Saturday, December 27, 2008

Intranet Implementation: The Advantages Of A Web-Based Solution

The traditional approach to implementing an intranet is to purchase a software package, modify it for your needs, and install it on your system.

Over the past few years, another option has grown in popularity – the implementation of a web-based solution.

As you consider the choice between installed software and a web-based intranet, here are some considerations:


1. The most important requirement of any intranet is that everyone uses it.

To assure broad-based participation, the intranet must be easy to implement, simple to use, cost-effective to maintain, and offer each individual user the power to post, access and use content in a way that serves their specific needs. In short, the intranet must have value to everyone.

Web-based intranets are designed around this concept. The interface and navigation are consistent with their use of the web – an environment in which they feel in control, using familiar tools.

In contrast, the business world is littered with countless elegant and feature-rich soft-ware based intranets that have failed. Why? Because they represented an alien environment into which the user was expected to venture. Few employees had the time or the interest (or courage) to enter, rendering the intranet impotent, with the powerful tools unused.

This is the plight of traditional, out-of-the-box software solutions. Unlike web-based intranets, they force users into a constrained environment requiring in-depth training, built around rules designed for the group, rather than the individual.


2. Software intranets have unpredictable costs: in time, attention and money.

Software based solutions require extensive internal support. The ongoing expense in both staff time and money takes the focus of your IT group away from mission-critical tasks.

System integration, Implementation, maintenance, technology upgrades, training and user support are all on-going tasks that represent a significant, recurring investment. The cost can be substantial, far exceeding your initial license cost and monthly fee.


3. Web-based intranets offer a predictable cost and cutting-edge technology.

Most web-based solutions offer a fixed monthly fee that covers all maintenance, technology upgrades, training and user support. The costs are predictable, the technology evolutionary, and it's all done with minimal involvement of your IT staff.

It's for these reasons that companies needing broad-based participation in a changing environment are choosing web-based intranets over traditional software solutions.

How To Secure Your Wireless Network

People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?

Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.

Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.

You can setup your security by follow these steps:

1. Change default administrative password on wireless router/access point to a secured password.

2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.

3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.

4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.

5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.

Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.

All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.

There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.

How To Find Your IP Address . DNS Address . IPv4 . IPv6

Article : How To Find Your IP Address . DNS Address . IPv4 . IPv6
Article Map:
Content
Links

IP address
(Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any participating network device—including routers, computers, time-servers, printers, Internet fax machines, and some telephones—can have their own unique address.
An IP address can also be thought of as the equivalent of a street address or a phone number ( compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. An IP address differs from other contact information, however, because the linkage of a user's IP address to his/her name is not publicly available information.
IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a network address translator (NAT) or proxy server acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP addresses, in the private address space defined by RFC 1918, an address block that cannot be routed on the public Internet. Only the "outside" interface(s) of the NAT need to have Internet-routable addresses.
Most commonly, the NAT device maps TCP or UDP port numbers on the outside to individual private addresses on the inside. Just as there may be site-specific extensions on a telephone number, the port numbers are site-specific extensions to an IP address.
IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.

DNS Address:

On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g. en.wikipedia.org, into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use.

Uses :

The most basic use of DNS is to translate hostnames to IP addresses. It is in very simple terms like a phone book. For example, if you want to know the internet address of en.wikipedia.org, the Domain Name System can be used to tell you it is 66.230.200.100. DNS also has other important uses.
Pre-eminently, DNS makes it possible to assign Internet destinations to the human organization or concern they represent, independently of the physical routing hierarchy represented by the numerical IP address. Because of this, hyperlinks and Internet contact information can remain the same, whatever the current IP routing arrangements may be, and can take a human-readable form (such as "wikipedia.org") which is rather easier to remember than an IP address (such as 66.230.200.100). People take advantage of this when they recite meaningful URLs and e-mail addresses without caring how the machine will actually locate them.
The Domain Name System distributes the responsibility for assigning domain names and mapping them to IP networks by allowing an authoritative server for each domain to keep track of its own changes, avoiding the need for a central registrar to be continually consulted and

History :

The practice of using a name as a more human-legible abstraction of a machine's numerical address on the network predates even TCP/IP, and goes all the way to the ARPAnet era. Back then however, a different system was used, as DNS was only invented in 1983, shortly after TCP/IP was deployed. With the older system, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI (now SRI International). The HOSTS.TXT file mapped numerical addresses to names. A hosts file still exists on most modern operating systems, either by default or through configuration, and allows users to specify an IP address (eg. 192.0.34.166) to use for a hostname (eg. www.example.net) without checking DNS. As of 2006, the hosts file serves primarily for troubleshooting DNS errors or for mapping local addresses to more organic names. Systems based on a hosts file have inherent limitations, because of the obvious requirement that every time a given computer's address changed, every computer that seeks to communicate with it would need an update to its hosts file.
The growth of networking called for a more scalable system: one that recorded a change in a host's address in one place only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts' names and their associated IP Addresses.
At the request of Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications appear in RFC 882 and 883. In 1987, the publication of RFC 1034 and RFC 1035 updated the DNS specification and made RFC 882 and RFC 883 obsolete. Several more-recent RFCs have proposed various extensions to the core DNS protocols.
In 1984, four Berkeley students — Douglas Terry, Mark Painter, David Riggle and Songnian Zhou — wrote the first UNIX implementation, which was maintained by Ralph Campbell thereafter. In 1985, Kevin Dunlap of DEC significantly re-wrote the DNS implementation and renamed it BIND (Berkeley Internet Name Domain, previously: Berkeley Internet Name Daemon). Mike Karels, Phil Almquist and Paul Vixie have maintained BIND since then. BIND was ported to the Windows NT platform in the early 1990s.
Due to BIND's long history of security issues and exploits, several alternative nameserver/resolver programs have been written and distributed in recent years.
How DNS Work In The Theory :
The domain name space consists of a tree of domain names. Each node or branch in the tree has one or more resource records, which hold information associated with the domain name. The tree sub-divides into zones. A zone consists of a collection of connected nodes authoritatively served by an authoritative DNS nameserver. (Note that a single nameserver can host several zones.)
When a system administrator wants to let another administrator control a part of the domain name space within his or her zone of authority, he or she can delegate control to the other administrator. This splits a part of the old zone off into a new zone, which comes under the authority of the second administrator's nameservers. The old zone becomes no longer authoritative for what goes under the authority of the new zone.
A resolver looks up the information associated with nodes. A resolver knows how to communicate with name servers by sending DNS requests, and heeding DNS responses. Resolving usually entails iterating through several name servers to find the needed information.
Some resolvers function simplistically and can only communicate with a single name server. These simple resolvers rely on a recursing name server to perform the work of finding information for them.

IPv4:

Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 is the dominant network layer protocol on the Internet and apart from IPv6 it is the only protocol used on the Internet.
It is described in IETF RFC 791 (September 1981) which made obsolete RFC 760 (January 1980). The United States Department of Defense also standardized it as MIL-STD-1777.
IPv4 is a data-oriented protocol to be used on a packet switched internetwork (e.g., Ethernet). It is a best effort protocol in that it does not guarantee delivery. It does not make any guarantees on the correctness of the data; It may result in duplicated packets and/or packets out-of-order. These aspects are addressed by an upper layer protocol (e.g., TCP, and partly by UDP).
The entire purpose of IP is to provide unique global computer addressing to ensure that two computers communicating over the Internet can uniquely identify one another.

Addressing :

IPv4 uses 32-bit (4-byte) addresses, which limits the address space to 4,294,967,296 possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~1 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses. As the number of addresses available are consumed, an IPv4 address shortage appears to be inevitable, however Network Address Translation (NAT) has significantly delayed this inevitability.
This limitation has helped stimulate the push towards IPv6, which is currently in the early stages of deployment and is currently the only contender to replace IPv4.

