Thursday, December 31, 2009

IT server support energizing the business

Rapid growth of businesses has put extra gravitational force on the IT infrastructure of leading organizations. Hence, to manage huge amount of data, consistent up gradation is required on the server part and so is the need of IT server support. Many well established firm are associated with the job of server support, which are offering 24/7 maintenance, installation and integration support on a wide range of data systems. These IT server support firms are well equipped with a strong technical and it support team.
IT server support has a very crucial role in managing the IT infrastructure. They play key role in designing, installing and maintaining the server. Under any IT server support security, availability, reliability and stability are considered as the foundation stone. Adept IT technician are employed to get rid of any related error. In addition to server, they will also pay attention towards the functioning of desktop, as they are the integral part of any business. They will manage any kind of issue associated with hardware or software. Technician takes care of data backup and does their archiving too, in order to fight against any mishaps of system crash. IT server support provides strong protection against any kind of anti-virus or malware. E-mails to be scanned are made to undergo Message Labs Platform. Any malicious email contaminated with a virus or containing a bad link is blocked and quarantined along with information of sender and recipient.
IT server support facilitates VoIP Telephony. Hence, it is extremely useful for the enterprises to communicate in real time with integrated voice, data, video and mobile communications. Moreover, they are able to make 24/7 use of VoIP Telephony, which helps them to organize any meeting or seminar round the globe.
IT server support plays an important role to make the e-mail communication secure with email contents filtering and end- to -end boundary encryption service. In addition to this, they keep a control over the bulk of email collection which makes unnecessary burden on your server. They provide protection against viruses, spam, identity theft and targeted blackmail campaigns and on the other hand ensure legitimate business email is not blocked.

Wednesday, December 16, 2009

Alteration in Terminal Server's listening port

It is a well-known fact that TCP port 3389 is used by Terminal Server and Windows 2000 Terminal Services for client connections. Alteration in this port is not recommended by Microsoft. But you can change this port. You have to perform this task carefully, otherwise you will face serious problems.
You have to give more concentration while modifying the registry. If you want to change the default port, then you have to follow these steps:
You start with the task of running Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp. Then you have to find the port number subkey and notice the value of 00000D3D, hex is for 3389. After this, you have to change the port number in Hex and save the new value.
If you want to change the port for a particular connection on the Terminal Server, then follow these steps:
You have to run Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection. After this, you have to find the port number subkey and notice the value of 00000D3D, here hex is for 3389. Then you have to change the port number in Hex and save this new value.
After performing this, you have to make alteration in the Port on the Client Side. Follow these steps to perform this:
You have to open Client Connection Manager. Then on the File menu, click on New Connection and then create the new connection. After executing the wizard, you will view a new connection listed there. Then you have to ensure that new connection is highlighted. After this, on the File menu, click Export. Then you have to edit the .cns file using Notepad. You have to make modifications in the server port, Server Port=3389 to Server Port= new port number, that you had specified on Terminal Server. Now import the file back into Client Connection Manager. Then you will be demanded to overwrite the current one. If it has the same name, then overwrite it. In this way, you will receive a client that has the correct port settings to match your Terminal Server settings.

Monday, December 7, 2009

Server Monitor

Sometimes you are in a need of monitoring the status of your web applications. Simple Server Monitor is a solution for this problem. It is powerful, of low cost and user-friendly server monitoring program that can continually monitor the status of your servers and web applications. When it detects any network uptime losses, then it can alert you with many methods. These alerting methods can be one of the following:

Simple Server Monitor can alert you with pop-up messages, e-mail / cell phone alerts, desktop audible alerts and external application launch. You can also perform its settings in a manner that you want. When you are using the alarming methods, then you can also stay connected with networks and servers from all over the world. In this way you can be aware of maintaining server uptime without losing your mobility. Here uptime deals with the availability of the network. If a website is designed for the purpose of providing continuous service to its customers and clients throughout the world, then its uptime should be higher. If the uptime of any website is higher, then it is more successful in the internet marketplace.

