Monday, 30 September 2013




Less Infrastructure, More Intelligent Servers

Cisco Unified Computing System (UCS) and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture. This unique architecture enables end-to-end server visibility, management, and control in both bare metal and virtual environments, and facilitates the move to cloud computing and IT-as-a-Service with Fabric-Based Infrastructure.

CISCO ROUTERS

CISCO ROUTER SERIES


The industry’s most widely deployed universal services aggregation router for enterprise and service provider edge applications, the Cisco 7200 Series offers:
  • Exceptional price/performance: The new NPE-G2 Network Processing Engine aggregates services at up to 2 Mpps
  • A wide range of connectivity options and numerous features including serviceability and manageability
  • Increased VPN performance with the new VPN Services Adapter
  • Increased scalability and flexibility with the new Port Adapter Jacket Card

Benefits:

  • WAN edge: Award-winning quality of service (QoS) feature performance
  • Broadband aggregation: Up to 16,000 PPP sessions per chassis
  • Multiprotocol Label Switching (MPLS): Leading choice for provider-edge deployment
  • IP Security (IPsec) VPN: Scalable to 5000 tunnels per chassis
  • High-end customer premises equipment (CPE)
  • IP-to-IP gateway support: Provides a network-to-network interface point for signaling interworking (H.323, SIP), media interworking, address and port translations (privacy and topology hiding), billing and CDR normalization, and bandwidth management (QoS marking using TOS)
  • Voice, video, and data integration: TDM-enabled VXR chassis and voice port adapters
  • Modular design: 3RU footprint with broad range of flexible, modular interfaces (from DS0 to OC-3)
  • Flexibility: Support for Fast Ethernet, Gigabit Ethernet, Packet over SONET and more

Basic Concept of VLAN

Basic Concept of VLAN
VLAN(Virtual Local Area Network)What is this VLAN ? Why we are using VLAN? How to configure VLAN? all is explained here

VLAN! VLAN!! VLAN !!!

What is this VLAN ?
Why we are using  VLAN?
How to decide VLAN?
These are the question in my mind making storm… But when I took admission in RST forum. Vagish Sir cleared my all doubts about VLAN. So in this blog we will just focus on the “VLAN”
So 1st question comes to your mind that why VLAN???
As consider a company like Accenture or Cisco in which there are 10000 of PC`s  and they are connected on a network and  all are in same subnet. The windows operating system is working on each computer. So as the windows operating system is always broadcasting its every service and any new service. So if we consider that our all PC`s are in a same subnet so the every PC will sends its service broadcast and when it is coming towards a switch it will broadcast it we can`t use router as all PC`s are in a same subnet. Switch will divide only the collision domain and not the broadcast domain so switch will make a multiple copies of that and send to its every port and so if 1 switch has 24 ports then the 10000/24 equal to a approximately 400 switches are there in a network. Lets imagine that for every broadcast the switch will make multiple copies and send its to every port and so it creates very high no of frames flowing through the network and so if now any PC want to use network then the network is already having very large traffic.so such a high no. of frames present in a network causes :-
·            Degradation of switch performnce
·            Degradation of PC`s performance
·            Degradation of useful Bandwidth of a link
 so basically VLAN`s ARE USED TO CONTROL THE BROADCAST DOMAIN.
As so we divide the network in vlan, each vlan is having different subnet so for the communication between VLAN we use layer 3 switch or router.
We are doing VLAN configuration on a switch means what we are doing?
When we define a VLAN on a switch at that time we are actually dividing the switch in to the smaller swich virtually where these virtual  switchs are working in the different network (subnet).
From the following diagram you will get the concept …..


As we made VLAN`s so now each VLAN have its separate subnet so according to our basic principle the traffic between two subnet will route and traffic within a subnet will switch. A router or a layer 3 switch is necessary for communication between two VLAN`s.  





           How to decide that our which PC`s will be in one VLAN and which will be in the separate VLAN ???


