "Oh. You want a wheel?" You get the idea. By the time you finish you have enough money to purchase a Cadillac paid and you are left at the helm of a breakdown, gas-guzzling, oil burning, primers, held together Yugo / Nash / Pinto with a couple of squirrels under the hood that can get around the block.

In comparison, looking for a professional company that offers a new midsize sedan at the expensesub-compact, with all the above features included. And doing so can be easily added on piece by piece as your organization grows until finally you have a Lamborghini. Did I mention that all you have to do is just turn the key? It would be nice would not?

Tags : Wireless Router Store. LOWER Prices in Same Item JVC Television Intel Core i5 750 2.66GHz Store

Wednesday, November 17, 2010

Multiple IP Hosting

Multiple IP hosting is also known as SEO web hosting is a way to host multiple domains multiple multiple IP or DNS server hosting. It gives one more opportunity to provide links to websites that you would like to build search engine optimization. All hosting packages come standard with unlimited private DNS, multiple IP is assigned by different classes of IP addresses. More IP hosts try to do all the hard work and difficult to do to bring jobs very reliable SEOhosts a great addition to the practices of SEO. Most of these hosting customers understand the most important part of why it is necessary to bring it to the next level and distribution of their domains on an infrastructure that is capable of hosting requirements for each of the hundreds of IP classes start .

Multiple IP hosting is actually the literal form of visual skill in hosting all your marketing efforts, several attempts to Class C IP ranges using multiple name servers.Hosts are the providers of all types of SEO hosting, and server-based solutions for businesses and individuals around the world. And to be the host of multiple sites, you must first be aware that each site has its own identity. To achieve this goal, we need different types or multiple names or addresses to assign an IP address. Host webmasters have their names only on their websites so people can find your websiteeasily and get the site content they want.

Maintaining multiple IP addresses is a task usually reserved for large enterprises and Internet Service Provider (ISP), providing multiple domain names is a simple procedure laid down in moderately guest. Many computers or networks using the DNS for the clients to meet the needs there.

Taking websites to the next level of hosting on a host IP Class C is the best optionfor site owners to get ranked in the network. Server that hosts this IP, you might get the opportunity to maximize the domains to manage a password, this can be comforting in times of need. The robots that are used by search engines to crawl through the Web sites are much more useful to establish ranks with the creation of sites that link to supply your most important. These bots are smart and do not realize that back links are created by you, just from different IP. Using thesemultiple IP addresses for each domain will help you to reconnect with the fundamentals of good SEO it.

With the use of multiple IP hosting you can easily take control of the content, keywords, and methods to help drive traffic to than your main site to take advantage of its benefits.

My Links : Cool Cell Phones Store Save! Driving Reckless

Tuesday, November 16, 2010

Dynamic Configure DHCP on a Cisco CCNA - Part 2

Step 1: The first step is to turn the service on the Cisco router

Router (config) # service dhcp

This command allows the service on Cisco routers and relay features on your router.

To remove the command using the same command without the beginning

Configure the DHCP pool name

Configure the name of the pool and use the following command in global configuration mode:

Router (config) # ip dhcp pool name

This command creates a name forService IP address pool and places you in how to configure the pool, the rapid changes in dhcp-config #.

Configuring the Subnet Mask address pool and the next step is to establish a subnet mask and the address pool you just created. This category includes the valid range of IP addresses that the service will be assigned to DHCP clients:

Router (DHCP-config) # network network-number [mask | prefix-length]

The prefix length indicates the number of bits that comprise the address prefix.The prefix is an alternative way to specify the network mask for the client.

Set the domain name for the customer The customer enters the domain name for a client in that domain.

Router (DHCP-config) # domain domain

Configuring the IP Domain Name System server for the client to client queries DNS server IP when they need to URLs, host names or IP addresses.

Router (DHCP-config) # dns - server address [address2... Address5]

Specifies the IP address of a DNS server available to a customer. A single IP address is necessary, but you can configure up to eight of them.

Configure the default router for the client to the network path and need to know the IP address of the default gateway / default router. The IP address of default router on the same subnet as the DHCP client.

Router (DHCP-config) # default-router address [address2... address8]

Specifies the IP address of a DNS server available to a customer. A single IP address is necessary, but you can configure up to eight of them.

