Showing posts with label Internet Tips. Show all posts
Showing posts with label Internet Tips. Show all posts

Sunday, February 16, 2014

AD (Active Directory) Photo Edit Free

If you are an IT admin at place that uses a Microsoft Windows Active Directory domain then you might have the need to import employee pictures into Active Directory so they can be pushed out to software programs such as Lync, SharePoint and Outlook. Since these programs are integrated into Active Directory they can pull user pictures and display them within the software.
Read More...

Friday, February 14, 2014

Sysinternals Autoruns Startup Information Utility

Autoruns by Sysinternals is a free utility that can show you everything that is set to start with your computer. It’s similar to the Windows System Configuration Utility (msconfig) but shows much more information. This can come in very handy if you are trying to troubleshoot issues such as slow startup times with your computer, error messages that pop up at startup, strange programs that run on their own right after Windows starts or slow overall performance because of a program or programs using your computer's resources. Autoruns is a free download and consists of an executable file so there is nothing to install. If you are running Windows Vista or Windows 7 you should run it as Administrator to avoid any permission issues. To run the utility as administrator simply right click the executable file and choose Run as Administrator. You may get a popup asking you if this is what you want to do so just click Ok if you do.
Autoruns can show you information such as the following:
Read More...

Taskbar Repair Tool Plus!- PC Troubleshooting Help Tips

The Taskbar Repair Tool Plus! Utility allows you to Repair and Customize the Quick Launch, Taskbar and Notification Area among other things in Windows XP. We have tested it in newer versions of Windows such as Windows 7 and it seems to work with it as well. This tool comes in very handy if you are having problems with your taskbar that traditional methods can't fix such as if your taskbar is missing altogether or if you have toolbars that are grayed out or missing.
It's a fairly simple utility to use and once you get used to the interface you should have no problem fixing or customizing your taskbar to suit your needs. The Taskbar Repair Tool Plus! utility is a single executable file that you run so there is nothing you need to install on your computer to run it.
Read More...

Get Rid of Low FPS (frames per second) Once and for All

If you have recently started to experience a drop in your frame rate while playing your favorite PC games, or if your frames per second have been an ongoing issue for some time, then you know how frustrating it is to deal with low FPS. And, curing your low frame rate is probably a high priority.
Read More...

Windows 7 Troubleshooting Tool

Everyone has problems with their computer at some point or another. It doesn't matter if you are using Windows, Linux or Mac as your operating system. Computers are not perfect and they have problems from time to time that you will need to have fixed or try and fix yourself. Windows is always trying to make computers easier to use and fix with each release of Windows.
Read More...

6 Tips and Tricks to Get Most Out of Windows 8

With Windows 8 due to be released on October 26, many people are wondering whether or not they should upgrade. With its very considerable changes over its predecessors, many people are understandably getting nervous about the new operating system. In fact, Windows 8 presents by far the biggest changes to the whole look and feel of the operating system since the launch of Windows 95 replaced the 16-bit era of Windows 3.1. With the highly touchscreen-orientated interface, many users may find themselves rather confused when they first try out the new operating system. Here are some tips and tricks to help you get the most out of Windows 8, particularly for those using traditional desktop and notebook computers which don't have touchscreens.
Read More...

WinAmp Media Payer shutting down after 15 years

If you have been a Windows user for a long time you most likely have used or at least heard of WinAmp Media Player. It was a very popular free program that would play audio and video files and was used by a lot of people. It was also used to stream audio from internet radio sites and the like. WinAmp supported a variety of file types making it popular for end users.
Read More...

Next generation USB is faster and the connector fits both ways

If you have ever plugged in a USB device (and who hasn’t), you must have at some time fumbled with plugging it in the right direction since the connections look pretty much the same on both sides. But don’t count on using it with existing USB pugs because it won’t fit because it will be smaller than today’s USB plugs and closer to Micro USB size.
Read More...

Not even your video games are safe from prying eyes

With all the recent NSA and Edward Snowden news about government spying one would wonder what you can and can’t do in the world of electronics that is safe from "the man". We already know that phone calls and emails are subject to surveillance but it doesn’t end there.
Read More...

