Going to take a certification that involves binary?

Going to take a certification that involves binary?

Here’s a quick tutorial~

Let’s say you are given an IP address of 192.168.1.135 in an answer.

What is this number in binary?

Here’s what you do.

Take a simple key to convert the numbers in the octets into binary.
The key is this:

128   64   32   16   8   4   2  1

Now let’s take the first octet of 192 and let’s see how many times the numbers above (the key) go into the given octet.

How many times does 128 go into 192?     192 – 128        1 time
This will leave us 64.
Next, how many times will 64 (your remaining number) go into the next number in the key(64)?

64 -64       1 time

Now the remaining number is 0.   So if you subtract 32 from 0 the number will be 0.  16 from 0 is 0, 8 from 0 is 0, 4 from 0 is 0, 2 from 0 is 0 and finally 1 from 0 is 0.

Look at your answers. 11000000 -This will represent 192.

Now let’s do the 168 octet.

128 goes into 168 – 1 time.   The remaining number is 40.   64 goes into 40 – 0 times.    32 goes into 40 – 1 time.  This gives you a remainder of 8.   16 (the next number in the key) goes into 8 how many times? 0 . 8 goes into 8 – 1 time.  The remainder is now 0.    4 goes into 0 – 0 times.   2 goes into 0 – 0 times.  1 goes into 0 – 0 times.   Look at your answers (bold).

168 will be 1010100

Of course the next number (third octect) which is 1 will be 00000001.

If you use the above key for 132, along with the subtraction method, 132 will be 10000100.

Your final answer is 11000000.1010100.00000001.10000100

 

Try a these yourself using the subtraction method above -

192.168.1.32
192.168.1.111

 

Flip over and see the answers

11110110˙10000000˙00010101˙00000011
01100100˙10000000˙00010101˙00000011
:ɹǝʍsuɐ

How to tie your cloud storage services together

How can you tie your cloud storage services together?   It’s actually easy if you use MultCloud.   MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single sign-on.

Completely FREE app for home and commercial use.
Single login for multiple cloud accounts.
Add unlimited accounts such as Dropbox, Box, OneDrive, etc

logo

Add Cloud

Signing up is easy and free.   Once you sign in, you can connect your cloud services and use the power of MultCloud to Upload or Download files from a central dashboard.

services

See who’s on your wireless network – SoftPerfect WiFi Guard

Want to see who is on your wireless?  SoftPerfect’s  WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network.

Before setting up WiFi Guard, inventory your computers, printers, routers, TVs and other devices that use your network.  Get each devices’ MAC address.  Load WiFi Guard and mark each device as trusted.  WiFi Guard’s settings allows you to set a scan interval and to put comments on devices that you know.  In the event a new device is connected to your network, you’ll be alerted.

taskbar

Scanned

 

 

Set a scan interval that meets your needs.Settings 

WiFi Guard keeps a history of devices that connect to your network.History

SoftPerfect WiFi Guard

The Ultimate Toolkit for IT Professionals – GE Geek Toolkit

I discovered GE Geek through Rick at What’s On My PC.  GE Geek is a resource like no other.  The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable.

The best feature by far is GE Geek’s Toolkit that contains 1.7 gigabytes of tools that every IT pro needs.

“A complete collection of over 300 Portable Freeware Tech Related
programs, all accessible from one Menu Launcher Utility. There’s
even a program to update all the essential programs automatically,
all contained on a USB/Flash drive for travel.” ~GE Geek

Here’s a short list of the categories -

Apps to Install
App Updates
App Uninstallers
BackUps
Benchmarking
Compression
Configurations
Diagnostics
Drivers
FTP Tools
Internet
Maintenance
Malware Removal
Multimedia
Network Tools
Recovery
Remote Tools
Repair Tools 1
Repair Tools 2
Scripts
Search
Security
System Information
System Tools
Tweaking Tools
Windows Services Defaults
Windows 7 Tools
Windows 7 Troubleshooting
Windows 7 / 8 Shortcuts
Dozens more
getoolkit 

 

Here’s a Snapshot of his Site. You have to visit the site to get an understanding of how this has to be one of the best sites on the web for IT Professionals.   Link

SnapShot

OPSWAT Gears – Manage your devices’ security remotely

Have mobile devices, servers and need to monitor these devices remotely?  OPSWAT Gears allows you to monitor your computers remotely – update antivirus software, discover compromised devices, manage threats and more.

MySQL Wworkbench – manage your MySQL installation

If you are a beginner or an expert, MySQL Workbench is a must have if you have installed MySQL.  The community edition allows you to Start/Stop your MySQL instance, write queries, monitor performance and has dozens of other features.

