Dear Friends!!
Hi I have one side www.zamazar.com
Simply Easy 4 steps to convert any file format to any file format without using external party utility.
Thank you,
Regards,
Jignesh
Hello Friends... I hold Bachelor Degree In Computer Science From South Gujarat University, and also I hold Some certification in networking CCNA (R & S), CCNP (R & S), CCNA (Sec) and CCSP (Security), CCIE#28963(Sec). Now I am preparing CCIE R&S. Here I post several my real life experience that surely helpful to you in your career.
Monday, December 21, 2009
.dll, .ocx, .drv files of system
Dear All
I got new side in that you can find any .dll file, .ocx files, .drv files for system repairs. Here You just Write your file name then it will be free download and replace with your system without helping any CD/DVD.
Thank You,
Regards,
Jignesh
I got new side in that you can find any .dll file, .ocx files, .drv files for system repairs. Here You just Write your file name then it will be free download and replace with your system without helping any CD/DVD.
Thank You,
Regards,
Jignesh
Block Some Sites Using Host.
Dear Friends!!
Hi Now I will come back.. Well Not more to say
but if you want to block some side that u not want to open on your local machine under any circumstances that you have to modify host file.
just go to location:
C:\WINDOWS\system32\drivers\etc\host open this file with Word Pad
At end line
change like:
127.0.0.1 www.anysidename.com
save file and restart pc.
Thank you,
Regards
Jignesh
Hi Now I will come back.. Well Not more to say
but if you want to block some side that u not want to open on your local machine under any circumstances that you have to modify host file.
just go to location:
C:\WINDOWS\system32\drivers\etc\host open this file with Word Pad
At end line
change like:
127.0.0.1 www.anysidename.com
save file and restart pc.
Thank you,
Regards
Jignesh
Tuesday, December 1, 2009
IP2Locatin
Hi Friends!!
by using following side you can get location of IP.
try this
http://www.ip2location.com/demo.aspx
Regards,
Jignesh
by using following side you can get location of IP.
try this
http://www.ip2location.com/demo.aspx
Regards,
Jignesh
Friday, November 27, 2009
Download Complete Ref Of Windows 2008 server
Dear All
Download Complete Ref Of Windows 2008 server Book
link:http://depositfiles.com/files/5x8s8o7uv
Regards
Jignesh
Download Complete Ref Of Windows 2008 server Book
link:http://depositfiles.com/files/5x8s8o7uv
Regards
Jignesh
Download Newst Theams of Window7
Hello Friend!!!
We are now used windows7 OS in our desktop and Laptop, we install themes in windows7 and make better look.
Download Link:
http://hotfile.com/dl/18069060/bc6bd8a/100_Windows7_Themes.rar.html
Thanks!!!
Regards
Jignesh
We are now used windows7 OS in our desktop and Laptop, we install themes in windows7 and make better look.
Download Link:
http://hotfile.com/dl/18069060/bc6bd8a/100_Windows7_Themes.rar.html
Thanks!!!
Regards
Jignesh
Wednesday, November 25, 2009
Download New Office 2010
Office 2010:
Microsoft Office 2010 gives you powerful new tools to express your ideas, solve problems, and connect with people. Office 2010 lets you work how, when, and where you want, letting you get things from a PC, the Web, and even a smartphone.
Use Office 2010 virtually anywhere: PC, phone, browser
With Microsoft Office 2010, you can review and do minor editing on Word, Excel, PowerPoint, and OneNote 2010 documents, virtually anywhere, by using Office Web Apps from more locations on more devices.
Keep your people productive on the go. Office 2010 lets you access and edit documents stored on a server while you�re offline with SharePoint Workspace 2010, and then automatically syncs these changes when you�re back online. So you stay productive while on the go.
Support your employees, regardless of location or device. Office 2010 saves you time and money by helping you deploy and manage Office on the PC, the smartphone, and the Web, all from within familiar Microsoft System Center tools.