These  is decided on the 80-20% rule .
This rule says that 80% traffic in a network should switch and 20% traffic should route.

As in a organization people which are in a same department talks more to each other and communicate more where as the people from different department will talk less to each other and communicate less to each other.
As we know switching is faster than routing. so the traffic within a department has to switch (as more traffic is there) and between the department should route (as less traffic is there).

So lets take a example that there is one company like cisco, in this company we have 4 different departments like engineering, Finance, Human resource and testing so as per our discussion we will keep the people from 1 department in a same VLAN so when they communicate then the traffic between them will switch but when communicate with other department (as they communicate with other department rarely ) so the traffic will route
Advantages of VLAN :-

·            To controls the broadcast domain

·            Use to provide security (it is actually a byproduct)

To provide security means not like the people from different can’t talk the can talk but their call or data will routed through a router so with the help of access list and some other way we can provide them the security. Some people think this is the main requirement of creating a VLAN but actually it is just a byproduct.(providing security to one department from other department doesn`t mean that they should not communicate to each other otherwise in above Cisco company example if a engineering dept. person can`t talk to testing dept. people then what is the use of the network)

All this is a basics of VLAN and after this we will see how the VLAN is configure on a cisco switch and can be extended on more than 1 switch in my next blog.If you have any doubt about VLAN you can ask it to me by comment. I will shortly publish my Blog on VLAN trunk port concept and VLAN Trunking Protocol (VTP). Thanks for reading. 

The following Diagram is added for the comment from himanshu to explain how broadcasting work in Switches on which VLAN is configured.


Sunday, 21 July 2013

HOW TO CREAT BACKDOOR IN WINDOW SEVEN

                                                               CREAT BACKDOOR
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
STEP 1.open c drive  (note:takebakeup of sethc for remove back door)
STEP 2.open windows folder
STEP 3.open system32
STEP 4.search sethc file
STEP 5.right click on sethc
STEP 6.run as administrator
STEP 7.go to properties of sethc
STEP 8.give full control to administrator
STEP 9.now search cmd copy it any drive and rename with sethc
STEP 10.then paste in syatem32 and replace with sethc
STEP 11. log off the syatem and press shift key 5 times.and now it opens command prompt.....you are ready to use it's  command prompt.then you can change anything in that syatem...
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Thursday, 18 July 2013

Using Wine In Red Hat Linux

                              Using Wine In Red Hat Linux


Wine is a great tool for Linux users who want to install and run Windows applications under Linux. Tonight I decided to test Wine and therefore searched about downloading and installing Wine on my Red Hat Enterprise Linux. So its time for you to get ready for an eventful journey towards Wine.
The installation process is quite easy. Wine package is included in RHEL so all you need is to issue the following command:
  • yum install wine
Now just be patient till it get installed. Once you have it installed get an exe file to test Wine. So I downloaded Firefox8 and give it a try with Wine. Now open your terminal. Don’t try to run it from CLI mode. To run an exe issue the following command:
  • wine yourfilepath.exe( for example I issued wine /root/Desktop/Firefox\ Setup\ 8.0.exe
And what I see is that the installation process has begun. Wow! I am running exe files in Linux.
Running Windows Applications In Linux using Wine

Sunday, 14 July 2013

To Password Protect Folders with Folder Protector?




    Step 1. Select folders for protect
  • Copy Folder Protector (lockdir.exe) to the folder you want to protect or drag and drop the folder you want to protect in the operation window of Folder Protector for adding the folder to protect.
    step 2. Send Password to protect selected folder
  • Make settings in Settings window and then right-click on the folder and navigate to "Folder Protector" option to password protect it.
Protect
Step 3. Make settings to retrieve password.
  • a. Click on the ">>" Button on the right side of the main window.
    b. Type a password hint to help you remember your password.
  • Remember that anyone unprotected this folder will be able to see the password hint.
    c. Set an e-mail address to help you retrieve password. The program will remember this e-mail address if you click on "Save as default e-mail".
Step 4. Click "Protect" button to Protect folders