Allocation :

Originally, the IP address was divided into two parts:

* Network id : first octet
* Host id : last three octets

This created an upper limit of 256 networks. As the networks began to be allocated, this was soon seen to be inadequate.
To overcome this limit, different classes of network were defined, in a system which later became known as classful networking. Five classes were created (A, B, C, D, & E), three of which (A, B, & C) had different lengths for the network field. The rest of the address field in these three classes was used to identify a host on that network, which meant that each network class had a different maximum number of hosts. Thus there were a few networks with lots of host addresses and numerous networks with only a few addresses. Class D was for multicast addresses and class E was reserved.
Around 1993, these classes were replaced with a Classless Inter-Domain Routing (CIDR) scheme, and the previous scheme was dubbed "classful", by contrast. CIDR's primary advantage is to allow re-division of Class A, B & C networks so that smaller (or larger) blocks of addresses may be allocated to entities (such as Internet service providers, or their customers) or Local Area Networks.
The actual assignment of an address is not arbitrary. The fundamental principle of routing is that address encodes information about a device's location within a network. This implies that an address assigned to one part of a network will not function in another part of the network. A hierarchical structure, created by CIDR and overseen by the Internet Assigned Numbers Authority (IANA) and its Regional Internet Registries (RIRs), manages the assignment of Internet address worldwide. Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments; information from these databases plays a central role in numerous tools that attempt to locate IP addresses geographically.

IPv6:

Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is designated as the successor of IPv4, the current version of the Internet Protocol, for general use on the Internet.
The main improvement brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. While IPv6 could support 2128 (about 3.4׳1038) addresses, or approximately 5׳1028 addresses for each of the roughly 6.5 billion people[1] alive today. It was not the intention of IPv6 designers, however, to give permanent unique addresses to every individual and every computer. Rather, the extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

Introduction :

By the early 1990s, it was clear that the change to a classless network introduced a decade earlier was not enough to prevent IPv4 address exhaustion and that further changes to IPv4 were needed.[2] By the winter of 1992, several proposed systems were being circulated and by the fall of 1993, the IETF announced a call for white papers (RFC 1550) and the creation of the "IP, the Next Generation" (IPng Area) of working groups.[2][3]
IPng was adopted by the Internet Engineering Task Force on July 25, 1994 with the formation of several "IP Next Generation" (IPng) working groups.[2] By 1996, a series of RFCs were released defining IPv6, starting with RFC 2460. (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.)
It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. IPv4-only nodes (clients or servers) will not be able to communicate directly with IPv6 nodes, and will need to go through an intermediary

Features of IPv6 :

[edit] To a great extent, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to work over IPv6; exceptions are applications protocols that embed network-layer addresses (such as FTP or NTPv3).
Applications, however, usually need small changes and a recompile in order to run over IPv6.

Larger address space :

The main feature of IPv6 that is driving adoption today is the larger address space: addresses in IPv6 are 128 bits long versus 32 bits in IPv4.
The larger address space avoids the potential exhaustion of the IPv4 address space without the need for network address translation (NAT) and other devices that break the end-to-end nature of Internet traffic. NAT may still be necessary in rare cases, but Internet engineers recognize that it will be difficult in IPv6 and are trying to avoid it whenever possible. It also makes administration of medium and large networks simpler, by avoiding the need for complex subnetting schemes. Subnetting will, ideally, revert to its purpose of logical segmentation of an IP network for optimal routing and access.
The drawback of the large address size is that IPv6 carries some bandwidth overhead over IPv4, which may hurt regions where bandwidth is limited (header compression can sometimes be used to alleviate this problem). IPv6 addresses are harder to memorize than IPv4 addresses, although even IPv4 addresses are much harder to memorize than Domain Name System (DNS) names. DNS protocols have been modified to support IPv6 as well as IPv4.

Stateless auto configuration of hosts :

IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually. Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means

IPv6 scope :

IPv6 defines 3 unicast address scopes: global, site, and link.
Site-local addresses are non-link-local addresses that are valid within the scope of an administratively-defined site and cannot be exported beyond it.
Companion IPv6 specifications further define that only link-local addresses can be used when generating ICMP Redirect Messages [ND] and as next-hop addresses in most routing protocols.
These restrictions do imply that an IPv6 router must have a link-local next-hop address for all directly connected routes (routes for which the given router and the next-hop router share a common subnet prefix).

Links:

Find IP Info: link http://www.ip-adress.com
Find DNS, IPv4, IPv6 : link: http://www.iplobster.com
Find IP Address: link http://www.myip.dk

How to Build a Cat 5 Cable

STEP 1 - Stripping
Start by pulling out about 12 feet of bulk network cable to making the process a little easier. Carefully remove the outer jacket of the cable exposing about 1 1/4" of the twisted pairs. Be careful when stripping the jacket as to not nick or cut the internal wiring. After removing the outer case you will notice 8 wires twisted in pairs and a rip cord (white thread).

STEP 2 - Inspecting
Inspect the newly revealed wires for any cuts or scrapes that expose the copper wire inside. If you have breached the protective sheath of any wire you will need to cut the entire segment of wires off and start over at step one. Exposed copper wire will lead to cross-talk, poor performance or no connectivity at all. It is important that the jacket for all network cables remains intact.

STEP 3 - Preparation
To prepare the wires and to make them easier to work with, you can untwist the pairs so they will lay flat between your fingers. The white piece of thread can be cut off even with the jacket and disposed.

STEP 4 - Layout
Now based on the wiring specifications you are following you will need arrange the wires in a certain pattern. There are two methods set by the TIA, 568A and 568B. 568B is the most common network cables, widely used for computer networks and digital phone systems. So for our demonstration we will use that. Starting from the left-top side of the RJ-45 plug, the wiring should be in the order shown at the right.

STEP 5 - Jack Preparation
Again, press all the wires flat between your thumb and forefinger as shown in step three. Verify the colors have remained in the correct order. Using a pair of scissors, cut the top of the wires even with one another so that they are 1/2" long from the base of the jacket. Ensure that the cut leaves the wires even and clean; failure to do so may cause the wire not to make contact inside the jack.

STEP 6 - Wire Insertion
Ensuring that the wires remain flat and in order, push them into the RJ-45 plug with the flat surface of the plug on top. The white / orange wire should be on the left looking down at the jack. You can tell if all the wires made it into the jack and maintain their positions by looking head-on at the plug. You should be able to see a wire located in each hole, as seen at the bottom right. You may have to use a little effort to push the pairs firmly into the plug. The cabling jacket should also enter the rear of the jack about 3/16" to help secure the cable once the plug is crimped.

STEP 7 - Crimping
Now place the wired plug into the crimping tool. Give the handle a firm squeeze, you should hear a ratcheting noise as you continue. Once you have completed the crimp, the handle will reset to the open position.

STEP 8 - Testing
Once your new cable is completed, it is not a bad idea to test the cable to ensure that it will function in the field. It is vital that all eight wires have connectivity and are in the correct order. Mis-wired network cables could lead to headaches down the road. In addition, with power-over-ethernet making its way into the market place, crossed wire pairs could lead to physical damage of computers or phone system equipment; making it even more crucial that the pairs are in the correct order. A simple cable tester can quickly verify that information for you.

You can find these instructions with pictures Here

How Do Wireless Networks Work?

Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.

Ones and Zeros.

I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time. That doesn't stop a computer from using them, though.

Morse Code.

The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash). It was used manually for years, and became a great way of getting information from one place to another with the invention of the telegraph. More importantly for this example, though, it is a binary system, just like a computer's ones and zeros.

You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.

All About Frequencies.

You might wonder, though, how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.

First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.

In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.

Access Points.

The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.

They Understand Each Other.

That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.

You Don't Need to Worry.

If all this talk of frequencies has you a little worried, you don't need to be -- wireless networking hardware and software handles all of this automatically, without you needing to do a thing. Don't think that you're going to have to tell one wireless device what frequency another is using, because it's just not going to happen, alright? Wireless networking, for all its complicated workings, is really far more simple to use than you'd ever expect.

