5/8/10

Start your own network

Start your tracker and root node with the edited configuration. Congratulations, your peer-to-peer stream is up.

http://www.freecast.org - FreeCast, a peer-to-peer broadcast solution


HOWTO setting up a home network

Networking Vista machines to other XP machines by Tramposch

Today I will show you how to network Vista computers with an XP computer.

A password is required for vista.

Keywords:
Network, MSHOME, WORKGROUP

Please visit http://Orange-clip.com

http://www.orange-clip.com
www.orange-clip.com

Windows Vista - Setup and Connect to Network with Simplicity

Windows Vista sreamlines the process of connecting to networks and enables you to connect to any type of network--local wireless networks, corporate networks through a virtual private network (VPN) or a remote access service (RAS), or dial-up-- all from the Network Center.


How to Setup a Wireless Connection

This tutorial walks you through the basics of setting up a wireless tutorial.

4/11/10

Computer Security 101

Video we used to show our security people at a place I used to work. Has John Walsh from America's Most Wanted in it.



How Do Hackers Find My Network?

Network Security and hackers & crackers 12-15 Dario Ortiz EN

Produced by: PC ExpertsUSA.com Directed By: Mr. Dario Ortiz Music: Music by Zearle Web: http://www.zearle.com/ subpages/albums /class_war.htm Date of recorded: 17-9-2007 address: PO BOX 20975, San Juan, PR 00910 PO Box 5008, Passaic Park, 07055 NJ email: DarioPCX@HotMail.com
Credentials: ITS, Consultants & Security Specialist, With 20 years Of experience in the area of technology, bachelor's degree In computer science and courses of digital electronics, programming, repair of micro computer, Communication, certifications of manufacturing of the industry like Microsoft, Novell, Linux, Unix, Mac OS ,Comp Tia and many more , specialist in wiring structured, certifications in programming in machine language, courses of draftsman with Auto CAD, courses of designer of pages and many services Web related and many certifications all related to the industry...
Objective: educate the consumer and the corporations on the problems of security in the area of computing covering many topics from the information in the intranets to the information on the extranets.
Providing this material in a simple language and a easy to understand chronology .




For more information or support contact me at 1(787)727-6026 I appreciate the time taken to listen to this video I also hope this information is helpful for the community so they could help me to get the message of all the problems that not securing of information is causing too many people and corporations.
As it is obvious that the production of these videos and the taking of this message out they're so that people could understand the problems that lays in front of us requires a lot of effort and resources if you understand that we are going the right direction you can send any donations to the address shown below you donation will be much appreciated.
Any donations of $5.00 or more will be appreciated to this address.
PO Box 20975, San Juan, PR 00910 or PO Box 5008, Passaic Park, NJ 07055
To order this video in DVD just send a check or money order to the address shown below for the amount of $ 19.99 PO BOX 20975, San Juan, PR 00910.
PO BOX 20975, San Juan, PR 00910 PO Box 5008, Passaic Park, 07055 NJ email: DarioPCX@HotMail.com Additional shipping costs for international shipping.
Thank you for your sponsorship and that God bless you and that God bless the United States of America.


End-to-End Network Security: Defense-in-Depth -Part 1

Network Security expert, Omar Santos presents material from his latest book, End-to-End Network Security: Defense-in-Depth --Best practices for assessing and improving network defenses and responding to security incidents.

Get the book:http://www.informit.com/store/product.aspx?isbn=1587053322

Get all OnNetworking Vidcasts FREE:http://www.informit.com/podcasts/channel.aspx?c=efe8cc1f-a28a-4c9d-b6a7-961ed8948f75

www.InformIT.com/podcasts

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.


Subnetting in 6 easy steps - part 2

Subnetting in 6 easy steps - part 1

How to do TCP/IP Subnetting in your head. Just remember 6 questions. -- Part 1



Network Security Module 1.1

This podcast will allow students to learn basic network vulnerabilities, weaknesses attacks and threats caused by malicious codes or software such as Virus, Worm, Trojans and backdoors. The modules in the podcast also explain the methods to protect the network against these types of attacks by implementing various types of security.


Cisco - Security

Video used for internal training at Cisco. The basics of Security. Shot a few years ago but still pretty relevant


4/5/10

My free WiFi wireless Internet setup

I explain how I use a wireless access point as a repeater so I can mount the antenna high in the house and repeat the signal throughout the house.

An access point has to be used because the 2.4GHz signal used for WiFi is heavily attenuated in cable runs at anything over just a few feet. So running a long cable from the high mounted antenna to computer would never work.