Part II. Unprotect a Folder

    Three different unprotection modes
  • Virtual Drive: Access your data in a virtual drive without extracting the data, which means the folder will be reprotected automatically as soon as you close the explorer window.
  • Temporary: Show a restore window on your taskbar after unprotection, which allows you restore protection easily.
  • Complete: Completely unprotect your folder. You need to run Folder Protector again and enter a new password to protect the folder if you wish to gain folder protection again.
  • Unprotect
    Temporary unprotection Window.
    Temporaray Unprotect

Saturday, 13 July 2013

RSA Algorithm Example


RSA Algorithm Example

  • Choose p = 3 and q = 11
  • Compute n = p * q = 3 * 11 = 33
  • Compute φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20
  • Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7
  • Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 3 [(3 * 7) % 20 = 1]
  • Public key is (e, n) => (7, 33)
  • Private key is (d, n) => (3, 33)
  • The encryption of m = 2 is c = 27 % 33 = 29
  • The decryption of c = 29 is m = 293 % 33 = 2

Friday, 12 July 2013

Cryptographic Algorithms


THE CRYPTOGRAPHY GUIDE



Cryptographic Algorithms

There are of course a wide range of cryptographic algorithms in use. The following are amongst the most well known:

DES
This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a 'private key' system. Further Details on the DES Algorithm
RSA
RSA is a public-key system designed by Rivest, Shamir, and Adleman. Further Details on the RSA Algorithm
HASH
A 'hash algorithm' is used for computing a condensed representation of a fixed length message/file. This is sometimes known as a 'message digest', or a 'fingerprint'..
MD5
MD5 is a 128 bit message digest function. It was developed by Ron Rivest. Further Details on the MD5 Algorithm

AES
This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST.
SHA-1
SHA-1 is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20 bytes).Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5.
HMAC
HMAC is a hashing method that uses a key in conjunction with an algorithm such as MD5 or SHA-1. Thus one can refer to HMAC-MD5 and HMAC-SHA1

Wednesday, 10 July 2013

Windows XP Network configuration

Windows XP Professional

Windows XP TCP/IP configuration panel.
Click Start -> Control Panel -> Network Connections.
Alternately, click Start ->, and right-click My Network Places then select Properties.
The following procedure steps through the Windows XP Professional TCP/IP configuration process:
  1. On some installations the interface will be called Local Area Connection and on others it will be called Network Bridge. On our system it is called Network Bridge. Right-click on Network Bridge -> Properties.
    Network Bridge Configuration.
    Network Bridge Configuration.

  2.  The Network Bridge Configuration, or Local Area Connection, panel is used to set TCP/IP protocol settings. In This connection uses the following items: box, click on Internet Protocol (TCP/IP), then click on Properties.
    The default setting is DHCP-enabled operation (i.e.“Obtain an IP address automatically”).
    Internet Protocol (TCP/IP) Properties.
    Internet Protocol (TCP/IP) Properties.

    Many network administrators will want to use DHCP to configure all client TCP/IP protocol stack settings.
    If it is necessary to provide a fixed IP address, click on “Use the following IP address” and enter the IP Address, the subnet mask, and the default gateway address in the boxes provided.
  3. Click the Advanced button to proceed with TCP/IP configuration. This opens a panel in which it is possible to create additional IP addresses for this interface. The technical name for the additional addresses is IP aliases, and additionally this panel permits the setting of more default gateways (routers). In most cases where DHCP is used, it will not be necessary to create additional settings.
    Advanced Network Settings
    Advanced Network Settings

    Fixed settings may be required for DNS and WINS if these settings are not provided automatically via DHCP.
  4. Click the DNS tab to add DNS server settings. The example system uses manually configured DNS settings. When finished making changes, click the OK to commit the settings.
    DNS Configuration.
    DNS Configuration.