How a Computer Consulting Business Can Help Your Company

While many small companies only call in a local computer consulting business when something computer-related breaks, there's a lot to be gained by forging a proactive, long-term relationship with a local computer consulting business in your area.

Consider Getting Advice from a Computer Consulting Business

If you need to get advice once-in-a-while on how your computers can be better utilized, or you have a specific computer-related problem that needs to be solved, a computer consulting business is generally the way to go.

However, if computer-systems and information technology (IT) are really important to your industry and your company, outsourcing your computer-related service needs to a local computer consulting business is often a much better solution than just piecemeal, ad-hoc usage of a computer consulting business.

Hiring a Computer Consultant

Many computer consulting businesses choose to specialize and end up becoming extremely valuable to their particular area or niche. In many cases, these kinds of computer consulting businesses can know almost as much about your industry and competitive challenges as you do.

So to help your company grow and to make sure it's not being short-sighted with its computer-related needs, consider getting advice from a computer consulting business.

Wearing Lots of “Hats” is Fine… But Don't Let These “Hats” Blind-Sight You

Sometimes small companies already have an idea of what their computer-related needs are when they enlist the help of an outside computer consulting business.

There are several advantages to bringing in an outside computer consulting business, as opposed to trying to limp along with someone internally who just wears the “hat” of the occasional computer person.

One of the most important reasons to bring in a computer consulting business though is that a computer consultant is someone who is an expert in his or her field. This means you can have access to an expert for a fraction of the cost it would take to hire that caliber of professional on a full time basis.

In almost all cases, a computer consultant like this can troubleshoot problem much faster and much more effectively than your internal employees.

A Fresh Computer Consultant Perspective

A computer consultant or computer consulting business can also being in a fresh perspective to your company.

It's often really helpful to have a fresh set of eyes to look at your company and its IT infrastructure. Over time, non-technical small business owners and managers have a tendency to see the same things within their own companies. A good computer consultant or computer consulting business brings a new and fresh perspective into your situation and can help you truly visualize the forest through the trees.

How Computer Consulting Businesses Help

A good computer consulting business or computer consultant is prepared to do any number of things to help your company make the most out of any business or technology challenge it faces. This may include personal coaching, training for small and large groups of employees, and leading strategy-planning meetings with key people… almost as if that computer consultant were your part-time chief information officer (CIO).

The best computer consultants will not enter into your company with a preset plan, but rather will tailor a plan according to the specific needs of your company. A good computer consulting business will have computer consultants on their staff who can quickly find out what the needs of your company are and then come up with cost-effective solutions.

The Bottom Line

In this article, you've been introduced to the basics of why to hire a computer consulting business and what computer consulting businesses can do for your company.

Copyright MMI-MMVI, ComputerConsultingSecrets.com, All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Finding Your MAC Address On Wired And Wireless Network Cards

The Answer To The Media Access Control Question
----------------------------
Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason I’ve received so many questions about Ethernet cards and MAC addresses is people trying to secure their home wireless networks and their desire to use MAC address filtering. This type of filtering in wireless networks can be configured to allow or deny specific computers to use or attach to the wireless network, based on the MAC address.

My first thought was to write an article just about MAC addresses and wireless Ethernet. After thinking about it I decided to expand on this and go over some specific information about Ethernet cards and communication.

Different Ways Of Finding Your MAC Address And More
--------------------------------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer’s have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP “ipconfig” utility since this is available in the majority of Windows Operating Systems.

First, go to “start” -> “run” and type “cmd” without the quotes. Then hit the enter key. At the command line type “ipconfig /all”, again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the “ipconfig /all” command is below with each item commented in green lettering:

Fault Tolerant And Highly Availability Computer Systems
----------------------------
There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer’s have proprietary software that can reveal this information but they work differently depending on the manufacturer. So we will use the Windows 2000 and XP “ipconfig” utility since this is available in the majority of Windows Operating Systems.

First, go to “start” -> “run” and type “cmd” without the quotes. Then hit the enter key. At the command line type “ipconfig /all”, again without the quotes. Actually, just typing ipconfig without the /all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the “ipconfig /all” command is below:

OutPut Of The “Ipconfig /All” Command
----------------------------------------------------------
Windows IP Configuration


Host Name . . . . . . . . . . . . : Home Computer
This is the name of your computer, typically defined during the windows installation. However, it can be changed after installation.

Primary Dns Suffix . . . . . . . : domain.com
If your computer participates in a network such as a Microsoft Windows domain this item may contain the name of the domain.

Node Type . . . . . . . . . . . . : Unknown
The Node Type may say Unknown, or peer-to-peer, or in some cases “hybrid”. It is a setting that has to do with the Windows Internet Naming Services used in certain types of Windows domain networks.

IP Routing Enabled. . . . . . . . : No
This setting determines if Windows XP or 2000 will function as an IP router. If you have two or more network cards you can setup your system to act as a router, forwarding communications requests from one network to another. Windows 2000 can be configured to do this in a pretty straight forward fashion; Windows XP will need a registry modification.

WINS Proxy Enabled. . . . . . . . : No
WINS Proxy is another setting that is related to the “Node Type” we discussed earlier. It is normally not a required setting in a home or small office network, or newer types of Microsoft Windows domains.

Ethernet adapter Wireless Network Connection 2:
If you have multiple Ethernet (network) cards in your systems, as I do in this laptop, you will have multiple listings. This one happens to be the second Ethernet card, an internal wireless Ethernet card.

Description . . . . . . . . . . . : Broadcom 802.11b/g WLAN
This is the description of the Ethernet card, usually the Name / Manufacturer and type of Ethernet card. In this case, it is a Broadcom wireless Ethernet card built into my laptop.

Physical Address. . . . . . . . . : 00-90-4B-F1-6E-4A
And here we have the MAC address. The MAC address is a 48 bit hexadecimal code and is suppose to be a totally unique address. It is 48 bits because each number or letter in hexadecimal represents 8 bits. Hexadecimal numbers range from 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, F. There are 6 alpha-numeric codes hence 6*8=48(bits). The first 3 codes identify the manufacturer of the card and the remaining codes are used to create a unique number. Theoretically there should never be a card with same MAC address on a local network. However, there are a few exceptions. There are software tools that allow you to change this code. In fact, this is a step some hackers take to attack other systems on a local network. I say local network because MAC addresses are not routable between network segments. By spoofing this address, you can impersonate another machine on the local network. Traffic that was bound for the intended target can be redirected to the hacker’s machine. This is the address you would also use to populate a MAC address, or physical address table when setting up your wireless access point to support MAC address filtering.

DHCP Enabled. . . . . . . . . . . : Yes
DHCP, or the Dynamic Host Control Protocol, if enabled means your computers IP address is being provided by a DHCP server on you network. The DHCP server could be your wireless access point, cable/dsl router, cable modem, or a server on your network. Also, if a DHCP server is not enabled on your network, your computers Operating System will auto generate a random IP address within a certain predefined range. This means you could network a group of systems together without having to manually assign the IP settings.

IP Address. . . . . . . . . . . . : 192.168.0.117
This parameter provides you with your current IP address. The address listed above is what is called a "private" address. There are certain classes of IP addresses that have been set aside for private use. This means for your internal, local, or private network at home or office. These addresses are not, or should not, be routable on the Internet. The Internet routes what are called “valid” IP addresses. Your cable/dsl router or cable modem has a valid IP address assigned to its “external” network interface. The external interface may be your phone line or cable TV cable.

Subnet Mask . . . . . . . . . . . : 255.255.255.0
The Subnet Mask is a special number, or in some sense, filter, that breaks down your IP address, in this case private IP address, into certain groups. IP addresses and Subnet Masks can be a complicated matter and would take an entire article to go over.

Default Gateway . . . . . . . . . : 192.168.0.254
The default gateway, the IP addresses listed above, is the IP address of the device that will route your request, such as when you try to browse a website, to the Internet. It is a bit more complicated than that though as gateways or routers can route traffic to various different networks, even other private networks. At your home or small office, this gateway most likely is your cable/dsl modem or router.

