Sunday, April 25, 2010

Hard Drive Parts

Cache Memory

Cache Memory is fast memory that works between the processor and memory. The cache holds data that was recently used by the processor and saves a trip back to the main memory. The first two levels of memory are contained in the processor itself. L1 cache is the first level of cache, typically contained in the processor. The third level of memory is the L2 cache, contained on the motherboard; the benefit is that it will run at the same speed as the processor, and cost less to put on the chip. The fourth level is the L3 cache now that some processors include L1 and L2 cache on the chip, it becomes L3 cache. Usually, it runs slower than the processor, but it’s faster than the main memory. The fifth level of memory is the main memory. The sixth level is a piece of the hard disk used by the Operating System, called the virtual memory. Most operating systems use this when they run out of main memory and can be changed whatever amount is need depending on the amount currently used.

Saturday, April 24, 2010

Changing the refresh rate in windows

The refresh rate is technically the vertical scan frequency what this does is specify the times the scanning beam redraws the screen per second in CRT monitors. CRT’s have phosphors that stay bright for a fraction of a second so they need to be constantly hit with electrons to stay lit to the human eye. The propose of changing the refresh rate is to reduce headaches after staring at your screen.
Some computers monitors screens refresh rate is too low and the screen flickers. Some users may be accustomed to the flicker, or their eyes are not sensitive enough to detect it, but the flicker is there. And till it flickers, it will irritate your eyes and cause eye strain. Higher refresh rates are less likely to cause eyestrain

Thursday, April 22, 2010

Network Security

Network security covers a broad range of topics and solutions for new cases every day, many business have security set in place to ensure data is kept save here are a few security devices and common threats that are in place in everyday life. One of the most basic devices is a host-based firewall which is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only. They can prevent a host from becoming infected and stop them from spreading malware to other hosts. Host-based firewalls for servers typically use rule sets similar to those of network firewalls. Some host-based firewalls for desktops and laptops also use similar rule sets, but most allow or deny activity based on lists of applications. Activity involving any application not on the lists is either denied automatically, or permitted or denied on the basis of the user's response to a prompt asking for a decision about the activity. To prevent malware incidents, organizations should configure host-based firewalls with deny-by-default rule sets for incoming traffic. A host-based firewall with antivirus capabilities can monitor inbound and outbound e-mails for signs of mass mailing viruses or worms and temporarily shut off e-mail services if such activity is detected. Accordingly, host-based firewalls for workstations that offer several types of malware prevention capabilities typically offer the best single, host-based technical control for malware threat mitigation, as long as they are configured properly and kept up-to-date at all times with the latest signatures and software updates.

A network-based intrusion prevention system (IPS) is a program that performs packet sniffing and analyzes network traffic to identify and stop suspicious activity. It receives packets, analyzes them, decides whether they should be permitted, and allows acceptable packets to pass through. The network-based IPS architecture allows some attacks to be detected on networks before they reach their intended targets. Most network-based IPS products use a combination of attack signatures and analysis of network and application protocols, which means that they compare network activity for frequently attacked applications to expected behavior to identify potentially malicious activity. Network-based IPS products are used to detect many types of malicious activity besides malware, and typically can detect only a few instances of malware by default, such as recent major worms. However, some IPS products are highly customizable, allowing administrators to create and deploy attack signatures for many major new malware threats in a matter of minutes. Network-based IPS products can be effective at stopping specific known threats, such as network service worms, and e-mail-borne worms and viruses with easily recognizable characteristics. However, network-based IPS products are generally not capable of stopping malicious mobile code or Trojan horses. Network-based IPS products might be able to detect and stop some unknown threats through application protocol analysis.