Windows 7 retail sales have ended


If you are looking to upgrade the version of Windows running on your computer to Windows 7 or are looking to build your own Windows 7 computer then you better get your hands on a copy of Windows 7 before they become extinct. Microsoft has announced that they have discontinued distributing retail copies of Windows 7 to retailers in October of this year.
Read More...

NSA malware on over 50,000 computers

We all know how big of a problem malware is these days with cyber criminals trying to steal your personal information. And one would think the government is trying to prevent these types of cyber attacks from happening so we can have some sort of peace of mind when it comes to our home computer.
Read More...

Courts rule against Net Neutrality

The Internet is a place that most of us consider to be free and open where we can reach any website out there without having to worry about being cut off or restricted. This was the goal of the FCC (Federal Communications Commission) Net Neutrality plan which would require internet providers to treat all traffic equally and not pick and choose what traffic goes through and who gets what bandwidth.
Read More...

YouTube to offer 4k video

If you have a semi new TV then you know what HD looks like and are familiar with terms like 1080p and 720p in regards to the resolution\definition of the picture. And if you watch YouTube videos you most likely know that most videos have the option to watch in HD assuming the uploader recorded the video in HD to begin with. Most of the time switching to HD makes quite a difference in picture quality but can sometimes cause slower performance and lagging with the video itself.
Read More...

Wednesday, February 12, 2014

Ensuring Network Security with a VPN (Virtual Private Network)

Virtual private networks (VPNs) were created to address two different problems: the high cost of dedicated leased lines needed for branch office communications and the need to allow employees a method of securely connecting to the headquarters' networks when they were on business out of town or working from home.

How a VPN works

A VPN uses a special protocol to establish a virtual channel between two machines or two networks. Imagine if you could blow a soap bubble in the shape of a tube and only you and your friend could talk through it. The bubble is temporary and when you want to have another conversation, you would have to create another bubble. That's kinda like a VPN's channel. This channel is actually a temporary direct session. This is what is commonly referred to as tunneling.
Then the VPN also exchanges a set of shared secrets to create an encryption key. The traffic traveling along the established channel is wrapped with an encrypted package that has an address on the outside of the package, but the contents are hidden from view. It's sort of like a candy wrapper. You can see the candy, but you don't really know what the candy looks like on the inside. The same thing happens with the encrypted traffic. The original contents are hidden from view, but it has enough information to get it to its destination. After the data reaches its destination, the wrapper is safely removed.

Setting up a VPN

You can set up a VPN two ways: The first way is normally used between networks and firewalls or encrypting routers to do the encrypting and decrypting of the traffic. In this set up there is no need for special software on the desktop or client computers. The second method is to have a firewall, encrypting router, or VPN server at the destination end and special VPN client software on the desktop or laptop computers. It all depends on whether the VPN is a two-way operation or a one-way operation.

Determine the relationship

In a two-way relationship you have two networks that want to work together and each has basically the same VPN setup as the other. The request to establish a VPN connection can come from either direction. No special software is needed on the desktop computers because all the encrypting and decrypting is done at the entry and exit points of the network. Both networks also have key management systems so they can both create secret keys for a VPN session. It's important that the two networks have compatible VPN components or they won't be successful in talking to one another.
In a one-way relationship, the destination network has the VPN setup and there is no agreement with another network to share. In that case, the computer wanting to make the connection with the network has to have VPN client software and the request can only be made in one direction — from the client to the network. The client software can request and authenticate itself, but the secret key making mechanisms are only on the network. The client computer will have a secret key stored on itself, but it cannot create new keys.
Generally, the one-way system is used for remote users who are dialing in from home or while they are traveling on the road. They dial up through their ISP and the mechanisms for establishing and maintaining VPN connections is all contained at the destination network. If someone with a laptop without the VPN client software tried to connect to the company's network, he wouldn't get too far because he wouldn't have the client software or a secret key. Additionally, the unauthorized user would not be listed on the VPN's database of authorized users. However, once someone dials in and is authenticated, their access is the same as if they were sitting in the same building as the destination network.

Inside or outside?

You can set up the VPN endpoint at various locations. The endpoint is where the VPN traffic comes into your network. In some cases, the endpoint is also the firewall as many firewalls come with VPN capabilities nowadays. The endpoint can also be in front of the firewall, in a DMZ off one side to the firewall, or inside of the firewall. Each of these configurations has its pluses and minuses.
If you choose to put your VPN in front of the firewall, the mechanism does all of the encrypting and decrypting on its own. That means there is no need to allow an open VPN tunnel through your firewall. All of the traffic through the firewall will have been pre-filtered and formatted so the firewall can read it. However, if the VPN fails or is taken down, you'll be faced with a situation where all the traffic goes out unencrypted, or no traffic at all gets out. It depends on whether or not your VPN will fail in the open or closed position.
A VPN on the firewall would seem like a good solution because, again, you don't need to leave an open tunnel through the firewall. The firewall will handle all the encryption, decryption, and its regular job of the examination of traffic. This type of solution puts an enormous burden on the poor little firewall, though. Encryption and decryption is labor-intensive for a computer, as is the examination of traffic, and that could result in a bottleneck for traffic.
Another method is to put the VPN on the inside of the firewall. This relieves the firewall and/or the router of having to handle the encryption and decryption of the traffic, but you have to allow a VPN tunnel to pass through the firewall. A firewall cannot read encrypted traffic and it will allow that traffic to pass through unchallenged. Of course, the traffic will still be stopped by the VPN mechanism, but by that time, it's already in the internal network.

Securing the client

Probably the easiest way to break a VPN's security is to get a hold of a laptop that is used to dial in for a VPN connection. The stolen laptop will have the VPN client software, the UserID, and the secret key all stored on one machine. A smart laptop owner will not have saved the password for the VPN tunnel on his computer. If he has, the thief has just gotten himself a free ticket to wander around in your network!
Users who use laptops to establish VPN connections with your network need to be given lessons in maintaining good security. They should have up-to-date anti-virus software installed and ensure that it runs every time they start their computer. Additionally, the laptop should have personal firewall software set up. Some VPN clients already include personal firewalls, so you'll have to check with your vendor as to whether yours does or doesn't. The personal firewall can ensure that only the VPN client is making the connection and that it's not actually a Trojan horse program masquerading as the VPN client. Another good precaution is to enable the BIOS password. That way, if the computer is stolen, it cannot even be started up without the password.
Read More...

Configuring a Wireless Access Point

The physical setup for a wireless access point is pretty simple: You take it out of the box, put it on a shelf or on top of a bookcase near a network jack and a power outlet, plug in the power cable, and plug in the network cable.
The software configuration for an access point is a little more involved, but still not very complicated. It's usually done via a Web interface. To get to the configuration page for the access point, you need to know the access point's IP address. Then, you just type that address into the address bar of a browser from any computer on the network.
Multifunction access points usually provide DHCP and NAT services for the networks and double as the network's gateway router. As a result, they typically have a private IP address that's at the beginning of one of the Internet's private IP address ranges, such as 192.168.0.1 or 10.0.0.1. Consult the documentation that came with the access point to find out more.

Basic configuration options

When you access the configuration page of your wireless access point on the Internet, you have the following configuration options that are related to the wireless access point functions of the device. Although these options are specific to this particular device, most access points have similar configuration options.
  • Enable/Disable: Enables or disables the device's wireless access point functions.
  • SSID: The Service Set Identifier used to identify the network. Most access points have well-known defaults. You can talk yourself into thinking that your network is more secure by changing the SSID from the default to something more obscure, but in reality, that only protects you from first-grade hackers. By the time most hackers get into the second grade, they learn that even the most obscure SSID is easy to get around. So leave the SSID at the default and apply better security measures.
  • Allow broadcast SSID to associate? Disables the access point's periodic broadcast of the SSID. Normally, the access point regularly broadcasts its SSID so that wireless devices that come within range can detect the network and join in. For a more secure network, you can disable this function. Then, a wireless client must already know the network's SSID in order to join the network.
  • Channel: Lets you select one of 11 channels on which to broadcast. All the access points and computers in the wireless network should use the same channel. If you find that your network is frequently losing connections, try switching to another channel. You may be experiencing interference from a cordless phone or other wireless device operating on the same channel.
  • WEP — Mandatory or Disable: Lets you use a security protocol called wired equivalent privacy.

DHCP configuration

You can configure most multifunction access points to operate as a DHCP server. For small networks, it's common for the access point to also be the DHCP server for the entire network. In that case, you need to configure the access point's DHCP server. To enable DHCP, you select the Enable option and then specify the other configuration options to use for the DHCP server.
Larger networks that have more demanding DHCP requirements are likely to have a separate DHCP server running on another computer. In that case, you can defer to the existing server by disabling the DHCP server in the access point.
Read More...

Looking into Routed versus Routing Protocols for the CCNA Exam

When preparing for the CCNA exam, review routers and their protocols by starting with the difference between a routed protocol and a routing protocol. Knowing the difference between these two protocols is fundamental to understanding how routers route.
Networked devices communicate over routes, which are paths between sending devices and receiving devices. A networked device learns about a route between it and another device in a variety of ways:
  • Manually: A network administrator can manually configure a route.
  • Pull: Devices can send out polling messages or "probes" to discover the route to a destination.
  • Push: Devices can send out route information about routes it knows.
Regardless whether the route information is manually entered, discovered, or received from another device, the information learned is stored in the routing table for later use.

Inside versus outside

A routing protocol sends and receives routing information packets to and from other routers. A routed protocol can be routed by a router, which means that it can be forwarded from one router to another. Yes, there are protocols that can't be routed, such as NetBEUI (Network Basic Input Output System Extended User Interface).
That a routed protocol can be routed may seem obvious, but unless you know how to differentiate it from a routing protocol, you may have trouble with the wording for some questions on the exam.
protocol is a set of rules that defines how two devices communicate with one another. It also defines the format for the packets used to transmit data over communications lines. A routed protocolcontains the data elements required for a packet to be sent outside its host network or network segment. In other words, a routed protocol can be routed. Protocols used to communicate routing information between routers within an autonomous system are Interior Gateway Protocols (IGP), which are routing protocols, but not routed protocols.
Routing protocols gather and share the routing information used to maintain and update routing tables. That routing information is in turn used to route a routed protocol to its final destination. Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP) are the routing protocols you need to know for the exam. If you can remember what the abbreviations mean, you'll remember that they are routing protocols because they have routing in their names. Remember, too, that they are not routed protocols.
In short, routed protocols route your data and routing protocols send routing updates between routers about the status of the network so that your routed protocol data can be routed. Got that? No? Well, try this to help keep it straight:
1. Routed protocols get routed.
2. Routing protocols are for updating (the info about the routes over which routed protocols are routed).
Examples of routed protocols are IP and IPX, and examples of routing protocols are RIP and IGRP.

A routing we will go

Routing is the process of moving data along a path from a source to a destination. The complexity of this process involves finding the most efficient route from a multitude of available routes. Routing occurs at the Network layer (Layer 3).
To assist itself in making its routing decisions, the router builds routing tables to store information about routes to networks it has previously discovered. Most routers keep an entry, known as the default route, in their table to be used when the router doesn't have an explicit route for a packet. Figure 1 shows both what a routing table contains as well as where it fits into a network. Notice that it consists of network addresses and the interface to which each device, associated with an address, is connected.

Figure 1: A routing table of a network router.

Routing types you need to know for the exam

As far as the CCNA exam goes, there are three types of routing: static, dynamic, and default. Details about these routing types appear in the following sections.

Static routes: One-lane roads

Static routes are fixed routes that are manually entered by the administrator into the router's configuration. If a static route is entered into the configuration, it must be manually updated should the network topology change. Not that the topology of the network is likely to change too frequently, but you may decide to change the segmenting structure or make other topology-level changes. When changes occur, the administrator must update the router configuration to include the changes, which is why static routing is not generally used in a large network. The time required to maintain the routing tables can become a burden.
Static routes are generally used if the internetwork, the part of the network that lies beyond the router, is accessible through only one path. A network with only a single path to the rest of the internetwork is known as a stub network. Static routes are also used for security reasons because they allow the administrator to restrict knowledge of the network from outside sources. A static route is configured on the router with a command like this:
Router(config)#ip route 192.168.1.0 255.255.255.0 192.168.101.1 3
This example contains the command (ip route) and the IP address of the destination network, the subnet mask, the IP address of the next hop router, and an administrative distance (more on that later).
Using the previous command example, the key elements of the static route configuration command are (memorize these for the exam):
  • ip route: This is the command used to designate a static route.
  • destination address: In this example, 192.168.1.0 is the IP address of the destination network.
  • subnet mask: 192.168.1.0 is a Class C IP address and is using the default subnet mask for Class C addresses, 255.255.255.0.
  • next hop: Following the subnet mask is the address of the next hop router, 192.168.1.1.
  • administrative distance: This is a number between 0 and 255 that indicates how well the route can be trusted. The higher the number, the lower the trust. An administrative distance of 120 falls about midrange on the trustworthiness scale. So, as indicated by the 3 in the ip route command, this route is very trustworthy.

