Posts

Showing posts from October, 2020

What is the default SMB version

  SMB or Server Message Block Protocols are used to connect your computer to an external server. Windows 10 ships with support of these protocols but they are disabled in the OOBE. Currently, Windows 10 supports SMBv1, SMBv2, and SMBv3 as well. Different servers depending upon their configuration require a different version of SMB to get connected to a computer. But in case you are using Windows 8.1 or Windows 7, you can check if you have it enabled too. That’s what we are going to do today. How to check SMB version on Windows 10/8/7 First of all, if you have Windows 7, you should not be disabling SMB v2. This is due to the following reasons: Request compounding – allows for sending multiple SMB 2 requests as a single network request Larger reads and writes – better use of faster networks Caching of folder and file properties – clients keep local copies of folders and files Durable handles – allow for connection to transparently reconnect to the server if there is a temporary disconnec

Distributed Computing in networking

  The simultaneous growth in availability of big data and in the number of simultaneous users on the Internet places particular pressure on the need to carry out computing tasks “in parallel,” or simultaneously. Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software engineering. During the early 21st century there was explosive growth in multiprocessor design and other strategies for complex applications to run faster. Parallel and distributed computing builds on fundamental systems concepts, such as concurrency, mutual exclusion, consistency in state/memory manipulation, message-passing, and shared-memory models. Creating a multiprocessor from a number of single CPUs requires physical links and a mechanism for communication among the processors so that they may operate in parallel. Tightly coupled multiprocessors share memory and hence may communicate by sto

Windows Task Manager role in Networking operations

  Use the End Task feature to clean up unneeded apps and processes running in Task Manager on your Windows 8 computer. However, should proceed with caution. When forcing an app to close in this way, you lose any unsaved data.  If you force an important system process to end, elements of your computer may stop working properly. Only close processes you've researched to ensure they're not essential to the running of your computer. Step 1 Press "Ctrl-Shift-Esc" to launch Task Manager. You can also open Task Manager by typing "Task" on the Start screen and then clicking "Task Manager" on the Apps list. Step 2 Click the "More Details" button in the bottom-left corner of Task Manager to display all of the program's tabs. Step 3 Select the application or process you want to close. Apps are listed under the Apps heading. Processes are listed under the Background Processes heading. Step 4 Click the "End Task" button in the bottom-rig

LAN Manager authentication level for Network security

  This policy setting determines which challenge or response authentication protocol is used for network logons. LAN Manager (LM) includes client computer and server software from Microsoft that allows users to link personal devices together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory domains, the Kerberos protocol is the default authentication protocol. However, if the Kerberos protocol is not negotiated for some reason, Active Directory uses LM, NTLM, or NTLM version 2 (NTLMv2). LAN Manager authentication includes the LM, NTLM, and NTLMv2 variants, and it is the protocol that is used to authenticate all client devices running the Windows operating system when they perform the following operations: Join a domain Authenticate between Active Directory forests Authenticate to domains based on earlier versions of the Windows operating system Authenticate to computers tha

Whati is SMB

  SMB or Server Message Block Protocols are used to connect your computer to an external server. Windows 10 ships with support of these protocols but they are disabled in the OOBE. Currently, Windows 10 supports SMBv1, SMBv2, and SMBv3 as well. Different servers depending upon their configuration require a different version of SMB to get connected to a computer. But in case you are using Windows 8.1 or Windows 7, you can check if you have it enabled too. That’s what we are going to do today. How to check SMB version on Windows 10/8/7 First of all, if you have Windows 7, you should not be disabling SMB v2. This is due to the following reasons: Request compounding – allows for sending multiple SMB 2 requests as a single network request Larger reads and writes – better use of faster networks Caching of folder and file properties – clients keep local copies of folders and files Durable handles – allow for connection to transparently reconnect to the server if there is a temporary disconnec

