Saturday, 21 May 2011

BCDedit.exe

Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.


 

BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu parameters, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements:


 

Exposes a wider range of boot parameters than Bootcfg.exe.

Has improved scripting support.

Hardware assisted virtualization

In computing, hardware-assisted virtualization is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors. Full virtualization is used to simulate a complete hardware environment, or virtual machine, in which an unmodified guest operating system (using the same instruction set as the host machine) executes in complete isolation. Hardware-assisted virtualization was added to x86 processors.

Monday, 4 April 2011

Networking Cables

Straight-through cables get their name from how they are made. Out of the 8 pins that exist on both ends of an Ethernet cable, each pin connects to the same pin on the opposite side. Review the diagram below for a visual example:
straight through cables
Notice how each wire corresponds to the same pin. This kind of wiring diagram is part of the 568A standard. The 568B standard achieves the same thing, but through different wiring. It is generally accepted to use the 568A standard as pictured, since it allows compatibility with certain telephone hardware- while 568B doesn’t.
Straight-through cables are primarily used for connecting unlike devices. A straight-through cable is typically used in the following situations:
Use a straight-through cable when:

  • 1. Connecting a router to a hub
  • 2. Connecting a computer to a swtich
  • 3. Connecting a LAN port to a switch, hub, or computer

Note that some devices such as routers will have advanced circuitry, which enables them to use both crossover and straight-through cables. In general, however, straight-through cables will not connect a computer and router because they are not “unlike devices.”

The Purpose of Crossover Cables

Crossover cables are very similar to straight-through cables, except that they have pairs of wires that crisscross. This allows for two devices to communicate at the same time. Unlike straight-through cables, we use crossover cables to connect like devices. A visual example can be seen below:
crossover cable
Notice how all we did was switch the orange-white and green-white wires, and then the orange and green wires. This will enable like devices to communicate. Crossover cables are typically used in the following situations:
Use a crossover cable when:

  • 1. Connecting a computer to a router
  • 2. Connecting a computer to a computer
  • 3. Connecting a router to a router
  • 4. Connecting a switch to a switch
  • 5. Connecting a hub to a hub

While the rule of thumb is to use crossover cables with like devices, some devices do not follow standards. Others provide support for both types of cables. However, there is still something that both crossover and straight-through cables can’t do.

The Purpose of Rollover Cables

Rollover cables, like other cabling types, got their name from how they are wired. Rollover cables essentially have one end of the cable wired exactly opposite from the other. This essentially “rolls over” the wires- but why would we need to do such a thing? Rollover cables, also called Yost cables, usually connect a device to a router or switch’s console port. This allows a programmer to make a connection to the router or switch, and program it as needed. A visual example can be seen below:
rollover cable
Notice that each wire is simply “rolled over.” These types of cables are generally not used very much, so are usually colored differently from other types of cables.

Network Devices

A router is an Open Systems Interconnect (OSI) model Layer 3 device. IP addressing and routing is performed at Layer 3. A router is used to connect networks that are assigned IP addresses in different subnets. A router delimits a broadcast domain.

A bridge is a Layer 2 device that connects network segments. A bridge is more efficient than a repeater because it can analyze traffic. However, it does not limit a broadcast domain.

A firewall is a security device that filters traffic. Basic firewalls filter incoming and outgoing traffic based on the TCP/IP port. A firewall is typically used between segments that have different security requirements. There are different types of firewalls that operate at different layers of the OSI model. For example, a packet filter firewall operates at the Layer 3 of the OSI model, but an application layer firewall operates at Layer 7.

A repeater also connects network segments. However, a repeater simply rebroadcasts the signal. It cannot be used to connect segments in different IP subnets. A repeater also does not serve as a broadcast domain delimiter. A repeater operates at Layer 1 of the OSI model.

IGMP

IGMP is used to control sending packets to broadcast groups. This enables one computer to send content to selected group of other computers in one broadcast, unlike a standard broadcast that is delivered to all computers. Also, routers pass IGMP messages, but block standard broadcast messages.

Tuesday, 29 March 2011

Stateful vs. Stateless Firewalls

A firewall can be described as being either Stateful, or Stateless.

STATELESS

Stateless firewalls watch network traffic, and restrict or block packets based on source and destination addresses or other static values. They are not 'aware' of traffic patterns or data flows. A stateless firewall uses simple rule-sets that do not account for the possibility that a packet might be received by the firewall 'pretending' to be something you asked for.

STATEFUL

Stateful firewalls can watch traffic streams from end to end. They are are aware of communication paths and can implement various IP Security (IPsec) functions such as tunnels and encryption. In technical terms, this means that stateful firewalls can tell what stage a TCP connection is in (open, open sent, synchronized, synchronization acknowledge or established), it can tell if the MTU has changed, whether packets have fragmented etc.

Neither is really superior and there are good arguments for both types of firewalls. Stateless firewalls are typically faster and perform better under heavier traffic loads. Stateful firewalls are better at identifying unauthorized and forged communications.

Monday, 28 March 2011

Useful Windows Commands

NETSTAT

The netstat command is used to display the TCP/IP network protocol statistics and information.

NSLOOKUP

The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network.

ROUTE

The route MS-DOS utility enables computers to view and modify the computer's route table

TRACERT / TRACEROUTE

The tracert command in MS-DOS / Windows or the traceroute command in Unix / Linux and variants is another commonly used network command to help determine network related issues or slowdowns. Using this command you can view a listing of how a network packet travels through the network and where it may fail or slow down. Using this information you can determine the computer, router, switch or other network device possibly causing your network issues.

ARP

Display or manipulate the ARP information on a network device or computer.
 

ARPING
The arping command sends Address Resolution Protocol (ARP) packets to test connectivity. Therefore, it can be used to test connectivity with a computer that blocks the Internet Control Messaging Protocol (ICMP). However, since ARP is not a routable protocol, the computers must be located on the same subnet. 
 

DIG
The dig command is used to retrieve information from a Domain Name System (DNS) server.