Set the Address Lease Time The default lease time for each IP address assigned by a server days. This is the time that the address location is valid. Changing the value of an IP address:

Router (DHCP-config) # lease {days [hours] [minutes] | infinite}

ConfigureDynamic DHCP on a Cisco router Part 2

For the CCNA, you must have a thorough knowledge of how Dynamic Host Configuration Protocol (DHCP) to configure the IP address information of a Cisco router to serve one or more subnets

DHCP Configuration Example

Router (config) # service dhcp

Router (config) # ip dhcp pool CCNA

Router (DHCP-config) # network 10.1.1.0 255.255.255.0

Router (DHCP-config) # domainCOMMSUPPORT.LOCAL

Router (DHCP-config) # dns - server 10.1.1.1

Router (DHCP-config) # default-router 10.1.1.254

Router (DHCP-config) # lease 5 2 3

The above configuration will be assigned an address in the range of 10.1.1.253 10.1.1.2 and every client, the server will also tell customers that the commsupport.local domain is that the DNS server on the 10.1.1.1 subnet, a known how to use gateway 10.1.1.254and respecting the address for 5 days 2 hours and 3 minutes.

Visit : LASIK Vision Institute Cheap Invisible Shield Store Wireless Headset Save Price! Store

Monday, November 15, 2010

How to make a Windows NTP Network Time Server Configuration

computer synchronization is very important in modern computer networks, precision and time synchronization is critical in many applications, particularly time sensitive operations. Imagine buying an airline seat only to be told at the airport that the ticket was sold twice because it was then purchased a computer that had a slower clock!

Modern computers have internal clocks called Real Time Clock chips (RTC) that provide time and date. Thischips are battery backed so that even during power outages, they can maintain time but personal computers are not designed to be perfect clocks. Their design is optimized for mass production and low cost rather than maintaining accurate time.

For many applications, can be quite adequate, although many of these machines need time to be synchronized with other PCs on a network and the computers are not synchronized with each other problems can arise, such as file sharing networkor, in some environments even fraud!

Microsoft Windows 2000, a time synchronization utility built into the operating system called Windows Time (W32Time.exe) that can be configured to operate as a network server. Microsoft and others recommend that you configure a time server with a hardware source rather that the Internet where there is no authentication.

If you want to configure the Windows Time service to use the internal hardware clock, thenfirst check that w32time is located in the list of system services in the registry to check:

Click Start, Run and type regedit and click OK.

Locate and click the following registry entry:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32Time

We strongly recommend that you back up the registry as serious problems can occur if you modify the registry, the changes to the registry is done at your own risk.

To begin the configuration of ainternal clock, click the following subkey:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParameters

In the right pane, right-click ReliableTimeSource, click Edit.

In the Edit DWORD Value, then type 1 in the Value data box, click OK

Close the Registry Editor

To restart the Windows Time service, Run (or alternatively use the Command Prompt).

Type: net stop w32time & & net start w32time

Then press Enter.

Onlocal reset 'time the computer, type the following on all computers except the time server which must not be synchronized with itself:

w32tm-s

Configuring the Windows Time service to use an external time source, regedit, click Start, Run, and type and then click OK.

Locate the following subkey:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParameters

In the right pane, click Type then click Edit Edit Value, type NTP in the Value data boxbox and click OK.

Now, in the right pane, right-click ReliableTimeSource, click Edit.

In Edit DWORD Value data box, type 0, click OK.

NtpServer right mouse button in the right pane, click Edit.

In Edit Value, type the Domain Name System (DNS), each DNS must be unique.

Now click on OK.

For Windows 2000 Service Pack 4 only the time correction settings to do thisfind:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParameters

In the right pane, right-click MaxAllowedClockErrInSecs, and then click Modify the Edit DWORD Value box, a second time in seconds the maximum difference between the local clock and the time received from the NTP server types should be considered as a valid new time.

Click OK.

To find the polling interval:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParameters

Inthe right pane, right-click the period, and then click Edit.

In Edit DWORD Value data box, type 24 then click OK

Close the Registry Editor

Click Start, then Run and type the following command and press Enter:

Net stop w32time & & net start w32time

the local 'Recovery time computer, type the following on all computers except the time server which must not be synchronized with itself:

Network Time Protocol (NTP) is an Internet protocol used totransfer of accurate time information for the time, so that an exact time can be obtained

For the Network Time Protocol, NTPServer, locate and click:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeTimeProvidersNtpServer

In the right pane, click Enabled, and then click Edit.

In the Edit DWORD Value, type 1 under Value data, click OK.

Now go back and click onon

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeParametersNtpServer

In the right pane, click NtpServer, and then click Edit in the Edit DWORD Value data, type in the right pane, click NtpServer, and then click Edit in the Edit DWORD Value data, type the domain name system ( DNS), each DNS must be unique and need 0x1 to the end of each DNS name otherwise changes will have no effect.

