Posts

Showing posts from September, 2020

How do I find out what version of SMB is enabled on a remote ...

  SMB or Server Message Block Protocols are used to connect your computer to an external server. Windows 10 ships with support of these protocols but they are disabled in the OOBE. Currently, Windows 10 supports SMBv1, SMBv2, and SMBv3 as well. Different servers depending upon their configuration require a different version of SMB to get connected to a computer. But in case you are using Windows 8.1 or Windows 7, you can check if you have it enabled too. That’s what we are going to do today. How to check SMB version on Windows 10/8/7 First of all, if you have Windows 7, you should not be disabling SMB v2. This is due to the following reasons: Request compounding – allows for sending multiple SMB 2 requests as a single network request Larger reads and writes – better use of faster networks Caching of folder and file properties – clients keep local copies of folders and files Durable handles – allow for connection to transparently reconnect to the server if there is a temporary disconnec

Configuring Rapid Spanning Tree Protocol

Rapid Spanning Tree Protocol (RSTP), a standard inter-switch protocol, ensures a loop-free forwarding network topology at Layer 2. This protocol was defined by the IEEE 802.1w standard and is an extension of the 802.1D Spanning Tree Protocol (STP). RSTP is an improvement over STP as it provides faster convergence after a network topology change or failure. RSTP introduces new port roles, and the original five port states of STP are reduced to three. To build a loop-free topology, switches (bridges) determine the root bridge and compute the port roles. To do this, the bridges use special data frames called Bridge Protocol Data Units (BPDUs) that exchange bridge IDs and root path cost information. BPDUs are exchanged regularly, typically at two second intervals, and enable switches to keep track of network topology changes and to start and stop forwarding on ports as required. Hosts should not send BPDUs to the switch ports and to avoid malfunctioning/malicious hosts from doing so, the s

Virus protection for the Mobile

  The operating system of your iDevice is always protected against viruses. The closed environment with its hidden file system makes it much harder for hackers to place a virus than a Windows PC or Android smartphone. In addition, you only need to load your apps from the App Store. Apple scrupulously checks every software. New programs are released for use only when everything is OK. Unlike Windows and Android, iOS does not require you to be afraid of viruses and other malware that can damage or disable your system. However, your data is not always necessarily in a safe place on iOS. Most recently, in 2019, a  major security vulnerability was  discovered in iOS that gave hackers access to a host of sensitive data, including contact data and WhatsApp chats. The hacker's favorite: The jailbreak Manipulate the system by  jailbreaking , open hackers the door to your smartphone. The file system is open here and is especially vulnerable to malicious attacks. What a jailbreak is and what

Linux and Windows Programming Conversion

  Once upon a time, the world of developers was split into two halves: One half was composed of Windows developers, who created most of the productivity apps that powered PCs (and, occasionally, servers). The other half comprised Linux and Unix developers, whose work focused on server-side development.Today, however, as the worlds of Windows and Linux move ever closer together, the distinction between Windows and Linux developers is disappearing. Gone are the days when you had to specialize in one ecosystem or the other. One was a set of programming languages and frameworks that were designed primarily for the Windows world, like C# and .NET. Although Windows developers sometimes also worked with languages like Java, which was engineered as a cross-platform language, you knew you were a Windows dev if you found yourself touting the importance of coding in a “pure” object-oriented language like C#. Most Windows developers were also united by Visual Studio, the IDE of choice in the Windo

problems of microsoft lan manager

  Redirector This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so muc

Parallel Distributed Computing

  The simultaneous growth in availability of big data and in the number of simultaneous users on the Internet places particular pressure on the need to carry out computing tasks “in parallel,” or simultaneously. Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software engineering. During the early 21st century there was explosive growth in multiprocessor design and other strategies for complex applications to run faster. Parallel and distributed computing builds on fundamental systems concepts, such as concurrency, mutual exclusion, consistency in state/memory manipulation, message-passing, and shared-memory models. Creating a multiprocessor from a number of single CPUs requires physical links and a mechanism for communication among the processors so that they may operate in parallel. Tightly coupled multiprocessors share memory and hence may communicate by sto

