Speed up your network by disabling the HomeGroup

While we’ve discussed speeding up SQL connections by disabling LLMNR, there’s another way to speed up your network.

If you are not using the HomeGroup feature, a quick way to speed up your network is to disable the services for HomeGroup.  You can either disable both by using Services.msc or go to a command prompt as an administrator and type the following-

sc config HomeGroupProvider start= disabled
sc stop HomeGroupProvider
sc config HomeGroupListener start= disabled
sc stop HomeGroupListener
pause

Results 

29.6% Increase in Writing
14.6% Increase in Reading

Results with Updated Drivers

46.6% Increase in Writing
54.2% Increase in Reading

Food for thought:

  • Network speed IS DEPENDENT on hard drive speeds
  • Network card optimization (drivers/offloading/type)
  • Bus Speeds
  • Memory Speeds
  • Access Point/Router
  • Other

Before

Before

After disabling services (above)

after

Updated Drivers

With Driver

Posted in Computer hardware, computer troubleshooting, Computers, help desk, Home Networking, Information Technology, Microsoft, Microsoft Windows, Microsoft Windows 10, network, Networking, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Wireless | Tagged , , | Leave a comment

Bookmark4Techs link updated

Need access to one of the largest listings of technical bookmarks? Go over and visit –

bookmarks4techs_blogger2

https://whatsonmypc.blog/bookmarks4techs/

Posted in Computer Security, computer troubleshooting, Computers, Hardware, Home Networking, Industry, Information Technology, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Technology, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Security | Leave a comment

Windows error code (0xc1900200) – Creators Edition

Recently I was updating our home laptops and experienced Windows error code 0xc1900200.  Apparently the System Reserve partition is not large enough or is ‘too full’ to install the update.   Over at What’s On My PC, Rick experienced the same thing I was experiencing and we both ironically had to install MiniTools Partition Wizard Free in order to install the update by resizing this partition.

Rick’s apparently worked flawlessly as did three of our four installs at home.  However with one Acer laptop that I had upgraded to a SSD drive, the 100mb System Reserve Partition was at the front of my drive in Disk Management and my computer crashed after resizing the partition.

Instead of panicking, I inserted a Windows 10 CD that I had made and did a Startup Recovery (Click Repair once it starts up).  Once I did this, I still had issues – My desktop permissions were not correct.  How did I ultimately fix it?   I set the permissions by navigating to C: drive, users, and found the desktop folder.   The easy fix?   Right click the desktop folder, click the security tab, Advanced and set the permissions.

Note:  Because of the nature of resizing partitions and updating, it is recommended that you backup all of your data and programs.

Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips | Tagged , , , | 1 Comment

Cyber Summit – Memphis, TN June 2017

Cyber Logo

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions to address today’s challenges in cyber security.

The program will include presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector cyber security partners. They will address business and industry intrusions, incident handling and response, identifying vulnerabilities, understanding threats, and designing strategies for security. It will be of particular interest for local and state governments, health care, education, transportation, financial institutions, utilities, business, and industry professionals.

This exciting, highly informative conference will be held at the Memphis Cook Convention Center in Memphis, Tennessee, on Tuesday, June 6th and Wednesday, 7th, 2017!  Regular Admission is FREE. Space is limited and available on a first come-first served basis.

Link

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

Speed up Disk Cleanup loading in Windows

Want to speed up disk cleanup so that it loads quicker?

  • Right Click your C: drive
  • Select properties
  • Hold down the Shift + the Ctrl key
  • Click on Disk Cleanup

Disk Cleanup

Posted in computer troubleshooting, Computers, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1 | Tagged , , , | Leave a comment

2017 Cyber Security Conference – Memphis, TN – June 2017

cyber

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions to address today’s challenges in cyber security.

The program will include presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector cyber security partners. They will address business and industry intrusions, incident handling and response, identifying vulnerabilities, understanding threats, and designing strategies for security. It will be of particular interest for local and state governments, health care, education, transportation, financial institutions, utilities, business, and industry professionals.

This exciting, highly informative conference will be held at the Memphis Cook Convention Center in Memphis, Tennessee, on Tuesday, June 6th and Wednesday, 7th, 2017!  Regular Admission is FREE. Space is limited and available on a first come-first served basis.

TCAT Shelbyville will be partnering with TCAT Memphis with live hands on demonstrations.

