Thursday, November 29, 2007

9. 10 tips for improving your wireless network

If Windows ever notifies you about a weak signal, it probably means your connection isn't as fast or as reliable as it could be. Worse, you might lose your connection entirely in some parts of your home. If you're looking to improve the signal for your wireless network, try some of these tips for extending your wireless range and improving your wireless network performance.

1.

Position your wireless router (or wireless access point) in a central locationBad router and good router comparison.

When possible, place your wireless router in a central location in your home. If your wireless router is against an outside wall of your home, the signal will be weak on the other side of your home. Don't worry if you can't move your wireless router, because there are many other ways to improve your connection.

2.

Move the router off the floor and away from walls and metal objects (such as metal file cabinets).

Metal, walls, and floors will interfere with your router's wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be.

3.

Replace your router's antenna.

The antennas supplied with your router are designed to be omni-directional, meaning they broadcast in all directions around the router. If your router is near an outside wall, half of the wireless signals will be sent outside your home, and much of your router's power will be wasted. Most routers don't allow you to increase the power output, but you can make better use of the power. Upgrade to a hi-gain antenna that focuses the wireless signals only one direction. You can aim the signal in the direction you need it most.

Standard antenna and hi-gain antenna examples

4.

Replace your computer's wireless network adapter.

Wireless network signals must be sent both to and from your computer. Sometimes, your router can broadcast strongly enough to reach your computer, but your computer can't send signals back to your router. To improve this, replace your laptop's PC card-based wireless network adapter with a USB network adapter that uses an external antenna. In particular, consider the Hawking Hi-Gain Wireless USB network adapter, which adds an external, hi-gain antenna to your computer and can significantly improve your range.

Laptops with built-in wireless typically have excellent antennas and don't need to have their network adapters upgraded.

5.

Add a wireless repeater.

Wireless router and wireless repeater

Wireless repeaters extend your wireless network range without requiring you to add any wiring. Just place the wireless repeater halfway between your wireless access point and your computer, and you'll get an instant boost to your wireless signal strength. Check out the wireless repeaters from ViewSonic, D-Link, Linksys, and Buffalo Technology.

6.

Change your wireless channel.

Wireless channels

Wireless routers can broadcast on several different channels, similar to the way radio stations use different channels. In the United States and Canada, these channels are 1, 6, and 11. Just like you'll sometimes hear interference on one radio station while another is perfectly clear, sometimes one wireless channel is clearer than others. Try changing your wireless router's channel through your router's configuration page to see if your signal strength improves. You don't need to change your computer's configuration, because it'll automatically detect the new channel.

7.

Reduce wireless interference.

If you have cordless phones or other wireless electronics in your home, your computer might not be able to "hear" your router over the noise from the other wireless devices. To quiet the noise, avoid wireless electronics that use the 2.4GHz frequency. Instead, look for cordless phones that use the 5.8GHz or 900MHz frequencies.

8.

Update your firmware or your network adapter driver.

Router manufacturers regularly make free improvements to their routers. Sometimes, these improvements increase performance. To get the latest firmware updates for your router, visit your router manufacturer's Web site.

Similarly, network adapter vendors occasionally update the software that Windows XP uses to communicate with your network adapter, known as the driver. These updates typically improve performance and reliability. To get the updates, visit Microsoft Update, and then under Select by Type click Hardware, Optional. Install any updates relating to your wireless network adapter. It wouldn't hurt to install any other updates while you're visiting Microsoft Update, too.

Note When you go to Microsoft Update, you have two options: the Express Install for critical and security updates and Custom Install for high priority and optional updates. You may find more driver updates when you use Custom Install.

9.

Pick equipment from a single vendor.

While a Linksys router will work with a D-Link network adapter, you often get better performance if you pick a router and network adapter from the same vendor. Some vendors offer a performance boost of up to twice the performance when you choose their hardware: Linksys has the SpeedBooster technology, and D-Link has the 108G enhancement.

10.

Upgrade 802.11b devices to 802.11g.

802.11b is the most common type of wireless network, but 802.11g is about five times faster. 802.11g is backward-compatible with 802.11b, so you can still use any 802.11b equipment that you have. If you're using 802.11b and you're unhappy with the performance, consider replacing your router and network adapters with 802.11g-compatible equipment. If you're buying new equipment, definitely choose 802.11g.

Wireless networks never reach the theoretical bandwidth limits. 802.11b networks typically get 2-5Mbps. 802.11g is usually in the 13-23Mbps range. Belkin's Pre-N equipment has been measured at 37-42Mbps.