2.4 Ghz 19 db Antenna

Make a long range wi-fi repeater. Point directional antenna at target access point (SSID).
Antenna gain is 8 db and with short run to rf amp signal is boosted again. Dlink DAP 1160
allows selection of internet source with site survey. Repeated access point also is much
stronger signal.




WLAN 2,4GHZ Helix Antenna

WiFi Antenna Mod!

Turn a standard WiFi antenna into a super range extender antenna just like the ones sold in stores for $30 or more. Your cost? About 5 CENTS

D.I.Y cheap Wlan antenna

— how to make your own 16dbi WLAN antenna that is 6X more powerful than the standard.





1 watt Wi-Fi amplifier 802.11b/g extends range to 5 bars in entire complex

1 watt bidirectional amplifier for TX/RX (transmit/receive) effectively increases throughput and connection reliability. the chip that switches from RX to TX proves to be high quality and does not affect throughput!



Helix directional WiFi antenna by web7days Tested

I also completed and tested 10 dbi 19 elments omni wifi antenna on 1st June 2008.


29th May 2008 19:00(original fabrication date) Tested corrections are made and completed. The aluminium reflector is 15 cm in diameter, the PVC tube(corrected here from aluminium to PVC) is 2.5 cm in diameter and 60 cm in length. Wrap a single 2.5 mm solid copper wire at every 3.5 cm apart.

IT's WORKING prefect with my dish antenna that connected a router! ( http://uk.youtube.com/watch?v=Xze_efr... ) tested on 5 June 2008 12:35 with two different Wifi softwares.



My free WiFi wireless Internet setup

I explain how I use a wireless access point as a repeater so I can mount the antenna high in the house and repeat the signal throughout the house.

An access point has to be used because the 2.4GHz signal used for WiFi is heavily attenuated in cable runs at anything over just a few feet. So running a long cable from the high mounted antenna to computer would never work.


4/3/10

Hotspot Solution with PPPoE Server and Radius in 10 Mins

Hotspot Solution by Mikrotik RouterOS and RouterBoard
- Hotspot Server
- PPPoE Server
- Radius User Manager
All configulation in less than 10 Minute.


Mikrotik - blocking p2p traffic

Mikrotik - bandwidth test

bandwidth test from MT to MT and from PC to MT

MikroTik Show

Mikrotik LCD

Mikrotik Patch

802.11A Link Spans 22 + 17 Miles on 5.8GHz

Just a short view of the Hub Switch feeding a 5.8GHz 22miles shot through a MikroTik 432 Router, to another 17 mile shot for another wireless ISP WISP.


Mikrotik Wireless Scanning Bug

Both are running from my distributor on RB411 and R52 UPDATE: Not working in 4.5


PCbox mikrotik travelnetindo

mikrotik mode : on

2 mikrotik with 2 cable connection

Masang Mikrotik

Mikrotik wireless bridge

This is a full duplex wireless bridge -router using Mikrotik RB 333, 2x r52, 23 dbi wideband 5ghz panel antennas and ospf to simulate full duplex while maintaining redundancy.

3/28/10

Mikrotik - create pppoe server

create simple pppoe server


How to install RouterOS without CD or DVD

Small tutorial how to install Mikrotik RouterOS without burning install iso.



3/4/10

Be Aware of Your Surroundings

When using a public wireless access point, you should be aware of what’s going on around you.
Are others using their computers in close proximity to you? Can others view your screen? Are
you sitting near a window through which someone, using binoculars, could get a view of your
screen? If any of these conditions exist, your sensitive data might be at risk. Consider whether it

is essential to connect to the internet. If an internet connection is not essential, disable wireless
networking altogether. If you do need to connect, use caution and follow the steps noted above.

Disable File Sharing

File sharing in public wireless spaces is even more dangerous than it is on your home wireless
network. This is because you and your wireless-enabled laptop are likely to be even closer to
other wireless computers operated by people you don’t know. Also, many public wireless
networks feature peer-to-peer networking in which other computers will attempt to connect
directly to yours. To leave file shares open in this kind of environment is to invite risk. To
prevent attackers from gaining access to your sensitive files, you should disable file sharing
when connecting to a public wireless access point. Consult the help file for your operating
system to learn how to disable file sharing.