Bring ideas to life
Create and deliver presentations that help you stand apart from the competition. Office 2010 puts you in the director�s chair, enabling you to create dazzling digital content in PowerPoint 2010 without the need for expensive third-party tools. And you can broadcast your presentation to anyone with a browser, even if they don�t have PowerPoint.
Stay organized and on top of your work. OneNote 2010 pulls together everything from daily sales figures to digital images, so all the information you need is easily accessible. You can also create side notes that stay on your screen as you move between different programs, so you can keep your thoughts organized as you multi-task. This helps you stay organized while saving you time.
Turn intuition into insights to make quicker and more informed business decisions. Excel 2010 provides tools for improved data visualization, which can give you key insights into business processes and tailor messaging and products to best meet customer needs. Whole trends can be conveyed in a single cell with Sparklines. And there are more options in styles and icons in conditional formatting, as well as the ability to highlight specific items like such as "max/min� in a single click.
Work better together
Collaboration means better work and beating deadlines. Co-authoring allows multiple people to work on the same document at the same time, such as an RFP, to respond faster and meet deadlines. With Office 2010, several team members can work on Word 2010 and PowerPoint 2010 documents simultaneously and see who else is working on which sections, regardless of location.
Reduce travel costs and spend less on third-party conferencing tools. Office 2010 helps your people save time and money by providing one-click communication through unified communications technology, and real-time document sharing from within Word, PowerPoint, and Excel 2010 without the need to switch applications. This makes virtual meetings more effective so team members can get more done without being in the same room.
Instantly share a presentation. Hold spontaneous meetings with customers and partners with PowerPoint 2010. Broadcast Slideshow allows you to present a slideshow entirely through a Web browser�no matter where your audience is at. No need for your customers to have a third-party conferencing tool, or even PowerPoint. All they have to do is click on a link and a browser window opens with your slides.
Top 10 benefits of Office Professional Plus 2010
Save travel costs by enabling your people with better communication tools.
Office 2010 helps save time and money by providing one-click communication through unified communications technology, and document sharing from within Microsoft Word, PowerPoint, and Excel, without the need to switch applications. This makes virtual meetings more effective so team members can get more done without being in the same room.
Beat deadlines by working more effectively as a team.
Co-authoring allows multiple people to work on the same document at the same time, such as an RFP, to respond faster and meet deadlines. With Office 2010, multiple team members can work on Word 2010 and PowerPoint 2010 documents and be able to see who else is working on what sections.
Use Office virtually anywhere and on virtually any device.
With Office Web Apps, you can review and make minor edits to documents in Word, Excel, PowerPoint, and OneNote 2010 from any supported Internet Explorer, Firefox, or Safari browser. All of the changes are saved and appear exactly as you intended, so you can seamlessly move from a desktop to the Web, and vice versa.
Gain control over your e-mail and calendar.
Outlook 2010 can help you take control of your day with conversation management tools, mail tips, calendar preview, and more. Stay better organized and up-do-date with less effort and find information you need fast.
Make informed business decisions the second you need to
Excel 2010 provides tools for improved data visualization, so you can gain key insights quickly and easily turn the numbers into a story to share with others. You can convey whole trends in a single cell with Sparklines, choose from more styles and icons in conditional formatting, and highlight specific items such as "max/min� in a single click.
Create sophisticated marketing in-house to get your business noticed.
Office 2010 puts you in the director�s chair, enabling you to create dazzling digital content in PowerPoint 2010 that comes to life with cutting-edge audio/video capabilities and animation enhancements. Your business can cut costs by reducing the need for third-party multimedia tools and design agencies.
Enable employees to work offline and keep your business moving forward.
SharePoint Workspace 2010 allows everyone to take content from SharePoint sites offline and work with that content from their desktop, without reliance on an Internet connection. This makes it easier for IT to drive a strategy with more consistent use of collaboration tools based on SharePoint technology throughout the organization.
Be more productive by finding what you need faster.
Office 2010 extends the toolbar throughout all applications, making it easier to find the commands you need. And the new Microsoft Office Backstage view (available in all applications except Communicator) gives your people quick access to important operations such as viewing document information, saving, printing, and sharing.
Protect inboxes from malicious attacks, so everyone in the business can rest easier.