8. 10 Facts About the Internet


Here are some interesting facts about my favorite thing:

1) How old is the internet?

The internet became popularized in 1983, but was based largely on the ARPANET, which was first launched in late 1969. The first email was sent in 1972. Therefore, the 'net is over 30 years old.

2) Who invented the internet?

The technology that underlies the internet involves packet-switching. This technology was invented in the 1960's by Paul Baran in the US and Donald Watts Davies in the UK, both working independently. However, the entire infrastructure is the product of cooperation between countless scientists and engineers� no single person or group can take responsibility for the internet.

3) I've heard that the interent was built to survive a nuclear war. Is this true?

Bugwash. The ARPANET was funded by the US Department of Defense; specifically, the Advanced Research Projects Agency� hence the name. The goal was to enable incompatible mainframe computers to communicate and share resources.

4) What is the World Wide Web and how old is it?

Many people confuse the World Wide Web with the internet itself. The WWW is but one aspect of the internet, albeit the most recognizable feature. Web pages are the 'front-end' of the 'net. The WWW technology was invented in 1989 by Tim Berners-Lee, an English software engineer. Other internet services include email, telnet, ftp, etc.

5) How many people are on the 'net?

At best an educated guess, this link purports that there were somewhere around 605.60 million internet users as of September 2002.

6) How does the growth of the internet compare to other forms of communication?

It took radio 37 years to reach 50 million listeners, and TV about 15 years to reach 50 million viewers. The World Wide Web took just over 3 years to acquire 50 million users.

7) Who owns the interent?

The infrastructure (transmission lines, computers, servers, switches, etc.) of the internet are owned by private companies and individuals, but all of the software that runs the show belongs in the public domain. You own the 'net, and so do I.

8) Where did the term 'cyberspace' come from?

The term comes from the novel Neuromancer, published in 1984. The writer (and more recently, blogger) William Gibson described it as a 'consensual illusion'.

9) The internet is flooded with pornography, isn't it?

The world is flooded with pornography� a massive industry. As the internet is the first completely uncensored publication medium in history, you should expect a lot of pornography. Despite what the press will have you believe, however, the internet is flooded by a heck of a lot more than just porn!

10) The internet is kind of like a billion channel television, right?

Television is 'push' technology. The content is programmed by a small number of providers and then pushed at viewers whose freedom of choice is limited to what the providers are offering. The internet, conversely, is a 'pull' medium. As a user, you decide what you want and then pull it to your screen. The affordability of web publishing ensures that almost anyone can become a content provider, which has translated to an amazingly diverse range of content. While television remains a passive medium, the internet is all about interactivity.

7. Forgot Your Windows Password?

Forgot Your Windows Password?

Recently, visotor Mike a.k.a. Mayor requested help in Geek's Forum. Appartenlty, he took a laptop home from work and reconfigured it for his home network/ internet setup. The problem that he ran into is that when he changed the settings from using the domain in his workplace to using his home workgroup, his user account became invalid. After offering his a few tips, I recalled an old site that allows you to reset the password on Windows NT.

The information at Offline NT Password & Registry Editor is still relevant to Windows 2000 and XP (which are based on the NT archetecture), and will likley still apply to Longhorn and other future versions of Windows.

Mike says: "I downloaded the ISO and burned it, stuck the CD in the laptop, booted it up, and all I had to do was follow the instructions that popped up."

Around the same time, Joy at Confessions of a Geek was discussing the same issue as it relates to Windows 95/98/ME.

"You can remove a person's account logon* by renaming the username.pwl file to username.old and then on the subsequent reboot, don't enter any data and press the enter key. By doing that, you basically make a universal account with no password."

6. Customize the Places Bar in MS Office 2000


When you are opening or saving a document in Office, you'll see some shortcuts on the left side that may or may not be helpful. I have found that customizing these shortcuts is a real time-saver.

Begin by downloading Places.dll. Click the link, choose "Save", and save it to your Desktop or somewhere convenient. After the file downloads, copy it to your Windows\System directory.

1. Click Start, and then click Run.

2. Type the following command line:

Regsvr32 \Places.dll

(for most computers, this will read "Regsvr32 C:\Windows\System\Places.dll" or "Regsvr32 C:\WINNT\System\Places.dll")

Now open any Office application, such as Word. On the Tools menu, you will now find an option entitled "Set Places..."

Note: Microsoft has added the Places bar setting to the registry for Office XP. More info here.

