...Windows 7 Commonly Used Services Browser Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained. If this service is disabled, any services that explicitly depend on it will fail to start. bthserv The Bluetooth service supports discovery and association of remote Bluetooth devices. Stopping or disabling this service may cause already installed Bluetooth devices to fail to operate properly and prevent new devices from being discovered or associated. Dhcp Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not receive dynamic IP addresses and DNS updates. If this service is disabled, any services that explicitly depend on it will fail to start. Dnscache The DNS Client service (dnscache) caches Domain Name System (DNS) names and registers the full computer name for this computer. If the service is stopped, DNS names will continue to be resolved. However, the results of DNS name queries will not be cached and the computer's name will not be registered. If the service is disabled, any services that explicitly depend on it will fail to start. eventlog This service manages events and event logs. It supports logging events, querying events, subscribing to events, archiving event logs, and managing event metadata. It can display events in both XML and plain text format. Stopping...
Words: 658 - Pages: 3
...IT 302 LINUX ADMIN PROJECT I chose to do my final project on the Samba server, such as how to set up the server, security, and maintenance. Samba “is an Open Source/Free Software suite that provides seamless file and print services to SMB/CIFS clients. Samba is freely available, unlike other SMB/CIFS implementations, and allows for interoperability between Linux/Unix servers and Windows-based clients.” (source1) The whole purpose of the samba software is to make it possible to operate on many platforms. To install the server you would use the yum command in terminal. You then would enter su for the “super user” to install files as root. Then create a new directory containing three empty files which you'll share. While logged on as root create the new directory “/smbdemo” using this command “mkdir /smbdemo”. Then you would change permissions on the new directory to 770 with the following command “chmod 770 /smbdemo”. Now you navigate to the new directory with “cd /smbdemo” for the command. Add three empty files to the directory with the following command “touch file1 file2 file3”. Next step one would most likely add a user to the server. You do this first by “adding users to the Samba database in order for them to have access to their home directory and other Samba shares.”(source2) Using this command “smbpasswd -a ” you will then be able to add a new samba user. The user must be an existing Linux user or else the command will fail. Then if you “perform the following...
Words: 681 - Pages: 3
...Abstract Three forms of malware that originally had legitimate applications, but have over time been developed as malicious software are taken into account: ActiveX control, Telnet, and NetBIOS. They are explained first, then the risks user can face if his computer is infected with that malware are given, and the countermeasures which should be taken in order to combat the malware. After that, the compare and contrast of the three forms of malware mentioned above is given. In the end, two recent forms of malware, Flame and FinFisher are explained. ActiveX control What is an ActiveX control? ActiveX is a software component of Microsoft Windows. It is already installed in a computer with Internet Explorer. ActiveX controls are small programs, sometimes called add-ons that are used on the Internet. They can enhance browsing experience by allowing animation or they can help with tasks such as installing security updates at Microsoft Update. Some websites require installing ActiveX controls to see the site or perform certain tasks on it. When these websites are being visited, Internet Explorer asks to install the ActiveX control. The website that provides the ActiveX control should tell the visitor what the control is for. It should also provide relevant details on the web page before or after the warning. Internet Explorer blocks websites from using an ActiveX control if the website tries to use the ActiveX control in a way that might not be safe. What are the risks? ActiveX...
Words: 2385 - Pages: 10
...Table of Contents INTRODUCTION 2 DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3 AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3 INSTALLING AND AUTHORIZING A DHCP SERVER 4 CREATING AND CONFIGURATION OF DHCP SCOPES 8 CREATING AND TESTING DHCP CLIENT RESERVATIONS 10 IMPLEMENTING DHCP RELAY AGENTS 12 DOMAIN NAMING STRATEGY 16 DOMAIN NAME SERVICE INSTALLATION 17 DOMAIN NAME SERVICE LOOK UP ZONES 18 ZONE AUTHORITY DELEGATION 23 DNS DYNAMIC UPDATES 25 DNS RESOURCE RECORDS 25 NETBIOS NAME RESOLUTION 27 INSTALLATION OF WINS 27 STATIC WINS RECORD 28 CONFIGURING REPLICATION PARTNERS 30 ALTERNATIVE IP ADDRESSING STRATEGY 31 ALTERNATE NAME RESOLUTION TECHNIQUES 32 NETWORK PLAN FOR THE UWS GLASGOW SITE 32 NETWORK PLAN FOR THE UWS CLYDE SITE 33 NETWORK PLAN FOR THE UWS HEAD OFFICE SITE 33 OVERVIEW OF THE UWS NETWORK INFRASTRUCTURE AS A WHOLE 34 TROUBLESHOOTING STRATEGY FOR UWS NETWORK 34 BACK UP AND FAULT TOLERANCE STRATEGY FOR NETWORK SERVICES 38 NETWORK HEALTH MONITORING AND ANALYSES 38 CONNECTIVITY SOLUTIONS FOR MULTI-VENDOR -ENVIRONMENT 40 REMOTE CONNECTIVITY TO UWS NETWORK USING VPN 41 CONFIGURING INBOUND VPN CONNECTION 41 CONFIGURING REMOTE ACCESS POLICIES 45 CONFIGURING OUTBOUND VPN CONNECTION 48 NETWORK COUNTERACTIVE APPROACHES WITH REGARDS TO SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company...