Now click on OK.

Identification andClick on the following

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeTimeProvidersNtpClientSpecialPollInterval

In the right pane, special poll interval right mouse button, click Modify.

In Edit DWORD Value data box, type the number of seconds for each poll, ie 900 to poll every 15 minutes, and then click OK.

To configure the correct settings, found:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32Timeconfig

In the rightRight click MaxPosPhaseCorrection, and change, in the Edit DWORD Value, under Base, click Decimal, under Value data, type a time in seconds as 3600 (one hour) and then click OK.

Now go back and click:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32Timeconfig

In the right pane, right-click MaxNegPhaseCorrection, and then click Change.

In the Edit DWORD Value box, under Base, click Decimal, type in the data value of the time in seconds that you want to poll such as 3600 (polls inhour)

Close the Registry Editor

Now that Windows Time Service, click Start, Run (or alternatively use the Command Prompt) and type reboot:

net stop w32time & & net start w32time

And on any computer other than the time server, type:

W32tm / s

And this is the server which should now be up and running.

Friends Link : Virtual Space

Sunday, November 14, 2010

What is the Google Redirect Virus and What a Hosts file?

Redirect virus redirects the browser to another site, instead of where you wanted.

Many times this is for you to send to a website with advertising to get you to buy something. Other times it can be used to send to a fake online banking site to try to get your account information.

Redirection malware or viruses usually change a file on your computer called the "hosts" file

Before discussing what the hosts file. Isomething to explain how a website with your web browser.

There are some popular web browsers today a number of Internet Explorer, also known as IU Firefox, Google Chrome and Safari. There are more available, but this seems to be the ones I see people who use more.

Before a site has a numeric address like a phone number or address.

So, for example, Google has an address of 208.69.32.231 (the IPaddress) you can type in the address bar of your browser and it would take to Google. The problem is that trying to remember the numbers is much more difficult for humans to use the name.

If you have a website at the request of the computer name first time you watch the hosts file to see if it is listed there, usually there are no entries in the hosts file. If an entry for google.com with an IP address of your computer you can send to that IP address, even if it is not aaddress associated with Google.

If no entry of Google or the website that you want to go to the computer), contact a DNS server (Domain Name to see the numeric address of the site.

It shows that Google = 208.69.32.231, and the computer, the Web site you were looking for which is located at the address.

The virus creates an entry for forwarding to the Google site or a website and add a fake IP address or IP addressbelongs to another website. If you want to go to that site your computer will go to the false / incorrect IP address in the hosts file.

So here it must first scan the computer and determine the hosts file to resolve.

The hosts file can also be used to help protect against bad Web sites. If you have a list of bad websites in the world, you can see in the hosts file and use the IP address 127.0.0.1

The voice soundedthis

badwebsitename 127.0.0.1

Then you or someone using your computer tried to go bad in one of the sites in the host computer file, then the browser an error page that basically says that the page can not be displayed.

So you might ask what is 127.0.0.1 or 127.0.0.1 where there is a simple answer, it is your computer.

It's called loop back address.

Then, because there is no website running on your computer, loop-back address that you get the page can not be displayed error, which is much better than going to a website that viruses or malware on it.

There are sites that maintain a host file with a list of known bad sites. If you replace the hosts file with it, you can protect your system from malware.

There are other types of viruses that can cause a diversion, some may even change the setting to the router and DNS server will send an evil.

Then the "poisoned"> Server DNS forward. So you can guess the problem lies in the computer, but it is also possible that the router has been hit by a virus.

Related : Stainless Steel Tanks

Saturday, November 13, 2010

10 practice questions for Microsoft MCSA Certification Exam - 70-291

Implement, manage and maintain a Server 2003 Network Infrastructure

After studying the text books is important to test your new knowledge and how well they absorbed the material shown. Practice Exams ....

* Reinforces what you've learned - the gaps of what you missed
* Gets you used to answer questions to build confidence and familiarity

Here are 10 multiple choice questions for practice examsto:

______________________________

Question # 1 - You have to return implemented a remote access server for receiving requests from incoming connections. Lately there has been receiving complaints that some compounds have been fired without just cause and connections are very slow. The implementation of a different remote server, but this does not help the situation, even if the number of complaints reduced by 25%.

What should I do?