If any website has lower uptime, then it can refuse hundreds or even thousands of visitors. If you want to increase the website reliability then it is necessary that you should monitor the server uptime. Simple Server Monitor also gives the following benefits:

It provides you up-to-the-minute network monitoring. Its performance charts monitors the server operation. Simple Server Monitor has better testing as compared with a server ping. It can be connected to a service and logs on. It provides unlimited e-mail support and free minor updates.

Thursday, October 15, 2009

Online Server Support to Automated Troubleshooting of TCP/IP

This post discuss how to troubleshoot TCP/IP Issued with windows XP, It will help to fix network monitoring support to maintain small business network.

The procedure that you use to troubleshoot TCP/IP issues depends on the type of network connection that you are using and the connectivity problem that you are experiencing.

For most issues that involve Internet connectivity, start by using the Network Diagnostics tool to identify the source of the issue. To use Network Diagnostics, follow these steps:

1. Click Start, and then click Help and Support.
2. Click the link to Use Tools to view your computer information and diagnose problems, and then click Network Diagnostics in the list on the left.
3. When you click Scan your system, Network Diagnostics gathers configuration information and performs automated troubleshooting of the network connection.
4. When the process is completed, look for any items that are marked "FAILED" in red, expand those categories, and then view the additional details about what the testing showed.

You can either use that information to resolve the issue or you can provide the information to a network support professional for help. To interpret the results for TCP/IP, expand the Network Adapters section of the results, and then expand the network adapter that failed the testing.

You can also start the Network Diagnostics interface directly by using the following command:
netsh diag gui

Tuesday, October 13, 2009

Wireless Network Troubleshooting with windows XP

This post provides server support to fix wireless network problems, These Steps provides basic troubleshooting for wireless network problems, It is applied for home server support or Small business support Services


To troubleshoot wireless network connections in Windows XP, follow these steps:

1. Check the Windows Catalog at http://www.windowsmarketplace.com (http://www.windowsmarketplace.com) to determine if there is a Windows XP-compatible driver that is available for your wireless adapter.
If there is a compatible driver, install the updated driver before you perform any additional troubleshooting procedures.
If there is not a compatible driver, you may be able to use the network adapter, but its configuration and functionality may be very limited.
2. Determine if the driver that you are using recognizes the Windows XP Wireless Zero Configuration service. To do this, follow these steps:
1. Click Start, and then click Control Panel.
2. In the right pane,click Network and Internet Connections.
3. In the right pane, click Network Connections.
4. Right-click Wireless Network Connection, and then click Properties.
5. View the available options:

If you do not see the Wireless Network Connection icon in the Network Connections folder, or if you cannot view the properties, there is a problem with the driver for the wireless network adapter. To troubleshoot this problem, see the Driver installation issues section.
If you can view the properties for the Wireless Network Connection icon, but you do not see a Wireless Networks tab, see the Drivers that do not support the Wireless Zero Configuration service section to continue troubleshooting.
If you can view the properties, and you can see and use the Wireless Networks tab, see the Drivers that support the Wireless Zero Configuration service section to continue troubleshooting.
If the Authentication tab is missing in the Wireless Network Connection properties, make sure that the Wireless Zero Configuration service is running.

Sunday, August 23, 2009

What is LAN, WLAN, WAN, MAN, SAN, CAN, PAN and GAN ?

Computer networks are bunch of interconnected PC or computers that facilitate the exchange of data or some other purposeful work. The first computer network to be designed was the "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense in the late 1960s and early 1970s. From then on, numerous new network technologies have been developed.

Computer networks can be classified into different types based on their scale of operation. They include:
  • LAN: Local Area Networks cover a small physical area, like a home, office, or a small group of buildings, such as a school or airport.

  • WLAN: Wireless Local Area Networks enable users to move around within a larger coverage area, but still be wirelessly connected to the network.

  • WAN: Wide Area Networks cover a broad area, like communication links that cross metropolitan, regional, or national boundaries. The Internet is the best example of a WAN.

  • MAN: Metropolitan Area Networks are very large networks that cover an entire city.

  • SAN: Storage Area Networks help attach remote computer storage devices, such as disk arrays, tape libraries, and optical jukeboxes, to servers in such a manner that that they appear to be locally attached to the operating system.

