Wednesday, February 21, 2007

3 Steps to Set Up Wireless in Your Home

Step 1
Get High-Speed Internet Access
Dell TrueMobile Wireless equipment does not work on dial-up modems. Start here and share your home's broadband connection throughout your new network.

Dell can help you choose from the many local provider offers.

High Speed Internet Check for High-Speed Availability in Your Area and Get Connected



Step 2

This is the heart of your wireless network. The router connects to your existing cable or DSL modem so all your computers can access the Internet. Get great performance from your wireless router by following these easy tips:

Optimal Placement Dell Wireless

* Place your broadband router near the center of your network.
* Mount the router as high as possible in the room.
* If your network needs to cover two stories, you may need a separate router for each floor.

Reduce Interference Dell Wireless

* Place your broadband router away from computers, televisions, microwaves and cordless phones.
* Wireless products from Dell operate at 2.4 GHz, the same frequency as many small appliances.

Connect Your Router Dell Wireless

* Use a Cat-5 Ethernet cable to connect your DSL or cable modem to the WAN port located on the back of your broadband router.
* Your access point can also be connected to a Local Area Network with an Ethernet cable.

Step 3
Connect and Configure Your Computers
To transmit data to a wireless network, your notebook or desktop computer will require a wireless PC network card.

PC network cards come in three formats:

* Integrated – a card that is hardwired into your notebook (also referred to as a Mini-PCI card)
* External – a separate PC network card that needs to be plugged into your notebook's PC card slot (commonly located on the side of a notebook)
* USB Wireless Adapter – a separate device that can be plugged into the USB port of a desktop

Once all your wireless network hardware is in place, you'll need to create a Configuration Profile or a unique identifier to access the network. The TrueMobile Client Manager software installed on your notebook can help you.

A single broadband router can accommodate up to 16 wireless users. If you'd like to connect additional notebooks or desktop computers to your wireless network, you do not need to purchase additional broadband routers. However, each system will need its own PC network card.

What is Wireless?

Wi-Fi, or Wireless Fidelity technology, uses a uniform networking standard that ensures compatibility amongst other Wi-Fi wireless networking products. All Dell wireless products meet these standards. Now everyone can enjoy the advantages of going wireless at home.

* Wireless technology allows you to create a home network without running cables and cords to every computer in the house.
* It gives you the freedom to access your e-mail or the Web from anywhere you have access to a wireless network.
* Share a printer or a high-speed Internet connection or stay connected in public places like airports, hotels and restaurants (where wireless access is available – additional access charges apply in some locations).

Sunday, February 18, 2007

How to Create a Wireless Network

How to Create a Wireless Network
Computer networking is a great way to collaborate with other computer users in your home or office. While it is becoming increasingly easy for the basic computer user, it can still be a difficult, frustrating experience for many people.

Steps
Decide on what type of network you wish to install. We will be covering how to install a wireless network including 2 desktop computers, 1 laptop, and a High Speed Internet (HSI) connection. If you wish to install a wired network, this manual is not for you.
Purchase the following items for your Wireless Network:
Wireless router (with switch)
2 PC wireless adapters for the desktop computers
1 Laptop wireless adapter for the wireless laptop
Connect the wireless router to your High Speed Connection by turning off all units, including the computers. Simply use an Ethernet cable (which usually comes with your High Speed Internet Connection) to connect your HSI modem to the WAN port on your wireless router.
Open your desktop computers and install the PC adapters, or purchase USB adapters that do not require you to open your computer. Also install any necessary software on each machine. Older operating systems need some drivers installed.
Install the wireless PC card in your laptop, and install the included software. Then, shut down all computers.
Turn on your new items in this order:
1. Your HSI modem (wait for all lights to return to normal).
2. Your New Wireless Router (wait for it to start up fully).
3. The computers. They should find the wireless router and connect to the network and the internet through the new router.

Tips
To create a network that does not include internet access (or to ensure that your computers are really networked), be sure to enable Print and File Sharing on all computers. This is done differently on the Macintosh, Linux and the Windows platform.

Warnings
Turning on your equipment in the wrong order could cause your new setup to not work! Be sure to power on each item in order. It really does matter.
Remember to set up your WEP (preferably WPA) security settings to prevent unauthorized access to your network
Also remember to change the default passwords and usernames on your wireless router. Many wardrivers will travel around finding hotspots and then trying the default codes for that type of access point. This could result in you getting locked out of your own router and having to manualy reset your network.

Related wikiHows
How to Secure Your Wireless Home Network
How to Take the First Steps in Home Networking
How to Add an HP Printer to a Wireless Network
How to Make a Network Cable

External Links
Wireless Networks related help : http://www.telecomspace.com/wirelessnw.html
http://www.comtradcables.com/Wireless-C386.aspx

some hacking tricks

some hacking tricks
This is a complimation of computer tricks, mainly security and privacy related.By: the@womble.co.uk Flames: If you think this is crap, you're probably right. Sue me Send/ email to anyone as long as the entire file is intact Site: www.groovyweb.cjb.net, www.axion-network.net for more
Getting Ip's:--To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected toIn MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--Servers send information. Clients retrieve. Simple. Windows comes with a built in program to connect to other computers called telnet. To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system Ports are doors into computers. Hosts are computer names (ip number or a name that is translated into the ip automatically) Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is: 11 :- Sends info on the computer 21 :- FTP (File transfer program) 23 :- Telnet (Login to the computers command line) 25 :- Smtp (Sends mail) 80 :- Http (Web pages) There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Anyway, back to telnet. Type www.yahoo.com as the host and port as 80 the click connect. If nothing happens, you're in. Wow. You are connected to Yahoo's server. You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about. Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted WindowsSee http://blacksun.box.sk/tutorials/format.php3?file=windows.html for some very cool tactics. A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following: REGEDIT4 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp] "Disabled"=dword:0 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem] "DisableRegistryTools"=dword:0 Save it as something.reg then run it. Simple.
Making undeletable, unreadable foldersTested on Windows 95/98 By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)
ProxiesProxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port
Password filesIf you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. Download showpass.zip from hereto view all passwords stored. Or rename the files to .bak to delete passwords.In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon. See here.
Securing your websiteFtp Ftp is how you upload your web site, if somone finds out the password they can add/ delete anything. Brute forcing is the most common ftp attack, where a program guesses every possible combination (or from a list of words). An eight letter alpha-numeric word is almost impossible to crack, as the process is slow.The real problem is with server side scripting. Pages other than plain html (ie. pages that perform commands on the host) are a security risk. The main problems are scripts that write to pages (guestbooks etc.). If when the guestbok is viewed it has a .shtml extension, then it can execute commands. Eg. a malicious visitor could place the following shtml command in a messege:

MAKE FREE MONEY

WELCOME

Welcome to my world where everybody is somebody and none is nobody. Together we shall hack all hackables