Thursday, December 17, 2009

Advanced Command

ANSI.SYS Defines functions that change display graphics,
control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when
editing a file or running a command.
ARP Displays, adds, and removes arp information from
network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows
ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series
of commands in a file.
BOOTCFG Recovery console command that allows a user to view,
modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL\'s.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character
set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color
of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to
modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows
system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on
another disk.
DOSKEY Command to view and execute commands that have
been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable
service or driver.
ENDLOCAL Stops the localization of the environment changes enabled
by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it\'s
original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and
information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file
extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings
and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the
services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and
enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current
TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer
or network device.
POPD Changes to the directory or network path stored
by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory
so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without
affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters
in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or
extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for
another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files
have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from
one location to another.
TRUENAME When placed before a file, will display the whole directory
in which it exists
TASKKILL It allows you to kill those unneeded or
locked up applications

Some basic Command For Xp

Window XP shot Cut
Run Commands:

compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Run Commands to access the control panel:

appwiz.cpl - Add/Remove Programs control
timedate.cpl - Date/Time Properties control
desk.cpl - Display Properties control
findfast.cpl - FindFast control Fonts Folder control fonts
inetcpl.cpl - Internet Properties control
main.cpl - keyboardKeyboard Properties control
main.cpl - Mouse Properties control
mmsys.cpl - Multimedia / sound Properties control
netcpl.cpl - Network Properties control
password.cpl - Password Properties control Printers Folder
control printers
mmsys.cpl - Sound Properties control
sysdm.cpl - System Properties control

Wednesday, December 16, 2009

Building Wireless Connection

We'll start with a single computer that already has a wired Ethernet broadband connection to the Internet. Then we'll build the ad hoc wireless network in three steps:

1.


The first step will be to install an 802.11b wireless card in the main computer and configure it as a computer-to-computer (ad hoc) wireless connection.

2.


The second step will be to install a wireless card in a second computer.

3.


To complete the network and provide connectivity to the Internet, Internet Connection Sharing (ICS) will be enabled on the host.

As you read through the procedures below, note that the accompanying images are captured from both the host and client computers and that the screen shots of the host computer contain a silver title bar, while the client computer screen shots contain a blue title bar.
Configuring the Host Computer

After you install an 802.11b adapter (such as an Orinoco or Cisco wireless network card) on a computer, Windows XP will automatically detect the card, install drivers, and display an icon in the notification area. (I am using Agere's Orinoco Silver cards to construct the ad hoc wireless network here. Although they have native, in-box support in Windows XP, these cards can be updated with even newer drivers and firmware through Microsoft Update). If the computer is in an environment where other wireless networks are in range, Windows should display a list of available networks automatically. However, if no wireless networks are in range, the wireless connection icon may display a red “X” and may not automatically open a View Wireless Networks window. To open this window, click the icon for the wireless connection.

Do not select an available network at this time if any are displayed in the Available networks listing. If your computer previously connected to a preferred access point, remove all preferred access points. This will ensure that a connection is made only to the ad hoc network that you are trying to configure.
Figure 1

Figure 1

Next, click the Advanced tab at the top of the window. Select Computer to computer (ad hoc) networks only and clear the Automatically connect to non-preferred networks box if it is selected. This setting, along with removing preferred networks, ensures connection to the ad hoc network only.

Click the Wireless Networks tab again. Under Preferred Networks, click Add, as shown in Figure 1. In the Wireless Network Properties dialog box, specify a Network name (SSID). Use any name desired, but be sure to use it to configure all computers. Note that the network type is already marked as a computer-to-computer network and that this cannot be changed since it has already been specified that a connection should be made to only ad hoc networks.
Figure 2

Figure 2

Wireless Equivalency Protocol (WEP) settings are not being configured at this time because it's easier to get an ad hoc wireless network running smoothly before attempting to configure WEP data encryption. The decision on whether or not to use WEP should be based on your environment. In most cases, for optimum protection and security, after your ad hoc network is running properly, you should return to Wireless Network Properties and specify WEP settings.

After configuring the network name (SSID) in the Wireless Network Properties dialog box, the new ad hoc network will be displayed with a PC Card icon to designate that this is a computer-to-computer network.
Figure 3

Figure 3

Note the red X. When a second computer is in range and the new ad hoc network is connected, the display changes to show a working computer-to-computer network without the X.
Top of pageTop of page
Configuring a Client Computer

After installing an Agere Orinoco 802.11b Silver PC Card in a second computer, the Wireless Networks tab displays a list of in-range wireless access points or ad hoc wireless networks, as shown in Figure 4.
Figure 4

Figure 4

The new ad hoc network aloha4321 is listed (and is identified by the PC Card icon). Highlight the network name, and then click Configure. Because WEP will not be configured at this time, click OK.
Top of pageTop of page
Sharing the Connection

Now that a successful ad hoc wireless network has been created, we'll set up Internet Connection Sharing.

1.


Open Network Connections on the host computer. (Click Start, click Control Panel, click Switch to classic view, and then click Network Connections.

2.


Click the connection to be shared, and under Network Tasks, click Change settings of this connection.

3.


On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.

4.