What is Corporate Network Administrator

  The area of ​​information technology, especially in regions with technology company hubs such as the South and Southeast, even with the crisis, are not affected as impactfully as other areas. This reflects the growing need for technology resource management, and is a motivation for future professionals who are still in doubt about which area to pursue. If you are interested in one of these job trends in information technology, one of the recommendations is the Network Technologist course. Once completed, the student acts as a network administrator. Let's look at some general duties of a professional in this area. Network Administrator Roles In addition to working autonomously, a recent graduate in the south and southeast begins earning a base salary working in the support area of ​​at least $ 2,000, but this amount depends on the state and the company. As experience is gained the salary goes up, either within the company itself or with proposals from other companies, climbing the

Virus protection for the Mobile

  Virus free apps on the iPhone - is iOS safe? The operating system of your iDevice is always protected against viruses. The closed environment with its hidden file system makes it much harder for hackers to place a virus than a Windows PC or Android smartphone. In addition, you only need to load your apps from the App Store. Apple scrupulously checks every software. New programs are released for use only when everything is OK. Unlike Windows and Android, iOS does not require you to be afraid of viruses and other malware that can damage or disable your system. However, your data is not always necessarily in a safe place on iOS. Most recently, in 2019, a  major security vulnerability was  discovered in iOS that gave hackers access to a host of sensitive data, including contact data and WhatsApp chats. The hacker's favorite: The jailbreak Manipulate the system by  jailbreaking , open hackers the door to your smartphone. The file system is open here and is especially vulnerable to mal

What is Windows Security Settings

  Microsoft Windows contains a range of security utilities designed to work in tandem with other security products, such as anti-virus software, to protect your computer. These include SmartScreen, which warns you when running unfamiliar programs, and Windows Firewall, which stops programs from reaching the Internet. You can also change Family Safety and User Account security settings. To start with any of these settings, press "Windows-X," click "Control Panel" and then change the view from "Category" to "Small Icons." Windows SmartScreen Step 1 Open "Action Center" in the Control Panel. Step 2 Click "Change Windows SmartScreen Settings" on the sidebar. Step 3 Choose whether SmartScreen should block unfamiliar files without administrator access, warn about unfamiliar files without blocking them or allow all files to run. Press "OK" when finished. read more :  lm security

Computer Network Hub Work?

  A network hub is a networking device that connects to one or more equipment. For example, a computer can connect to a server, printer and another computer through a network hub. It is useful in sharing of resources and broadcasting data it receives. It helps connects these devices together without having to connect to each other directly. There are three types of network hubs: Passive Hubs, Active Hubs and Intelligent Hubs. Passive Hubs One of the types of a network hub is the so-called passive hub. It's a pass-through that does not do anything more than just broadcast signals it receives through its input port, then sends it out through the output port. It does not do anything to regenerate or process the signals because it only functions as a connector of different wires in a topology. Active Hubs An active hub works more than just a connector but also regenerates the data bits to ensure the signals are strong. Another name for an active hub is a multiport repeater. It provides

What is Windows 10 Tune-up Utilities

  Every PC will become slow, sluggish, and problem-filled if a full maintenance is not performed. The sad part is the built-in Windows utilities do not clean the most important culprits. Most of us (including me) go beyond regular computer use by spending over 8 hours per day on our laptops or desktops. Every time you use a program, install new software or games, or simply browse the Internet, your PC will eventually experience corrupt system files, wrongful data values, harmful defunct registry bloat, and other accumulated junk files and data. Windows just goes along for the ride, and leaves these third party apps to their own devices. Only using proper tuneup utilities can you claim back your PC to a like-new state. Actually, it will be better than new because our recommended solution below improves PC speed, Internet performance, and provides perfect rock-solid stability. for more information:  lanmanserver windows 7

What is Distributed Computing

  The simultaneous growth in availability of big data and in the number of simultaneous users on the Internet places particular pressure on the need to carry out computing tasks “in parallel,” or simultaneously. Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software engineering. During the early 21st century there was explosive growth in multiprocessor design and other strategies for complex applications to run faster. Parallel and distributed computing builds on fundamental systems concepts, such as concurrency, mutual exclusion, consistency in state/memory manipulation, message-passing, and shared-memory models. Creating a multiprocessor from a number of single CPUs requires physical links and a mechanism for communication among the processors so that they may operate in parallel. Tightly coupled multiprocessors share memory and hence may communicate by sto

problems microsoft lan manager

  Redirector This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so muc

What is Spanning Tree Protocol

The Quick Definition: Spanning Tree Protocol (STP) is used to prevent Layer 2 loops, commonly known as broadcast storms, from disrupting local area networks. STP virtually disconnects redundant links to prevent loops from occurring. If you’re tasked with managing bridges and switches, you’ll probably encounter spanning tree protocol (STP) during your configurations. STP is used to configure backup connections when linking between two bridges or switches fails. It provides the most efficient way to forward information between LAN segments, reducing performance issues — without losing redundancy. Root Bridge Election After you connect switches or bridges together, the first thing your hardware does is select a root bridge. This can be any one of the switches, but Cisco normally chooses the switch with the lowest MAC address. It does this because it’s likely the longest switch in service, but it could also be the slowest. This is why some network administrators choose to conf