DHCP Server . . . . . . . . . . . : 192.168.0.49
The DHCP server, remember we talked a little about this above, is the device that assigns your computer an IP address and other information. DHCP servers can assign all kinds of information such as; Default Gateway, Domain Name Servers (DNS), IP address, Subnet Mask, Time Server, and much more.

DNS Servers . . . . . . . . . . . : 192.168.0.49, 64.105.197.58
DNS Servers are internal or external servers that resolve Fully Qualified Domain Names (FQDN), such as www.defendingthenet.com , to IP addresses. This is done because computers don’t actually transmit your requests using the domain name, they use the IP address assigned to the FQDN. For most home or small office users, the primary DNS server is the IP address of your cable/dsl router. Your cable/dsl router than queries an external DNS server on the Internet to perform the actual resolution of the FQDN to IP address. The address 192.168.0.49 is an internal private device on my network whereas the 64.105.197.58 is an external public Internet DNS server and is present just in case my router has trouble performing the DNS resolution tasks.

Lease Obtained. . . . . . . . . . : Sunday, March 19, 2006 6:38:16 PM
This information tells you when your computer received its IP address and other information from a DHCP server. You will notice it says “Lease Obtained”, that is because most DHCP servers only lease the IP address to you from a pool of available address. For instance, your pool may be 192.168.1.1 through 192.168.1.50. So your DHCP server has 50 IP addresses to choose from when assigning your computer its IP address.

Lease Expires . . . . . . . . . . : Wednesday, March 29, 2006 9:38:16 PM
When the IP address, assigned by the DHCP server, lease expires it will attempt to lease you the same or another IP address. This function can typically be changed on the DHCP server. For instance, on some fully functional DHCP servers, you can configure the Lease to never expire, or to expire within 1 day and so on.

Why Are MAC Addresses So Important And How Do They Work
------------------------------------------------------
To jump back to MAC address for just a bit. You may think that IP addresses are the most important thing when it comes to network communication. The reality is, MAC addresses are very important because without them computers would not be able to communicate over Ethernet networks. When a computer wants to speak with another computer on a local network, it will make a broadcast request, or ask a question, of who owns a particular IP address. For instance, your computer may say “Who is 192.168.0.254”. Using the information above, my default gateway is 192.168.0.254 and will answer “I am “00-90-4B-F1-6E-4A” 192.168.0.254”. It sends back its MAC address. That MAC address then goes into what is called a Address Resolution Protocol (ARP) table on your computer. You can see this information by going to the command prompt like you did above and typing "arp –a". You will get information like the following:


Internet Address Physical Address Type
192.168.0.49 00-12-17-5c-a2-27 dynamic
192.168.0.109 00-12-17-5c-a2-27 dynamic
192.168.0.112 00-0c-76-93-94-b2 dynamic
192.168.0.254 00-0e-2e-2e-15-61 dynamic

How A Hacker Can Use MAC Addresses In An Attack
----------------------------------------------
You will notice the IP addresses and to the right of them the MAC addresses. Without this information, without the MAC address, you would not be reading this article right now. MAC addresses are not routable like IP addresses. They work on your local or private network. However, devices on the Internet perform the same tasks. Routers and switches maintain a list of their peer devices MAC address just like your computers and devices on your home or office network. I mentioned above that MAC addresses can be changed in order to redirect requests. For instance, if I were on your office network and you had an internal web server that took personal information as input, I could tell your computer to go to my laptop for the web site by broadcasting my MAC address tied to the real web servers IP address. I would do this when you computer asked “Who is the “Real Web Server””. I could setup a fake web server that looks just like the real thing, and start collecting information the real web server would normally collect. You can see how dangerous this can be.

Conclusion
-----------
There are several other easy ways you can find your MAC address but they can be a little confusing if you have more than one internal network card. Most external USB, or PCMCIA wired and wireless Ethernet cards have their MAC address printed on them. In cases where the wired or wireless network card are inside your computer, such as in laptops, the MAC address is sometimes printed on the bottom of the laptop. Even Desktop systems cards that are inserted in PCI slots have the MAC address printed on the Ethernet card.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/NewsLetters/FindingYourMACAddressOnWiredAndWirelessNetworkCards.htm

About The Author
----------------
Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@defendingthenet.com. If you would like to know more about computer security please visit us at http://www.defendingthenet.com.

Fiber Optics In The Real World

Optic fibers are used widely in the medical field for diagnosing and treating a variety of ailments. Because optic fibers can be made extremely thin and made into flexible strands, they can be used for insertion into blood vessels, lungs and other parts of the body. Optic fibers have been enabling physicians to look and work inside the body through tiny incisions with an instrument called an Endoscope. An Endoscope is a medical instrument made to carry two bundles of optic fibers inside one long tube. One bundle of optic fiber directs light at the tissue being examined, while the other bundle of optic fiber transmits light reflected from the tissue, producing a detailed image. Endoscopes may be designed to look into specific areas of the human body. For example, physicians can use the optic fibers in the Endoscope to examine knees, shoulders and other joints in the body.

Arthroscopy (pronounced ahr-THROS-kuh-pee) is a technique of using another medical instrument called the Arthroscope. This instrument is straight and cylinder-like with a series of lenses and optic fiber bundles that come in sizes of 1/12 to 1/5 inch (2 to 5 millimeters.) The Arthroscope is used to examine a joint in a body, such as knee joints, ankles, elbows, hips and shoulders. This is done by the Arthroscope being inserted into a joint of the body through a small incision. A light is then transmitted by the use of the optic fibers to the tip of the Arthroscope to illuminate the joint. The use of optic fiber through the Arthroscope enables a physician to thoroughly examine a joint for diagnosis or treatment.

Optic fibers used in the Arthroscope can be used to measure temperature and other bodily
attributes as well as being used in performing surgical procedures. The problem most commonly treated by Arthroscopy is torn cartilage in the knee. This is when a small incision is made at the joint for use of the optic fiber in the Arthroscope and then a second incision is made for the use of other surgical instruments to remove the cartilage. The primary advantage of using optic fibers through Arthroscopic surgery is that the operation can be performed through a small incision, resulting in the patient experiencing the least amount of discomfort and a healing time that is much shorter, when compared to the other methods of surgery.

Aside from the uses of the Endoscopes and the Arthroscopes, another widely used function of optic fibers in the medical field is the ability for the optical fibers to be inserted into blood vessels to give a quick and accurate analysis of blood chemistry. Physicians have also found medical use of the optical fibers to direct intense laser light at a wound to stop bleeding or to burn away abnormal tissue. Fiber optic training is necessary in the field of medicine. The use of optic fiber through medical science continues to grow rapidly to everyday to develop more new and advanced medical devices to enable physicians to provide people with better service.

Does The Google Desktop Really Put Your Privacy In Jeopardy?

There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application.

The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share files between your desktop and laptop for example.

But are these concerns grounded in truth? Is there really a privacy issue here?

I downloaded and installed the new Desktop Search beta the other day. It has some interesting new features such as the ability to remove panels from the sidebar and dock them anywhere you like on your desktop.

And there are several more panels available to let you do anything from manage what is indexed, to passing time by playing games.

One of the coolest features is its ability to reach beyond the desktop it is on to do a variety of things. Now, I can play tic tac toe with co-workers, or even friends around the world.

But the biggest, and most troubling update to some is the ability to remotely index files, as well as share them using Google servers to temporarily store the items.

By turning this feature on you give Google the right to store your files for up to 30 days. Therein lies the crux of the issue – there seems to be no way around this 30 day requirement.

All I have to say is 'so what?'

So what if you have to give Google this ability? Google will encrypt the data so that no one else can access it. And even if there is some sort of DOJ subpoena requiring access to these files I don't think it would stand up in court.

This is because Google has set up a network whereby all your Google activities are tied to one Google account. Your personalized home page, gmail, google analytics, adwords and adsense accounts all share the same Google account. Therefore, it would be difficult for anyone to get a subpoena to review information pertaining to only part of that account.