Office 2010 provides a Protected View feature to help you guard against malware in your e-mail attachments and Internet files, as well as in Word, PowerPoint, and Excel documents.
Stay organized by keeping the right details in the right place.
OneNote is your essential "catch-all.� From daily sales figures to news articles clipped from the Web, you can make everything accessible and at the ready. You can even create side notes that stay on your screen as you move between different programs, so you can keep your thoughts organized as you multi-task.
Microsoft Word 2010 offers the best of all worlds: enhanced features to create professional-quality documents, easier ways to work together with people, and almost-anywhere access to your files.
Designed to give you the finest document-formatting tools, Word 2010 helps you organize and write your documents more efficiently. In addition, you can save documents online and access, edit, and share them from almost any Web browser.1 Your documents stay within reach so you can capture your best ideas whenever and wherever they occur.
Microsoft Access 2010 is all about simplicity. Access 2010 empowers you to make the most of your information�even if you�re not a database expert. And, through newly added Web databases, it amplifies the power of your data, making it easier to track, report, and share with others. Your data will never be further away than your closest Web browser.
Microsoft PowerPoint 2010 gives you more ways to create and share dynamic presentations with your audience than ever before.
Exciting new audio and visual capabilities help you tell a crisp, cinematic story that�s as easy to create as it is powerful to watch. With new and improved tools for video and photo editing, dramatic new transitions, and realistic animation, you can add polish to presentations that will captivate your audience.
In addition, PowerPoint 2010 enables you to work simultaneously with other people or post your presentation online and access it from virtually anywhere using the Web or your smartphone
Microsoft Publisher 2010 helps you create, personalize, and share a wide range of professional-quality publications and marketing materials. With Publisher 2010, you can easily communicate your message in a variety of publication types, saving you time and money.
Whether you�re creating brochures, newsletters, postcards, greeting cards, or e-mail newsletters, you can deliver quality results without needing graphic design experience. Get the job done right the first time with Publisher 2010.
Microsoft Outlook offers premium business and personal e-mail management tools to more than 500 million users worldwide. With the release of Outlook 2010, you get a richer set of experiences to meet your communication needs at work, ome, and school.
From a redesigned look to advanced e-mail organization, search, communication, and social networking features, Outlook 2010 provides you with a world-class experience to stay productive and in touch with your personal and business networks. Want information on Outlook 2010 with customer and contact management features? Please see Top 10 benefits of Outlook 2010 with Business Contact Manager.
Welcome to Microsoft InfoPath 2010, a forms-creation and data-gathering tool that helps organizations streamline business processes. InfoPath 2010 is designed for both advanced business users and developers, depending on the type of forms-based solution an organization needs.
Without writing code, advanced business users can use InfoPath 2010 to design sophisticated electronic forms to quickly and cost-effectively gather information. Developers can create advanced forms for departmental and enterprise business processes, including composite applications and workflow sequences, with InfoPath 2010, Microsoft SharePoint Server 2010, and SharePoint Designer 2010�using little or no code.
Microsoft Excel 2010 makes it possible to analyze, manage, and share information in more ways than ever before, helping you make better, smarter decisions. New data analysis and visualization tools help you track and highlight important data trends.
Easily upload your files to the Web and work simultaneously with others online. Access your important data on the go from almost any Web browser. Whether you�re producing financial reports or managing personal expenses, Excel 2010 gives you more efficiency and flexibility to accomplish your goals.
SharePoint Workspace 2010, expands the boundaries of collaboration by allowing fast, anytime, anywhere access to your SharePoint team sites. Synchronize SharePoint content with SharePoint Workspace so you can access, view, and edit files anytime and anywhere from your computer.
Working across teams is also much easier when you can coauthor documents simultaneously with other people in SharePoint Workspace and automatically synchronize changes to Microsoft SharePoint Server without additional steps.
Microsoft OneNote 2010 gives you the ultimate place to store and share your information in a single, easy-to-access location.