SMB version on Windows 10

SMB or Server Message Block Protocols are used to connect your computer to an external server. Windows 10 ships with support of these protocols but they are disabled in the OOBE. Currently, Windows 10 supports SMBv1, SMBv2, and SMBv3 as well. Different servers depending upon their configuration require a different version of SMB to get connected to a computer. But in case you are using Windows 8.1 or Windows 7, you can check if you have it enabled too. That’s what we are going to do today. How to check SMB version on Windows 10/8/7 First of all, if you have Windows 7, you should not be disabling SMB v2. This is due to the following reasons: Request compounding – allows for sending multiple SMB 2 requests as a single network request Larger reads and writes – better use of faster networks Caching of folder and file properties – clients keep local copies of folders and files Durable handles – allow for connection to transparently reconnect to the server if there is a te

What is Mobile Security Risk

Today’s business is non-stop. Employees need access to corporate systems and data wherever they are, around the clock. Only mobile devices provide the flexibility to allow employees that kind of constant connectivity. However, mobile devices introduce new kinds of security risks. Businesses need to consider using mobile device management (MDM) and enterprise mobility management (EMM) software to protect against these mobile device threats: 1. Operating system attacks Much like computers, mobile devices run a range of operating systems and versions, each with its vulnerabilities to attacks. Vendors provide patches, but when employees use their own devices, it’s up to every employee to download and install the upgrade. Protect against these threats by using your MDM software to prohibit connections from devices that aren’t using the latest, safest operating systems. 2. Application attacks If an application isn’t securely coded, it can have vulnerabilities such as stor

Hide a Server from the Microsoft Computer Browser Service

You can configure a computer so that it does not send announcements to browsers on the domain. If you do so, you hide the computer from the Browser list, which can help reduce network traffic. Editing the Registry 1. Open the registry editor and go to Microsoft Registry 1 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters 2.From the Edit menu, choose Add Value and type: Hidden Note: This value is case sensitive and must begin with a capital H. 3.In the Data Type field, choose REG_DWORD and choose OK. 4.In the Data field, type 1 to enable hiding and choose OK. 5.Restart your computer. Using the NET CONFIG SRV command This setting can also be changed using the following command: net config server /hidden:yes|no To hide the computer from the Browser List, type net config server /hidden:yes at the command prompt, and then press ENTER. To unhide the computer from the Browser list, type net config server /

What is LAN Monitor Software

Here's a list of four of the best programs for Monitoring your LAN and Local Network Traffic inside of your Perimeter. We've really focused on software packages that have management and monitoring capabilities dedicated to a LAN. The Network Performance Monitor by SolarWinds is an excellent overall tool for keeping a close eye on the health of your network. It boasts a strong variety of monitoring tools and a very robust alert system – which means you have to spend less time actively watching your network and can depend on the software to clue you in when something is amiss! The software even lets you customize your own alerts so that you can tailor your awareness to the specific needs of your network's use. This software is all about helping you predict and, ideally, prevent network downtime. It also offers some ability to monitor the actual traffic on your network but focuses heavily on up-time and device management. It also has some hand

Windows Task Manager

Use the End Task feature to clean up unneeded apps and processes running in Task Manager on your Windows 8 computer. However, should proceed with caution. When forcing an app to close in this way, you lose any unsaved data. If you force an important system process to end, elements of your computer may stop working properly. Only close processes you've researched to ensure they're not essential to the running of your computer. Step 1 Press "Ctrl-Shift-Esc" to launch Task Manager. You can also open Task Manager by typing "Task" on the Start screen and then clicking "Task Manager" on the Apps list. Step 2 Click the "More Details" button in the bottom-left corner of Task Manager to display all of the program's tabs. Step 3 Select the application or process you want to close. Apps are listed under the Apps heading. Processes are listed under the Background Processes heading. Step 4 Click the "End Task"