5. Downloading and Watching Movies (Windows 98/2000/XP Mac Linux)

Here is a quick guide to watching movies from the Internet. Note: Beware of pirated Hollywood movies, because you wouldn't want to watch blockbuster movies for free, or you might upset the ... ;)

Here is what you'll need:

  • A fast internet connection. Downloading movies over dial-up is no fun, trust me on this one.

  • A good file-sharing program. I recommend Kazaa-Lite. If you use the regular Kazaa, you'll be seeing lots of unwanted pop-up windows and other annoyances. Uninstall it, run Ad-Aware and then install Kazaa-Lite, which you can download here. For hard-to-find movies, try using Overnet (requires patience).

  • You need codecs to watch the movies that you download. This can get tricky, but if you download and install these four packages, you should be able to happily watch 98% of the movies out there.
    (I recommend installing them in this order, and rebooting before installing ffdshow).
    1) Nemo Codec Pack
    2) DivX
    3) Xvid
    4) ffdshow.

  • A good media player to watch the movies in.
    (Windows Media Player can play most movies you'll find, and is now available for Mac and Linux as well as Windows. If your movie won't play in WMP, try opening it with the DivX Player that comes bundled with the DivX codec).
  • 4. Bits and Bytes

    A common area of confusion among computer users is dealing with the prefixes we use to relate file sizes. Here is the easiest way I've seen to conceptualize these measurements.

    Bit: the smallest unit of measure for data and space that holds it on your computer. This is the level at which all data is either a 1 or a 0.

    Byte: made up of eight bits. A byte is equivalent to a character ("a", "b" etc.). The order and combination of the eight ones and zeros (bits) defines a character. eg. 00000001 etc.

    Kilobyte: (K or KB ) equals: 1024 bytes

    Megabyte: (MB, or M. or meg) equals 1024 kilobytes

    Gigabyte: (GB, G or gig) equals 1024 Megabytes

    How many bytes do we have in a gigabyte? 1024 x 1024 x 1024 = 1,073,741,824 bytes -- slightly over a billion.

    That's a lot of one's and zero's that you have on your hard drive. Have you backed them up l

    3. Top 4 Port Scanners

    #1
    Windows
    Superscan : A Windows-only port scanner, pinger, and resolver
    SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

    #2
    new
    Windows
    Angry IP Scanner : A fast windows IP scanner and port scanner
    Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins

    #3
    new
    Linux
    *BSD


    Unicornscan : Not your mother's port scanner
    Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses. Like Scanrand, it isn't for the faint of heart.

    #4
    Linux
    *BSD


    Scanrand : An unusually fast stateless network service and topology discovery system
    Scanrand is a stateless host-discovery and port-scanner similar in design to Unicornscan. It trades off reliability for amazingly fast speeds and uses cryptographic techniques to prevent attackers from manipulating scan results. This utility is a part of a software package called Paketto Keiretsu which was written by Dan Kaminsky.

    2. Top 10 Password Crackers

    1
    Windows
    GUI Interface
    Cain and Abel : The top password recovery tool for Windows
    UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.

    Also categorized as: packet sniffers


    #2
    Linux
    *BSD
    OS X
    Windows

    John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
    John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here.


    #3
    Linux
    *BSD

    THC Hydra : A Fast network authentication cracker which support many different services
    When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC

    #4
    new
    Linux
    *BSD


    Aircrack : The fastest available WEP/WPA cracking tool
    Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

    Also categorized as: wireless tools

    #5
      TITLE=
    Windows
    GUI Interface
    L0phtcrack : Windows password auditing and recovery application
    L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead.

    #6
    Linux
    *BSD
    OS X

    Airsnort : 802.11 WEP Encryption Cracking Tool
    AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.

    Also categorized as: wireless tools


    #7
      TITLE=
    Windows
    GUI Interface
    SolarWinds : A plethora of network discovery/monitoring/attack tools
    SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.

    Also categorized as: traffic monitoring tools


    #8
    Windows
    Command-line interface

    Pwdump : A window password recovery tool
    Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.

    #9
    new
    Linux
    *BSD
    OS X

    RainbowCrack : An Innovative Password Hash Cracker
    The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

    #10
    Windows
    GUI Interface
    Brutus : A network brute-force authentication cracker
    This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.

    Featured Posts

    Adding Accesspolicy to KeyVault for Service Principal Using Portal and Powershell

      Scripts path : https://drive.google.com/drive/folders/1sbBpnVFgXhUIXLdf2E9heyWDeU2f9427?usp=sharing  Adding Accesspolicy to KeyVault for S...