  • CAN: Controller Area Networks allow micro controllers and devices to communicate with each other without a host computer.

  • PAN: Personal Area Networks are used for communication among various devices, such as telephones, personal digital assistants, fax machines, and printers, that are located close to a single user.

  • GAN: Global Area Networks support mobile communications across an arbitrary number of wireless LANs and satellite coverage areas.

  • INTERNETWORK: Internetworking is the process of connecting two or more distinct computer networks or network segments through a common routing technology.

Computer networks are an integral part of our lives. It is only because of networking that telephones, televisions, radios, and the Internet are at our fingertips.

Tuesday, July 14, 2009

Wireless Routing Protocol

The Wireless Routing Protocol (WRP) is a proactive unicast routing protocol for mobile ad-hoc networks (MANETs). WRP uses an enhanced version of the distance-vector routing protocol. Because of the mobile nature of the nodes within the MANET, the protocol introduces mechanisms which reduce route loops and ensure reliable message exchange.
WRP is a distance vector routing protocol. Each node maintains 4 tables:
Distance table
Routing table
Link cost table
Message Retransmission List table


The wireless routing protocol (WRP), similar to DSDV, inherits the properties of the distributed Bellman-Ford algorithm. To counter the count-to-infinity problem and to enable faster convergence, it employs a unique method of maintaining information regarding the shortest distance to every destination node in the network and the penultimate hop node on the path to every destination node. Since WRP, like DSDV, maintains an up-to-date view of the network, every node has a readily available route to every destination node in the network. It differs from DSDV in table maintenance and in the update procedures. While DSDV maintains only one topology table, WRP uses a set of tables to maintain more accurate information. The tables that are maintained by a node are the following: distance table (DT), routing table (RT), link cost table (LCT), and a message retransmission list (MRL).

The DT contains the network view of the neighbors of a node. It contains a matrix where each element contains the distance and the penultimate node reported by a neighbor for a particular destination. The RT contains the up-to-date view of the network for all known destinations. It keeps the shortest distance, the predecessor node (penultimate node), the successor node (the next node to reach the destination), and a flag indicating the status of the path. The path status may be a simple path (correct), or a loop (error), or the destination node not marked (null). The LCT contains the cost (e.g., the number of hops to reach the destination) of relaying messages through each link. The cost of a broken link is infinity. It also contains the number of update periods (intervals between two successive periodic updates) passed since the last successful update was received from that link. This is done to detect links breaks. The MRL contains an entry for every update message that is to be retransmitted and maintains a counter for each entry. This counter is decremented after every retransmission of an update message. Each update message contains a list of updates. A node also marks each node in the RT that has to acknowledge the update message it transmitted. Once the counter reaches zero, the entries in the update message for which no acknowledgments have been received are to be retransmitted and the update message is deleted. Thus, a node detects a link break by the number of update periods missed since the last successful transmission. After receiving an update message, a node not only updates the distance for transmission neighbors but also checks the other neighbors’ distance, hence convergence is much faster than DSDV.

Sources:http://en.wikipedia.org/wiki/Wireless_Routing_Protocol

Friday, July 10, 2009

How to Extend Wireless Range

Maximizing the signal of a wireless network is always a big advantage to a home, business establishment, or workplace. There are many ways of boosting wireless range. Some may require something as simple as relocating the wireless router, while some would need special equipment. One or a combination of these methods will hopefully help extend network range enough to cover an entire home, office, or establishment.

Materials Needed:
- wireless router
- hi-gain antenna (optional)
- USB network adapter (optional)
- wireless repeater (optional)
Step 1
Try relocating the router. Ideally, the router should be placed at the center of the area for maximum coverage in all directions. Also, thick metal and concrete, as well as floors may interfere with the signal of the router so try placing the unit away from these obstructions. Elevating the unit onto a table or mounting it on a wall may also help boost the signal.

Step 2
Try to gauge if the signal has increased by referring to the Wi-Fi client’s signal meter.