Legalities aside, if you are that concerned about the privacy being surrendered to Google in order to use this system then don't sign up for it.

You can still download and use the new Desktop Search with most of its new features, but you don't have to use the file sharing.

But what if you want to share files between computers?

Well, do what I did – go to your favorite electronics store and buy a flash drive. I just bought a USB flash drive with over 2 gigs of storage for under $100. Now I can easily transfer anything between any computer with no worry of some government agency wanting to know what's on it.

As I said, I do have the new Google Desktop installed, and I did look at the settings for the search and file sharing, but I didn't turn them on. I have no need to be able to search my home computer from work and vice versa, nor do I need to share files between the two computers.

And if I did, I'll simply use the FTP site I have set up on a computer at home or the aforementioned flash drive.

Really, when it comes to all the other ways that Google captures your personal data, from search history to Gmail, should we be all that concerned that some files may end up being stored on a Google server somewhere?

I think we should have other concerns. For example, I think we should be concerned about what Google already knows about us via those services I mentioned earlier.

I think business owners should be concerned that such a service would allow employees to easily steal and transfer data to and from work.

I think if you are that scared of the US government infringing on your privacy then you shouldn't have a Google account, nor Google Desktop Search nor a Gmail account. In fact I don't think you should have any Internet accounts because quite honestly everyone is a target for the DOJ. Further, I can almost guarantee you that your local ISP will fold and hand over the data much easier than Google will.

So before you start complaining about how Google could infringe your privacy, remember that YOU have the ability to stop it from happening. It's just a matter of choosing to do so.

Crime Fighting Computer Systems and Databases

As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far behind.

Quotes from the official Web pages of some of these databases:

National Center for the Analysis of Violent Crime (NCAVC)

Its mission is to combine investigative and operational support functions, research, and training in order to provide assistance, without charge, to federal, state, local, and foreign law enforcement agencies investigating unusual or repetitive violent crimes. The NCAVC also provides support through expertise and consultation in non-violent matters such as national security, corruption, and white-collar crime investigations.

It comprises the Behavioral Analysis Unit (BAU), Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), and Violent Criminal Apprehension Program (VICAP).

VICAP is a nationwide data information center designed to collect, collate, and analyze crimes of violence - specifically murder. It collates and analyzes the significant characteristics of all murders, and other violent offenses.

Homicide Investigation Tracking System (HITS)

A program within the Washington state's Attorney General's Office that tracks and investigates homicides and rapes.

Violent Crime Linkage System (ViCLAS)

Canada-wide computer system that assists specially trained investigators to identify serial crimes and criminals by focusing on the linkages that exist among crimes by the same offender. This system was developed by the RCMP (Royal Canadian Mounted Police) in the early 1990s.

UTAP, stands for The Utah Criminal Tracking and Analysis Project

Gathers experts from forensic science, crime scene analysis, psychiatry and other fields to screen unsolved cases for local law enforcement agencies.

International Criminal Police Organization (ICPO) - Interpol's DNA Gateway

Provides for the transfer of profile data between two or more countries and for the comparison of profiles that conform to Interpol standards in a centralized database. Investigators can access the database via their Interpol National Central Bureau (NCB) using Interpol's secure global police communications system, I-24/7.

Interpol's I-24/7

Global communication system to connect its member countries and provide them with user-friendly access to police information. Using this system, Interpol National Central Bureaus (NCBs) can search and cross-check data in a matter of seconds, with direct and immediate access to databases containing critical information (ASF Nominal database of international criminals, electronic notices, stolen motor vehicles, stolen/lost/counterfeit travel and ID documents, stolen works of art, payment cards, fingerprints and photographs, a terrorism watch list, a DNA database, disaster victim identification, international weapons tracking and trafficking in human beings-related information, etc).

Interpol Fingerprints

Provides information on the development and implementation of fingerprinting systems for the general public and international law enforcement entities.

Europol (European Union's criminal intelligence agency) Computer System (TECS)

Member States can directly input data into the information system in compliance with their national procedures, and Europol can directly input data supplied by non EU Member States and third bodies. Also provides analyses and indexing services.

Computer Networking Fundamentals

A computer network is a collection of two or more computers with communication between them through a medium. The communication medium can be through radio waves, wires, infrared, optical fibers etc.

Computer network is an integral part of our daily lives, with the most important reason being that of communication. The use of computer networking is to share resources like fax machines, printers, modems, files etc., and its other uses are database server, computer server, email, chat, internet etc. The computer to which the resources are attached is called the server and the other computers that access the resource are called clients. In peer-to-peer computer networks there are no servers.

The sharing of fax machines, printers, and modems amongst many computers and users reduce the operational cost. A database on a computer network is a very important application as it stores and runs many important data and jobs. Emails and chats can be used for instantaneous communication and sending of files on a computer network.

The computer networks are classified, depending upon the size, as Local Area Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN) and Personal Area Networks (PAN). The topology (topology is the way the computer networks and network resources are connected) of the networking can be classified as Bus Network, Ring Network and Star Network.

The networking hardware basically consists of wiring, network cards and a hub. Computer network cards are required so that one computer can understand what the other computer is “talking”. Network cards have a unique MAC address to identify computers on a computer network. Hubs connect all the computers in the network. Hubs can also be used to connect to other hubs to increase the size of the computer network. Two computers can be connected using Ethernet cards or phone lines or power lines for communication, with hardware kits available at roughly a cost of $100.

As the number of computers in an office or a home increases, so do the number of cables, so wireless networking is a viable solution. In wireless networking radio transreceivers or infrared signals are used to communicate between computers and devices. Examples of wireless networking include Wi-fi and Bluetooth technology, though there may be security issues involved in wireless networking. However there definitely is a stronger preference towards wireless networking nowadays among consumers.

Computer networks have added a new dimension to the 21st century. Today the cyber world is much faster and wider than the real world. This has all been made possible due to computer networks. Computer networks have revolutionized business, communication, travel, research, defense, society and almost all human endeavors. The evolution of computer networks has helped the technological revolution take a big leap forward.

Computer Network Management

Today it is almost inconceivable for a business not to have computers, whether it is a construction company or a high technology firm. When a business has more than one computer, they are almost always connected together in a local area network. These networks may be more or less advanced and therefore more or less costly.

Companies invest so much (in terms of both money and time) in a local area networks because there are many advantages that a local area network brings to a business and how it is administered.

Some businesses use a local area network in such a way they are highly dependent on it always working. If the company's network fails, then you may see all the employees chatting away in the corridors because they can't do their work. This means big losses for the company and causes stresses on the employees. All companies must consider their local area networks a vital asset and downtime must be avoided. This imposes huge demands on the network staff to keep such networks running almost 100% of the time.


The advantages of Computer Network Management

One of the main advantages of installing and maintaining LANs is the opportunity they create for better communication and cooperation between employees and customers.

Security considerations: Local Area Network security can be both a help and hindrance. Comprehensive security is beneficial because it provides a central and safe strategy for data access and disaster recovery. All information is protected by the design and implementation of the network security solution. On the other hand, interconnecting computers in local area networks creates a security risk, since doing so makes it technically possible for intruders to access many machines on the network at once.

Cost considerations: Installing a local area network is a relatively expensive project. Servers, cabling, switches, routers and software can all be expensive and should never be purchased without expert advice. Keeping the network operating and secure also requires a lot of resources and can be costly.

Surprisingly, a local area network can bring a number of cost savings. Sharing resources avoids the need to purchase equipment for each individual. Even more important is the security that a local area network can provide. Data loss could cost a business a great deal of money and in some cases, cause the business to shutdown altogether. Computer Network Management should require a consistent routine for data backups with regular checkups of data quality - a practice that will save a company huge sums in the event of a mishap.


Computer Network Management: preliminary analysis phases

The first phase of computer network management is to determine the source of the problem (a preliminary study that looks into several options of differing scope may be useful here) and defining it in a specification of requirements. Examples of what should be evaluated are different network operating systems, mail systems, and other applications. The choice of hardware components should also be evaluated. This phase is generally aimed at establishing what the system should do, not how it should do it.