A. Completed 2S remote server instead of just one

B. Since the reduction of symptoms by 25% with the addition of a remote access server, you need a total of 4 servers on a complaint reduced by 100%

C. Implementing a RADIUS server that takes responsibility for authenticating access to the remote server

D. Implementing IIS server

_____________________

Question # 2 - You are on the SOA (Start of Authority) tab of the DNS server on which you want to configure DNS1The zone transfer to another DNS server DNS2 once every 8 hours. Which of the following will help you transfer you to configure the DNS zone between the two servers?

A. Update Interval
B. Attempts Again
C. Retry Interval
D. Decay

_____________________

Question # 3 - When you press software updates for all clients on the network from a designated server, which of the following Group Policy settings shouldconfigured?

A. Audit Object Access setting
B. Specify the location of the service intranet Microsoft update
C. Give the location of Internet services from Microsoft Update
D. Auto Update Settings

_____________________

Question # 4 - You've just created a number of DNS zones in the network. To the extent that you have a DNS primary and secondary DNS. The response was very smooth and without problems. You want the zone transfer and updates on the network isas smooth after the areas have been created.

What should I do?

A. Make sure all areas are integrated into Active Directory

B. Make sure that all DNS servers running on domain controllers

C. Make sure that all DNS servers running on member servers

D. Avoid the use of areas

_____________________

Question # 5 - You are required to an institution by the previous management, to change the IPSec policy. Which of theHe would later use to manage this?

A. IP Security Monitor Console
B. Microsoft Management Console
C. Network Monitor Tool
D. IPSec Tools

_____________________

Question # 6 - You are required to change certain security based on existing network to be applied. Which of the following would you use to analyze what exists and what needs to be applied?

A. Microsoft Baseline Security Analyzer
B. IP Security MonitorConsole
C. Network Monitor
D. basic setting up Group Policy

_____________________

Question # 7 - You want to keep track of your DNS server database by date and free of unnecessary documents. Which of the following will help to maintain the DNS database as required?

A. Tombstone
B. Aging and Disposal
C. DDNS
D. Secure Updates

_____________________

Question # 8 - The network consists of a single domain with aWindows Server 2003 DNS. The DNS server hosts a standard primary zone. Users report that the response time for the network seems slow. Using Network Monitor to examine network traffic, you will find that there is an abnormal amount of traffic between the DNS client and DNS server.

What better tool could help you learn the cause of the excess traffic?

A. System Monitor
B. Registers
C. Tracert
D. SecurityMonitor

_____________________

Question # 9 - You are about to expand its network of remote access if your company is fast gaining small businesses around the world.

The policy of the Company's written that all remote access server are the same security settings. If changes are made to this policy in writing or otherwise to be given to all servers at once to ensure that the administrative time for the above activitiesminimized. What should I do?

A. The use of RADIUS
B. Use RRAS
C. Using IIS
D. Use a server certificate

_____________________

Question # 10 - You must configure the updates for your network. The network consists of 100 Windows Server 2003 domain controllers and 48 Windows 2003 server. There are about 2500 clients. Which of the following would be an ideal and efficient method for implementing an automated process for software updates?

Each instruction selectionpresents a part of the solution. Choose two explanations come to a complete solution

A. Configuring Software Update Services (SUS), together with Group Policy Objects (GPO).

B. Configuring Automatic Updates on all domain controllers and clients

C. Configure Automatic Updates on the Root DC and the rest do not connect to the Internet at all

D. Do only the critical DC connect to the Microsoft site for updates and a designated server pushes the update torest of the computer network

_____________________

ANSWERS

Question # 1 - correct answers: C
Question # 2 - correct answers: A
Question # 3 - correct answers: B
Question 4 # - correct answers: A
Question # 5 - correct answers: A
Question # 6 - correct answers: A
Question # 7 - correct answers: B
Question # 8 - correct answers: A
Question # 9 - correct answers: A
Question # 10 - correct answers: A, D

My Links : Cool Phones Review Switch Hub Store. LOWER Prices in The Same Item, Rosetta Stone Store LOWER Prices in The Same Item

Friday, November 12, 2010

IPv6 (Cisco) Training - Using the "DNS server and a domain name (IPv6)" Commands


Well, since this article is a kind of long I'm going straight down to it, so without further ado let us begin.

The "DNS - server" (IPv6) command, a Cisco IOS "DHCP for IPv6 pool configuration mode command is used to specify the network Domain Name System (DNS) server IPv6 (s) available on one.