Step 3
Try changing the orientation of the router’s antennas (horizontal, vertical, at a certain angle) to see which direction works best to intensify the signal.

Step 4
Go to the wireless router’s configuration page to change channels. Changing the wireless channel, much like fiddling with the dial of a radio to find the best signal, may also help in choosing a channel that is free of interference.

Step 5
Most antennas that come with the router are omni-directional so they broadcast in equal intensity around the router. This will prove inefficient if the router is near an outside wall since half of the signal will go to a place outside the needed area. If this is the case, consider upgrading to a hi-gain antenna. This kind of antenna will concentrate the wireless signal toward only one direction, maybe the area where the router power is most needed.

Step 6
Adding a wireless repeater is one very common way of increasing signal strength. Placing the repeater halfway from the computer and the router will instantly boost the wireless signal. Choose a repeater from the same producer of the router if possible, as hardware coming from the same manufacturers generally work better together.

Step 7
Upgrading the wireless router may prove to be more costly but it is the surest way to actually boost wireless signal. The best in the market, according to most online reviews, is the 802.11n so far. It has been said that this model’s signal provides better range as well as stability. It has also been observed that it crashes less frequently than other models.

Friday, July 3, 2009

How to Encrypt a Wireless Router

A wireless network deployed without adequate encryption is similar to a house without front door with a welcome mat saying thieves are welcomed here at any time. The increasing popularity of Wireless Fidelity (Wi-Fi) networks also led to a need for more reliable protection mechanism which prevents the hijacking of the Internet connection for authorized users of the wireless network. Unfortunately, majority of novice computer owners opt to forego of the process of encrypting the broadcasting of their wireless routers because of the perceived complexity associated with the procedure. This is a dangerous practice because it allows an unhampered access not only to the broadband connection but possibly to the resources of the network clients.

Materials Needed:
- Wireless router
- computer
- Internet connection
- Web browser
Step 1
The process of encrypting the digital signals of the wireless router is not as complicated as it seems. To lock down the router broadcast, open the Web browser and type the IP address of the wireless router in the address page. Possible addresses are 192.168.1.1, 192.168.0.1, and 192.168.2.1 among others depending on the device’s manufacturer. Consult your router manual for verification.
Step 2
Entering the correct address will bring up the Administrator login screen for the router. Unless previously modified, possible default usernames are admin, root, or simply a blank box. The possible passwords would be admin or just leaving it blank. The default username and password should be in the device documentation.
Step 3
After successfully entering the correct username and password, the Web Administration Page will be displayed to the user. This is where the encryption of the broadcast will be done.
Step 4
Click on the “Wireless” section of the router configuration page. Choose the section for the “Wireless Security” option.
Step 5
Under the “Security Mode” option, click the dropdown list to select from the possible choices for encryption mode. Each router supports a different range of security methods. More common choices would be WPA (further divided into Personal and Pre-Shared key) and WEP.
Step 6
After choosing the preferred security method, choose the “Wireless Encryption Level” which is normally 64- or 128-bits. The higher the number of bits, the more secured the encryption level is.
Step 7
In the Passphrase field, type a reference text that you can remember. Click on the “Generate” button which will generate a corresponding key based on the Wireless Encryption Level. This code serves as the password for all wireless devices attempting to access the network.
Step 8
Click on the “Save Changes” button to implement the new configuration. Test the broadcast encryption by attempting to connect your wireless device without specifying the network password. The connection should be denied.
Step 9
Repeat the same connection process but this time, type in the generated network key. Click on the “Connect” button. The wireless device should be able to connect to the network. Select the option to save the network key to eliminate the need to type it in at every connection attempt.

Sources: http://www.liutilities.com/how-to/encrypt-a-wireless-router/

Tuesday, June 30, 2009

What is WiFi ? what is different type of wirless network

Wireless, or WiFi, technology is another way of connecting your computer to the network using radio frequency and no network cables.

Wireless works similarly to cordless phones; they transmit data from one point to another through radio signals. But wireless technology also requires that you be within the wireless network range area to be able to connect your computer. There are three different types of wireless networks:

Wireless Local Area Network (WLAN): WLAN are wireless networks that use radio waves. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network. The range of a WLAN can be anywhere from a single room to an entire campus.