Computer Network Management: design phase

The purpose of design phase is to determine how the requirements of the specification are to be met. The current approach to large, complex projects is to break them down into smaller, more manageable subprojects.


Computer Network Management: implementation phase

This phase involves the physical installation of the local area network. Cables are run, software is installed, and computers and other hardware are put in place.


Computer Network Management: integration and system testing phase

In this phase, commissioning of the network begins, and routines are adapted to users and the operating personnel. The system must be tested, both to ensure that the network meets the requirements set out in the specification and that it is stable enough to perform the central function it has in the organization.


Computer Network Management: operation and maintenance

Local area networks have complex operating routines. This is because there may be serious consequences when faults occur or unauthorized persons gain access to the system. Many companies have employees devoted solely to take care of running and maintaining computer networks. These system administrators may deal with network issues such as performance, reliability and security of both hardware and software.


Computer Network Management: tools

Although an organization may have computer administrators on site, they must also monitor the network more than eight hours a day. In fact, some of the worst trouble that arises with networks can happen during the night hours when nobody is using the network. With the right computer network management tools, your organization can receive the security of knowing that problems will be foreseen, prevented, and taken care of - and that your network administrator can be notified at a moment's notice, should anything go exceptionally wrong.

Computer Consulting Profit Secrets

Do you own or manage a computer consulting company? Are you having trouble growing your computer consulting company's profits?

If so, then you must learn how to focus on your computer consulting firm's profit and bottom line.

In this article, we'll look at 7 profit secrets and strategies you can use in your computer consulting business, to ensure that you are able to balance your clients' small business IT needs against your own computer consulting company's profitability challenges.

Origins of the Problem

While focusing on your computer consulting profits may sound simple enough at first glance, this business-focused discipline often eludes many a computer consulting firm.

This usually happens because many computer consulting business owners fall in love the technology gadgetry, and get seduced by seemingly attractive reseller channel programs, at the expense of their business' profit.

At the end of the day however, your computer consulting company is a business… not a charity and not a hobby. And your computer consulting company must be run like a business.

Profit Secret #1: Show motivation with your small business computer consulting clients.
To avoid being labeled as just another clueless geek, you need to position your computer consulting services to be more in line with those of a virtual CIO for hire. So always be on the look out for new ways to enhance your clients' businesses… not just fix broken desktops and servers.

Profit Secret #2: Be dedicated to the task and relentless in your pursuit to improve the status quo.
Because it takes a lot of work to land the best computer consulting clients, you need to focus on lifetime customer value… not just one-shot-deal sales. So always remember that your proposed or recently implemented computer consulting technology solution isn't a one-shot deal. This kind of long-term vision and planning requires tremendous staying power and perseverance… which often escapes many computer consulting business owners.

Profit Secret #3: Don't be afraid to be creative with your client engagements.
Small business technology solutions often need to stay within relatively modest budgets. And your computer consulting solutions must work without the need for in-house IT staff. To satisfy these challenges, don't be afraid to think outside of the box when appropriate.

Profit Secret #4: Evaluate how your clients' systems, both paper- and computer-based, function today.
As part of your virtual CIO role, look at how these existing clients systems are meeting or not meeting present and future needs. Most of this work will be done during IT audits… another key computer consulting profit secret that can really help to separate you from the pack of mediocrity.

Profit Secret #5: Put yourself in your clients' shoes and think about what THEIR clients need from them.
Yes, as a computer consulting business owner, you need to have good people skills and a certain degree of empathy for your clients' business problems. But an even more advanced computer consulting business owner doesn't just stop at understanding their clients' business problems. The virtual CIO really digs in and learns about their clients' customers' business problems… one layer down on the value chain.

Profit Secret #6: Keep up with advances and new versions.
As virtual CIO for your computer consulting clients, your clients depend on your firm to advise them on what tools can better help their businesses grow. So while you can't allow this R&D and training to consume and devour all of your scarce weekly schedule, you do need to stay a few steps ahead of your clients' IT needs at all times.

Profit Secret #7: Summarize and share that information with your clients.
The essence of your R&D and training should focus on one major objective: will this new platform or tool add value to your computer consulting clients' existing or future installations? And how you can best summarize this information, in layperson language that non-technical clients can understand?


The Bottom Line
Your computer consulting firm's needs to be your client's virtual IT department can often be at odds with your computer consulting firm's need to be profitable. A big part of this problem happens because computer consulting business owners fall in love with technology, at the expense of their marketing and sales activities.

To make sure you don't fall into this same strap, which can kill your computer consulting profits, don't go overboard with your training and R&D activities. Be sure to keep business development activities in your weekly schedule… EVERY week. If you want to keep your computer consulting profits as healthy as possible, make sure that you're proactive in your marketing and sales activities… dig the well for computer consulting profits BEFORE you're thirsty. And a great way to start is by listening to the profit-generating secrets at http://www.computer-consulting-101.com


Copyright MMI-MMVI, Small Biz Tech Talk Blog. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Computer Consulting and Virtual IT

Do you own or manage a computer consulting company? Would you like to achieve greater small business success? If so, then get ready to learn why most computer consulting companies get IT (Information Technology) wrong and what you can do about IT.

The Problem: Why Most Computer Consulting Companies Get IT Wrong

Most owners of computer consulting companies make their jobs much harder than need be. Why? Because these computer consulting business owners fall in love with the technology… and view their small business clients as a distant second priority.

However, if you get this part of “IT” wrong, you will doom your computer consulting company to “clueless geek” status. It's crucial that you understand one extremely important principle here: Recruiting and retaining small business clients is your #1 computer consulting priority. Keeping up with IT should never get in the way of the mission of your computer consulting company.

In other words, don't get seduced by the hardware, operating systems or applications. Fall-in-love with the business opportunities surrounding how you solve your clients' biggest business problems with your recommended IT solutions. That's the real mission of a computer consulting company.

The Solution: Blend Computer Consulting and Virtual IT

To put this all in perspective with your computer consulting company, you need to understand and embrace the concept of virtual IT.

Virtual IT is what allows your computer consulting company to function as an extension of your small business clients' companies. Your computer consulting company essentially becomes the outsourced IT department for your small business clients.

As owner or manager of a computer consulting company in this role, you will most likely become the de facto CIO (chief information officer), CTO (chief technology officer), or IT manager for your small business clients.

And just like any well-rounded internal IT department, your virtual IT computer consulting business will need to provide, or arrange for, a complete soup-to-nuts solution that includes services like help desk, desktop support, network administration, engineering, security, training, procurement, and asset management… because anything short of the complete virtual IT solution will leave valuable computer consulting money on the table.


The Bottom Line

Most computer consulting companies are making a huge mistake when it comes to their small business engagements… because these computer consulting business owners fall-in-love with the technology, at the expense of the business opportunities. In order for your computer consulting company to flourish, make sure that you understand the concept of virtual IT and build virtual IT into every major business decision for your computer consulting company. To continue learning more about how you can use virtual IT to grow your computer consulting company, go sign-up right now for the one-hour free training seminar on 5 Easy Ways to Grow Your Computer Consulting Business at http://www.ComputerConsultingBusiness.com

Copyright MMI-MMVI, Computer Consultants Secrets .com, All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Cisco's Catalyst 6500 Remains The Network Switch To Beat

San Francisco, California October 10, 2006: Following a lackluster Q3, Cisco Systems emerges as the leader in the 10 Gigabit Ethernet Switch Market for the fourth quarter. Fueled by increased demand and an overall rise in the average selling price, Cisco experienced significant gains in a market of over $300 Million.

With almost 70% of the projected $1.3 Billion 10-Gig market share and a more powerful, yet affordable design, the Catalyst 6500 is poised to cement Cisco as the dominating force in the industry. With the recent release of an eight-port, 10-Gigabit Ethernet module for the 6500, Cisco is quickly pulling away from the rest of the pack.