Words: 5792 - Pages: 24
...A distributed system is a collection of computers connected to a network of distributed middleware (software connecting client and database: software that manages the connection between a client and a database) . This allows the computers to communicate to each other and also share resources. While allowing the user to use the computer as he or she would use a single integrated computing facility. Examples of failures in a distributed system include, stop failure, Halt failure, Network Failure, and Distributed File System Namespace access failures. Distributed File System Namespace access failures in Windows On Windows Vista and later one of the following error messages may occur: Windows cannot access \\\ The connection may fail due to any of the following reasons: Failure to connect to a domain controller to obtain a DFSN namespace referral, Failure to connect to a DFSN server, Failure of the DFSN server to provide a folder referral. This error typically occurs because the DFSN client cannot complete the connection to a DFSN path. To resolve the issue , evaluate network connectivity, name resolution, and DFSN service configuration (How to troubleshoot Distributed File System Namespace , 2010). Evaluate Connectivity "connectivity" refers to the client's ability to contact a domain controller or a DFSN server. If a client cannot complete a network connection to a domain controller or to a DFSN server, the DFSN request fails. Use the following tests to verify...
Words: 795 - Pages: 4
...This report was generated Using Two vulnerability scans Netwitness and Zenmap investigators. A list of the information will be listed below to be reviewed and analyzed with Company management department for further investigations, modifications and implementations if needed. Services: The scan shows the use of the following services: Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008. Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the...
Words: 429 - Pages: 2
...Lab#1 Questions DeAundre Graves 4/9/2014 Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM (VM Name: “WindowsTarget01”) and identify whether that application starts as a service on the system or must be run manually? A.FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N |. 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP? default gateway router? A. a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? A. Yes, 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-replies vary? A. The TTL on Windows was 128 while on Ubuntu the TTL was 64 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? A. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular scans. A. Ping Scan ...
Words: 407 - Pages: 2
...to communicate. The Services being used by Corp Tech Management Domain on the internet is a group of computers networked through some form of networking. When on the internet, this is defined by an ip. address. Kerberos –sec is intended to provide secure authentication over insecure networks such as the Internet. Further, Kerberos provides for mutual authentication, each party can be assured of the identity of the other Msrpc (Microsoft Remote Procedure Call) on WinXP is IPv6 enabled Netbios- ssn NetBIOS (Network Basic Input/Output System) is a program that allows applications on different computers to communicate within a local area network (LAN). (cont.) Other Services being used are Idap - Lightweight Directory Access Protocol which means an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Microsoft –ds Microsoft Directory Services This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. We Can Harden the System to be exposed to less Vulnerabilities to the IT infrastructure is by closing ports that are not being used. Always have the most updated software on systems * Non-essential services - It is important that an operating system only be configured to run the services required to perform the tasks for which it is...
Words: 535 - Pages: 3
...Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular...
Words: 415 - Pages: 2
...the DHCP Manager Create Scope or Scope Properties dialog box. It cannot be set directly in the DHCP Options dialog box. 3 Router Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter. 6 DNS servers Specifies a list of IP addresses for DNS name servers available to the client. 15 Domain name Specifies the DNS domain name that the client should use for DNS computer name resolution. 44 WINS/NBNS servers Specifies a list of IP addresses for NetBIOS name servers (NBNS). 46 WINS/NBT node type Allows configurable NetBIOS over TCP/IP (NetBT) clients to be configured as described in RFC 1001/1002, where 1 = b-node, 2 = p-node, 4 = m-node, and 8 = h-node. On multihomed computers, the node type is assigned to the entire computer, not to individual network adapters. 47 NetBIOS scope ID 1 Specifies a text string that is the NetBIOS over TCP/IP scope ID for the client, as specified in RFC 1001/1002. 51 Lease time Specifies the time, in seconds, from address assignment until the client's lease on the address expires. Lease time is specified in the DHCP Manager Create Scope or Scope Properties dialog box, and can be set directly in the DHCP Options dialog box. 58 Renewal (T1) time value Specifies the time in seconds from address assignment until the client enters the Renewing state. Renewal time is a...