Wireless Personal Area Network (WPAN): WPANs are short-range networks that use Bluetooth technology. They are commonly used to interconnect compatible devices near a central location, such as a desk. A WPAN has a typical range of about 30 feet.

Wireless Wide Area Networks (WWAN): WWANs are created through the use of mobile phone signals typically provided and maintained by specific mobile phone (cellular) service providers. WWANs can provide a way to stay connected even when away from other forms of network access. Also, be aware that additional charges are often associated with the usage of WWANs in some locations

Thursday, June 25, 2009

10 tips for improving your wireless network

If Windows ever notifies you about a weak signal, it probably means your connection isn't as fast or as reliable as it could be. Worse, you might lose your connection entirely in some parts of your home. If you're looking to improve the signal for your wireless network, try some of these tips for extending your wireless range and improving your wireless network performance.

Position your wireless router (or wireless access point) in a central location:

When possible, place your wireless router in a central location in your home. If your wireless router is against an outside wall of your home, the signal will be weak on the other side of your home. Don't worry if you can't move your wireless router, because there are many other ways to improve your connection.

Move the router off the floor and away from walls and metal objects (such as metal file cabinets):

Metal, walls, and floors will interfere with your router's wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be.

Replace your router's antenna:

The antennas supplied with your router are designed to be omni-directional, meaning they broadcast in all directions around the router. If your router is near an outside wall, half of the wireless signals will be sent outside your home, and much of your router's power will be wasted. Most routers don't allow you to increase the power output, but you can make better use of the power. Upgrade to a hi-gain antenna that focuses the wireless signals only one direction. You can aim the signal in the direction you need it most.

Replace your computer's wireless network adapter:

Wireless network signals must be sent both to and from your computer. Sometimes, your router can broadcast strongly enough to reach your computer, but your computer can't send signals back to your router. To improve this, replace your laptop's PC card-based wireless network adapter with a USB network adapter that uses an external antenna. In particular, consider the Hawking Hi-Gain Wireless USB network adapter, which adds an external, hi-gain antenna to your computer and can significantly improve your range.

Add a wireless repeater

Wireless repeaters extend your wireless network range without requiring you to add any wiring. Just place the wireless repeater halfway between your wireless access point and your computer, and you'll get an instant boost to your wireless signal strength. Check out the wireless repeaters from ViewSonic, D-Link, Linksys, and Buffalo Technology.

Reduce wireless interference:

If you have cordless phones or other wireless electronics in your home, your computer might not be able to "hear" your router over the noise from the other wireless devices. To quiet the noise, avoid wireless electronics that use the 2.4GHz frequency. Instead, look for cordless phones that use the 5.8GHz or 900MHz frequencies.

Update your firmware or your network adapter driver:

Router manufacturers regularly make free improvements to their routers. Sometimes, these improvements increase performance. To get the latest firmware updates for your router, visit your router manufacturer's Web site.

Similarly, network adapter vendors occasionally update the software that Windows uses to communicate with your network adapter, known as the driver. These updates typically improve performance and reliability. To get the driver updates, do the following:
Windows Vista users: Click the Start menu, click All Programs, and then click Windows Update. In the left pane, click Check for updates, and then wait while Windows looks for the latest updates for your computer. Install any updates relating to your wireless network adapter.
Windows XP users: Visit Microsoft Update, click Custom, and then wait while Windows looks for the latest updates for your computer.

Pick equipment from a single vendor:

While a Linksys router will work with a D-Link network adapter, you often get better performance if you pick a router and network adapter from the same vendor. Some vendors offer a performance boost of up to twice the performance when you choose their hardware: Linksys has the SpeedBooster technology, and D-Link has the 108G enhancemen.