Monitoring your LAN and Local Network Traffic

  Here's a list of four of the best programs for Monitoring your LAN and Local Network Traffic inside of your Perimeter. We've really focused on software packages that have management and monitoring capabilities dedicated to a LAN. The Network Performance Monitor by SolarWinds is an excellent overall tool for keeping a close eye on the health of your network. It boasts a strong variety of monitoring tools and a very robust alert system – which means you have to spend less time actively watching your network and can depend on the software to clue you in when something is amiss! The software even lets you customize your own alerts so that you can tailor your awareness to the specific needs of your network's use. This software is all about helping you predict and, ideally, prevent network downtime. It also offers some ability to monitor the actual traffic on your network but focuses heavily on up-time and device management. It also has some handy tools for deploying and monito

network security level

  Networking is ever present. Every business needs it from day one. Mobile devices and cloud services depend on it, and IoT devices are mission critical. Nearly every house or apartment has a router and devices communicating with the outside world. Given the proliferation of networked devices, people assume that networking is already a solved problem. But when your network starts behaving erratically, you realize networking is still difficult. Why? The flawed promise of public protocols A network with all its component parts purchased from the same company is extraordinarily uncommon. Modern networking enables hardware from different vendors to interoperate — in theory. There are several flaws in that vision. Public protocols are so flexible that people make hardware do things the writers never anticipated. The protocol definitions can have design flaws or errors in protocols and specifications. For instance, vendors implementing DNS make slightly different choices and those devices ma

Networking Difficulties

  Networking is ever present. Every business needs it from day one. Mobile devices and cloud services depend on it, and IoT devices are mission critical. Nearly every house or apartment has a router and devices communicating with the outside world. Given the proliferation of networked devices, people assume that networking is already a solved problem. But when your network starts behaving erratically, you realize networking is still difficult. Why? The flawed promise of public protocols A network with all its component parts purchased from the same company is extraordinarily uncommon. Modern networking enables hardware from different vendors to interoperate — in theory. There are several flaws in that vision. Public protocols are so flexible that people make hardware do things the writers never anticipated. The protocol definitions can have design flaws or errors in protocols and specifications. For instance, vendors implementing DNS make slightly different choices and those devices ma

Virus free apps on the iPhone - is iOS safe?

  Virus free apps on the iPhone - is iOS safe? The operating system of your iDevice is always protected against viruses. The closed environment with its hidden file system makes it much harder for hackers to place a virus than a Windows PC or Android smartphone. In addition, you only need to load your apps from the App Store. Apple scrupulously checks every software. New programs are released for use only when everything is OK. Unlike Windows and Android, iOS does not require you to be afraid of viruses and other malware that can damage or disable your system. However, your data is not always necessarily in a safe place on iOS. Most recently, in 2019, a  major security vulnerability was  discovered in iOS that gave hackers access to a host of sensitive data, including contact data and WhatsApp chats. The hacker's favorite: The jailbreak Manipulate the system by  jailbreaking , open hackers the door to your smartphone. The file system is open here and is especially vulnerable to mal

Networking Difficulties

  Networking is ever present. Every business needs it from day one. Mobile devices and cloud services depend on it, and IoT devices are mission critical. Nearly every house or apartment has a router and devices communicating with the outside world. Given the proliferation of networked devices, people assume that networking is already a solved problem. But when your network starts behaving erratically, you realize networking is still difficult. Why? The flawed promise of public protocols A network with all its component parts purchased from the same company is extraordinarily uncommon. Modern networking enables hardware from different vendors to interoperate — in theory. There are several flaws in that vision. Public protocols are so flexible that people make hardware do things the writers never anticipated. The protocol definitions can have design flaws or errors in protocols and specifications. For instance, vendors implementing DNS make slightly different choices and those devices ma

How to Open and Use Task Manager on a PC

  Use the End Task feature to clean up unneeded apps and processes running in Task Manager on your Windows 8 computer. However, should proceed with caution. When forcing an app to close in this way, you lose any unsaved data. If you force an important system process to end, elements of your computer may stop working properly. Only close processes you've researched to ensure they're not essential to the running of your computer. Step 1 Press "Ctrl-Shift-Esc" to launch Task Manager. You can also open Task Manager by typing "Task" on the Start screen and then clicking "Task Manager" on the Apps list. Step 2 Click the "More Details" button in the bottom-left corner of Task Manager to display all of the program's tabs. Step 3 Select the application or process you want to close. Apps are listed under the Apps heading. Processes are listed under the Background Processes heading. Step 4 Click the "End Task" button in the bottom-righ