Connect Using a VPN

Many companies and organizations have a virtual private network (VPN). VPNs allow
employees to connect securely to their network when away from the office. VPNs encrypt
connections at the sending and receiving ends, and keep out traffic that is not properly encrypted.
If a VPN is available to you, make sure you log onto it any time you need to use a public
wireless access point.

Watch What You Do Online

Because you’re likely to have an unsecured, unencrypted network connection when you use a
public wireless access point, be careful about what you do online—there’s always the chance
that another user on the network could be monitoring your activity. If you can’t connect securely
using a VPN (see “Connect Using a VPN” below), then consider avoiding
• online banking
• online shopping
• sending email
• typing passwords or credit card numbers

Safe Wireless Networking in Public Spaces

Accessing the internet via a public wireless access point involves serious security threats you
should guard against. These threats are compounded by your inability to control the security
setup of the wireless network. What’s more, you’re often in range of numerous wireless-enabled
computers operated by people you don’t know. The following sections describe steps you can
take to protect yourself.

Unauthorized Computer Access

As is the case with unsecured home wireless networks, an unsecured public wireless network
combined with unsecured file sharing can spell disaster. Under these conditions, a malicious user
could access any directories and files you have allowed for sharing.
Shoulder Surfing
In public wireless areas, the bad guys don’t even need a computer to steal your sensitive
information. The fact that you may be conducting personal business in a public space is
opportunity enough for them. If close enough, they can simply glance over your shoulder as you
type. Or, they could be peering through binoculars from an apartment window across the street.
By simply watching you, they can steal all kinds of sensitive, personal information.

Peer-to-Peer Connections

Many laptop computers, particularly those equipped with 802.11-type WiFi wireless networking
cards, can create ad hoc networks if they are within range of one another. These networks enable
computer-to-computer connections, a situation that creates security concerns you should be
aware of. An attacker with a network card configured for ad hoc mode and using the same
settings as your computer may gain unauthorized access to your sensitive files. You should note
that many PCs ship from the manufacturer with wireless cards set to ad hoc mode by default.

Wireless Sniffing

Many public access points are not secured, and the traffic they carry is not encrypted. This can
put your sensitive communications or transactions at risk. Because your connection is being
transmitted “in the clear,” malicious users can use “sniffing” tools to obtain sensitive information
such as passwords, bank account numbers, and credit card numbers.

Evil Twin Attacks

In an evil twin attack, the attacker gathers information about a public access point, then sets up
his or her own system to impersonate the real access point. The attacker will use a broadcast
signal stronger than the one generated by the real access point. Unsuspecting users will connect
using the stronger, bogus signal. Because the victim is connecting to the internet through the
attacker’s system, it’s easy for the attacker to use specialized tools to read any data the victim
sends over the internet. This data may include credit card numbers, username and password
combinations, addresses, and other personal information.

Public Wireless Threats

A wireless-enabled laptop can make you more productive outside your office or home, but it can
also expose you to a number of security threats. The following sections describe some of the
security threats you face when using a public access point.

Check Your Internet Provider’s Wireless Security Options

Your internet service provider may provide information about securing your home wireless
network. Check the customer support area of your provider’s web site or contact your provider’s
customer support group.

Keep Your Access Point Software Patched and Up to Date

From time to time, the manufacturer of your wireless access point will release updates to the
device software or patches to repair bugs. Be sure to check the manufacturer’s web site regularly
for any updates or patches for your device’s software.

Use File Sharing with Caution

If you don’t need to share directories and files over your network, you should disable file sharing
on your computers. You may want to consider creating a dedicated directory for file sharing,
and move or copy files to that directory for sharing. In addition, you should password protect
anything you share, and use a password that is long, contains non-alphanumeric characters (such
as #, $, and &), and does not contain personal information (such as your birth date). Never open
an entire hard drive for file sharing.

Change Your Administrator Password

Your wireless access point device likely shipped with a default password. Default passwords for
various manufacturers are widely known and can be used to gain unauthorized access to your
network. Be sure to change your administrator password to one that is long, contains non-
alphanumeric characters (such as #, $, and &), and does not contain personal information (such
as your birth date). If your wireless access point does not have a default password, be sure to
create one and use it to protect your device.

Encrypt Your Network Traffic

Your wireless access point device should allow you to encrypt traffic passing between the device
and your computers. By encrypting wireless traffic, you are converting it to a code that can only
be understood by computers with the correct key to that code.

Rename Your Wireless Network

Many wireless access point devices come with a default name. This name is referred to as the
“service set identifier” (SSIS) or “extended service set identifier” (ESSID). The default names
used by various manufacturers are widely known and can be used to gain unauthorized access to
your network. When you rename your network, you should choose a name that won’t be easily
guessed by others.

Make Your Wireless Network Invisible

Wireless access points can announce their presence to wireless-enabled computers. This is
referred to as “identifier broadcasting.” In certain situations, identifier broadcasting is desirable.
For instance, an internet cafe would want its customers to easily find its access point, so it would
leave identifier broadcasting enabled.
However, you’re the only one who needs to know you have a wireless network in your home. To
make your network invisible to others, see your access point’s user manual for instructions on
disabling identifier broadcasting. (In Apple wireless networking, this is called “creating a closed
network.”)
While this kind of “security through obscurity” is never foolproof, it’s a starting point for
securing your wireless network.

Protecting Home Wireless

While the security problems associated with wireless networking are serious, there are steps you
can take to protect yourself. The following sections describe these steps.

Direct attack on your computer

Malicious users may be able to access files on your
computer, install spyware and other malicious programs, or take control of your
computer.
Wardriving
Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point
can make internet connections possible outside your home, even as far away as your street.
Savvy computer users know this, and some have made a hobby out of driving through cities and
neighborhoods with a wireless-equipped computer—sometimes with a powerful antenna—
searching for unsecured wireless networks. This practice is nicknamed “wardriving.” Wardrivers
often note the location of unsecured wireless networks and publish this information on web sites.
Malicious individuals wardrive to find a connection they can use to perpetrate illegal online
activity using your connection to mask their identities. They may also directly attack your
computer, as noted in the “Piggybacking” section above.
Unauthorized Computer Access
An unsecured wireless network combined with unsecured file sharing can spell disaster. Under
these conditions, a malicious user could access any directories and files you have allowed for
sharing.

Monitoring of your activity

Malicious users may be able to monitor your internet
activity and steal passwords and other sensitive information.

Abuse by malicious users

Users piggybacking on your internet connection might
engage in illegal activity that will be traced to you.

Bandwidth shortages

Users piggybacking on your internet connection might use up
your bandwidth and slow your connection.

Service violations

You may exceed the number of connections permitted by your
internet service provider.

Home Wireless Threats

By now, you should be aware of the need to secure traditional, wired internet connections.
If
*
you’re planning to move to a wireless connection in your home, take a moment to consider what
you’re doing: You’re connecting a device to your DSL or cable modem that broadcasts your
internet connection through the air over a radio signal to your computers. If traditional wired
connections are prey to security problems, think of the security problems that arise when you
open your internet connection to the airwaves. The following sections describe some of the
threats to home wireless networks.
Piggybacking
If you fail to secure your wireless network, anyone with a wireless-enabled computer within
range of your wireless access point can hop a free ride on the internet over your wireless
connection. The typical indoor broadcast range of an access point is 150 – 300 feet. Outdoors,
this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you
live in an apartment or condominium, failure to secure your wireless network could potentially
open your internet connection to a surprising number of users. Doing so invites a number of
problems:

Update your computer’s network adapter drivers

Just as a router has firmware upgrades, the network adapter in your computer have driver updates. You can find driver updates at the adapter manufacturer’s website or at Windows Update web site.

If the signal strength doesn’t improve, you could try replacing your wireless router and network cards. You may have an old router which is based on the older 802.11b networking standard. 802.11g is the newer standard. 802.11g devices are several times faster that 802.11b devices. (802.11b devices operate an 11Mbps while 802.11g devices operate at 54 Mbps.)

802.11g devices are also backward compatible with 802.11b devices. In other words, if you buy a new 802.11g router, it will still work with the 802.11b network adapters in your computers. Still, if you upgrade your router to 802.11g, for best results you should consider upgrading network adapters in your computer to 802.11g as well.

If you decide to do so, consider buying extended-performance 802.11g devices which operate at twice the speed–108Mbps. But keep in mind that if you buy extended performance devices, you must buy all of them from a single manufacturer. Most manufacturers such as Netgear, Linksys, and D-Link make extended-performance 802.11g devices but they are not necessarily interoperable with devices from other manufacturers.

And if none of these solutions work, forget about wireless and go back to good old wired networking!

Update the network adapter on your computer

If you have a desktop computer with an internal network card, try using a USB network adapter instead. These adapters usually have an antenna of their own to better capture signals. Laptops with on-board network adapters are usually fine; you don’t need to replace them. But if you use a card adapter with your laptop, try getting one with an external antenna.