A dynamic personality

Dynamic routing is the process by which a network adapts automatically to the changes in topology or traffic as those changes occur. To be successful, dynamic routing requires timely maintenance of routing tables. The routing protocol used defines how this occurs and includes such information as when, what, and how the updates are sent.

When all else fails

A default route is very much like a static route. The administrator enters the default route, and it becomes the default path the router uses to forward packets for which it knows no other route to use. Without a default route, packets with unknown destinations are dropped.
When no specific next hop is listed in the routing table for a particular type of packet, the router uses its default route, a preassigned route that is generally available.
Read More...

Exploring TCP/IP Routers

Routers connect networks. Routers range from someone's desktop PC running Internet sharing software to multimillion-dollar systems of specialized hardware and software. In the original work on TCP/TP, the designers wanted to be able to move data across a network even if parts of the network became disrupted. For example, if a network link were taken out by enemy attack, the traffic on that link would automatically reroute to a different link. This reliable scheme is called dynamic rerouting. Your system doesn't have to be a victim of an enemy attack for dynamic rerouting to be valuable. If a forklift cuts a cable in a warehouse, for example, dynamic rerouting means that inventory data can still be sent across a network via a different route.
(In network parlance, you can pronounce router either rowter or rooter. Just pick a side and join the battle. People pronounce it both ways and some are willing to fight for their choice.)
A router extends a LAN by linking two or more network segments that may or may not use the same media type. The router permits each connected network to maintain its independent identity and address. Figure 1 shows a small intranet consisting of two subnets. The router connects the subnets and connects the entire intranet to the Internet.

Figure 1: This router connects the subnets to each other and the intranet to the Internet.
When someone at address 130.103.2.1 sends e-mail to 130.103.2.4, the router is smart enough to see that the message is staying on the same subnet. There is no need to investigate any routes to the other subnet or to the Internet. When 130.103.2.1 sends e-mail to 130.103.1.4, however, the router forwards the message to the other subnet. When someone from anywhere within the intranet sends a message outside the 130.103 intranet, the router forwards the message out to the Internet.
What makes routers special is that they're intelligent enough to understand IP addresses. In fact, the decisions the router makes about directing the packets of your data are based on the network portion of the IP address. A router contains a network interface card for each segment of the network that it connects. Each network interface card has a different IP address because the router itself is a member of each network. The router gets most of its intelligence from routing tables. Routing tablesare stored on the router and contain information about the following:
  • Paths (routes) to particular networks
  • How to handle special kinds of traffic
  • Priorities for certain connections
On big fancy routers, routing tables also store statistics on which routes are fastest and shortest.

Understanding how routers work

Routers work at the Internet, data link, and physical layers of the TCP/IP structure. A router resembles an octopus whose tentacles represent all of your cabling types. Routers are aware of the multiple paths that your data packets can take across the network to their final destination. The router knows about other routers on the network and can choose the most efficient path for the data to follow. This efficient path may change as network devices change and as traffic comes and goes.
For example, on Monday, the most efficient path may be from network A to network C to network B. On Tuesday, however, the most efficient path may be from network A to network D to network B because network C is broken. Because the router knows about any problems on the network path, it can detour your data when necessary. Not only are routers intelligent, they talk to each other and share knowledge, especially traffic reports: "Route A is jammed right now. Take route B instead. Route C has disappeared."
Routers use a routing protocol to find out information about the entire network and to determine the optimal path for sending a packet on to its destination. What's optimal? Is it the shortest path (fewest hops from one host to another)? Or the fastest path (more hops on speedier links)? Or the least congested path?
Suppose you want to go from Boston to New York City (NYC) to visit the Empire State Building. Your top three choices are probably these:
  • Drive to NYC on Interstate 95 and use a city map to find the Empire State Building.
  • Drive to Boston's Logan Airport. Fly to JFK Airport in NYC. Take a taxi to the Empire State Building.
  • Drive to Boston's South Station. Take a train to Penn Station in NYC. Take the subway to the Empire State Building.
Which way do you think will get you there fastest? If you've never driven to Logan Airport during rush hour and through construction, you would guess that flying from Logan to JFK is the fastest route. However, depending on city traffic, flying may actually be the slowest way.
The shortest way isn't always the fastest way. Nor is the most direct route always the fastest way. And if you never go to New York City even once in your life, these facts are rules to live by on the network, as well.
Routers use packet switching to move messages from one place to another on a network. Messages are divided into packets before they move out onto a network. During transmission, each packet is independent of the others. In fact, each packet in a message could take a different route to the destination. That's packet switching; the point is that all the packets in a message get to the destination, not how they get there.