Source:http://www.microsoft.com/athome/setup/wirelesstips.aspx

Tuesday, June 23, 2009

How to Secure Your Wireless Network

Wireless Network :- it is a network which is set up by radio signal frequency. wireless network cummnicate among computers and other network devices.It also known as Wifi network or WLAN.this types of networking is increaseing day by day nowadays due to easily in setup.The main advantage is also that no cabling involved with it.we can connect many computer in anywhere in your house and office without any wires.In wireless networking computer send the binary data and it will be encoded to radio frequency and transmitted through wireless router.The network computer get the radio frequency data in binary data after decode the signal.

Before installing a wireless router we have known the requirement and how to setup.One wireless support only one WLAN.We keep in mind that setup of WLAN installation as simple as possible.Most probably try to install our wireless router in a central location within the home and office.Keeps your computer closer to your Wifi networking works.In Installation we have to give the name of network,in wi-fi networking, the netowrk name is often called the SSID.We shared same SSID with all router and computer on the WLAN.

If our Wireless networking instalation is done,we have to keep in mind that,all works not done here.We have to more take some precaution regarding to secure oue wireless networking.Some don't know about it, other just ignore it.if we have an unsecured wireless network the outsider computer people connect to your network, use your connection for downloading illegal stuffs. We takes Example in Xp how we check our unsecured network. Go to 'network connection' and search wireless networks in range.in that windows we should be able to see whether the your wireless network "NAME" to is secure or not.In this you have check the WPA or WEP encryption method also.( Right click on the network, select 'Properties' and then look for 'Encryption type' we have to change this Encryption type or password once in a week.Without Encryption and other protectives measure, any one can use you network and see our wi-fi traffic.we should keep ON the firewall build into your router to prevents from hackers on the internet from getting access code to our Computer and also should run software firewalls on individual PCs on our network.Some goods software also available on net to prevent our wi-fi network like Zone Alarm which is easily available on net free.

Friday, June 12, 2009

Wireless Network Protocol Support

A protocol is a set of rules which is used by computers to communicate with each other across a network.A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints.

On the Internet the set of communications protocols used is called TCP/IP. TCP/IP is actually a collection of various protocols that each have their own special funtion or purpose. These protocols have been established by international standards bodies and are used in almost all platforms and around the globe to ensure that all devices on the Internet can communicate successfully.


There are a variety of protocols currently in use for wireless networking. Arguably, the most prevalent is 802.11b. Equipment using 802.11b is comparitively inexpensive. The 802.11b wireless communication standard operates in the unregulated 2.4 Ghz frequency range. Unfortunately, so do many other devices such as cordless phones and baby monitors which can interfere with your wireless network traffic. The maximum speed for 802.11b communications is 11 mbps.

The newer 802.11g standard improves on 802.11b. It still uses the same crowded 2.4 Ghz shared by other common household wireless devices, but 802.11g is capable of transmission speeds up to 54 mbps. Equipment designed for 802.11g will still communicate with 802.11b equipment, however mixing the two standards is not generally recommended.

The 802.11a standard is in a whole different frequency range. By broadcasting in the 5 Ghz range 802.11a devices run into a lot less competition and interference from household devices. 802.11a is also capable of transmission speeds up to 54 mbps like the 802.11g standard, however 802.11 hardware is significantly more expensive.

Another well-known wireless standard is Bluetooth. Bluetooth devices trasnmit at relatively low power and have a range of only 30 feet or so. Bluetooth networks also use the unregulated 2.4 Ghz frequency range and are limited to a maximum of eight connected devices. The maximum transmission speed only goes to 1 mbps.

There are many other standards being developed and introduced in this exploding wireless networking field. You should do your homework and weigh out the benefits of any new protocols with the cost of the equipment for those protocols and choose the standard that works best for you.

Source:http://netsecurity.about.com/cs/wirelesssecurity/qt/qt_wifiprotocol.htm

Wednesday, June 10, 2009

Why is Wireless Security Important.

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

Wireless networks are very common, both for organizations and individuals. Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking has many security issues.[1] Hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks. As a result, it's very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources.[2]

The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Crackers had not yet had time to latch on to the new technology and wireless was not commonly found in the work place. However, there are a great number of security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level.[3] Cracking methods have become much more sophisticated and innovative with wireless. Cracking has also become much easier and more accessible with easy-to-use Windows or Linux-based tools being made available on the web at no charge.