Here is the correct syntax and example of the "DNS - server" (IPv6) command:

Syntax: router (config-dhcp) #> DNS - Server IPv6 address
Example: Router (config-dhcp) # dns - server 2001:0 DC8: 3000:3000:: 42

Note that the router prompt "DHCP for IPv6 pool configuration" mode argument is the IPv6 address and IPv6 address of the DNS server available.

Now, in case you're wondering if you can use (configure) the "DNS - server" (IPv6) command several times on a router, if you have multiple DNSnetwork servers. And the new IPv6 addresses delete (overwrite) the current (old) IPv6 addresses.

Also, if you search for a specific DNS server for the list of DNS servers, all you have to do is type the word "no" in front of the command as you can see below:

-Address-dhcp) # no DNS - server config ipv6 Syntax: router (
Example: Router (config-dhcp) # no DNS - server2001:0 DC8: 3000:3000:: 42

Ok, that basically sums up the "DNS - server" (IPv6) command, so, go to "domain name" (IPv6) command.

The "domain name" (IPv6) is also a command from Cisco IOS "DHCP for IPv6 pool configuration" mode command, but is used to configure a domain name for a DHCP client for IPv6, also known as a router or an applicant RR.

Here is the correct syntax and example of the "domain name" (IPv6)command:

Syntax: router (config-dhcp) # domain domain
Example: Router (config-dhcp) # domain ittechtips.com

Announcement that the router prompt is still "DHCP for IPv6 pool configuration" mode and domain of the argument concerning the domain name is used by the client. So in the example above, the router (client) uses the domain name ittechtips.com.

And, like the "DNS - server" (IPv6) command, the "domain name" (IPv6)command can be used (configured) multiple times on a router. And, new domain names do not delete (overwrite) the existing domain names.

Finally, if you delete a domain name to a DHCPv6 client (RR) should see the word "no" to the "domain name" (IPv6) command as shown below:

Syntax: router (config-dhcp) # no domain domain
Example: Router (config-dhcp) # no domain ittechtips.com

I hope this article is very informativeand helped you quickly understand the use of "DNS - server and the domain name" (IPv6) commands. If you need to learn, I suggest you go to my website, where the latest information on Cisco IPv6 design and deployment techniques available.

To your success,

Thanks To : Blank DVDs Store. LOWER Prices in The Same Item Network Consulting

Thursday, November 11, 2010

Understand the Domain Name System

Ever wonder why DNS systems came? Efficiency. Each computer has its own IP address, and the Internet needed an elite method for obtaining these addresses and for managing the system as a whole. Enter ICANN.

The Internet Corporation for Assigned Names and Number manages the DNS root of the area of Internet domain names. ICANN is the role of assigning identifiers to manage, to ensure that all users have unique names.

The DNS system is runby a series of servers called DNS servers. ICANN manages the DNS root domains, including top-level domains.
It also manages:

Organizational domains
Geographic areas
Reverse domain

Among the top-level domains are other naming authorities such as Nominet, the Naming Authority of the United Kingdom.

How does a DNS Query work?

The process takes place in two parts. First, a name query begins at a client computer and is passed to DNS Client service for resolution. If the query can not be resolved locally, DNS servers queried.

For example, when a web browser calls the fully qualified domain http://www.discountdomainsuk.com, the request is passed to the DNS Client service is the name of solving using a cache data locally. If the query is held in the cache, then the process is complete.

However, if the query can not be resolved locally, the DNS client service uses a list server> (ordered in sequence) to query external DNS server. When a DNS server receives a query, first check if that domain name. If it is authoritative, it resolves the name and the process is complete.

If the DNS server is unable to resolve a query, in turn, ask other DNS servers, using a process known as recursion. DNS Server use root hints to assist in locating> Server DNS, which are able to provide the required result. In this way, applications are minimized and the Internet DNS is able to operate effectively and quickly.

A typical query may run as follows:

Client contacts Nameserver A looking http://www.discountdomainsuk.com.

A name server checks the cache, but can not answer, so ask an authoritative server for the web root.

The root server responds with a reference to a server authoritative for the. com domains. Queries the name server. COM server and gets referred to the authoritative server for http://www.discountdomainsuk.com.

A request for a name server and the server receives the IP address for http://www.discountdomainsuk.com.

A name server responds to the client with the IP address.

Queries can return answers that are authoritative, positive, negative or referral in nature. In the case of negative answer, another DNS> Server is required.

Tags : Game And Toys Store Hole Drilling Crucial 2GB 667 Store.

