Useful tip to Hide drives and Partitions

Friday, August 8, 2008

You can hide your system partitions or drives from other users. This tip is very useful if different type of users are using same computer then you can safe your important drives with this trick from any illegal action. You can use windows XP TweakUI utility or registry editor to hide drives. To work with windows XP TweakUI go to Run and type tweakui then press enter. A small TweakUI interface will open with options to uncheck drives that you want hidden. Click OK to finish it.
You can also use registry editor to edit the computer registry to turn off the display of drives, but be careful to work with computer registry.
Follow the given steps to hide computer drives:
  • First click on Start button then type Regedit in Run option.
  • Here locate the location to:
        HKey_Current_User \ Software \ Microsoft \ Windows
        \ Current Version \ Policies \ Explorer
  • Here right click on right side of Registry editor panel and add new DWORD then put its value 3FFFFFF.
  • Now close the registry editor and restart your computer after any changes to go into effect.

How to Secure a Wireless Network from Hackers?

Sunday, August 3, 2008

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:
1.       Strategic antenna placement:
The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2.       Use WEP:
WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3.       Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4.       Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5.       Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6.       Utilize access lists:
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

Install windows 2000 after you have installed windows XP

If you want to install two windows (windows 2000 and XP) on the same computer then the sequence is that first install windows 2000 then windows XP. But if you have already installed windows XP on your computer and now want to install the windows 2000 on the same computer then after windows 2000 setup your XP windows will create problem. Follow the given steps how to install windows 2000 after you have installed windows XP.

  • First backup the NTLDR and NTDETECT.COM files in windows XP, locate these files NTLDR and NTDETECT.COM in the boot drive (normally in C drive root directory). Usually these files are hidden files but you can locate to adjust your explorer options to show them. You can search these files on your computer C drive.

  • Now copy these files on USB drive or write on black CD. But you can also save these files on other hard disk drives like D or E drive.

  • After backup these files, boot your computer from bootable windows 2000 CD and run the windows 2000 setup.

  • Try to install the windows 2000 to a different partition that XP is installed. After complete the windows 2000 setup, boot your computer into windows 2000.

  • When your computer boot into windows 2000, attach the backup drive that you used earlier for backup, now copy back NTLDR and NTDETECT.COM to the root directory of your boot drive.

  • Now, you'll be able to restart your computer and boot into windows 2000 or windows XP. 


  • How to install FreeNX on Suse 10.0?

    NoMachine NX is a Terminal Server and remote access solution based on a comprising set of enterprise class open source technologies. NX makes it possible to run any graphical application on any operating system across any network connection at incredible speed.

    FreeNX application/thin-client server is based on NoMachine’s NX technology. It can operate remote X11 sessions over 56k modem dialup links or anything better. FreeNX package contains a free (GPL) implementation of the nxserver component. The following workshop describes the FreeNX installation on a Linux Suse 10.0 server.
    In the workshop setup the NX server is running behind a firewall. You can access it from outside your environment (i.e. the Internet) via an analog or ISDN MODEM or from inside you LAN.
    NOTE: Please make sure to configure your firewall correctly to allow SSH connections (Port 22) from both sides.
    You also need to allow inbound traffic TCP to port 5000.

    The workshop setup could look like this:


    Banner


    readbud - get paid to read and rate articles