  5.  Click the WINS tab to add manual WINS server entries. This step demonstrates an example system that uses manually configured WINS settings. When finished making changes, click OK to commit the settings.
    WINS Configuration
    WINS Configuration

Network configuration in Linux




How to configure the network card in Red hat enterprise Linux 5 and Centos 5


You can configure network card by editing text files stored in 
/etc/sysconfig/network-scripts/ directory.

First change directory to /etc/sysconfig/network-scripts/:

# cd /etc/sysconfig/network-scripts/

You need to edit files as follows:

/etc/sysconfig/network-scripts/ifcfg-eth0 : First Ethernet card configuration file
/etc/sysconfig/network-scripts/ifcfg-eth1 : Second Ethernet card configuration file
To edit/create first NIC file, type command:
# vi ifcfg-eth0

modify as follows:


# Intel Corporation 82573E Gigabit Ethernet Controller (Copper)

DEVICE=eth0

BOOTPROTO=static

DHCPCLASS=

HWADDR=00:30:48:56:A6:2E

IPADDR=192.168.1.2

NETMASK=255.255.255.0

ONBOOT=yes


Save and close the file. Define default gateway (router IP) and hostname in 
/etc/sysconfig/network file:

# vi /etc/sysconfig/network

Append/modify configuration as follows:
NETWORKING=yes

HOSTNAME=server1.example.com

GATEWAY=192.168.1.1


Save and close the file. Restart networking:

# /etc/init.d/network restart

Make sure you have correct DNS server defined in /etc/resolv.conf file:

# vi /etc/resolv.conf
Setup DNS Server as follows:
nameserver XX.XX.XX.XX

nameserver XX.XX.XX.XX

Tuesday, 9 July 2013

OOPs Concepts



OOPs – Object Oriented Programming System
Object-oriented programming (OOP) is a programming paradigm that uses “Objects “and their interactions to design applications and computer programs.

There are different types of OOPs are used, they are
  1. Object
  2. Class
  3. Data Abstraction & Encapsulation
  4. Inheritance
  5. Polymorphism
  6. Dynamic Binding
  7. Message Passing

1) Object :Object is the basic unit of object-oriented programming. Objects are identified by its unique name. An object represents a particular instance of a class. There can be more than one instance of an object. Each instance of an object can hold its own relevant data.
An Object is a collection of data members and associated member functions also known as methods.
For example whenever a class name is created according to the class an object should be created without creating object can’t able to use class.
The class of Dog defines all possible dogs by listing the characteristics and behaviors they can have; the object Lassie is one particular dog, with particular versions of the characteristics. A Dog has fur; Lassie has brown-and-white fur.
2) Class :
Classes are data types based on which objects are created. Objects with similar properties and methods are grouped together to form a Class. Thus a Class represents a set of individual objects. Characteristics of an object are represented in a class as Properties. The actions that can be performed by objects become functions of the class and is referred to as Methods.
For example consider we have a Class of Cars under which Santro Xing, Alto and WaganR represents individual Objects. In this context each Car Object will have its own, Model, Year of Manufacture, Colour, Top Speed, Engine Power etc., which form Properties of the Car class and the associated actions i.e., object functions like Start, Move, Stop form the Methods of Car Class.No memory is allocated when a class is created. Memory is allocated only when an object is created, i.e., when an instance of a class is created.