A specialized form of network-based IPS, known as DDoS attack mitigation software, attempts to stop attacks by identifying unusual network traffic flows. Although these products are primarily intended to stop DDoS attacks against an organization, they can also be used to identify worm activity and other forms of malware, as well as use of attacker tools such as backdoors and e-mail generators. DDoS attack mitigation software typically works by monitoring normal network traffic patterns, including which hosts communicate with each other using which protocols, and the typical and peak volumes of activity, to establish baselines. The software then monitors network activity to identify significant deviations from the baselines. If malware causes a particularly high volume of network traffic or uses network or application protocols that are not typically seen, DDoS attack mitigation software should be able to detect and block the activity. Another way of limiting some malware incidents is by configuring network devices to limit the maximum amount of bandwidth that can be used by particular hosts or services. Also, some types of network monitoring software can detect and report significant deviations from expected network activity, although this software typically cannot specifically label the activity as malware-related or block it.

Host-based IPS products are similar in principle and purpose to network-based IPSs, except that a host-based IPS product monitors the characteristics of a single host and the events occurring within that host. Examples of activity that might be monitored by host-based IPSs include network traffic, system logs, running processes, file access and modification, and system and application configuration changes. Host-based IPS products often use a combination of attack signatures and knowledge of expected or typical behavior to identify known and unknown attacks on systems. For example, host-based IPS products that monitor attempted changes to files can be effective at detecting viruses attempting to infect files and Trojan horses attempting to replace files, as well as the use of attacker tools, such as rootkits, that often are delivered by malware. If a host-based IPS product monitors the host's network traffic, it offers detection capabilities similar to a network-based IPS's.

A virus requires its host program to run before the virus can become active and generally requires human interaction to activate. The program “infects” computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to infect other files. Viruses may contain a simple message or image that consumes storage space and memory, and degrades the overall performance of a computer, or in the case of a more malicious payload, can destroy files, reformat a hard drive erasing all of the data on the disk, or cause other damage. Worms also are self-propagating; unlike viruses, they can create fully functional copies and execute themselves without user intervention. This has made worms increasingly popular with attackers, because a worm has the potential to infect many more systems in a short period of time than a virus can. Worms take advantage of known vulnerabilities and configuration weaknesses, such as unsecured Windows shares. Although some worms are intended mainly to waste system and network resources, many worms damage systems by installing backdoors, perform DDoS attacks against other hosts, or perform other malicious acts. A Trojan horse, once delivered to its host and executed, might be activated at any time, either by remote control, by a timer mechanism, or through detecting certain events on the host. A Trojan horse may enter a user's computer by presenting itself as an attractive tool of some sort, which the user intentionally downloads and installs, unaware of its ulterior purpose. Trojan horses typically build in the functionality of key logging software and other spyware and a range of other functions to disable system security.

A VPN works by using shared public networks while maintaining privacy through security procedures and protocols that encrypt communications between two end points. To provide an additional level of security, a VPN can encrypt not only the data, but also the originating and receiving network addresses. There are two main VPN technologies, which differ in their methods of encrypting data for secure transmission over Internet connections. The first method is based on tunneling protocols that encrypt packets at the sending end and decrypt them at the receiving end. This process is commonly referred to as encapsulation, because the original, unsecured packet is placed within another packet that has been secured by encryption. The encapsulated packets are then sent through a “tunnel” that cannot be traveled by data that have not been properly encrypted.

Phishing refers to a social engineering attack, where someone misrepresents their identity or authority in order to induce another person to provide personally identifiable information over the internet. Internet scammers use e-mail bait to phish for passwords and personal financial data from the "sea" of Internet users. Some common phishing scams involve e-mails that purport to be from a financial institution, Internet service provider, or other trusted company claiming that a person’s records have been lost or their account compromised. The e-mail directs the person to a website that mimics the legitimate business’ website and asks the person to enter a credit card number so the records or account can be restored. In fact, the e-mail or website is controlled by a third party who is attempting to extract information that will be used in identity theft or other crimes.

Social engineering is another and it refers to techniques designed to fool human beings into providing information or taking an action which leads to the subsequent breach in information systems security. Humans are a weak link in the security chain, and this concept has been exploited by criminals in both the physical and cyber worlds. Email, web browser, and instant messaging applications are some of the more commonly used communications channels for delivering social engineering attacks. Network security covers a broad range of topics and solutions for new cases every day, many business have security set in place to ensure data is kept save here are a few security devices and common threats that are in place in everyday life.