Registration

Posted in Computer Security, Education, Hacking, higher ed, higher education, Information Technology, internet security;, Technology, Windows Security | Tagged , , , , | Leave a comment

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password – Educational Purpose

Educational Purpose-

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

Source: Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

https://www.youtube.com/watch?v=oPk5off3yUg

Posted in Technology | Leave a comment

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links.

  1. Kali Linux – https://www.kali.org/downloads/
  2. Backbox – http://www.backbox.org/downloads
  3. Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download
  4. Parrot Sec – http://www.parrotsec.org/download/
  5. Deft – http://www.deftlinux.net/download/
  6. Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d
  7. Samurai – http://sourceforge.net/projects/samurai/files/
  8. Network Security Toolkit – http://sourceforge.net/projects/nst/
  9. PenToo – http://www.pentoo.ch/download/
  10. Knoppix (Security Testing Distribution) – http://s-t-d.org/download.html
  11. Weakerth4n – https://goo.gl/UJFfak
Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment

Jumbo Frames

TCAT Shelbyville - Technical Blog

In a gigabit network, you should enable jumbo frames and tweak the jumbo frame settings on your nic so that large files can transfer at greater speeds.  In a packet of data, the header will remain the same but the payload size will increase.  You should do this if you have gigabit switches and gigabit cards in place.  Normally network cards will allow for tweaks of the Jumbo frame by several MTUs.   With gigabit switches in place, the receiving switches may be 10/100 and the computer on the other end will not see a great benefit from this.  However if you have cards in computers that are connected to a switch (1000 mbps/1 Gbps)  and a NAS that supports Jumbo frames, the data transfer from these computers (normally a Server) will benefit from this tweak.

Ideally you would want your entire network on gigabit.   In today’s economy,  many if not most…

View original post 44 more words

Posted in Technology | Leave a comment

Don’t daisy chain switches

TCAT Shelbyville - Technical Blog

When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry.  Replace any hubs on your network as soon as you can.

With a hub, collisions can be >20% and utilization can stand at >50%.   By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room.  Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.

Daisy Chaining Switches -what not to do

Real world scenarios may require you to temporarily daisy chain switches.  If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)

Daisy chaining

One of many solutions is to run independent lines…

View original post 102 more words

Posted in Technology | Leave a comment

Cannot access computer by NetBios name after replacing NIC card

TCAT Shelbyville - Technical Blog

If you have ever replaced a network card on a server or computer and you can no longer access the computer, you should flush any cache on the workstation that is accessing the server.

Insure no other users are logged in –

Open a Command Prompt as an Administrator (Type CMD in the search box)

ipconfig /flushdns

ipconfig /registerdns

nbtstat –s

nbtstat -r

nbtstat –c

nbtstat –R

nbtstat -RR

nbtstat –n

nbtstat -a xxx.xxx.xxx.xxx      (replace the x’s with the IP address of the computer you are accessing – the computer with the new NIC card)

Also insure the NetBIOS over TCP/IP radio button is selected. (See Below)

To enable NetBIOS over TCP/IP on Windows 7 or Server 2008 R2:

  1. Click Start, and then click Network. (click Start, type ncpa.cpl into the search box for Windows 7 or Vista, hit ENTER).
  2. Click on the Network and Sharing…

View original post 45 more words

Posted in Technology | Leave a comment

What is port 5800 on TightVNC?

If you would like to use TightVNC in a browser on a computer without TightVNC viewer, you can use the http://  + the web address and the port number 5800 (which you can easily change).  Example: http://192.168.1.7:5800

On the computer you are working on, go to the control panel, Java, add the web address to the security tab.  Next, enter the web address with :5800.  Wait.  you will recieve a warning, click Run, enter your password and manage the computer from your browser.

Always make sure TightVNC and Java are up-to-date.

1

2

3

wordp

 

Posted in Technology | 1 Comment

World Route by Softperfect

Here’s a visual aid to tracert currently free at Softperfect.  You can use this to see where internet delays are happening with a website.  This tool comes in portable and with an installer.

https://www.softperfect.com/products/worldroute/

Capture

Posted in computer troubleshooting, Free Software, freeware, Information Technology, Microsoft Windows, Microsoft Windows 10, network, Networking, Technology, Windows 10, Windows 7, Windows 8, Windows 8.1 | Tagged , , , | 1 Comment

9 Popular Password Manager Apps Found Leaking Your Secrets

Source: 9 Popular Password Manager Apps Found Leaking Your Secrets

Posted in Computer Security, Free Software, help desk, higher ed, higher education, Information Technology, internet security;, Software, Windows Security | Tagged , , , , | 1 Comment

Need to know the default services for Windows?