If you are not using a third party firewall and have not already set up the Internet Connection Firewall (ICF), be sure to check the box enabling this feature. (Read more about why to enable ICF in an earlier column, Don't Let the Defense Rest.)

5.


Finally, optionally enable the setting to let other users control or enable this connection.

After completing ICS configuration, the Network Connection window on the host computer will display the original wired Ethernet connection and display the status as Shared as well as Enabled. The Network Connection window on the client computer will display the connection on the host as an Internet Gateway.
Figure 5

Figure 5

The client computer(s) should now receive a private class, non-routable IP address in the 192.168.0.* address range via DHCP from the host computer and should have full Internet connectivity.
Top of pageTop of page
Configuring WEP

As connectivity has now been established successfully, the next step is to return to Network Properties and configure WEP settings to ensure the best security possible for the ad hoc network.

On the host computer, open the Wireless Network Properties dialog box and select the Data encryption (WEP enabled) check box. Consult the documentation provided by your wireless card manufacturer for the key format and key length.
Figure 6

Figure 6

Use the highest level of encryption possible (key length) that is supported by your hardware and drivers. Agere's Orinoco Silver cards are used here, and only support 64-bit WEP (also known as 40 bits). Using the latest drivers and firmware, Windows XP actually automatically detects that this hardware only supports 64-bit encryption and will not allow setting the key to 128 bit. Be sure that if you use an ASCII network key that you pick random characters and letters that can't be easily guessed. The final step is to use the same key and encryption settings and configure the client computer(s). Note: for additional security, consider changing the key on a regular weekly basis.
Top of pageTop of page
Instant Private Networking

Not only does ad hoc wireless networking provide a lower cost method to share an Internet connection than a more expensive wireless router/router plus separate access point solution, but it affords a fast and simple way of establishing a means to share data and documents for groups with no external LAN or Internet connection. With no available DHCP server, Windows XP provides an automatic private IP address between 169.254.0.0 and 169.254.255.255 to network adapters. If you're sitting around a conference table with a group of colleagues and find that everyone is in desperate need of a Power Point presentation on an associate's computer on the other side of the room, setting up an instant ad hoc wireless network can be the solution, allowing everyone to copy the file to their computers over the wireless network. You'll need to have the same workgroup configured with appropriate permissions for file and print sharing, and you'll never have to wait again to get connected to the Internet or a corporate LAN to receive copies of urgently needed documents.

Barb Bowman enjoys sharing her own experiences and insights into today's leading edge technologies. She is a product development manager for AT&T Broadband Internet Services, but her views here are strictly personal.

Tuesday, December 15, 2009

different types of networks

Different types of networks

Different types of (private) networks are distinguished based on their size (in terms of the number of machines), their data transfer speed, and their reach. Private networks are networks that belong to a single organisation. There are usually said to be three categories of networks:

* LAN (local area network)
* MAN (metropolitan area network)
* WAN (wide area network)

There are two other types of networks: TANs (Tiny Area Network), which are the same as LANs but smaller (2 to 3 machines), and CANs (Campus Area Networks), which are the same as MANs (with bandwidth limited between each of the network's LANs).
LAN

LAN stands for Local Area Network. It's a group of computers which all belong to the same organisation, and which are linked within a small geographic area using a network, and often the same technology (the most widespread being Ethernet).

A local area network is a network in its simplest form. Data transfer speeds over a local area network can reach up to 10 Mbps (such as for an Ethernet network) and 1 Gbps (as with FDDI or Gigabit Ethernet). A local area network can reach as many as 100, or even 1000, users.

By expanding the definition of a LAN to the services that it provides, two different operating modes can be defined:

* In a "peer-to-peer" network, in which communication is carried out from one computer to another, without a central computer, and where each computer has the same role.
* in a "client/server" environment, in which a central computer provides network services to users.

MANs

MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one another (over an area of up to a few dozen kilometres) at high speeds. Thus, a MAN lets two remote nodes communicate as if they were part of the same local area network.

A MAN is made from switches or routers connected to one another with high-speed links (usually fibre optic cables).
WANs

A WAN (Wide Area Network or extended network) connects multiple LANs to one another over great geographic distances.

The speed available on a WAN varies depending on the cost of the connections (which increases with distance) and may be low.

WANs operate using routers, which can "choose" the most appropriate path for data to take to reach a network node.

The most well-known WAN is the Internet.

Thursday, December 10, 2009

Wireless Network

Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires.[1] Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or "layer" of the network.[2]
Network security starts from authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name, i.e. the password which is something you 'know', this is sometimes termed one factor authentication. With two factor authentication something you 'have' is also used (e.g. a security token or 'dongle', an ATM card, or your mobile phone), or with three factor authentication something you 'are' is also used (e.g. a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.[1] Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS)[2] help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behaviour and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high level analysis.

Communication between two hosts using the network could be encrypted to maintain privacy.

Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis could be used to further tighten security of the actual network being protected by the honeypot.[3]

A useful summary of standard concepts and methods in network security is given by [4] in the form of an extensible ontology of network security attacks.
The terms Network Security and Information Security are often used interchangeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (hackers). Information Security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of Data Loss Prevention (DLP) techniques. One of these techniques is to compartmentalize large networks with internal boundaries. Employees have to cross these boundaries and be authenticated when attempting to access protected information.