3) Data abstraction & Encapsulation :The wrapping up of data and its functions into a single unit is called Encapsulation.
When using Data Encapsulation, data is not accessed directly, it is only accessible through the functions present inside the class.
Data Abstraction increases the power of programming language by creating user defined data types. Data Abstraction also represents the needed information in the program without presenting the details.
Abstraction refers to the act of representing essential features without including the background details or explanation between them.
For example, a class Car would be made up of an Engine, Gearbox, Steering objects, and many more components. To build the Car class, one does not need to know how the different components work internally, but only how to interface with them, i.e., send messages to them, receive messages from them, and perhaps make the different objects composing the class interact with each other.
4) Inheritance :
Inheritance is the process of forming a new class from an existing class or base class.
The base class is also known as parent class or super class, the new class that is formed is called derived class.
Derived class is also known as a child class or sub class. Inheritance helps in reducing the overall code size of the program, which is an important concept in object-oriented programming.
It is classifieds into different types, they are
  • Single level inheritance
  • Multi-level inheritance
  • Hybrid inheritance
  • Hierarchial inheritance
5) Polymorphism :
Polymorphism allows routines to use variables of different types at different times. An operator or function can be given different meanings or functions. Polymorphism refers to a single function or multi-functioning operator performing in different ways.
Poly a Greek term ability to take more than one form. Overloading is one type of Polymorphism. It allows an object to have different meanings, depending on its context. When an exiting operator or function begins to operate on new data type, or class, it is understood to be overloaded.
6) Dynamic binding :
It contains a concept of Inheritance and Polymorphism.
7) Message Passing :It refers to that establishing communication between one place to another.

Setup The Timezone


HowTo: Linux Server Change OR Setup The Timezone

by  on AUGUST 27, 2006 · 55 COMMENTS· LAST UPDATED NOVEMBER 5, 2012
My Linux systems timezone is pointing to the wrong timezone. How do I setup or change the timezone under Linux operating systems?

Unix time, or POSIX time, is a system for describing points in time: it is the number of seconds elapsed since midnight UTC on the morning of January 1, 1970, not counting leap seconds. The definition for time zones can be written in short form as UTC±n (or GMT±n), where n is the offset in hours. You can use the following commands:

[a] setup or redhat-config-date for RHEL based distros.
[b] dpkg-reconfigure tzdata for Debian based distros.
[c] ln command - Generic method for all other distros.

Command to change the Linux timezone

You need to type the following commands as per your Linux distribution.

If you are using Fedora / RHEL / Cent OS Linux

Type the redhat-config-date command at the command line to start the time and date properties tool, run:
# redhat-config-date
OR type setup and select time zone configuration. This tool is recommended for remote ssh text based sessions.
# setup
Select timezone configuration
Fig.01: Redhat / CentOS Server Setting Up Timezone
Fig.01: Redhat / CentOS Server Setting Up Timezone

Just follow on screen instructions to change the timezone.

If you are using Debian / Ubuntu Linux

To change the timezone for you run the following command as root user:
# dpkg-reconfigure tzdata
Again, just follow on screen instructions.

Set timezone using /etc/localtime configuration file [any Linux distro]

Often /etc/localtime is a symlink to the file localtime or to the correct time zone file in the system time zone directory.

Generic procedure to change timezone under Linux

Cd to /etc, run:
# cd /etc
Create a symlink to file localtime:
# ln -sf /usr/share/zoneinfo/EST localtime
OR some distro use /usr/share/zoneinfo/dirname/zonefile format (Red hat and friends):
# ln -sf /usr/share/zoneinfo/EST localtime
OR if you want to set up it to IST (Asia/Calcutta):
# ln -sf /usr/share/zoneinfo/Asia/Calcutta localtime
Please note that in above example you need to use directory structure i.e. if you want to set the timezone to Calcutta (India) which is located in the Asia directory.

How do I verify new settings?

Use the date command to verify that your timezone is changed:
$ date
Output:
Tue Aug 27 14:46:08 EST 2006

How do I use of environment variable called TZ?

You can use TZ environment variable to display date and time according to your timezone:
$ export TZ=America/Los_Angeles
$ date

Sample Output:
Thu Aug 27 11:10:08 PST 2006

Cluster configuration




Red Hat Cluster allows you to connect a group of computers (called nodes or members) to work together as a cluster. It provides a wide variety of ways to configure hardware and software to suit your clustering needs (for example, a cluster for sharing files on a GFS file system or a cluster with high-availability service failover). This book provides information about how to use configuration tools to configure your cluster and provides considerations to take into account before deploying a Red Hat Cluster. To ensure that your deployment of Red Hat Cluster fully meets your needs and can be supported, consult with an authorized Red Hat representative before you deploy it.