With MySQL, the my.conf file normally found in Linux installs is the my.ini file.  This configuration file can be found under the ProgramData folder (you have to show hidden files in Windows Explorer to see it).   This file can be configured using MySQL Workbench.   If you get an error connecting to it, go to the server instance and navigate to the my.ini file.   This is a common error when reading the configuration file.

WorkBench Status

Other features -

SQL Editor – SQL Code Completion, SQL Code Formatter, SQL Syntax Highlighting, SQL Code Generation, SQL History, SQL Snippets, Server-Stop/Start, Server Status, Performance and more.

WorkBench One

 

 

Free-Windows Server 2012 R2 Technet Document -7970 pages

Want to know how to be an administrator of Windows Server 2012 R2?  This 7900+ page document has everything you want to know about Microsoft’s latest server.  Included in this massive manual is-

  • Technical Scenarios
  • Install and Deploy Windows Server
  • Migrate Roles and Features to Windows Server
  • Secure Windows Server
  • Manage Privacy in Windows Server
  • Support and Troubleshoot Windows Server
  • Server Roles and Technologies
  • Management and Tools for Windows Server

Download Microsoft Windows Server 2012 R2 and Windows Server 2012 TechNet Library Documentation here.  111 mb

Microsoft also offers free virtual labs (Virtual Microsoft Server from your browser).  Coupled with this 7900+ page manual, this is an excellent resource to learn Windows Server 2012.

If you want to print this, it will take approximately 16 reams of paper and 3.25 high capacity laser toner cartridges.  Of course once you print it, you’ll have your first 32″ wide book.

Windows Hotfix Rollup with 90 updates for Windows 7 and Server 2008

The Microsoft Update may show that your computer is up-to-date but you may be able to improve system stability and performance with these 90 updates for Windows 7 and Server 2008 with a hotfix that was released earlier in 2013.  

This enterprise hotfix fix WebDAV, DFSN client, Folder Redirection, Offline Files and Folders, SMB client, Redirected Drive Buffering Subsystem, Multiple UNC Provider, SMB Service, TCP protocol components (Network Performance), processing of Group Policies, Group Policy preferences, helps to reduce network load and domain load, WMI and more.

Information on the hotfix is here – (http://support.microsoft.com/kb/2775511/en-us)

Where do you get the hotfix?  The hotfix can be downloaded here.  You MUST use Internet Explorer to apply the hotfix.  The hotfix from the Windows Update Catalog requires you to install components to download the files of your choice.

Microsoft Update Catalog

 

Install

 

Available updates

 

Progress

 

After downloading the update, you will need to double click the installation file and after the hotfix is applied, you must restart your computer.

How reliable is your Windows 7 computer?

You can use these command line tools to take a quick short-cut to your reliability monitor and other performance tools.

perfmon /rel  

Lets you review your computer’s reliability and problem history.

perfmon /report

Collects performance data for 60 seconds and then generates and displays a system diagnostics report.

My laptop shows the network card (LAN) as being disabled.  (Thus showing a fail – I use wireless)  This report gives stats across your OS and hardware.

perfmon /res  This opens your resource monitor and allows you to see comprehensive data about your system.

Security Onion- IDS, NSM, and log management

What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network?  And what if you want an easy setup that provides you with information that will help you – something with a GUI interface?   Security Onion can provide you with the defacto IDS system – Snort, Squert and a ton of other tools to help you.  While there are options, Security Onion offers the choice of Snort (http://snort.org/) or Suricata (http://suricata-ids.org/).

The setup below shows a test system using VMWare with 2 processors and 2 Gb of RAM if you want to try it out.   While the bare minimum is suggested to be 3 Gb, a production environment should have 8- 128 Gb of RAM, a ton of hard drive space for logs and two network cards.  One network card for management and one to sniff.

Security Onion’s ISO can be downloaded from SourceForge.   While there is a ton of how-tos on the internet about Security Onion, there is a great deal of information on there blog located here.

Here’s a simple setup I did at home to try out Security Onion.  Using VMware’s Player (non-commercial use).  If you plan on trying Security Onion or deploying it in a production environment, you should use the commercial version or have a system that supports the minimum requirements.

menuinstallliveLive Runninginstalling rullinstalling driveinstalling drive erase  Installing files after time keyboard finished

 

Once you restart, you’ll need to run setup again to enter an email address for squert and setup a password. Once this is done, you can open the shortcuts on the desktop or use your host computer to login. Once this is complete, login to Snorby’s url.

While snort is running, Snorby will present a dashboard.  You may be surprised to see no threats once you login.  You can expedite this process by running NMap (Zenmap against the virtual machine) if you want to see threats.

What is Snorby? “ Snorby is a web application interface to view, search and classify Snort and Suricata alerts and generate various types of reports, such as most active IDS signatures, most active sensors, and top source and destination IP addresses.”  more information.
2 snorby

Once you run NMap, click on More Options in the right corner and update the Cache

2a cache update

Give Security Onion just a few seconds and refresh the screen.  You’ll see the events logged.  This will visually show you not only how  many threats were ‘ seen’ on the network but will categorize and graph them.

3 snorby 3 severity

Clicking on the events will show each event and give you the option to categorize unknown threats or to reclassify threats.
4 nmap to test

Logging in to Squert allows you to see threats along with maps and information from threats.

5 squert

Squert map

ELSA – allows you to query and look for information.

6 Elsa

What does NMap show when Security Onion is scanned?

7 is it logging

 

 

 

Introduction to Security Onion

Security Onion Blog

 

Microsoft Surface Pro-ready for manufacturing, business and industry

The Microsoft Surface Pro has proven to be versatile in the workplace.  Mr. Arnold our Industrial Maintenance instructor uses the Microsoft Surface Pro to connect to nearly a hundred PLCs, motors, robots and other industrial components.

So why is this tablet perfect for business and industries?

100_3087

External DVD Attached through USB port

100_3088

USB EasyLINK to transfer files from one computer to another

100_3091

The Windows below shows the USB EasyLINK software (loaded on the USB device)

100_3090100_3093

100_3094

Many industrial components require a floppy disk drive – (Above and Below)

100_3092

What if you need to expand your USB with a USB hub or two?

100_3095

100_3097100_3096

IT personnel can attach a Wireless Spectrum Analyzer or multiple wireless cards for site surveys or other wireless needs.

100_3099

 

100_3103100_3101   100_3100100_3102

Four Wi-Fi Nic cards shown above

100_3104

Multitasking (above)

100_3105

Joining a domain (above)

100_3106

100_3107

Connect an external drive, card reader or multiple USB drives at the same time.

Use all of your Windows based software…now why was the Surface a bad idea?  It’s not…

Installing Linux Lite – A mini review

Home users that ONLY check email and use very few other programs may consider replacing their OS.   Linux has made an exceptional gain over the past several years with a Programs (Add/Remove) component and with hardware drivers.

To see just how Linux Lite stacked up other OSs, I decided to load it in Oracle’s VirtualBox.  The little over 600+mb download is comparable in size to Windows XP.  The ISO can be burned with an image burner to make a bootable CD/DVD.  Before you decide to switch, remember there are limitations to Windows software even with Wine.  Wine is a software application that allows you to run Windows programs.  Hunting around the internet you’ll find hundreds of Linux programs comparable to Windows programs.  You don’t have to look far considering the Linux repository has hundreds of programs.

After loading Oracle’s VirtualBox, simply walk through the New OS wizard, select Linux, allocate 2 GB of RAM and 8 GB of HDD space if you can.  Once you have completed this step, click on Settings and select bridge on the Network Card and load the ISO under storage.

Once you complete that step, start the OS and follow the on screen prompts.

1

(Above) – initial load screen.

2

Loading the OS into RAM

3

Load time of around two minutes for the initial screen to appear.

4

Select your language.

5

The above screen is checks to insure hardware and internet connectivity is ok.

6

Erase the hard drive.

7

Below – set your location for the time.

8

Select the keyboard layout.

9

Setup an initial user and password.

10

Copying files

11

After the installation, Restart your computer (VirtualBox)

12

Booting up from the hard disk drive.

13

Login and options.

14

The initial desktop is clean.  Don’t let this fool you.  The amount of programs and options for an internet user is excellent.

15

 

17 updates

 

Checking for updates is easy.  Simply click on the menu and select update.  Provide your login password and Linux Lite does the rest.

Printer setup

If you have a printer that supports IPP Protocol, login to the printer’s web address and Enable IPP.   The printer in our home is the Samsung SCX-3400 wireless.  An inexpensive laser printer that provides for thousands of pages with Samsung’s toner cartridge.  The printer provides hundreds of options for Windows, Apple, Linus or mobile devices.

printer

 

What programs come with Linux Lite?  Hundreds of items.  Here’s the main categories.

  • Office
  • Games  (Such as steam and others)
  • Graphics  (Gimp and more)
  • Accessories
  • Internet (email and browsers)
  • Multimedia
  • System (dozens of tools)
  • Settings

accessories Games Graphics Internet Multimedia Office settings Sharing System

 

If you ONLY use the internet and want to look into an alternate operating system.  Linux Lite may be for you.  It is easy to use, install and offers hundreds of programs.