In addition, upgrades like the Application Control Engine (ACE) module have prompted companies like Pure Video Networks to adopt Cisco switches to manage traffic of their popular video websites. Implementing simultaneous data center services such as server load balancing, integrated network and application switching/security, the ACE module delivers the highest performance in the industry. The ACE Simplifies application infrastructure by combining the functionality of multiple application delivery appliances into a single module, including server load balancing and off-load, Secure Socket Layer (SSL) protocol, security, and application optimization capabilities.

Already the most successful networking switch on the IT market, the 6500 Series reduces existing operational costs and improves a network's ability to respond to intensive bandwidth demands. In general, customers using the services modules for the Catalyst 6500 reduce their total cost of ownership by taking advantage of simplified infrastructure, improved investment protection, pervasive security, and the high levels of performance, scalability, and innovative technologies.

With over twenty unique service modules in five distinct categories, the Catalyst 6500 ranks among the most scalable, high-performance platform for integrated services. Currently, Cisco offers modules that address security issues, application, networking, network monitoring, wireless/mobility, and IP communications, which can be integrated into existing catalyst switches. Each modules offers upgraded performance and reinforces Cisco's hold on the market for network switches. With more than $20 Billion is sales sine it's release in 1999, the 6500 Series switch has become the most popular networking platform ever.

While Cisco has been able to fend off most threats to their position, rival Foundry Networks, and newcomer Force 10 have recently launched new 10Gbe ready products aimed at disrupting the company's market share. According to literature on Force 10's Terascale E-Series 1200, the E1200 boasts of more than double the ports of the Catalyst 6500 (1260 vs. 576 Ethernet ports/chassis). While this may be good news for the company, Force 10 has been focused on the data center vertical, and is therefore still untested in the enterprise market. Foundry's BigIron RX series switch has received favorable press for it's size/performance ratio and lower prices. With the launch of the new RX series, Foundry has mounted a consistent affront to Cisco's unchallenged reign.

Even with the competition mounting new efforts, the Cisco name is still a major factor among IT professionals whose networks depend on their equipment. Fortunately for the stalwart Cisco, reputation is still the key to market dominance.

Your Business can suffer due to absence of Digital certificate on your website

It is very important to take the protection against online information larceny, because it's getting very easy for people to share digital products. Information theft is a type of computer safety and security risk and it's defined as thieving someone’s private or confidential information. It’s very dangerous to get the information stolen as this can cause as much damage, or possibly more then hardware or software theft.

Most of the systems on the way of your data can see what you send. A lot of companies try to stop information from being stolen by applying some user identification and authentication controls.
These constrictions are most promising for protecting computers along a company's premise. However, to protect information on the Internet and on networks, companies use a handful of encryption methods like digital certificates and SSL security. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. Encryption refers to the process of converting data into an unreadable form. Encrypted data is like any other data because you can send it through a lot of options, but to read it you must decrypt or decipher it into a more readable form with the help of public and private keys provided. Throughout the encryption process, the unencrypted data or input is known as plaintext and the encrypted data, or output is known as cipher text. To be able to create an SSL connection a web server requires an SSL Certificate. When you choose to activate SSL on your web server you will be prompted to complete a number of questions about the identity of your website and your company. Your web server then creates two cryptographic keys - a Private Key and a Public Key. To encrypt information, the programmer converts the plaintext into cipher text using some type of encryption key. An encryption key is the programmed formula that the person who receives the data uses to decrypt the cipher text. There are varieties of encryption or algorithm methods. However, with an encryption key formula, you will be using more then one of these techniques.

Most common example is a nasty individual stealing credit cards so they can make illegal purchases on another person's account. If information is transmitted over a network then it has a very high chance for nasty users to capture the information.

A digital signature is a type of encrypted code that an individual, website, or company pastes to an electronic document to make sure that the individual is who they claim to be. The code will most likely consist of the user name and a hash of usually part of the message. The complexities of the SSL protocol remain invisible to your customers. Instead, their browsers provide them with a key indicator to let them know they are currently protected by an SSL encrypted session - the lock icon in the lower right-hand corner, clicking on the lock icon displays your SSL Certificate and the details about it. All SSL Certificates are issued to either companies or legally accountable individuals. The main purpose behind using digital signatures is to make sure that it's not a swindler participating in the transaction. So, digital signatures help narrow down e-mail frauds. A digital signature can also make sure that contents of a message have not been changed.

Typically, an SSL Certificate will contain your domain name, your company name, your address, your city, your state and your country. It will also contain the expiration date of the Certificate and details of the Certification Authority responsible for the issuance of the Certificate. When a browser connects to a secure site it will retrieve the site's SSL Certificate and check that it has not expired, it has been issued by a Certification Authority the browser trusts, and that it is being used by the website for which it has been issued.

Many ecommerce websites will usually have digital certificates. A certificate authority (CA) is an authorized company or individual for that matter that has the ability to issue and verify digital certificates. There are several of websites that offer a digital certificate. One of the popular Global Certification authorities is MindGenies (www.sslgenie.com).

What To Expect When Taking Your First Cisco Certification Exam

Cisco Certification: Taking Your First Certification Exam



You’ve studied hard you’ve practiced your configurations you’ve used your flash cards over and over again and finally, the big day is here. Your first certification exam!



For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam.



Walking into a testing center for the first time can be a nerve-wracking experience. You’ve got enough on your mind just keeping all that new information straight without worrying about what the testing experience will be like.



You’re not there to take the exam. You’re there to pass the exam. With this aggressive attitude in mind, let’s take a look at what you should expect (and not expect) when taking your first Cisco certification exam.



Be Early and Bring Your ID.



If the testing center is not in a part of town that you drive to in the morning, and you’ve got a 9 AM exam, you may find the traffic is much heavier that time of morning than you expected. Driving up to the testing center 10 minutes late is not a good way to get started. If you’ve never been to the center before, check their website for directions, or call them for directions. If at all possible, drive to the center the night before your exam.



Make sure to bring your wallet or purse. You cannot take the exam without proper identification. You’ll probably be asked for two forms of ID, one of which must be a picture ID.



Test Your Marker & Dry Erase Board



The testing center will give you a dry erase board and a marker. Make sure that the marker has a fine point when you’re answering subnetting questions or performing a hexadecimal-to-binary conversion, that will come in handy.

Cisco policy states that you are no longer allowed to use paper during the exams.




The Testing Room


Despite the best efforts of VUE and Prometric, some testing center rooms are afterthoughts. I strongly advise that if you’re taking your exam at a technical school, ask to see the testing room BEFORE you sign up for the exam. If it looks like a converted broom closet, it probably is. Those rooms also tend to be right next to classrooms, which can result in distracting noise during your exam.



If your testing center specializes in giving computer-based exams rather than classes, you’re probably in good shape. Again, feel free to drop by the testing center before your exam to take a peek at the testing room. Most testing rooms have a window that employees use to keep an eye on testers, and you should be able to take a peek through the window.



When you go in, you’ll be asked to enter your social security number as your testing ID. Once you do that, the exam engine starts running. However, this doesn’t mean the test starts.



The Survey


When you take a Cisco exam, you’ll first be presented with a survey. The survey consists of 10 – 20 questions asking about your background, preparation methods, and comfort level with different technologies. This is a good time to catch your breath before starting the exam. The survey will only take about five minutes, and this time does not count against your exam time.



Pay Attention To The Exam Tutorials


You’ll then be presented with an exam tutorial, showing you how to answer the different types of questions Cisco may ask. While most of these questions types are common sense (multiple choice, single answer, fill-in-the-blank), I strongly urge you to pay special attention to the router simulator question tutorial.



The simulator questions carry more weight than the other questions indeed, it’s almost impossible to pass the CCNA exams if you totally miss the simulator questions. While the interface for these exams is intuitive, sometimes students who fail their exam complain that they were not given enough information to answer the question. The real problem is that they didn’t look in the right place for that information. It’s not hidden, but spend a few minutes with the tutorial and do not go forward until you’re comfortable with the simulator interface.