Capture text, images, video and audio notes with OneNote 2010 to keep your thoughts, ideas, and important information readily available. By sharing your notebooks, you can simultaneously take and edit notes with other people on your network, or just keep everyone easily in sync and up-to-date.
You can also take OneNote 2010 on the road with you by posting your notebooks online and accessing them from virtually anywhere using the Web or a smartphone.1
Instant messaging at work will be a snap for you with Microsoft Office 2010, and so will all the related functions of your Microsoft Office Communicator 2007 R2 application.
That�s because Office Communicator 2007 R2 is tightly integrated into Outlook 2010, and works seamlessly with the familiar Office applications that users employ daily.
By using Office Communicator 2007 R2, you can simultaneously experience multiple modes of communication, including instant messaging, video conferencing, telephony, application sharing, and file transfer.
Download Link:(685MB only)
http://sharingmatrix.com/file/678650/MSOPP.2010.x86.part1.rar
http://sharingmatrix.com/file/678653/MSOPP.2010.x86.part2.rar
http://sharingmatrix.com/file/677255/MSOPP.2010.x86.part3.rar
http://sharingmatrix.com/file/677157/MSOPP.2010.x86.part4.rar
Enjoy!!!
Regards
Jignesh
Tuesday, November 24, 2009
Implementaions ACL
Friends!!!
We are now implementing ACL.
In this Fig We block some address range in internal networks to access web server using ACL
Router(config)#access-list 101 deny 192.168.1.0 0.0.0.15 host 10.1.1.1 eq www
Router(config)#access-list 101 permit any any
Router(config)#interface F0/1
Router(config-if)access-group 101 in
Router(config-if)#exit
Here First statement of ACL 101 indicate block some range in internal network in example it will be 0-15 host on network 192.168.1.0 it will be deny for web server.
except this all are allowed to access web server.
Thank you,
Regards
Jignesh
We are now implementing ACL.
In this Fig We block some address range in internal networks to access web server using ACL
Router(config)#access-list 101 deny 192.168.1.0 0.0.0.15 host 10.1.1.1 eq www
Router(config)#access-list 101 permit any any
Router(config)#interface F0/1
Router(config-if)access-group 101 in
Router(config-if)#exit
Here First statement of ACL 101 indicate block some range in internal network in example it will be 0-15 host on network 192.168.1.0 it will be deny for web server.
except this all are allowed to access web server.
Thank you,
Regards
Jignesh
ACL Fundamentals
Hello Friends!!!
ACL stands for ACL-Access Control List, list of statements which matched with packets and check condition for allow or block packets towards destination.
Types Of ACL : Standard & Extended ACL
Standard ACL check only source address of packet and take decision it could not check whatever destination and which applications (port no).
Extended ACL check source address, destination address, protocol, and port numbers.
Number Allocated to ACLs: (1) Standard ACL (0-99, 1300-1999)
(2) Extended ACL (100-199, 2000-2699)
Before Implementing ACL on routers we have to clear about inbound and outbound interface:
Inbound: check packet before entering packets
Inbound method apply on interface then we first check packet before packet goes to routing!!! easy...
Outbound: check packet before leaving interface
Outbound method apply on interface then first go to routing table check route and check ACL for allow or deny.
Wildcard Mask: Reverse of Subnet mask in we match and don't match of bits. Here 0 means must match and 1's means don't match.
e.g 10.23.23.0 0.0.0.255 means first three octant matched last one not required.
For more detail and implementaion I put blog in next blog..
Thank You,
Regards
Jignesh
ACL stands for ACL-Access Control List, list of statements which matched with packets and check condition for allow or block packets towards destination.
Types Of ACL : Standard & Extended ACL
Standard ACL check only source address of packet and take decision it could not check whatever destination and which applications (port no).
Extended ACL check source address, destination address, protocol, and port numbers.
Number Allocated to ACLs: (1) Standard ACL (0-99, 1300-1999)
(2) Extended ACL (100-199, 2000-2699)
Before Implementing ACL on routers we have to clear about inbound and outbound interface:
Inbound: check packet before entering packets
Inbound method apply on interface then we first check packet before packet goes to routing!!! easy...