Some organizations that have no wireless access points installed do not feel that they need to address wireless security concerns. In-Stat MDR and META Group have estimated that 95% of all corporate laptop computers that were planned to be purchased in 2005 were equipped with wireless. Issues can arise in a supposedly non-wireless organization when a wireless laptop is plugged into the corporate network. A cracker could sit out in the parking lot and gather info from it through laptops and/or other devices as handhelds, or even break in through this wireless card-equipped laptop and gain access to the wired network.

Source:http://en.wikipedia.org/wiki/Wireless_security

Thursday, June 4, 2009

How to Setup a Wireless Newtork

How to setup a Wireless Network:
Wireless network communicate to among computer and other network device. Mostly Wireless network has gotten easy to set up without wires allow to create a dynamic office environment that responds to your business. here we tell you about how to configure the security features of our wireless router or access point. Here are some of the things so that we can protect our wireless network:
What you will need to set up a Wireless Network:
Desktop, Tablet PCs, or Pocket PCs,notebook PCs, equipped with wireless LAN access cards or with built-in wireless support.
A wireless access point:
A broadband Internet connection such as a partial/whole T1 line or a DSL/cable connection for small offices with fewer than 5 people if you plan to share Internet connectivity
Step 1:You connect you wireless access point to the router which supplies your broadband Internet service.
Step 2. Equip all your computers with wireless support.
Step 3:Reset your SSID values to lock down the wireless network
Step4:Configure the security settings on your access points and computers to maximize security
Step1: Your broadband Internet service normally includes a router, which allows you to connect the Internet service with the computers on your network. On a wired network, a standard router, hub or switch shares your Internet connection with your company computers via Ethernet cables. On a wireless network however, the access point replaces the hub or switch to broadcast the signals wirelessly to all of your computers.
To deploy a wireless network, simply connect your wireless access point to your router and it will be ready to share your Internet connection.
Step2: Ensure all of your computers are wirelessly equipped:
For your desktop,hand held and notebook and tablet PCs to communicate over your wireless network,They will need to support the wireless LAN protocol called Wi-Fi.So they can access your wireless network immediately after the installation of an access point.
Access points have compatible protocols,802.11b and 802.11g are inter operable.
Step:3Configure the SSID on your access points and wireless computers:
Wi-Fi access point use to special value as called a SSID to distinguish wireless networks from one another. Access point default setting.
Step4: Configure your access point and cards for maximum security:
After getting your hardware up and running,be carefully review the security options and configuration available to you before communicating sensitive data over the wireless network offer provide the latest in wireless security, including data encryption and user authentication.

Wednesday, June 3, 2009

How to Secure Wireless Help

Mostly WLAN hardware has gotten easy to set up and many users simply plug it in and start using the network without giving much thought to security.here we tell you about how to configure the security features of our wireless router or access point. Here are some of the things so that we can protect our wireless network;
1) How can we Secure our wireless router or access point Through administration interface ,
Mostley we have seen all of the routers and access points have an own administrator password that's needed to log into the device and modify any configuration settings. some of devices use a weak default password like the manufacturer's name, and some don't have a default password at all. we have to set a new WLAN router or access point,firstly we will have to change the default password to something els and we may not use this password very often, the only one way to access the router or access point we may be to reset it to factory default settings which will wipe away any configuration changes we have made.
2) We Don't have to broadcast our SSID.
Mostly WLAN access points and routers automatically broadcast the network's name, or SSID. This will make setting up wireless clients extremely convenient.after that it will make our WLAN visible to any wireless systems within range of it.
3)We will have to enable WPA encryption instead of WEP.
802.11's WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect our WLAN is with WPA (Wi-Fi Protected Access). We all know that WPA provides much better protection and is also easier to use.
4) And Rememberone thing that WEP is better than nothing .
If we find that some of our wireless devices only support WEP encryption , We will have to avoid the temptation to skip encryption entirely because in spite of It's flaws,when we will use WEP is still far superior to having no encryption at all. Ifwe willuse WEP, we don't have to use an encryption key that's easy to guess like a string of the same or consecutive numbers also,and we have to see this page need help getting WEp to work.
5) We have to Use MAC filtering for access control,
Use Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering wecan limit network access to only our systems . when we will use MAC filteringwe need to find the 12-character MAC address of every system that we will connect to the network, especially if we have a lot of wireless clients or if our clients change a lot.MAC addresses can be "spoofed" (imitated) by a knowledgable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump.
6) We will have to Disable remote administration,
We have seen that Most WLAN routers have the ability to be remotely administered via the Internet. Ideally,we should use this feature only if it lets us define a specific IP address or limited range of addresses that will be able to access the router. Otherwise anyone anywhere could potentially find and access our router. it's best to keep remote