The Functions of Routing

Within routing there are three main topics that cover a variety of areas on how routing takes place within systems. A few of the basic things to know about routing include addressing technologies and addressing schemes such as NAT, PAT, and SNAT. Another would be to know the common IPv4 and IPv6 networking protocols, and most importantly knowing how routers work giving the tools used today. Routing enables everyone to interconnect individual LANs into WANs. Within the three topics are sub topics that must be explained along with the three over all topics of routing those include various terms and properties.

Addressing technologies and addressing schemes such as NAT, PAT, and SNAT are important to know for security and other reasons when creating a network. NAT is defined as the process of mapping addresses on one network to addresses on another network. The first thing to understand about routing over a network using NAT is that it works by replacing the source IP address of a computer with the source IP address from the router on outgoing packets. “When private addresses are used for hosts and mapped to public addresses through NAT, external hosts cannot initiate connections directly to the internal hosts because private addresses are not routable across the internet. Thus, all attacks against the network must be focused at the NAT router itself. Like firewalls, this provides security because only one point of access must be protected, and the router will generally be far more secure than a PC directly connected to the internet. The abstraction of the LAN from the internet through a NAT also simplifies network management.” (http://en.wikipedia.org/wiki/Network_address_translation) A Static NAT (SNAT) is another form that maps a single routable IP address to a machine so there is accessibility from outside the network. This also keeps track of the IP addresses and applies them permanently on a one to one basis with computers on the network. It’s defined as “a type of NAT in which a private IP is mapped to a public IP address, where the public address is always the same IP address (i.e., it has a static address). This allows an internal host, such as a web server, to have an unregistered (private) IP address and still be reachable over the internet.” (http://www.webopedia.com/TERM/S/static_NAT.html) A PAT is a network address translation and goes through a process where each computer on LAN is translated to the same IP address, that have a different port number.

IPv4 and IPv6 common routing protocols cover a wide range of concepts. One of the things to understand when dealing with routing is the link state routing protocol which has information passed down between routers that are related to the current connectivity. This is basically strait forward stating that if the signal is up it will connect if it’s not you won’t. The link state is very scalable and because of that it’s used most often in large networks. OPSF stands for open shortest path first and it works by choosing the shortest path first. OPSF routers are grouped logically into areas; each area has its own database and links with 0 being the default area. Each link has a cost such as throughput, reliability and round trip time. The lowest cost is the first choice, while identical costs are load balance. OPSF detects changes in the network link state and modifies the routing structure very quickly usually within seconds. The IS-IS is seen most often in large provider networks, there are two different levels the first routs within an area the second routs between areas. IS-IS stands for intermediate system to intermediate system and because there is less chatty many service providers like it over OSPF. An important routing protocol of RIP is the distance vector which has information passed between routers containing routing tables. This means that it determines how many hops away is another network which is basically the distance. With this there is very little configuration and is usually automatic. However, this is good for small networks because it doesn’t scale well in large networks. RIP 1 and RIP2 meaning the routing information protocol was updated and version two includes authentication to verify the source. This deals with network address, number of hops and destination, the maximum number of hops is 15. Boarder gateway protocol is the core routing protocol of the internet that is fully decentralized and is used by ISP’s. This allows multhoming which is multiple links to the same network. Hybrid is the last thing that includes aside from a little link state and distance vector an EIGRP which makes is reliable and use minimum bandwidth.

Routing enables everyone to interconnect individual LANs into WANs. The properties of routing include things such as Dynamic and static routing, dynamic routing is automatic all routing is handled by the protocol. Static Routing is a manual process; if you’re going on network 1 to network 2 then the tables set will that if to a link to get to the second network. When understanding routing, the next hop is another key for input and output of information across the network. A router isn’t generally concerned with the rest of the network, when a packet comes in a packet goes out. The next hop is a crucial piece of information which is why a router exists. The router determines where should a packet go and if it should go to the next hop.