Outbound: check packet before leaving interface
Outbound method apply on interface then first go to routing table check route and check ACL for allow or deny.
Wildcard Mask: Reverse of Subnet mask in we match and don't match of bits. Here 0 means must match and 1's means don't match.
e.g 10.23.23.0 0.0.0.255 means first three octant matched last one not required.
For more detail and implementaion I put blog in next blog..
Thank You,
Regards
Jignesh
Friday, November 20, 2009
Some More About Exception Handling In C++
Hello Friends,
Today I got one query from m.tech student,that C++ handling try... catch... exception handling..
I say first no then I search on internet i really surprised yes it support. I download C++ new turbo version and perform practical and solved query of m.tech student.
Download Link:
http://rapidshare.com/files/309634486/Borland_Turbo_C___Compiler_3.0.rar.html
You Enjoy C++ programming!!!
BEST OF LUCK for who are interested in c++.
Regards,
Jignesh
Today I got one query from m.tech student,that C++ handling try... catch... exception handling..
I say first no then I search on internet i really surprised yes it support. I download C++ new turbo version and perform practical and solved query of m.tech student.
Download Link:
http://rapidshare.com/files/309634486/Borland_Turbo_C___Compiler_3.0.rar.html
You Enjoy C++ programming!!!
BEST OF LUCK for who are interested in c++.
Regards,
Jignesh
Today New In Cisco G2 Series ISR routers
Hi friends.
Some New Good News In Cisco G2 Series ISR routers
http://www.cisco.com/assets/prod/rt/isr/whats-new-isrg2.html
Regards,
Jignesh
Some New Good News In Cisco G2 Series ISR routers
http://www.cisco.com/assets/prod/rt/isr/whats-new-isrg2.html
Regards,
Jignesh
Today New In Cisco G2 Series ISR routers
Hi friends.
Some New Good News In Cisco G2 Series ISR routers
http://www.cisco.com/assets/prod/rt/isr/whats-new-isrg2.html
Regards,
Jignesh
Some New Good News In Cisco G2 Series ISR routers
http://www.cisco.com/assets/prod/rt/isr/whats-new-isrg2.html
Regards,
Jignesh
Wednesday, November 18, 2009
Alias Command Configuration On Cisco Routers
Hello..
Here we can create some alias command also in cisco routers.
Router(config)#alias configure jignesh router ospf 1
then just type command alias name "jignesh"
Router(config)#jignesh
see what happen "router ospf 1" is is fired on your router.
Thanks
Regards
Jignesh
Here we can create some alias command also in cisco routers.
Router(config)#alias configure jignesh router ospf 1
then just type command alias name "jignesh"
Router(config)#jignesh
see what happen "router ospf 1" is is fired on your router.
Thanks
Regards
Jignesh
Monday, November 16, 2009
Static Routing and Default Routing.
Hello Boys & Girls..
In normally CCNA we learn lots of theory regarding routing types static and dynamic but actually where static routing is really used no one tell you, most of times it is used in customer premises equipments. like I give some brief example
R1(config)#ip route 0.0.0.0 0.0.0.0 s3/0
called Default static routing
IPS(config)#ip route 192.168.20.0 255.255.255.252 s0
IPS(config)#ip route 10.10.10.0 255.255.255.252 s0
As you see here IPS can't create default route cause on IPS router more than one customer are connected so IPS router manually specified or introduce your all network in their network that you have to care about that. one more thing after static routing it will be redistribute with IPS routing method so as Customer you don't need to very that ISP's responsibilities to introduce their network wholeover
Thank you,
Regards,
Jignesh
In normally CCNA we learn lots of theory regarding routing types static and dynamic but actually where static routing is really used no one tell you, most of times it is used in customer premises equipments. like I give some brief example
R1(config)#ip route 0.0.0.0 0.0.0.0 s3/0
called Default static routing
IPS(config)#ip route 192.168.20.0 255.255.255.252 s0
IPS(config)#ip route 10.10.10.0 255.255.255.252 s0
As you see here IPS can't create default route cause on IPS router more than one customer are connected so IPS router manually specified or introduce your all network in their network that you have to care about that. one more thing after static routing it will be redistribute with IPS routing method so as Customer you don't need to very that ISP's responsibilities to introduce their network wholeover
Thank you,
Regards,
Jignesh
Subnetting Logic
Hello All.