Try changing your router’s broadcast channel

Most cordless telephones have a little button on the handsets which you can press to change the channel if there is noise on the line. Like cordless telephones, routers broadcast on many channels too. You may be experiencing weak or noisy signals simply because your router broadcasts on a channel that doesn’t work well at your location. Try changing the channel. You will find an option to change the channel in your router’s administration interface.

If fixes at the router end of your network don’t work very well, you can try fixes at the other end — your computer.

Upgrade your router’s firmware

Log in to your router’s administration interface. You will usually find an option to upgrade its firmware. Most people install routers and forget about them. You may be surprised to find that your router has several firmware upgrades that you haven’t applied.

Install a repeater

A repeater is a device for boosting wireless signals across greater distances. If your router’s signal is weak in a certain location in the building, you can place a repeater half way between the router and the location to boost the signal strength.

Get a high-gain antenna for your wireless router

If you can’t more the router, you can try replacing your router’s antenna with a high-gain antenna. You can’t replace antennas on all routers, but you can do so on many newer models.

Antennas on most routers have 360 degree coverage. If your router is located in one cornet of the building, a good part of its coverage area will lie outside the building. In such cases, you can get unidirectional high-gain antennas which transmit signals in 180 or even 90 degrees. Again, you must have router which allows you to replace its antennas.

Move wireless router away from other wireless equipment

Most wireless networks operate at 2.4MHz, the same frequency as older cordless telephones and other wireless gadgets. Signals from these gadgets may interfere with your router’s signals. You can try moving you router away from such equipment (or the equipment away from the router if you can’t move the router).

Another possible solution may be to upgrade your phones to newer ones which operate at 5.8MHz.

Move wireless router to a better location

The biggest culprit for weak signals is the location of routers. Many routers are installed at less than ideal locations – under tables, in closets, in corners on the floor, and basements to name just a few. Many are installed near the outer wall of a building. This results in weak signals on the other end of the building.

It is often difficult to move a router too far away once it is installed. But it may be possible to move it by a couple of feet. Try moving it off the floor and away from the walls. If it is inside a closet, you may be able to get it out simply by drilling a hole in the wall for the cable.

3/2/10

Bullet2 RedBoot

EnGenius 600mW eor7550 dual radio 802.11n outdoor access point / client bridge / repeater

NODALIS.ES Nodo Engenius Senao EOC 1650

Senao EnGenius 1650

EnGenius esr-9710 eub-9701 ext2 802.11n hdtv streaming

Engenius Promo video

EnGenius esr-9710 eub-9701 ext2 802.11n hdtv streaming

EnGenius EUB-362 EXT long range WiFi adapter

EnGenius 600mW ECB-8610S WiFi AP / Bridge / REPEATER

free wifi internet with a router

My free WiFi wireless Internet setup

Wifi Repeaters 101

Pigtail Antenna wireless

Extending wireless network range with a repeater HP and Netgear

My Wireless Repeater Bridge Setup

D-Link wireless ethernet bridge

D-Link DAP-1522 Xtreme N Duo Wireless Bridge/Access Point

Linksys Wireless G Router Quick Setup

Linksys WAP54G Firmware Upgrade

Setting Up Your Linksys WAP54G Access Point

Wireless Access Point Setup

Install and Secure a Wireless Access Point (WAP)

Install and Secure a Wireless Access Point

Secure my wireless router with WPA

Fast D-Link Wireless Router Security Setup

New Deal at Techaday - TP-Link ADSL2

A quick unboxing of a new wifi router

TP LINK Load balancer and Wifi AP

How to change your IP address on Windows Vista

Change your MAC address without a program in Windows

NETGEAR RangeMax Dual band Wireless-N Router

NETGEAR showcased its three new wireless-N Products

Linksys introduced its new Wireless N Ultra RangePlus

Linksys WRT610N Wireless Router

How To Configure Router and WiFi Router Basics

Free WiFi from Starbucks or AT&T Hotspots

Unsecured Home Network Attacks

Hacking Wireless Hotspots

How to bypass Mikrotik Hotspot Login Page

Mikrotik PPPOE Server Setup

Mikrotik Netinstall

Mountian WiFi repeater , Ireland

ENLACE 28KM RB 411, XR5 , PACIFIC WIRELESS 29DBI.

mikrotik + xr5

Mikrotik - RB433 CNC milled outdoor box.

2/15/10

another method

made your cheep booster anntena

its another style about making a cheep booster anntena

made your cheep booster

made abooster very cheep with linksys access