List of web browsers


List of web browsers


History:-
       This is a table of personal computer web browsers by year of release of major version, in chronological order, with the approximate number of worldwide Internet users in millions. Note that Internet user data is related to the entire market, not the versions released in that year. The increased growth of the Internet in the 1990s and 2000s means that current browsers with small market shares have more total users than the entire market early on. For example, 90% market share in 1997 would be roughly 60 million users, but by the start of 2007 9% market share would equate to over 90 million users.
YearWeb browsersInternet users
(in millions)[1][2][3]
1991WorldWideWeb (Nexus)4
1992ViolaWWWErwiseMidasWWWMacWWW (Samba)7
1993MosaicCello,[4] Lynx 2.0ArenaAMosaic 1.010
1994IBM WebExplorerNetscape NavigatorSlipKnot 1.0MacWebIBrowseAgora (Argo), Minuet20
1995Internet Explorer 1Netscape Navigator 2.0, OmniWebUdiWWW,[5] Internet Explorer 2Grail16-39
1996Arachne 1.0Internet Explorer 3.0, Netscape Navigator 3.0, Opera 2.0,
PowerBrowser 1.5,[6] CyberdogAmaya 0.9,[7] AWebVoyager
36-73
1997Internet Explorer 4.0, Netscape Navigator 4.0, Netscape Communicator 4.0, Opera 3.0,[8] Amaya 1.0[7]70-118
1998iCabMozilla147-184
1999Amaya 2.0,[7] Mozilla M3, Internet Explorer 5.0248-278
2000KonquerorNetscape 6Opera 4,[9] Opera 5,[10] K-Meleon 0.2, Amaya 3.0,[7] Amaya 4.0[7]361-396
2001Internet Explorer 6Galeon 1.0, Opera 6,[11] Amaya 5.0[7]513-499
2002Netscape 7, Mozilla 1.0, Phoenix 0.1, Links 2.0, Amaya 6.0,[7] Amaya 7.0[7]587-659
2003Opera 7,[12] Safari 1.0, Epiphany 1.0, Amaya 8.0[7]719-771
2004Firefox 1.0, Netscape Browser, OmniWeb 5.0817-897
2005Safari 2.0, Netscape Browser 8.0, Opera 8,[13] Epiphany 1.8, Amaya 9.0,[7] AOL Explorer 1.0, Maxthon 1.0, Shiira 1.01018-1022
2006SeaMonkey 1.0, K-Meleon 1.0, Galeon 2.0, Camino 1.0, Firefox 2.0, Avant 11, iCab 3, Opera 9,[14] Internet Explorer 71093-1150
2007Maxthon 2.0, Netscape Navigator 9NetSurf 1.0, Flock 1.0, Safari 3.0, Conkeror1319-1364
2008Konqueror 4, Safari 3.1, Opera 9.5,[15] Firefox 3, Amaya 10.0,[7] Flock 2, Chrome 1, Amaya 11.0[7]1574-1556
2009Internet Explorer 8, Chrome 2-3, Safari 4, Opera 10,[16] SeaMonkey 2, Camino 2, Firefox 3.51802-1743
2010K-Meleon 1.5.4, Firefox 3.6, Chrome 4-8, Opera 10.50,[17] Safari 5, xxxterm, Opera 111971-2012
2011Chrome 9-16, Firefox 4-9, Internet Explorer 9, Maxthon 3.0, SeaMonkey 2.1-2.3, Opera 11.50, Safari 5.12,267-2264
2012Chrome 17-23, Firefox 10-17, Internet Explorer 10Opera 12, Safari 62,405


 

Copyright (c) 2010 NETWORK PLANET. Design by WpThemesExpert
Blogger Template by New Blogger Templates.