Need to know the default services for Windows?  – Service defaults is an excellent site to make sure your services are set to their defaults.

service

Posted in Technology | Leave a comment

Malware Removal Tool

While running CCleaner or Bleachbit can get rid of many temp files that will make your computer run smooth.   These two products also remove malware/adware that may be in your temp files.

So how do you get rid of malware or adware?  One of the best ways is to run ADWCleaner, JRT and programs like Adware Removal Tool, a tool often overlooked.   These programs should be on your flash drive so that you can clean computers.

Adware Removal Tool – Link

adware-removal-tool

 

Posted in Technology | Leave a comment

All In One FREE Data Recovery Suite

What's On My PC

Recently I featured an article, titled A Successful Data Recovery Story Using Some Desperation Moves where the hero of the day was a software application called MiniTool Power Data Recovery.

MiniTool Power Data Recovery

I realize there are numerous undelete recovery apps out there, but for some reason I always go to this app to get the job done. I have found it seems to dig a little deeper than most when recovering deleted data.

In addition, MiniTool Power Data Recovery is a “data recovery suite” which means it does more than the standard apps that are available.

For example, MiniTool Power Data Recovery has the ability to:

Recover formatted disks or partitions
Recover damaged partitions
Recover lost partitions
Recover CD & DVD disks
Recover Photos & Flash Memory cards

Home users can use MiniTool Power Data Recovery software to recover their lost data in any condition for…

View original post 48 more words

Posted in Technology | Leave a comment

MiniTool Mobile Recovery for Android Free

What's On My PC

There has been quite a few occasions where I had to drill down, using data recovery software, to find deleted files for people. I can’t say I have had to do this on an Android device yet; however, if the occasion does arise, MiniTool Mobile Recovery may be the software option I will be using. This free Android data recovery tool provides 2 recovery modules (recover from phone and recover from SD-Card) to restore Android data regardless of the reasons for data loss. The recovery process requires connecting to the Android device via your computer.

minitool-data-recovery

MiniTool Mobile Recovery for Android Free is the best Android data recovery software which can effectively recover data from Android Phones and Tablets.

Source: MiniTool Mobile Recovery for Android Free | Best Free Android Data Recovery Software for Android Phones and Tablets

View original post

Posted in Technology | Leave a comment

Your Wireless Printer may be giving away your documents

When installing any device such as home routers and printers, you should always password protect these devices.  During our studies in Network Security in the past, we studied perimeter security and how it was at the firewall.  Today because of wireless, perimeters are extended well beyond most property lines.

What does that mean?  Someone can drive by and gain access or go across the internet if a public ip address is given to the printer.  With simple Google searches anyone can find these printers.  No, we aren’t going to give you the answer on how to Google these unsecure printers but you do need to secure your printer(s) if they are unsecure.  (During the setup, set a login other than the default for any device you put on your network).   There is code on the web to gain access to your network and computers through some of the printers.   Script Kiddies and hackers that can get access can connect to the printer and print hundreds of test pages or change settings just to be malicious.

Note: Mobile computing also extends your perimeters globally…security is one of the most important areas that all IT personnel and employees need to be trained in.

Posted in Computers | Tagged , , , , , | Leave a comment

One in four wireless networks are still unsecure

Annually our class studies wireless technology and its implementation into homes and industry.   Surveys are conducted to analyze security used, transmit power and geographic location of wireless technology.

According to Wigle.net, Security has improved over past years.  Home users are still setting up their wireless wrong by not providing a WPA2 (AES) form of encryption.

Approximately 23% of home users still have open internet that neighbors or anyone passing by can use.    Vendors have tried to make setting up wireless easy and secure by providing WPS and/or a setup utility disk that walks the user through step by step.  Once you have secure wireless, you should change the password periodically to prevent users from learning what your passphrase is.

Wigle provides a map of wireless throughout the globe.  As users find wireless, they upload their data to Wigle and the database is free to the public.

With GPS technology today, anyone including malicious wardrivers can map out coordinates of unsecured wifi.  Make sure you secure your wifi.

Note:  During a survey we do not use packet analyzers or methods to see data on the wireless networks. 

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Internet, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment