2

VMware............. Networking practice tools .............


If anybody wants to learn computer networking, he needs more than one computer. So that maximum learner can’t practice in home. VMware provide them virtual machine. A user can use or run several virtual machine at a time. Each machine behaves like an individual computer. We can use those machines and can practice networking in home. This is the best software I ever had.


How to use VMware? 

At first you have to setup VMware workstation. Then you have to create a virtual machine.
 

You have to choose New virtual machine to create a virtual machine. 


Then another window arrived and showed welcome to the new virtual machine wizard
 Click Next
 Click Next

  Click Next


  Click Next
  Click Next
  Check Power on the virtual machine after creation Click Finish
 Then setup like all windows
Then you get your individual virtual machine

The main disadvantage of VMware is, you machine should have at least 1GB ram and Pentium 4




0

RoketDock ...................





RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.
Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.

Features:

  • Minimize windows to the dock
  • Real-time window previews in Vista
  • Running application indicators
  • Simple drag-n-drop interface
  • Multi-monitor support
  • Supports alpha-blended PNG and ICO icons
  • Icons zoom and transition smoothly
  • Auto-hide and Popup on mouse over
  • Positioning and layering options
  • Fully customizable
  • Completely Portable
  • ObjectDock Docklet support
  • Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
  • Runs great on slower computers
  • Unicode compliant
  • Supports many languages and can easily be translated
  • A friendly user base :)
  • And best of all... its FREE!!!
 If you want to check it out here download link  RockDock

It also support in windows 7
0

The Best Downloader for download a link like rapishare, hotfile etc.

 


JDownloader is open source, platform independent and written completely in Java. It simplifies downloading files from One-Click-Hosters like Rapidshare.com or Megaupload.com - not only for users with a premium account but also for users who don't pay. It offers downloading in multiple paralell streams, captcha recognition, automatical file extraction and much more. Of course, JDownloader is absolutely free of charge. Additionally, many "link encryption" sites are supported - so you just paste the "encrypted" links and JD does the rest. JDownloader can import CCF, RSDF and the new DLC files.






JDownloader - a program designed to download automatically without entering a code with the most popular sharing services, even without GOLD / premium account. JDownloader automatically detects the control tests, supports multi-threaded downloading, automatically extracts files from archives, etc.


Just right click and copy link to download a file. You should not have to past or add it add those file automatically and cheak online status.


To began ........... Right Click the link and continue....................

The Download link jdownloader 0.9.999(portable)
0

How to visit a banned website ..............


It’s very simple all you have to do is use proxy in your browser setting and start browsing.
·         Use IP address – This is the simplest way to bypass domain name based access restrictions.
·         Use Google cache – If you are not bothered whether the content is latest on a site, Google cache is best. Do a Google search for the site and then click on the cached link below the search results.
·         Use an Anonymizer – In this method you access a third party site which in turn routes your request to the required server. Some services provide URL encryption also. The problem is that most of these servers are no longer free. Do a Google search for the latest list as this is a very dynamic area.
·         Use Online Translation Tools – In this method, we can use the translation service as a web proxy. Following are the best links I know of. Again Google is your best friend for more resources.
·         Use Google Mobile search – Google mobile search works, but output may not be optimal. This is very similar to using a Web proxy.
·         Use a public Proxy server – There are many free proxy servers out in the Web. Note that in order to use these you have to change internet connection settings in Internet Explorer or whatever browser you use.
·         Get web pages via email – This is useful if you need a single Web page. Obviously accessing large files is not possible.
·         Use Tor Distributed Proxy – Tor is an advanced proxy server using multiple anonymous servers for a single Web request. This requires an application to be downloaded and installed.
·         Your own proxy server– This is an advanced technique and is probably the best. This requires your own proxy server hosted either at your home or at a hosting service provider. You can enable SSL encryption and prevent any snooping on the content as well. Also put some access control, otherwise someone can find the service and misuse it.
·         Use alternate content providers – When everything fails, you can use alternate service providers. For example if Gmail is blocked at your place, you can take another obscure mail address and enable email forward at Gmail.


We can also banned from our security settings for own PC. First we can select Internet option of the browser.
0

Forensic investigation ..................


Forensic Investigation: A forensic investigation is the search out of lawfully analyzing available, deleted, or "hidden" information and establishing evidence and facts that are to be presented in correct inlaw. The investigation is established by a forensic investigator. Forensics is a highly specialised career and there are only a few employment opportunities in the occupation.In modern times, the term is used for nearly all investigations and the ranging from computer or internet crimes to murders. This is may be a part of science relating legal evidence that is found in digital storage mediums as in computers and using internet. This field of forensic investigation has several areas including database forensics, firewall forensics, using cookie, URL history and Internet temporary files etc.

Forensic investigation provides:
Ø  To retrieve deleted computer files
Ø  The web sites that have been visited
Ø  The files what have been downloaded
Ø  When files were last accessed
Ø  Determination of when files were deleted 
Ø  Discovery of faxes or email messages and attachments sent or received.

0

The encryption Mathod of windows xp................

Encryption: In windows XP have file and folder security policy called encryption mathod. It secured a file from other users.


The process of encryption :-


 
1)      Select a file to encrypt and go to its properties.

 
Figure: Properties of selected file or folder




 
2.    On the General tab, click the Advanced button. Select the Encrypt contents to secure data check box, and then click OK.




Figure: Advance attributes
 

 
3.    In the Encryption Details dialog box, click Add to add a user from the local computer or from Active Directory.



2.    In the Select Users dialog box, click the user’s certificate, and then click OK.

Figure: user selection

 


0

What is a operating System?

The OS is a computer software that controls the execlution of computer programs and which may provide scheduling, debugging, I/O control, accounting, compilation, storage assignment, data management and related service.(American National Standards Institute (ANSI))
4

Advantage and disadvantage between Hub and Switch


 
Figure: Hub
Hub Advantages


  • A hub allows you connect clients to share and conversations with a network protocol analyser.
  • A hub also can modulate signal of the cable, if needed.
  •  Using hub save money because switches are costly then hub.
       
Hub Disadvantages:
  • Hub can’t control traffic of data. Cause it receive all attachment post.
  •  Hubs have limited port to connect client, so it is not suitable for large network.
  •   It works as a query system. When NIC send a work to the hub then hub make this work pending and process one by one. So it’s time consuming.
                 


Figure: Switch
 Switch Advantages



  • Client Performance: Because any given system attached to a switch sees only information explicitly addressed to its NIC, there is less overhead time spent throwing away packets that it does not need to read.
  • Higher Throughput: Because only relevant traffic is sent down any given network port, each NIC gets its own packets delivered to the switch independently of each other NIC attached to that switch. This means a switch can manage a larger total volume of data in transit at any given time.

Switch Disadvantages:


Switch: Unless the switch is expensive enough to include "port mirroring" capability, a sniffer is of limited use on a switch because the switch automatically filters out the traffic the sniffer would like to get.

Introduction to Networks and Networking Concepts

Networks are vital to the business use of computers, especially for the
applications and data that networks can deliver. If a single computer with
standard desktop software—such as word processing, spreadsheets, and
databases—can make anyone more productive,then interconnecting computers
on a network and bringing people and data together improves communications,
fosters productivity, and creates opportunities for collaborating and
exchanging information quickly and easily.
As a future network administrator, you must understand the fundamental
concepts in creating a network and making any network perform correctly. It’s
also important to understand what’s involved in networked communications
and which network models are best in different business situations. This
knowledge gives you a solid foundation for network design, implementation,
and troubleshooting tasks.



WHAT IS NETWORKING?

Networking involves connecting computers and other electronic devices for the purpose of
sharing information and resources and for communication. Even though the concept of
networking is basic, a great deal of technology is required for one device to connect and
communicate with another, and many choices for physical connections and related software
are possible. In the following sections, you learn about the fundamental concepts that drive
all networks to help you understand why networking is so important in the workplace and
in people’s everyday lives.


Local and Wide Area Networks

Originally, networks used expensive and complex technologies, and many of the earliest
networks were entirely custom-built. These early networks seldom interconnected more
than a dozen computers, nor were they likely to support more than one or two additional
peripheral devices. The earliest networking technologies imposed severe restrictions on the
number of interconnected machines and the physical span of the networks.For example,one
early networking technology could support a maximum of only 30 users on a single
network, with a total span of just 607 feet. This setup works well in a small office
environment with a limited number of connected machines, where the span from one end
of the office to the other—even allowing for characteristic twists and turns—falls within this
limitation.
A small network, limited to a single collection of machines and one or more cables and other
peripheral equipment, can be called a local area network (LAN). LANs also form the
basic building blocks for constructing larger networks called internetworks. An
internetwork is a network of networks or a networked collection of LANs tied together bydevices such as routers (discussed in Chapter 13). For large organizations that occupy more
than one floor in an office building or operate in multiple buildings in a campus setting, for
example, no single LAN can contain all the computers, cables, and other equipment needed
to bring together the entire user community. When the number of computers exceeds 100
and the distance to be spanned is more than 1000 feet, an internetwork is usually needed.
The Internet, the best example of the largest internetwork in the world, is a vast public
wide area internetwork that makes it possible for any computer in the world to communicate
with any other computer in the world using standard technologies and protocols.
Because of their limitations, early LANs were unable to meet the networking requirements
of large organizations, especially those that operated in multiple locations. The benefits of
networking were so great, however, that technology evolved to accommodate larger,
geographically dispersed organizations. As the scope of a network expands to encompass
multiple groups of users in multiple locations, LANs can grow into wide area networks
(WANs). AWAN is an internetwork that spans distances measured in miles and links two
or more separate LANs. WANs use the services of third-party communications providers,
such as telephone companies, to carry network traffic from one location to another.
Occasionally, you might encounter a network type called a metropolitan area network
(MAN). Essentially, MANs use WAN technologies to interconnect LANs in a specific
geographic region, such as a county or a city. It’s not uncommon to find large, complex
networks involving all three network types:LANs for purely local access,MANs for regional
or citywide access, andWANs for access to remote sites elsewhere in the country or around
the world.MANs have recently received a boost in popularity because of the growing trend
in some major cities to implement a citywide wireless network. In these cases, wireless
networking is possible in almost any part of the city, allowing users to stay connected
whether at home, at work, or at play. Some wireless technologies that make this type of
networking possible are discussed in Chapter 3.
Most businesses today use networks to store and share access to all kinds of data and
applications and to provide communications for employees and business partners. For these
reasons, networks are regarded as critical business tools. Nearly all users in today’s workplace
use computers to connect to their company networks.