Does anyone know network optimization problems

  Networking is ever present. Every business needs it from day one. Mobile devices and cloud services depend on it, and IoT devices are mission critical. Nearly every house or apartment has a router and devices communicating with the outside world. Given the proliferation of networked devices, people assume that networking is already a solved problem. But when your network starts behaving erratically, you realize networking is still difficult. Why? The flawed promise of public protocols A network with all its component parts purchased from the same company is extraordinarily uncommon. Modern networking enables hardware from different vendors to interoperate — in theory. There are several flaws in that vision. Public protocols are so flexible that people make hardware do things the writers never anticipated. The protocol definitions can have design flaws or errors in protocols and specifications. For instance, vendors implementing DNS make slightly different choices and those devices ma

What is use of LAN Monitor Software

  Here's a list of four of the best programs for Monitoring your LAN and Local Network Traffic inside of your Perimeter. We've really focused on software packages that have management and monitoring capabilities dedicated to a LAN. The Network Performance Monitor by SolarWinds is an excellent overall tool for keeping a close eye on the health of your network. It boasts a strong variety of monitoring tools and a very robust alert system – which means you have to spend less time actively watching your network and can depend on the software to clue you in when something is amiss! The software even lets you customize your own alerts so that you can tailor your awareness to the specific needs of your network's use. This software is all about helping you predict and, ideally, prevent network downtime. It also offers some ability to monitor the actual traffic on your network but focuses heavily on up-time and device management. It also has some handy tools for deploying and monito

Critical Vulnerabilities in Windows Leave Computers Exposed

  This is something you should only measure on your Terminal Server(s). You should monitor the "current commands" in the Redirector object. If the value is higher than 20 during sustained periods of time then you could have a bottleneck. Server Work Queues The Server Work Queues object should be monitored on the File server. You should monitor the "Available WorkItems" counter. Sustained values smaller than ten mean that the File server is running out of work items. When it does, performance really starts to plummet. Make sure this doesn't happen by upping the MinFreeworkItems value. Server In this object there's a counter called "Work Item Shortages". This value represents the number of times no work items were available or couldn't be allocated to service a file request. Obviously if you see any other value than zero, you need to start worrying. Upping the InitWorkItems or MaxWorkItems could help out here. Again, there's so much more you

What Is a Hub in a Computer Network?

  A network hub is a networking device that connects to one or more equipment. For example, a computer can connect to a server, printer and another computer through a network hub. It is useful in sharing of resources and broadcasting data it receives. It helps connects these devices together without having to connect to each other directly. There are three types of network hubs: Passive Hubs, Active Hubs and Intelligent Hubs. Passive Hubs One of the types of a network hub is the so-called passive hub. It's a pass-through that does not do anything more than just broadcast signals it receives through its input port, then sends it out through the output port. It does not do anything to regenerate or process the signals because it only functions as a connector of different wires in a topology. Active Hubs An active hub works more than just a connector but also regenerates the data bits to ensure the signals are strong. Another name for an active hub is a multiport repeater. It provides

Common mobile security threats and how to prevent them

  Today’s business is non-stop. Employees need access to corporate systems and data wherever they are, around the clock. Only mobile devices provide the flexibility to allow employees that kind of constant connectivity. However, mobile devices introduce new kinds of security risks. Businesses need to consider using mobile device management (MDM) and enterprise mobility management (EMM) software to protect against these mobile device threats: 1. Operating system attacks Much like computers, mobile devices run a range of operating systems and versions, each with its vulnerabilities to attacks. Vendors provide patches, but when employees use their own devices, it’s up to every employee to download and install the upgrade. Protect against these threats by using your MDM software to prohibit connections from devices that aren’t using the latest, safest operating systems. 2. Application attacks If an application isn’t securely coded, it can have vulnerabilities such as storing passwords and

Mobile Phone Virus Protection

The operating system of your iDevice is always protected against viruses. The closed environment with its hidden file system makes it much harder for hackers to place a virus than a Windows PC or Android smartphone. In addition, you only need to load your apps from the App Store. Apple scrupulously checks every software. New programs are released for use only when everything is OK. Unlike Windows and Android, iOS does not require you to be afraid of viruses and other malware that can damage or disable your system. However, your data is not always necessarily in a safe place on iOS. Most recently, in 2019, a  major security vulnerability was  discovered in iOS that gave hackers access to a host of sensitive data, including contact data and WhatsApp chats. The hacker's favorite: The jailbreak Manipulate the system by  jailbreaking , open hackers the door to your smartphone. The file system is open here and is especially vulnerable to malicious attacks. What a jailbreak is and what yo