Tuesday, 26 April 2011

Emails and Network Security


With the number of small, home-based businesses at present, computers and the internet are fast establishing themselves as essential tools for business management. But the active use of computers in business as means of banking and other financial transactions has attracted unscrupulous individuals. These individuals come up with programs and viruses that are threats to network security in hopes of intercepting important files from home computers. The Computer Emergency Response Team (CERT) at Carnegie Mellon University says that there are several ways how internet criminals threaten network security through emails. These methods seem harmless and are virtually undetectable until it is too late.

These threats include: email spoofing and email viruses. All these are classified as intentional computer misuses but are unwittingly spread by people who are not aware of their possible effects on network security. CERT explains that the writers of the viruses and malicious programs usually exploit the ignorance of most computer users to spread their viruses. 

Email spoofing happens when emails display sources other than the original source. The virus writer or the original source manipulates the virus program to make it appear that the source written on the "From" box is the actual sender of the message. Most cases involve "messages" from network system administrators asking the users to modify and send them new passwords or other important information. Others report receiving strange emails from banks or telephone companies. The recipient opens the email, thinking that it is an urgent reminder. The virus then starts spreading in the computer system. The usual function of viruses like this is to weaken network security in order for the virus writer to infiltrate the system. 

Viruses can also infiltrate systems by email attachments. This happens when a virus writer programs a virus and sends it to people disguised as a harmless email or attachment. The criminal usually attaches a funny picture or story in the email to entice recipients to open it. The recipient, thinking that the message is harmless and funny, sends it to other people. The virus spreads and disables network security with minimum effort from the writer. Email viruses usually come as attachments with hidden or concealed file extensions. Most victims open attachments thinking that these are harmless text documents or images taking note only of the ".txt" or ".jpg" in the filename. CERT advises that the first file extensions are not important in an attachment or file. The important attachment is the last because it indicates how the attachment functions. Extensions like ".exe" or ".vbs" means that the attachment will run as a program once the recipient opens it.

There are no foolproof ways on how to prevent the spread of malicious programs and viruses. To maintain network security, CERT recommends ignoring strange emails even if these are sent by an authority. Verify the messages' origin by calling the agency that "sent" them. For best protection, CERT advises email users to avoid downloading and saving attachments in their computers unless they have verified its source. Installing firewalls and other anti-virus software also strengthens network security.

For more valuable information on Network Security, please visit http://www.datascp.com

Sunday, 24 April 2011

Cisco CCNP / BSCI Certification: Troubleshooting Route Redistribution.

If there's one CCNP / BSCI topic that looks so easy but can lead to a real headache, it's route redistribution. I'm not even talking about the routing loops and suboptimal routing that can result when route redistribution is done without proper planning - I'm talking about the basic commands themselves. Leaving out one single command option, or forgetting what else needs to be redistributed when redistributing dynamically discovered routes, can leave you with a routing table that looks complete but does not result in full IP connectivity.

In this free CCNP / BSCI tutorial series, we'll take a look at three common errors in route redistribution configurations, and how to fix them. We'll use three routers, R1, R3, and R5. R1 and R5 are in a RIPv2 domain and R1 and R3 are in an OSPF domain. R1 will be performing two-way route redistribution.

R5 is advertising its loopback, 5.5.5.5/24, into the RIPv2 domain. R1 sees this route in its RIP routing table:

R1#show ip route rip

5.0.0.0/24 is subnetted, 1 subnets

R 5.5.5.0 [120/1] via 100.1.1.5, 00:00:01, Ethernet0

For R3 to see this route, route redistribution must be configured on R1. We'll use the redistribute rip command to do so.

R1(config)#router ospf 1

R1(config-router)#redistribute rip

% Only classful networks will be redistributed

The router immediately gives us a message that "only classful networks will be redistributed". What does this mean? Let's go to R3 and see if that router is receiving this route.

R3#show ip route ospf

< no output >

When we get no result from a show command, that means there's nothing to show. The only routes that will be successfully redistributed with the current configuration on R1 are classful networks, and 5.5.5.0/24 is a subnet.

To further illustrate the point, a classful network has been added to R5. This network is 16.0.0.0 /8, and is now being advertised by RIP. R1 sees this network as classful...