Monday, June 1, 2009

Wirless Network Advantages

Here are some of those advantages in case you are still on the fence regarding why you should go wireless:

If you have looked into setting up, or have set up a home office, or a small business, you’re probably aware of how far technology has come in terms of what’s available to the average consumer. What used to take up a whole room can now fit neatly under a desk. You can have a multi-server wireless network with a handful of workstations and all the bells and whistles. But is this right for you? Maybe not, but a wireless network may be the key to making your workplace more efficient.

A wireless network is a great way to expand the capabilities of any office, large or small. Even a single computer that sits on the same desk will benefit from a wireless set up. I’ll start with the obvious. There are no wires! Going wireless really tidies up your workspace. A wireless router is easy to tuck out of the way, and replaces yards, or miles of cables going across your office. In the early days of wireless, people assumed losing the wires would degrade signal quality or slow down operations. This isn’t true at all. With a wireless set up, your data will go just as fast as it would with a wired set up.

As strange as it sounds, a wireless environment can improve the aesthetics of your office, which improves the mood and morale of you and your co-workers. Having a laptop and being able to go freely through the office is convenient and efficient. Employees will be more motivated to work when they can do so in a comfortable environment. If you ever rearrange your office, or move to the other end of the building, it will be easy to get set right up on the network in your new location. In addition, you can easily add new units or expand without spending a lot of money on expanding your network.

In the business world, a key advantage of setting up a wireless network is the savings. After installing a wireless network, you will quickly see a return on your investment. You won’t need to spend money on cable or maintenance of extra equipment. Wireless routers are available for any budget. Most new computers are set up for wireless as a stock feature. If yours is not, PCI cards are available starting around $20, and enable a PC to run on a wireless network. Wireless receiver cards also available for laptop computers for an average of around $40-50. As with PCs, most laptops come with wireless capability as a stock feature.

wireless network is a great way to improve your work environment. There are many advantages you won’t realize until you make the change yourself. I find myself laying on the couch typing this article right now on my laptop, and that’s reason enough for me.

Friday, May 29, 2009

wireless network help

A Wireless network support is network set up by using radio signal frequency to communicate among computers and other network devices. Sometimes it’s also referred to as WiFi
network or WLAN. This
wireless network is getting popular nowadays due to easy to setup feature and no cabling involved. You can connect computers anywhere in your home without the need for wires.
Here is simple explanation of how it works, let say you have 2 computers each equipped with wireless adapter and you have set up wireless router. When the computer send out the
data, the binary data will be encoded to radio frequency and transmitted via wireless router. The receiving computer will then decode the signal back to binary data.
It doesn’t matter you are using broadband cable/DSL modem to access internet, both ways will work with wireless network. If you heard about wireless hotspot, that means that
location is equipped with wireless devices for you and others to join the network.
The two main components are wireless router or access point and wireless clients.
If you have not set up any wired network, then just get a wireless router and attach it to cable/DSL modem. You then set up wireless client by adding wireless card to each
computer and form a simple wireless network. You can also cable connect computer directly to router if there are switch ports available.
If you already have wired Ethernet network at home, you can attach a wireless access point to existing network router and have wireless access at home.
Wireless router or access points should be installed in a way that maximizes coverage as well as throughput. The coverage provided is generally referred to as the coverage cell.
Large areas usually require more than one access point in order to have adequate coverage. You can also add access point to your existing wireless router to improve coverage.