Showing posts with label Address. Show all posts
Showing posts with label Address. Show all posts

Wednesday, November 24, 2010

Finding the MAC address on wired and wireless network cards

The response of the Media Access Control Question

In recent weeks I have a lot 'of e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC). I think the main reason that I have received many questions about Ethernet cards, and MAC addresses is people trying to own wireless home networks and their desire to use the MAC address filtering to secure. This type of filter in wireless networks can be configured toAllow or deny use of specific computers or connect to the wireless network based on the MAC.

My first thought was that of a single article on wireless Ethernet MAC addresses and write. After thinking, I decided to expand on this and to move some specific information about Ethernet cards and communication.

Different ways to find your MAC address and much more

There are several ways to Ethernet protocol and communication and information. Many Ethernet cardmanufacturer's proprietary software that can reveal this information, but behave differently depending on the manufacturer. So we'll use the Windows 2000 and XP "ipconfig" utility since this is available in most Windows operating systems.

First, go to "Start" -> "Run" and type "cmd" without quotes. Then press the Enter key. At the command prompt type "ipconfig / all", again without the quotes. In fact, just typing ipconfig without the '/ all will work, but it will onlyprovide summary information of network adapters. An example of what one might see by typing "ipconfig / all" command is below each said in green:

Fault Tolerant and High Availability Computer Systems

There are several ways to Ethernet protocol and communication and information. Many software vendors Ethernet card owners who can reveal this information, but behave differently depending on themanufacturer. So we'll use the Windows 2000 and XP "ipconfig" utility since this is available in most Windows operating systems.

First, go to "Start" -> "Run" and type "cmd" without quotes. Then press the Enter key. At the command prompt type "ipconfig / all", again without the quotes. In fact, just typing ipconfig without the '/ all will work, but provide only summary information of network adapters. An example of what one might see by typing"Ipconfig / all" command is as follows:

Output of "ipconfig / all" command

Windows IP Configuration

Host Name. . . . . . . . . . . . : Home Computer

This is the name of the computer, usually defined during the installation of Windows. However, it can be changed after installation.

Primary DNS Suffix.. . . . . . : Domain.com

If your computer has an active network, such as a Microsoft Windows domain this entry may contain the name ofdomain.

Node Type. . . . . . . . . . . . : Unknown

The node type can say unknown, or peer-to-peer, or in some cases "hybrid". It is an institution that has to do with Windows Internet Naming Services used in certain types of Windows domain networks.

IP Routing Enabled. . . . . . . . : No

This setting determines whether Windows XP or 2000 functions as an IP router. If you have two or more network cards you can configure the system to act as a router, forwarding communicationsrequests from one network to another. Windows 2000 can be configured to do this in a nice straight forward, Windows XP will need a change in the registry.

WINS Proxy Enabled. . . . . . . . : No

WINS Proxy is another institution that is linked to the "Node Type" we discussed earlier. It is not normally a required setting in a home or small office or the newer type of Microsoft Windows domains.

Ethernet adapter Wireless Network Connection 2:

If youover Ethernet (network) cards in your system, if I were in this laptop, you will have multiple listings. This is the second Ethernet card, a wireless Ethernet card inside.

Description. . . . . . . . . . . : Broadcom 802.11b / g WLAN

This is the description of the Ethernet card, usually the name / manufacturer and type of Ethernet card. In this case it is a Broadcom wireless Ethernet card built into my laptop.

Physical Address. . . . . . . . . :00-90-4B-F1-6E-4A

And here we have the MAC address. The MAC address is a 48-bit hexadecimal code and is suppose to be a completely unique address. It is 48 bits because each number or letter in hexadecimal represents 8 bits. Hexadecimal numbers range from 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, F. There are 6 alpha-numeric codes is 6 * 8 = 48 (bit). The first 3 codes identify the manufacturer of the card and the other codes are used to create a unique number. Theoretically there should never be acard with the same MAC address of a local network. However, there are some exceptions. There are software tools that allow you to change this code. In reality, this is a step some hackers take to attack other machines on a local network. I speak the local network because MAC addresses are not routable between network segments. By spoofing this address, you can impersonate another machine on the network. Traffic that was bound for the objective may be redirected to the hacker's computer. This isthe address is also possible to use a physical address or MAC address table before setting up wireless access point to support MAC address filtering to people.