Words: 1115 - Pages: 5
...CIS 246 Week 8 FINAL EXAM Click Link Below To Buy: http://hwaid.com/shop/cis-246-week-8-final-exam/ Final Exam - Page 1 Question 1.1. (TCO 1) Which of the following enables resource sharing by other computers on the same network? (Points : 5) Segment Node Host Backbone Question 2.2. (TCO 4) A complex combination of pure topologies is known as a _____ topology.(Points : 5) mixed hybrid compound mulitpart Question 3.3. (TCO 7) _____ is an application layer protocol used to send and receive files via TCP/IP. (Points : 5) PING Telnet NNTP FTP Question 4.4. (TCO 2) Connectivity devices such as hubs and repeaters operate at the _____ layer. (Points : 5) session physical application network Question 5.5. (TCO 3) _____ cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil. (Points : 5) Fiber-optic Ethernet Shielded twisted-pair Coaxial Question 6.6. (TCO 8) _____ ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an administrator of the system can access. (Points : 5) Dynamic Well-known Private Registered Question 7.7. (TCO 1) _____ are standard methods or formats...
Words: 957 - Pages: 4
...Common Port Number and Description | Port # | Name | Description | 20 | FTP | Data. File Transfer Protocol is a protocol used on the Internet for sending files. | 21 | FTP | Control | 22 | SSH | Remote Login Protocol. Developed by SSH Communications Security Ltd. Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled. When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords. SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication. | 23 | Telnet | A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the...
Words: 958 - Pages: 4
...ITT-Technical Institute Abstract This paper will show what systems should be removed from a computer. It will also give you insight into what services typically run on a Web server. Unnecessary Services from a Saved Vulnerability Scan After completing the scan of the system the following services where found. They include the domain, http, ssh, auth, tcpwrapped, msrpc, smtp, netbios-ssn, Microsoft-ds, unknown, ftp and https. Below you will find a list of each and what they do. 1. Domain is the website that people go to. 2. http is the first part of the web address. 3. ssh is the port for logging in remotely. 4. Auth is the login information needed. 5. Tcpwrapped is host based network in ACL system used to filter Internet Server Protocols provides firewall features. 6. Msrpc is transport protocols. 7. Smtp is simple mail transfer protocol 8. Netbios-ssn part of the net bios 9. Microsoft-ds are the Microsoft port. 10. Unknown is just what it says. 11. ftp is the file transfer protocol. 12. https is part of the secure address for an internet site. After viewing these and finding out exactly what each does it has been decided that I will remove three of them. The reason for this is that they can automatically download malware or viruses to your computer. I will remove the file transfer...
Words: 415 - Pages: 2
...Term Advanced Definition An IEEE standard (802.3) for operating 10 Mbps Ethernet ... 10BaseT: networks (LANs) with twisted-pair cabling and a wiring hub. The weakening of a wireless signal that occurs as it passes through objects, especially those made of metal (walls, stairwells, filing cabinets) or containing large percentages Radio frequency (RF) energy is of water (fish tanks, stacks of Absorption (RF absorbed by material rather than paper, people, etc.). behavior) deflected or reflected. To avoid excessive absorption of the wireless signal, position the access point above any large objects in the area. An adjustment of the antennas may be necessary. An internetworking device that seamlessly connects wired and wireless networks. Access A device that provides wireless points combined with a Access Point (AP) clients with access to a wired distributed system support the network. creation of multiple radio cells that enable roaming throughout a facility. -- Default setting on Lexmark wireless network adapters. -- This will change to infrastructure during the configuration of the print server with an access point. -- Also known as peer-topeer, computer-to-printer, or computer-to-computer depending on the types of devices involved. Simple Definition Ad Hoc Mode A mode of operation for Wi-Fi networks in which devices communicate directly with each other. Term Simple Definition Advanced Definition -- A network composed solely of stations within mutual communication...
Words: 4427 - Pages: 18
...NET230-Final Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ___C_ 1. When ____ is used with only a filename and without parameters, the status of the object is displayed, indicating whether the object is encrypted and whether new files added to a folder will be encrypted. a.|CONVERT|c.|EFS| b.|CIPHER|d.|AES| ___C_ 2. Windows 2000 EFS uses ____. a.|DESX|c.|3DES| b.|AES|d.|4DFS| ___D_ 3. ____ must be used to grant or restrict access to objects in the shared folder. a.|Shared folders|c.|LFN| b.|Objects|d.|NTFS permissions| ____A 4. The ____ is a server-side software that sends a print job to the proper server in the format required by that server. a.|print client|c.|language monitor| b.|network interface driver|d.|print provider| ___D_ 5. A(n) ____ works with the printer driver to despool spool files during playback, making any needed changes to the spool file according to its data type. a.|print processor|c.|printer router| b.|mismatched document|d.|RAW spool file| ___D_ 6. ____ provides printer control at the print-job level and enables users to change printer defaults levels, such as number of copies, color, and printer languages. a.|Network interface printer|c.|Direct Driver Interface| b.|Printer Job Language|d.|Print resolution| ___B_ 7. Which of the following terms describes the contents of a completely or partially interpreted data file that contains text and control...
Words: 849 - Pages: 4