Wednesday, November 10, 2010

Optimize Vista 1 - speed Internet performance dramatically

Many Vista users have experienced difficulties with slow Internet, and the cause is probably unsupported hardware or ISP itself. To counter this problem, you must optimize your Windows Vista for better compatibility and speed. I'll show you 6 ways to restore the connection:

Method # 1 - Turn off TCP Auto Tuning.

Vista is smart enough to automatically adjust the TCP maximum constant speed, but has also introduced advancedmuch overhead for some hardware is not supported for some time you must manually configure the TCP settings with SG TCP Optimzer off Vista TCP Auto Tuning.

Method # 2 - Installing Web Accelerator.

You can try Google Web Accelearator or other commercial Web accelerators, like Nitro or ONSPEED. Web Accelerator is actually a proxy server web site with compression. It will be a tunneling connection between your computer and the Web server, and compress each item send to you, it improves the speed of navigation.

Method # 3 - Use static IP.

This method does not improve the speed, but accelerates the time required for computers to connect to the router.

Method # 4 - Use OpenDSN.

Your ISP DNS server can not respond fast enough, try OpenDNS to improve the response of your website on the Internet.

Method # 5 - Increase the DNS cache.

You have the knowledgeDNS> to register before you can use the cache. What it does is cache every search you make the DNS server, so the next time you visit the website again, the answer will be immediate. Therefore, your website cache faster, if you give them again.

Method # 6 - Disable IPv6 and other protocol.

You must disable all protocols used, do not get the additional costs slow down your Windows.

For more information on tuning the details to learn, thenDownload a copy of "Unleash Vista Power Express Guide and enroll for a three-day mini-course.

(C) Copyright 2008 Cook Choon - Feel free to reprint this article in its entirety as long as all links and author resources box in place.

Friends Link : Soil Permeability Bulk Email Friendly

Tuesday, November 9, 2010

Earn money with domain names without any experience!

People get a lot of knowledge online. For a very competitive person interested in Internet-linked cash, it is essential that an opinion given to start with a simple step how to get together to make money with domain names.

For an appetizer of online business to make money with domain names will not be too much of workers and moiling. It 's just a simple exercise that too much capital to start.

You may not take much exposuretechnology to make money with domain names. You may not need to have gone beyond high school. You may just need a computer with internet connection as the first step. How convenient!

With domain names, that's all you want, and your success depends largely on the strategies to use to get people to buy your domain names. If you do not know what strategies to adopt, it is imperative that you take the time to read books on strategies to use to make money sellingdomains.

However, the most important thing is to want to make sure you spend time on each other's business. If you as a serious hobby, probably to go the extra mile to see it as a viable business that will pay the bills.

The immediate step to take right now is to read success stories and reasons behind them. It will be very interesting to see how it will develop the game to make money to enjoy.

Friends Link : Western Digital My Book Essential 1 TB

Monday, November 8, 2010

To promote the conservation of the fire with your domain name

Establish your brand on the Internet can be a difficult task to control. With so much competition around, companies are finding it increasingly difficult to cut a niche for himself and to impress targeted users online. positioning in search engines are still ahead, but maintains the brand value of your company plays a growing role in influencing the revenues.

So when it comes to choosing your domain name for your online business, you need to focus onbrand value door. Often webmasters cluttering their domain name with keywords, so that it is a general impression that there is absolutely no relevance to your brand.

It 's always good to have a name that people can relate to the use and maintenance. Only then will you be able to bring in return visitors and increase your chances of converting them.

However, if the brand is not very popular, it is difficult to find people. ToFor example, 'rockshoes.com "the site of a shoe company called' Rock ', but the number of online users know? In such cases, the companies have a huge budget of e-marketing to promote this domain name and get traffic to the site to spend. It is therefore not the best strategy for an SME, which is just entering the world of online business.

However, there is a middle ground that you can choose. Using a combination of branding, keywords and generic termsrank for your domain name to the ability of the domain name to improve. Take one of the keywords you choose, and add a generic word in the end. Names like the city of flight, etc. BookHub, SEO value built into them, because the domain name you require users to use keywords in the link. Search engines get the keyword you are looking for a single label and get the users that you can keep for a long time.

When you decide to buy a domain, make sure to choose areliable registration of the domain name of the company offering the best options in terms of effective prices. There are a number of companies in the market that offer domain names and cheap domain extensions. Aussie Web Hosting, the leading provider of domain registration Australia is a leading online services offer domain names at competitive prices.

See Also : Buy Cheap Digital Tablets | LOWER Prices Buy Cheap Bluetooth Headset | LOWER Prices