Choosing a router

Depending on the number of machines and networks you need to connect, you may not need special purpose hardware to be your router.
  • A router for a Small Office/Home Office: If several networked computers share a connection to the Internet via cable or DSL, you can use the computer attached to the network device as your router. You need to add some kind of Internet sharing software to this computer. Microsoft's ICS (Internet Connection Sharing) is one example of Internet-sharing software. Software packages are available for other operating systems as well. The routing software checks to see whether packets should stay on the local net or go out to the Internet. Because the routing software doesn't work too hard, it doesn't disturb other programs that are running on the computer.
    Be sure to protect your Internet connection with a firewall.
  • For larger companies: Routers that do more than route: Companies that connect their subnets to the Internet need a more powerful, more intelligent router than a small office with a dozen computers. A special purpose router is the solution. A combination router/firewall is a good solution.
  • Really big routers for really big networks: These are the routers that connect the networks of large worldwide corporations. Routers this large and complex handle millions of packets per second and cost millions of U.S. dollars. They form the backbone of the Internet itself.
Read More...

Installing and Configuring DNS

The Active Directory Installation wizard offers to install DNS if the wizard does not detect a proper DNS zone configuration during the installation of Active Directory. However, you should not rely on the wizard for these tasks. Many bug reports have been submitted regarding installation bases that relied on the wizard. Also keep in mind that the Active Directory Installation wizard does not install a reverse lookup zone.
The Windows 2000 DNS service can coexist with or migrate other DNS services, including the popular Berkeley Internet Name Domain (BIND) DNS service. One great place to find BIND information is the Internet Software Consortium Web site. To migrate from BIND, you must transfer the BIND zone and boot files to the Microsoft DNS service.
Windows 2000 DNS can also upgrade or coexist with Windows NT 4.0 DNS servers.
For the exam, you should know how to configure DNS for Active Directory. Here is the procedure.
1. Click Start --> Settings --> Control Panel.
2. Double-click Add/Remove Programs and then click Add/Remove Windows Components.
3. In Components, select Networking Services and then click Details.
4. In Subcomponents of Networking Services, select the Domain Name System (DNS) check box, click OK, and then click Next.
5. In Copy Files From, type the full path to the Windows 2000 distribution files and then click OK.
To host Active Directory, you must properly configure DNS with a zone for the Active Directory namespace. You should create both zone types for a proper DNS implementation for your Active Directory namespace — that is, a forward lookup zone and a reverse lookup zone. Read on to discover how.

Creating a forward lookup zone

To create a forward lookup zone:
1. Click Start --> Programs --> Administrative Tools --> DNS.
Windows 2000 launches the DNS Microsoft Management Console, from which you can perform your DNS administration.
2. Expand the DNS server.
3. Right-click the Forward Lookup Zone folder and choose New Zone.
4. Click Next to continue when the New Zone wizard appears.
The wizard takes the pain out of DNS administration.
5. Ensure that Standard Primary is selected and click Next.
6. Ensure that Forward Lookup Zone is selected and click Next.
7. At the New Zone page, type the name of your zone (for example, http://computertips-az.blogspot.com/) and click Next.
8. Select Create a New File With This File Name and click Next.
9. Click Finish.