R1#show ip route rip

R 16.0.0.0/8 [120/1] via 100.1.1.5, 00:00:00, Ethernet0

5.0.0.0/24 is subnetted, 1 subnets

R 5.5.5.0 [120/1] via 100.1.1.5, 00:00:00, Ethernet0

... and R3 is receiving the route through redistribution.

R3#show ip route ospf

O E2 16.0.0.0/8 [110/20] via 172.12.123.1, 00:00:08, Serial0.31

To redistribute both classful and classless networks, the option "subnets" must be added to the redistribute command on R1.

R1(config)#router ospf 1

R1(config-router)#no redistribute rip

R1(config-router)#redistribute rip subnets

R3 will now see both the classful and classless networks being redistributed into OSPF. (100.1.1.0 is the network connecting R1 and R5.)

R3#show ip route ospf

O E2 16.0.0.0/8 [110/20] via 172.12.123.1, 00:00:20, Serial0.31

100.0.0.0/24 is subnetted, 1 subnets

O E2 100.1.1.0 [110/20] via 172.12.123.1, 00:00:20, Serial0.31

5.0.0.0/24 is subnetted, 1 subnets

O E2 5.5.5.0 [110/20] via 172.12.123.1, 00:00:20, Serial0.31

This is one of the most common errors made during route redistribution, but now you know what to look out for! In the next part of this free CCNP / BSCI tutorial, we'll take a look at another such error.

Wednesday, 20 April 2011

Fix and Recover Corrupted DBF Databases Automatically.

Heavy-load workstations and busy environments are home to most database applications. A system crash or a power failure can easily damage an open database, causing loss of data and corrupted database structures. Once the problem is fixed and the workstation rebooted, the corrupted database will fail to open.

What would you do when pressured to get the database up and running right away? Reach for a backup just to discover it's a week old, or attempt to recover the database, risking causing irreparable damage to what's still left?

Don't panic! If your database uses DBF files, your chances to get back all of the original data are extremely high if you use the right tool. Even if you don't know anything about the internal structure of DBF files, you still can get it fixed easily and automatically.

DBF Repair tool by www.dbf2002.com/dbf-recovery/ recovers damaged and corrupted DBF files completely automatically. You can be a professional database manager or a complete novice - DBF Recovery will repair the broken database regardless of your experience. With DBF Recovery, you simply select the corrupted file, and the program does the rest completely automatically.

Why paying for DBF Recovery instead of just using any of the numerous recovery tools that claim to repair your database in a matter of minutes? While DBF Recovery may not be as fast and as cheap as its freeware competitors, it does a much better job in correctly repairing the corrupted database structures and data records. Unlike many free database repair tools, DBF Recovery does not limit its operation to just the headers. The newly developed database recovery engine automatically detects the exact file format and database that created a DBF file, and thoroughly analyzes and repairs the structure of the database as well as all data records, resulting in the most comprehensive and quality recovery.

Have more corruption in supporting files? DBF Recovery fixes memo-files such as DBT and FPT in addition to DBF.

While new database administrators will certainly appreciate the unprecedented level of automation and the ease of use provided by DBF Recovery, expert users will enjoy the advanced features that provide even more automation to the database recovery process. Comprehensive command line parameters and batch mode support allow using DBF Recovery to process multiple databases automatically, or to fix certain database files on Windows startup.

Novice database users and advanced system administrators will appreciate the time savings provided by DBF Recovery. Supporting all DBF databases, including Dbase III and IV, FoxPro and Visual FoxPro, DBF Recovery is the perfect choice for a concerned database administrator. Download a free evaluation version of DBF Repair and rescue your DBF databases after corruption!

Tuesday, 19 April 2011

Importance of Computer


As computers are being used more and more in education, there will be soon no role for teachers in the classroom.
There is no doubt that education and the learning process has changed since the introduction of computers: The search for information has become easier and amusing, and connectivity has expedited the data availability. Though experts systems have made computers more intelligent, they have not yet become a substitute of the human interaction in the learning process. In my opinion; what can be expected, is a change of the teachers? role but not their disappearance from the classroom.