DHCP enabled. . . . . . . . . . . : Yes

DHCP or Dynamic Host Control Protocol, if enabled means your computers IP address provided by a DHCP server on the network. The DHCP server can cable wireless access point / router DSL, cable modem or a network server. Although aDHCP server is enabled on the network, the computer operating system will automatically generate a random IP address within a predefined interval. This means you could network a group of interconnected, without having to manually assign the IP settings.

IP address. . . . . . . . . . . . : 192.168.0.117

This parameter allows your current IP address. The address above is what is called a "private" addresses. There are several classes of IP addressesare reserved for private use. This means that for the internal network, local or private home or office. Such addresses are not, or not, are routable on the Internet. The Internet routes called "valid" IP addresses. The cable / DSL router or cable modem has a valid IP address assigned to the "outside" of the network. The external interface of the phone or cable TV cable.

Subnet Mask. . . . . . . . . . . : 255.255.255.0

Subnet Mask is aspecial issue, or in a sense, the filter, which breaks your IP address, in this case a private IP address in certain areas. IP addresses and subnet mask can be a complicated issue and would require an entire article to be about.

Default Gateway. . . . . . . . . : 192.168.0.254

The default gateway IP addresses of the above, the IP address of the device that will route your request, such as when you try to browse a website on the Internet. It 's a bit complicatedthan that, but as a gateway or router traffic to different networks, the other private networks. At home or small office, this gateway most likely is your cable modem / DSL or router.

DHCP Server ... . . . . . . . . : 192.168.0.49

The DHCP server, remember we talked a bit 'above, the device indicates that the computer has an IP address and other information. DHCP server can assign all kinds of information, including: StandardGateway, DNS (Domain Name), IP address, Subnet Mask, Time Server, and more.

DNS Server ... . . . . . . . . : 192.168.0.49, 64.105.197.58

The DNS servers are internal or external, to fully resolve the names (FQDN), such as http://www.defendingthenet.com full domain of IP addresses. This is because computers are not really about your request using the domain, use the IP address assigned to the FQDN. For mosthome or small office, DNS server IP address from your primary Cable / DSL Router. The Cable / DSL Router to ask an external DNS server on the Internet to perform address the effective resolution of the FQDN to IP. The address 192.168.0.49 is an internal private device on my network that 64.105.197.58 is an external public Internet DNS server and is available in case my router has difficulty performing the DNSResolution tasks.

Lease obtained. . . . . . . . . . : Sunday, March 19, 2006 18:38:16

This information tells you when the computer received its IP address and other information from a DHCP server. You will notice that says "Lease obtained", it is because most of the DHCP server just give the IP address lease from a pool of addresses available. For example, the pool may be 192.168.1.1 through 192.168.1.50. So your DHCP server has 50 IP addresses to choose from whenassigning the IP address of your computer.

Lease expires. . . . . . . . . . : Wednesday, March 29, 2006 21:38:16

If the IP address assigned by the DHCP server will attempt to lease expiring lease is the same or a different IP address. This can usually be changed on the DHCP server. For example, on some fully functional DHCP server, you can never rent due within one day and so on.

Why are so MAC addressesImportant and how they work

To jump back into the MAC address for just a bit '. You might think that IP addresses are the most important thing when it comes to network communication. The reality is, MAC addresses are very important because without them computers would not be able to communicate over Ethernet networks. When a computer wants to talk to another computer on a local network, broadcasts a query, or ask a question, who owns a particular IP address. For example,The computer can say, "Who is 192.168.0.254". Using the information above, my default gateway is 192.168.0.254 and say "I am" 00-90-4B-F1-6E-4A "192.168.0.254". You send the MAC address. That the MAC address then in what is called a (ARP) Address Resolution Protocol table on your computer. You can use this information to the command prompt like you did above and typing "arp-a". You can obtain information such as the following:

Internet Address Physical AddressType

192.168.0.49 00-12-17-5C-A2-27 dynamic

192.168.0.109 00-12-17-5C-A2-27 dynamic

192.168.0.112 00-0C-76-93-94-b2 dynamic

192.168.0.254 00-0E-2E-2e-15-61 dynamic

How can a hacker use MAC addresses in an attack

You will notice that the IP addresses and the right of their MAC addresses. Without this information, without the MAC address, it would not be reading this right now. MAC addresses are not routable, such as IP addresses. They work on localor private network. However, the devices on the Internet, to perform the same tasks. Routers and switches keep a list of their colleagues MAC address devices such as computers and devices on your home or office network. I mentioned that MAC addresses can be modified to meet demand. For example, if I'm on your corporate network and you had an internal Web server that took personal information as input, I could tell the computer to my laptop for the websitebroadcasting my MAC address with the real web server IP address. I would do if the computer asks, "Who is the" Real Web Server ". I could set up a fake web server that looks just like the real thing, and start gathering information that the real web servers normally collect. You can see how it can be dangerous.

Conclusion

There are many other simple ways to protect your MAC address, but can be a bit 'of confusion if you have more than oneinternal network. Most external USB or PCMCIA wired and wireless Ethernet cards have their MAC address printed on them. Where the wired or wireless network adapter in your computer, such as in laptops, the MAC address is sometimes printed on the bottom of the laptop. Even Desktop systems cards that are inserted in PCI slots have the MAC address printed on the Ethernet card.

You can print or publish this article free of charge as long as the bylines areincluded.

Original URL (the web version of this article)

http://www.defendingthenet.com/NewsLetters/FindingYourMACAddressOnWiredAndWirelessNetworkCards.htm

Friends Link : Network Tools Store. LOWER Prices

Tuesday, November 23, 2010

Learning to control and your IP address in Windows Vista Change

- Check whether an IP address in Windows Vista:

1. Start Windows Vista and draw on their own. If you are the only user of the computer then the computer will immediately charge your account and will probably have to look at your system administrator or change an IP address.
2. Test to make sure you have an active Internet connection to it. You can use an IP address using Windows Vista not occur without accessInternet.
3. Go to one of the tools available online that can identify the current IP of your computer. Once the site loads, you probably automatically display your current IP address.
4. Your IP manually, working with Windows Vista Network and Sharing Center. Just click on "Start" then "Control Panel" and double-click on the link "Manage network connections".
5. Click the network adapter. You'll definitely see that Windows Vista will automatically set to "Assign an IP address. "
6. Just click on "Use the following IP settings." That will allow you to configure settings for your specific needs.
7. Nature in all the IP information, including IP, Subnet Mask and Default Gateway. system administrator and / or network will have this information.
8. Just click on "OK" once you've done.
9. Groped to return to the online tool we have to verifyThe changes have been implemented. Otherwise, you are likely to view the dynamic IP address (mainly the changes) or the online tool will not load.

- Change your IP and TCP configuration on Windows Vista:

1. Go to Control Panel from the Start menu.
2. Click on "Network and Internet" and then "Network and Sharing Center".
3. Click on "Manage network connections."
4. Choose whichThe Internet is likely that you'd like to change if you have more than one. Right-click and choose Properties.
5. Click the network tab.
6th. Select Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol version 6 (TCP/IPv6).
7. Click on "Obtain an IP address automatically" to completely restore your IP automatically, then click OK.
8. Click Use the following IP address "to make its own IPinstitutions.
9. Enter your IP in the boxes marked "IP Address", "Subnet Mask" (or "subnet prefix length for IP/TCPv6) and Default Gateway. "

- Change the configuration of your DNS server:

1. Click on "Obtain DNS server address automatically" and then click OK.
2. Click "Use the following DNS server addresses" for the configurations manually change your DNS server.
3. Typeyour primary DNS server address in the "Preferred DNS Server".
4. Enter your secondary DNS server address in the "Alternate DNS server".

- Adding a new network protocol:

1. Click on "Properties" and then "Install" from "Manage network connections."
2. Click on "Customer", "service" or "protocol" based on where you want to add. Click'Add'.
3. Select the item you want to record the dialogue and click OK.

Related : Inspection Mirror Printers Store. LOWER Prices in The Same Item, Let Buy Cheap Speaker Systems | LOWER Prices

Thursday, October 21, 2010

How to hide IP address

First I will speak of the safety net is better to spread the myth more stable regarding anonymity on the Internet. No, I do not mean that people think that it is impossible for all information about a person via the Internet. I mean the following statement: "I'm not anonymous because I did not" dark "is to ensure ...." Hackers And now I think it is good when strangers know your home address and want to enter your house without your permission?

Theyalways follow you wherever you go and try to find out everything about you. I'm sure you are not happy. So tell me, please, because the majority of Internet users do not care about their safety on the Net? Also, recently more and more resources to a man with different information depending on home location. For example, many of the projects of U.S. business information and is not the most important fact for people outside the United States. It is not right? Not half! Today we will try to correct thisdishonesty. If you know the IP address of a computer can do a lot of things about its users.

We start with systems theory in general and Internet in particular. Are determined, we begin with the rule to address the information packets loaded. So when you type an address in a browser line, the request was first and foremost is sent to the string DNS server changes the symbol in the set of 32 zeros and ones (0, 1) - IP address used for routing.If an intruder knows that address he / she can connect a lot of information. For example, your real home. Or with the help of whois service provider determines that the user simply its IP address. Well, how can you protect yourself? For this reason you should hide your IP address.

Proxy Server

IP to hide IP address with proxy server which is like a mediator between the user and the computer-server network, we discovered the "traitor" - Discovering howaddress that can be removed in any way because the data routing necessity. But the proxy server sends the request to the Web server itself. And it's all the feedback. That is why at first glance, the use of proxy - anonymity guarantee. But it is not so easy. It was found that most of the proxy IP address end-user sends in a special area (X-Forwarded-For). Frankly, there are anonymous services but it is hard to find. But if you have servers, such asto hide the IP address and use the network. Among other things, you can control the anonymity proxy http://www.proxylist.com site.

Anonymizer

Anonymizer - an anonymous proxy server that has its own web interface. And it is very easy to work with him. All you need is at the site, enter the address required in the special field - that's all. After that server hide your IP address. Then download the requested page. You can be sure that you are safe.

But there are somedisadvantages:

Download speed of pages can slow down considerably
Most of them are expensive

Today it is almost impossible to find a good anonymizer for free. The lawsuit, when just appeared nobody could think of to sell. Maximum that the owners could lead - in order to set some advertising banners. Users now have to pay to go unnoticed. Incidentally, there are a lot of people is the fact that anonymizers are not legal and should be discontinued. ButBecause it makes no sense, because we must also stop wigs industry because criminals use them to change their exterior.

Now we know how to hide your IP address, but there are other more effective ways to hide. The most famous - cookies technology. Frequent, people use cookie technology for devious purposes. What is it? Cookie - is a string of symbols (4 KB), which writes a file server to a specific file on your PC. This technology is designed for easy net working capital. ToThus, E-shop remember a user and provide him / her to look over a number of new products based on their specific needs to be taken. A special restriction of access is set to the confidentiality of all data to be saved: only the server that converts the data in the cookie can read the future. Unfortunately, it was a piece of cake to bypass it.

Just think, what you see on almost all web pages on the Internet? That's right, the flags and hit counters. Appropriately, the majority ofthese elements are downloaded from their servers. Then a visit counter script situated on the number of sites can easily write and read data from the cookie. As a result of a system has the ability to monitor the web Rote or your web habits to learn. And this in turn is a natural lookout. Do you agree? It is advisable to hide IP address! There are several services that can hide your IP address, but I'm sure that just a GUI interface and has no equivalent -Arovax smart hide.

Arovax Smart Hide

smart hide is a kind of anonymizer but has no web interface. It uses a simple interface like any other software that a user runs everyday. Just one click is needed to hide your IP address. You can hide your IP address with this software for free. There are a lot of services with web interface, but it is a fact they do not provide everything they say. Also, with simple software like Arovax smart, do not hideFill in the fields all the time. It will hide IP address absolutely for everything including ICQ, browsers, IRC, email, FTP, etc.

Socks

Socks technology is a secure facility that offers anonymity on the Internet. We are talking about socks-protocols. A working principle of this technology is similar to a proxy server. A socks-server receives the user data to the computer, sends it to the web server and retargeting returned data back. There are many seriousdifferences, actually. First - "communication" between a client PC and a socks-server is not connected by common protocols, but those special (SOCKS4, SOCKS5, etc.) For a user IP address transfer is impossible in principle. In addition, a SOCKS server transforms the users' requests for information for the accepted protocols itself. This means that no other server will think the mediator sends the data to the end user, but to her. E 'enoughdownload a special tool SocksCap by Company NEC USA, Inc., Install, choose the software that must be protected. (Internet Explorer, Mozilla Firefox), enter the address of the server-socks and a door. That's it - you are safe, while using the browser.