We are know very well subnet means a huge network divided into many sub networks.
so we take small example therefore we easily understand.
Example: company ABC have it's own network id: 220.220.21.0/24. Administrator want to divided into network 8 sub networks.
Answer: There are THREE Easy Step 1 2 3.
Step 1: Here total 8 networks means power(2)n where n is number of bits borrowed from host portions.so total 3 bit cause power(2)3 = 8.Basis on that we find subnet mask for networks is 255.255.255.224. How na? (easy 24 bit + 3 bit borrow so total /27).
Step 2: Calculate Block Size is also easy: last octant is minus from 256.
Block Size = 256 - last octant. (256-224 = 32)
Step 3: So finally we find block size is 32.
we create sub networks easily 0, 32, 64, 96, 128, 160, 192, 224, 256 ohh... wait...
256 it's over. we get first 8 network ids.
minus one from next network id we get broadcast address of current networks like 31, 63, 96, 127, 159, 191, 223, 255.
Between these range are usable IP address in networks.
Thank You,
Regards,
Jignesh
We are know very well subnet means a huge network divided into many sub networks.
so we take small example therefore we easily understand.
Example: company ABC have it's own network id: 220.220.21.0/24. Administrator want to divided into network 8 sub networks.
Answer: There are THREE Easy Step 1 2 3.
Step 1: Here total 8 networks means power(2)n where n is number of bits borrowed from host portions.so total 3 bit cause power(2)3 = 8.Basis on that we find subnet mask for networks is 255.255.255.224. How na? (easy 24 bit + 3 bit borrow so total /27).
Step 2: Calculate Block Size is also easy: last octant is minus from 256.
Block Size = 256 - last octant. (256-224 = 32)
Step 3: So finally we find block size is 32.
we create sub networks easily 0, 32, 64, 96, 128, 160, 192, 224, 256 ohh... wait...
256 it's over. we get first 8 network ids.
minus one from next network id we get broadcast address of current networks like 31, 63, 96, 127, 159, 191, 223, 255.
Between these range are usable IP address in networks.
Thank You,
Regards,
Jignesh
Assing IP to Switch and Make Remote Connection
Hi All..
How to assign IP to switch for remote operating?
We all know that switch is operate at 2 layer but still we assign IP to switch and
make remote connection to switch. In switch by default VLAN1 is native so at a time we activate one vlan1 and all ports by default members of native vlan.
Switch(config)#vlan 1
Switch(config-if)#ip address 192.168.1.1 255.255.255.0
Switch(config-if)#exit
Switch(config)#exit
------------------------Remote Side-----------------------------------------------
C:>telnet 192.168.1.1
How to assign IP to switch for remote operating?
We all know that switch is operate at 2 layer but still we assign IP to switch and
make remote connection to switch. In switch by default VLAN1 is native so at a time we activate one vlan1 and all ports by default members of native vlan.
Switch(config)#vlan 1
Switch(config-if)#ip address 192.168.1.1 255.255.255.0
Switch(config-if)#exit
Switch(config)#exit
------------------------Remote Side-----------------------------------------------
C:>telnet 192.168.1.1
Wednesday, November 4, 2009
CCNA ICND vol1-2 Presentaions
Hi All
Download link of Presentations of ICND Vol1 part 2.
Download Link
http://uploadbox.com/files/8d83a6f557/
Regards,
Jignesh
Download link of Presentations of ICND Vol1 part 2.
Download Link
http://uploadbox.com/files/8d83a6f557/
Regards,
Jignesh
Basic Commad Is used to run SDM on router
Hello All.
Here I show very basic command to run SDM (Security Device Manager) to run on router.