Creating a reverse lookup zone

To create a reverse lookup zone:
1. Click Start --> Programs --> Administrative Tools --> DNS.
2. Expand the DNS server.
3. Right-click your server and choose New Zone.
4. Click Next to continue when the New Zone wizard appears.
5. Ensure that Standard Primary is selected and click Next.
6. Ensure that Reverse Lookup Zone is selected and click Next.
7. Ensure that Network ID is selected, type your network ID in the Network ID field, and click Next.
8. Select Create a New File With This File Name and click Next.
9. Click Finish.
As far as Active Directory is concerned, your DNS server is almost ready. You should now configure the forward and reverse lookup zones for dynamic updating so that you do not get stuck creating all the records required for Active Directory yourself!
Read More...

Tuesday, February 11, 2014

How to Configure Static Routes on Cisco Routers?

You can configure two types of routing on the router- static and dynamic to send the traffic to destination. Static route tell the network devices about exact location (hard-coded destination). Static routers can work well with small network but in large scale network dynamic routing is the best choice. Configure static routes between routers to allow data transfer between routers without the use of dynamic routing protocols.
From the global configuration mode, configure the hostname then configure the console and enable passwords on each router.
To configure static routes, first enter global configuration mode to run the following commands.
Configure the Static Routes on Router A. 
First run the command show ip route to view the IP routing table for router A before defining static routes
RouterA#configure terminal                (enter in global configuration mode)
RouterA(config)#ip route 15.0.0.0  255.0.0.0 10.1.1.2     (define static routing on Router A)
RouterA(config)#ip route 193.168.2.0 255.255.255.0 10.1.1.2       (define static routing on Router A)
RouterA(config)#ip route 193.168.3.0 255.255.255.0 20.1.1.2       (define static routing on Router A)
RouterA(config)#exit
RouterA#
Now run the command show ip route on router A to view the IP routing table (directly connected + static routes) detail.
Configure the Static Routes on Router B. 

First run the command show ip route to view the IP routing table for router B before defining static routes

RouterB#configure terminal                (enter in global configuration mode)
RouterB(config)#ip route 20.0.0.0  255.0.0.0 10.1.1.1     (define static routing on Router B)
RouterB(config)#ip route 193.168.1.0 255.255.255.0 10.1.1.1       (define static routing on Router B)
RouterB(config)#ip route 193.168.3.0 255.255.255.0 15.1.1.2       (define static routing on Router B)
RouterB(config)#exit
RouterB#
Now run the command show ip route on router B to view the IP routing table (directly connected + static routes) detail.

Configure the Static Routes on Router C. 

First run the command show ip route to view the IP routing table for router C before defining static routes
RouterC#configure terminal                (enter in global configuration mode)
RouterC(config)#ip route 10.0.0.0  255.0.0.0 15.1.1.1     (define static routing on Router C)
RouterC(config)#ip route 193.168.2.0 255.255.255.0 15.1.1.1       (define static routing on Router C)
RouterC(config)#ip route 193.168.1.0 255.255.255.0 20.1.1.2       (define static routing on Router C)
RouterC(config)#exit
RouterC#
Now run the command show ip route on router C to view the IP routing table (directly connected + static routes) detail.
Read More...

Sunday, February 9, 2014

How to Apply Keyboard Shortcut Feature in Dropbox?

Dropbox is an Online Storage App. This App permits us to upload, transfer and approach files from Mobiles and Desktop. This App offers both free and paid services for us. Dropbox easily installed in Windows 8, Linux, BlackBerry, Android and Apple Devices. We can use Dropbox also with help of Keyboard Shortcuts. These shortcuts are very helpful for working and make it more effective.
 

After reading this article we will able to use keyboard shortcuts in Dropbox. To do this we have to follow some steps which are as under.

Apply Keyboard Shortcuts in Dropbox:

  • First of all we have to go Dropbox page and log in using the Email Address and password connected with our Dropbox account.
Login-to-Dropbox



  • Page will appear. Do click on Account option which located at right corner of top.
Login in Dropbox
  • Account Window will display. Make hit on the tab of account Settings.
Dropbox Account Window will display
  • From Account Preference section do click on the checkbox of Enable file browser keyboard shortcuts.
Dropbox checkbox of Enable file browser keyboard shortcuts.
  • Dropbox keyboard shortcuts will appear.
Dropbox keyboard shortcuts
Read More...

Google Search

Followers

Total Pageviews

 
Computer TIPS Online | Template by Sanji @Copyright 2008