Core Networking

Core Networking

Speed UP Your PC in 3 Easy Steps

READ MORE - Speed UP Your PC in 3 Easy Steps

How to Network 2 Computers Without a Hub or Router

READ MORE - How to Network 2 Computers Without a Hub or Router

Sysinternals File and Disk Utilities

Sysinternals File and Disk Utilities are as follow:

  1. AccessChk

    This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.

  2. AccessEnum

    This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

  3. CacheSet

    CacheSet is a program that allows you to control the Cache Manager's working set size using functions provided by NT. It's compatible with all versions of NT.

  4. Contig

    Wish you could quickly defragment your frequently used files? Use Contig to optimize individual files, or to create new files that are contiguous.

  5. DiskExt

    Display volume disk-mappings.

  6. DiskMon

    This utility captures all hard disk activity or acts like a software disk activity light in your system tray.

  7. DiskView

    Graphical disk sector utility.

  8. Disk Usage (DU)

    View disk usage by directory.

  9. EFSDump

    View information for encrypted files.

  10. FileMon

    This monitoring tool lets you see all file system activity in real-time.

  11. Junction

    Create Win2K NTFS symbolic links.

  12. LDMDump

    Dump the contents of the Logical Disk Manager"s on-disk database, which describes the partitioning of Windows 2000 Dynamic disks.

  13. MoveFile

    Schedule file rename and delete commands for the next reboot. This can be useful for cleaning stubborn or in-use malware files.

  14. NTFSInfo

    Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files.

  15. PageDefrag

    Defragment your paging files and Registry hives!

  16. PendMoves

    See what files are scheduled for delete or rename the next time the system boots.

  17. Process Monitor

    Monitor file system, Registry, process, thread and DLL activity in real-time.

  18. PsFile

    See what files are opened remotely.

  19. PsTools

    The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

  20. SDelete

    Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

  21. ShareEnum

    Scan file shares on your network and view their security settings to close security holes.

  22. Sigcheck

    Dump file version information and verify that images on your system are digitally signed.

  23. Streams

    Reveal NTFS alternate streams.

  24. Sync

    Flush cached data to disk.

  25. VolumeID

    Set Volume ID of FAT or NTFS drives.

READ MORE - Sysinternals File and Disk Utilities

Sysinternals Security Utilities

Sysinternals Security Utilities are as follow:

AccessChk
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.

AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

Autologon
Bypass password screen during logon.

Autoruns
See what programs are configured to startup automatically when your system boots and you login. Autoruns also shows you the full list of Registry and file locations where applications can configure auto-start settings.

LogonSessions
List active logon sessions

NewSID
Learn about the computer SID problem everybody has been talking about and get a free computer SID changer, NewSID.

Process Explorer
Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility will even show you who owns each process.

PsExec
Execute processes with limited-user rights.

PsLoggedOn
Show users logged on to a system.

PsLogList
Dump event log records.

PsTools
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

RootkitRevealer
Scan your system for rootkit-based malware

SDelete
Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

ShareEnum
Scan file shares on your network and view their security settings to close security holes.

ShellRunas
Launch programs as a different user via a convenient shell context-menu entry.

Sigcheck
Dump file version information and verify that images on your system are digitally signed.

READ MORE - Sysinternals Security Utilities

Sysinternals Networking Utilities

Sysinternals Networking Utilities are as follow:

AD Explorer
Active Directory Explorer is an advanced Active Directory (AD) viewer and editor.

AD Insight
AD Insight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications.

AdRestore
Undelete Server 2003 Active Directory objects.

PsFile
See what files are opened remotely.

PsTools
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

ShareEnum
Scan file shares on your network and view their security settings to close security holes.

TCPView
Active socket command-line viewer.

Whois
See who owns an Internet address.
READ MORE - Sysinternals Networking Utilities

How to troubleshoot wireless network connections in Windows XP Service Pack 2

Troubleshooting for wireless networking with Windows XP requires gathering information, checking the drivers, verifying compatible hardware, and configuring wireless settings. Before you begin troubleshooting, make sure that you have answered the following questions:
  • What is the symptom? If it is an error message, note the full error message.
  • What wireless card is used? Note the manufacturer and the model number.
  • What is the driver version for the card? Look in Device Manager or click Configure in the Properties dialog box of the wireless connection.
  • What access point is in use? Note the manufacturer and the model number.
  • Are the wireless settings configured by using Windows or by using a third-party program? If a third-party program is used, what is the program and its version number?
  • Is the Wireless Zero Configuration service running? To determine if the Wireless Zero Configuration service is running, follow these steps:
    1. Click Start, and then click Run.
    2. Open box, type cmd, and then click OK.
    3. Type sc query wzcsvc, and then press ENTER
    4. If the Windows Zero Configuration service is running, the words "STATE : # RUNNING" will appear.
    5. If the problem is in the user interface, collect a screen shot of the issue, if you can. To collect a screen shot, press ALT+PRINT SCRN.
READ MORE - How to troubleshoot wireless network connections in Windows XP Service Pack 2

How to Use a Wireless Network Connection with a Windows XP Portable Computer at Home and Work

As there are several versions of Microsoft Windows, the following steps may be different on your computer. If they are, see your product documentation to complete these steps.
  1. Click Start, point to Connect To, click Show all connections, and then double-click your wireless network adapter.
  2. On the General tab, click Properties.
  3. Click the Wireless Networks tab, click your home network under Preferred Networks, and then click Properties.
  4. Click Data encryption (WEP enabled).
  5. Click the Association tab, and then make sure that the following are not selected:
    • Network Authentication (Shared mode)
    • The key is provided for me automatically
  6. Click the Authentication tab, and then make sure that the following is not selected:
    • Enable IEEE 802.1x authentication for this network
    Note Windows XP SP1 changed the process for authentication with 802.1x-enabled networks. If the 802.1x authentication does not complete properly, the connection is dropped. Because the MN-500 does not support 802.1x authentication, do not select this type of authentication.
  7. Type either a 64-bit or 128-bit network key by using 10 or 26 hexadecimal digits (0-9,A-F), respectively.

    Note Do not use a friendly alphanumeric name.
  8. Write down the wired equivalent privacy (WEP) key that you typed, and then type that same value in the Base Station Wireless Security HTML screen.
For specific information about the settings for the wireless network at your workplace, contact your system administrator.
READ MORE - How to Use a Wireless Network Connection with a Windows XP Portable Computer at Home and Work

Subscribe Core Networking