That's all there is, I think. I have presented all most famous ways which can be used an anonymous user on the Internet to make room for today. The cause, the situation changes all the time and newdevelopments appear each day, that's why if you want to be protected and anonymous while surfing the Internet trying to get the latest news about computer security to follow.

Related : Video Cards Store. LOWER Prices

Wednesday, September 15, 2010

The Importance of a DNS Server Address

DNS stands for Domain Name System. This is the whole system of naming websites that allows your web browser to take something like site.com and find it easily. DNS servers can be any computer system or server that runs software that allows access to the Internet, and is assigned an IP (Internet Protocol) address. There are main DNS servers that contain all of the DNS and IP information. These make up the top level of the system while the lower levels branch out and contain all Internet service provider's servers and server farms used by large companies, all of which contain various DNS addresses and IP addresses.

If you are planning on getting a domain name for your site, you really don't have to know any of this information. You don't need to know what a DNS address is, what your computer's IP address is or any other similar facts. But understanding how it all works can help you if you have technical problems. At the very least, you'll have some understanding of what an IT technician might tell you when troubleshooting.

Understanding in general how DNS addresses work can also help when troubleshooting your home computer. Sometimes the browser will refuse to bring up certain websites or any websites and it's a DNS address problem within your own system. Your browser is actually working as what's known as a DNS resolver or DNS client when you use it to surf the Internet. It sends a request to the server owned by your Internet service provider to bring up a certain site and your ISP then sends that information back to you.

If your ISP isn't directly connected to the site you are trying to reach, such as a site that hosted somewhere else, it then becomes a DNS resolver which sends the request to another server to bring the information back. When you type information into your browser with words like the site.com, it turns that into the numerical IP address of the site and makes requests based on that number.

The website that you create with your domain name will have an IP address that DNS servers and clients use to allow people to view your site. If you are browsing and you're having trouble bringing up certain sites, your Internet service provider can help you by giving you the IP addresses of your DNS server so you can make sure your browser is configured properly.

The DNS name is essentially the name you type in to get a website. The DNS system is what makes using that name possible so that we don't have to type in each website's IP number to access it. It's one of those little things that you don't really need to know about, but that makes using the Internet possible for people without any technical knowledge.

Tags : Buy Cheap Anti Virus 2010 | LOWER Prices Interesting Software Save Price!

Saturday, August 7, 2010

The Importance of Email Address Validation

Running an online business is simply complicated. There are a lot of things that ought to be considered in order to achieve the best results from it. One of the sensitive aspects of online business that requires careful consideration is email address validation; which has proven to be one of the many problems online entrepreneurs face today. Validation is important to keep track of any malformed IP addresses and to determine if the email address is valid before they are entered into your database.

There are several ways to effectively do this. One is done through DNS validation. Domain Name System (DNS) validation checks whether the domain actually exists. This is a major step for you to take to make sure that emails won't go unused and that there's a mail server that is waiting for them. Checking for the domain existence works in most cases and is an effective technique in address validation.

But in some cases, there are still some email addresses that can still pass through DNS validation. This leaves SMTP validation for the most sophisticated email address validation. In this method, SMTP protocol is used to reach the domain mail server to undergo manual address validation. Using this of method ensures you that no invalid email addresses are left unnoticed.

QAS email is one perfect example of web service that provides the most efficient method. The software itself runs through a genuine software that effectively validates, cleanses, captures, and enriches addresses and all other important details for contact information. Through QAS email it provides the most sophisticated software of today.

In an online business, email addresses are highly valued as they are considered leads which serve as the backbone of every business. It is therefore extremely vital to conduct email address validation to avoid any future inconveniences. Validation through the aid of QAS email emphasizes several business benefits like highly improved customer service, heightened reliability of contact information, and the relative increase of completion rates.

QAS Email is fully equipped to instantly detect validation errors. This provides the users enough time and convenience in making corrections instantly. QAS email is a simple tool with unmatched performance. It is easy to use and can work on almost any applications through the net. This amazing software provides the most efficient and most effective address validation method at the point of data entry.

Tags : Plastic Deck Buy Discount Home Design Software | LOWER Prices Vehicles Hybrid