The Exam Itself


Finally, the exam starts! Remember, you’re not being asked anything you don’t know. If you have prepared correctly with the right tools, you’ll have a passing grade on your screen before you know it.



Speaking of that grade, you’ll be presented with it about five seconds after you answer the final question. Cisco exams no longer allow CCNA and CCNP candidates to go back once a question is answered, so be prepared for that.



Knowing what to expect when you go into the testing room for the first time will magnify your chances of success. Work hard (and smart!) while studying, achieve a combination of theoretical knowledge and hands-on work with real Cisco routers, and you are on your way to exam success!



Chris Bryant

CCIE #12933

What Paper or Computer Files Should You Keep

Does this shock you? It did me at first, but now I subscribe to this motto and let go of all paper and information that doesn't serve me. It's my new mantra. If the information is important I make sure it gets filed--either in paper files or on my computer. More and more I don't use paper files and have learned how to make new folders of important people or specific information I need to keep track of.

If you are a stacker, slinger, or stuffer, you can now expand your power by keeping only what is important to you.

How to File these Important Pieces

If in a paper file organize them alphabetically and vertically and put a complete name at the top of the manila file folder. Categorize the kinds of files too: one for household information, another for the teleclasses and speaking engagements, another for coaching clients, and another for promotion Online and off.

In a computer word folder organize information alphabetically too. "My documents" includes these and many more, but with this technique you will always know where to find the important information because it's organized and categorized in folders Examples include: articles to submit, contacts influential, ClickBank, promotion campaigns by month and of course folders for books in word and PDF. These folders are the lifeblood of any business.

Make sure you keep only information that supports your best life. With that 20% make sure you file it so you can find it in less than two minutes!

What kind of backup you need?

For years now, we have learned to develop our business using computers and advanced technologies. Even though computers have turned out to be an immense help, they have also contributed to data insecurity and difficult protection for information that is vital. The last affirmation was especially valid for those of us who are regular enterprise users, those who need the Internet to transmit information, while taking advantage of advanced PC or laptop backup.

Using a computer on a regular basis has taught us that such technologies need to be taken care of. This is why we have programs that improve the functionality of our computers, while adding security and virus protection. Backing up a computer or a laptop is no longer a new concept; on the contrary, every day more and more people are becoming interested in laptop backup solutions. There are also millions of people (including enterprise users) who have not discovered yet the advantage of enterprise laptop backup; they suffer each day from loss of valuable data and they should be informed about the existence of such innovative solutions.

As the Internet is a pretty good resource for information, producers of PC backup solutions have started to present their products online. They have mentioned all the features that make their products so attractive and useful to the general public and enterprise users as well, including the statement that data protection is not just a dream for the future. Laptop backup is something everyone should be interested in, including those who run just a small business to large enterprises needing protection for terabytes of data. The characteristics of such products are presented online in detail, making people understand the need for them.

Mobile and remote-office users along with enterprise users have been searching for data protection solutions for years. Today, technology has reached to a point where files can be synchronized and sent to a central server for protection. Compressed and encrypted, they can be reached at any moment and put to good use, the central server storing the good version of files and allowing you to benefit from remote web access.

Wanting to take the modern generation of laptop backup solutions even further, specialists have promised to introduce continuous data protection (CDP) facilities, innovative encryption and even full support for mobile devices, especially personal organizers. The enterprise laptop backup products are now serving a wide segment of the market, promising to gain even more popularity than it all ready gained, as the need for data protection appears more often.

The concept of data protection has always been linked with the one of data recovery. This is one of the main reasons why laptop backup products include both these two features as basic foundation. The same specialists are constantly working to develop even more advanced enterprise laptop backup, wanting to reach an even wider segment of the market. Probably one of the most attractive things about backup solutions is that they can be implemented for both PC and laptop. You are given constant sync of the data you have sent to the central server, feeling indeed the advantages of this groundbreaking technology. Without a doubt, both laptop enterprise users and PC office ‘exploiters’ are taking delight in these backup products presented online, being particularly interested in the open-file/locked-file support for MS Outlook.

What Is The Best Baby Crib To Buy?

What Is The Best Baby Crib To Buy?

Should it be cheap? Should it be elegant? Big? Small? Answer those questions by reading more.

Buying a baby crib can be an expensive purchase. What follows is guide to help you find the best baby crib as well as a review of some of the most popular, quality brands.

Safety is paramount when choosing a baby crib. The best baby cribs will have Juvenile Product Manufacturers Association (JPMA) certification. This certification ensures that it meets and surpasses many US safety regulations. So, only looking at brands with a JPMA certification is a good place to start. Brands like Munire, Bellini and Bassett cribs as well as others have JPMA certification.

A good baby crib will come with features to make using it easy. If you are looking for a conventional drop side model, you should first decide if you require double drop sides. Whilst this isn't really a determining factor on quality, there's no point in buying a baby crib that doesn't have the features you want. The Delta Luv 3-in-1 Jenny Lind is an excellent double drop side and it's cheap. Incidentally, the Pali crib was the first to have a "one-hand" drop side feature with no exposed hardware - this company makes some of best baby cribs.

A convertible crib can be a best buy. These are more expensive than their traditional counterparts but you child will get longer use out of them. There are two types: 3-in-1 and lifetime. A 3-in-1 converts from crib to toddler bed to day bed - many also have storage drawers. A lifetime does this but will also serve as a full size bed. When buying either type, make sure that converting them is easy. Look for brands that don't require you to use a 'special' tool - you're almost certainly going to lose it before you need to use it. Pali Forever cribs are lifetime types and are an excellent product - the Carmen being a popular design.

Look for quality of materials and construction when deciding on the best baby crib to buy. A good one is made from solid wood - usually pine, beech or birch. Some brands further employ veneers for certain finishes. Also, the best have hidden hardware - moving metal parts, nuts and bolts etc. Munire and Basset cribs are some of the most beautiful, using lovely veneers and finishes.

Any well made crib will carry some sort of warranty. The industry norm is a 1 year limited warranty with some companies offering a longer period. Before you buy, ask about spare parts. Does the manufacturer provide them in case they should break? If not, this is a sign of a lack of commitment to customer care, so don't buy their products.

Finally, we talk about design. This is a very subjective matter. Some parents will prefer simplistic designs from the past like the Jenny Lind crib, while other prefer modern simple designs like the Bellini Isabella crib. The current collection of Basset cribs draw heavily on traditional American styles like Shaker, New England etc. If it's old fashioned opulence you want then checkout Munire's collection of divine baby cribs.

There's no such thing as the best baby crib. There are very well made, well designed models, some of which have been mentioned above. The best baby crib is the one that best suits your needs; once you're sure of what these are, you'll be able to make the right decision on your purchase.

What Is MCSE?

MCSE stands for Microsoft Certified Systems Engineer. What is this term, really? While the term sounds like a degree that you would get in Microsoft, it is not really an engineering degree, per say. In fact, that is one of the biggest complaints about this learning process. Nevertheless, MCSE is a training course of sorts that is designed to teach individuals who want to learn how to handle various aspects of Microsoft skills. The goal is to have a group of people who are knowledgeable in the areas that Microsoft is specific. Let’s explain.

Microsoft developed this type of training to allow individuals to get a specific training course, or several in various types of skills that pertain to Microsoft. The thing about this training is that it is specific to Microsoft. While you may learn to install a program in another course which would teach a broad range of information about all ways in which to do so, in the MSCE, you will learn strictly how it is done through Microsoft.

So, How Does MSCE Work?

In most cases, the training can be done in several ways. Students can take classes through certified teachers in school or they can study on their own. Some individuals feel that they have enough experience in the various uses of Microsoft to be able to take the test without taking a training class. The test is given at specific areas at specific times. In order to be considered, you must pay a fee of about $125 for each of the tests and certifications that you plan to take. The tests range in knowledge levels and in most cases, it is wise to take the training courses for MSCE prior to taking the test as it can be quite challenging.

You will find more information about MSCE throughout the web.