Before running SDM commands on router first you need basic knowledge of router IOS version is it supported or not.
http://www.cisco.com/en/US/products/sw/secursw/ps5318/
Now Following Basic Commands
Router(config)#ip http server
Router(config)#ip http secure-server (Optional if u configure https on port 443)
Router(config)#username cisco privilaged 15 passwrod cisco
Router(config)#ip http authentication local
Router(config)#crypto key generate rsa general keys modulus 1024
Router(config)line vty 0 871
Router(config-line)#login local
Router(config-line)#transport input telnet
Router(config-line)#transport input telnet ssh
Router(config-line)#end
---------------just launch SDM and put IP address----------------
Note JAVA Runtime or JVM must be install on your system and pop blocker must be disable.
Regards,
Jignesh
Here I show very basic command to run SDM (Security Device Manager) to run on router.
Before running SDM commands on router first you need basic knowledge of router IOS version is it supported or not.
http://www.cisco.com/en/US/products/sw/secursw/ps5318/
Now Following Basic Commands
Router(config)#ip http server
Router(config)#ip http secure-server (Optional if u configure https on port 443)
Router(config)#username cisco privilaged 15 passwrod cisco
Router(config)#ip http authentication local
Router(config)#crypto key generate rsa general keys modulus 1024
Router(config)line vty 0 871
Router(config-line)#login local
Router(config-line)#transport input telnet
Router(config-line)#transport input telnet ssh
Router(config-line)#end
---------------just launch SDM and put IP address----------------
Note JAVA Runtime or JVM must be install on your system and pop blocker must be disable.
Regards,
Jignesh
Packet Delivery Process
Hi All...
Here I was made one presentation for better understanding process of IP packet Delivery over network.Read carefully this presentation and learn which are internal procedures are doing during packet delivery you will better understand.
Download Link:
http://uploadbox.com/files/95d3f2d149/
Regards,
Jignesh
Here I was made one presentation for better understanding process of IP packet Delivery over network.Read carefully this presentation and learn which are internal procedures are doing during packet delivery you will better understand.
Download Link:
http://uploadbox.com/files/95d3f2d149/
Regards,
Jignesh
Wednesday, October 28, 2009
Hacking WEP key
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104. The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, �It doesn�t matter if you use 128 bit WEP keys, you are vulnerable!�
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104.
The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:
1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.
Download Links:
http://rapidshare.com/files/84258913/Live_CD_-_Wireless_hacking.rar.001
http://rapidshare.com/files/84259380/Live_CD_-_Wireless_hacking.rar.002
http://rapidshare.com/files/84258950/Live_CD_-_Wireless_hacking.rar.003
http://rapidshare.com/files/84258969/Live_CD_-_Wireless_hacking.rar.004
http://rapidshare.com/files/84258930/Live_CD_-_Wireless_hacking.rar.005
http://rapidshare.com/files/84259874/Live_CD_-_Wireless_hacking.rar.006
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104. The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, �It doesn�t matter if you use 128 bit WEP keys, you are vulnerable!�
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104.
The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:
1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.
Download Links:
http://rapidshare.com/files/84258913/Live_CD_-_Wireless_hacking.rar.001
http://rapidshare.com/files/84259380/Live_CD_-_Wireless_hacking.rar.002
http://rapidshare.com/files/84258950/Live_CD_-_Wireless_hacking.rar.003
http://rapidshare.com/files/84258969/Live_CD_-_Wireless_hacking.rar.004
http://rapidshare.com/files/84258930/Live_CD_-_Wireless_hacking.rar.005
http://rapidshare.com/files/84259874/Live_CD_-_Wireless_hacking.rar.006
Tuesday, October 27, 2009
RIPng With Multiple Process
In IPv6 routing you run multiple process on same interface, process are locally significant means it is not sent through routing updates but if you want to run multiple RIP routing process you have to change UDP port for process.
Router(Config-if)#ipv6 router rip
#port 527 multicast-group FF02::9
By default RIPng used UDP 521 and RIP use UDP 520
Router(Config-if)#ipv6 router rip
#port 527 multicast-group FF02::9
By default RIPng used UDP 521 and RIP use UDP 520
Subscribe to:
Posts (Atom)