Nobody can argue that the acquisition of knowledge is more fun and easier with computers. The mere activity of touching and exploring this device constitutes an enjoyable task for a kid. This, accompanied with the relaxing attitude and software interactivity, usually conduce to a better grasping of new knowledge. At a higher educational level; the availability of digital books, simulator and other academic materials, provide the student with an ever accessible source of information, that otherwise would not be at hand.
But, besides the increasing complexity and behavior of intelligent software, which is usually embedded in the academic digital material, the need of human interaction in the learning process will always be present, at least in the foreseeable future. There is the necessity for a human being to be able to determine what the specifics needs of each individual are. The expertise of a teacher in how to explain and adapt complex concepts to different individuals can hardly be mimicked by a computer, no matter how sophisticated its software is.
As computers are becoming a common tool for teaching, teachers should be more aware of their role as guides in the acquisition of knowledge rather than transmitters of facts. They have to be open minded to the changes that are taking places, keep updated and serve as a problem solvers in the learning process, thus allowing students to discover the fact for themselves.
To summarize, in my personal view, teachers play and will() play an important role in the classroom, especially at the primary level. No matter how complex computers become, there will be no replacement for the human interaction, but in the way haw this interaction takes place.

Data Recovery Services: Are They Necessary?

Hard drive crash data recovery is difficult, as it implies a high level of hazard to drop off your information for good. This comprises how come it is not advisable that little knowledgeable people endeavor to recover their information utilizing data retrieval instruments such as software system or utilities. Whenever undelete represents enough to acquire your files back, then you will be able to safely apply it, even if you have barely started out with PCs. If not, consider double ahead of running any computer program you may have downloaded from the cyberspace, even if you cashed for it. It's so much less hazardous for your data to capitalize on professional person disc drive data recuperation services, thus pulling out information from your broke up disk drive for future usage.

Valid disk drive recuperation involves numerous operations which are executed with the assistance of a specialized software package. Whenever your files are broken because of a hard error, the program can't be executed from the same drive, so you require a 2nd one connected to the defective one. And so the register system is scanned, the faults are ascertained and fixed. Just in case these don't succeed, there is a more elaborated routine named low-level scanning, which involves and explores each sector of your hard disc, seeking to recover the corrupted information.

Physical disk drive retrieval is demanded once you lost your registers as you dropped down your disk drive on the flooring, or you damaged it with water or fire. This recuperation can be managed either by mechanic means or electronically. Generally, you necessitate an additional disc drive, congruent with yours (brand name, storage electrical capacity, printed electric circuit panel), because you're going to use components of it to repair your master disk.

Concisely, such processes call for a dust-free surround, and this comprises how come you can't arrange them at home. Data recuperation societies employ minimal Class 100 Clean Rooms to furbish up faulty disks and recuperate the information.

Monday, 18 April 2011

Safety from Hacking



What Is Online Hacking?

It basically happens when a hacker exploits a security breach in a network or computer and is able to access the information through the internet. As long as he is not detected or the computer shut down, he will be able to hack the computer as long as it is online. It doesn’t matter if you have a broadband connection or a dial up, internet hackers

can access your home computer security if you haven’t taken adequate measures for protecting yourself. It is like leaving a car parked in the street. If you leave it with the windows open, the keys inside and the radio mask still placed in the console, it’s quite probable you will suffer a robbery. Unfortunately, with computers it is a little more difficult since you don’t see those opened windows. The only way to find them is looking for them with specialized software.

How Can You Protect Your Computer

Fortunately, there are several ways to protect your computer from the hackers on internet:

Software Updates
Software companies are always updating their products, trying to eliminate any security breach that could be exploited by hackers. For this reason, their software makes a periodic check on the latest version available in the internet. It doesn’t matter if they are operating systems, office suites, drivers, games or any other kind of specialized software, you always need to assure yourself that every software package is up to date.

Firewall
Firewalls became main stream with the Internet. Now-a-days it’s impossible to be connected to the net without being checked by hackers, looking for possible breaches in your connection. Although they can be hardware or software, the most common one among users are the software firewalls, which are installed in your operating system and continually check the transmission of information from your PC to the external world and vice versa.

Antivirus
From all the security packages that a user needs to have installed in his PC, antivirus software is the first. It has been with us for a long time, even before the internet and the now common news on internet hacking. In the old days, virus spread through corporate networks to employee home computers who innocently took work home via diskettes. Finally, it spread to their friends’ computers. Today, the Internet has provided viruses a better way to spread themselves through the world. A real time antivirus software package is a must for any user who wishes to navigate safely through the net and not find himself being a victim of a hacker attack.