Core Networking

Core Networking

Sysinternals File and Disk Utilities

Sysinternals File and Disk Utilities are as follow:

  1. AccessChk

    This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.

  2. AccessEnum

    This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

  3. CacheSet

    CacheSet is a program that allows you to control the Cache Manager's working set size using functions provided by NT. It's compatible with all versions of NT.

  4. Contig

    Wish you could quickly defragment your frequently used files? Use Contig to optimize individual files, or to create new files that are contiguous.

  5. DiskExt

    Display volume disk-mappings.

  6. DiskMon

    This utility captures all hard disk activity or acts like a software disk activity light in your system tray.

  7. DiskView

    Graphical disk sector utility.

  8. Disk Usage (DU)

    View disk usage by directory.

  9. EFSDump

    View information for encrypted files.

  10. FileMon

    This monitoring tool lets you see all file system activity in real-time.

  11. Junction

    Create Win2K NTFS symbolic links.

  12. LDMDump

    Dump the contents of the Logical Disk Manager"s on-disk database, which describes the partitioning of Windows 2000 Dynamic disks.

  13. MoveFile

    Schedule file rename and delete commands for the next reboot. This can be useful for cleaning stubborn or in-use malware files.

  14. NTFSInfo

    Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files.

  15. PageDefrag

    Defragment your paging files and Registry hives!

  16. PendMoves

    See what files are scheduled for delete or rename the next time the system boots.

  17. Process Monitor

    Monitor file system, Registry, process, thread and DLL activity in real-time.

  18. PsFile

    See what files are opened remotely.

  19. PsTools

    The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

  20. SDelete

    Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

  21. ShareEnum

    Scan file shares on your network and view their security settings to close security holes.

  22. Sigcheck

    Dump file version information and verify that images on your system are digitally signed.

  23. Streams

    Reveal NTFS alternate streams.

  24. Sync

    Flush cached data to disk.

  25. VolumeID

    Set Volume ID of FAT or NTFS drives.

READ MORE - Sysinternals File and Disk Utilities

Sysinternals Security Utilities

Sysinternals Security Utilities are as follow:

AccessChk
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.

AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

Autologon
Bypass password screen during logon.

Autoruns
See what programs are configured to startup automatically when your system boots and you login. Autoruns also shows you the full list of Registry and file locations where applications can configure auto-start settings.

LogonSessions
List active logon sessions

NewSID
Learn about the computer SID problem everybody has been talking about and get a free computer SID changer, NewSID.

Process Explorer
Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility will even show you who owns each process.

PsExec
Execute processes with limited-user rights.

PsLoggedOn
Show users logged on to a system.

PsLogList
Dump event log records.

PsTools
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

RootkitRevealer
Scan your system for rootkit-based malware

SDelete
Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

ShareEnum
Scan file shares on your network and view their security settings to close security holes.

ShellRunas
Launch programs as a different user via a convenient shell context-menu entry.

Sigcheck
Dump file version information and verify that images on your system are digitally signed.

READ MORE - Sysinternals Security Utilities

Sysinternals Networking Utilities

Sysinternals Networking Utilities are as follow:

AD Explorer
Active Directory Explorer is an advanced Active Directory (AD) viewer and editor.

AD Insight
AD Insight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications.

AdRestore
Undelete Server 2003 Active Directory objects.

PsFile
See what files are opened remotely.

PsTools
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

ShareEnum
Scan file shares on your network and view their security settings to close security holes.

TCPView
Active socket command-line viewer.

Whois
See who owns an Internet address.
READ MORE - Sysinternals Networking Utilities

How to troubleshoot wireless network connections in Windows XP Service Pack 2

Troubleshooting for wireless networking with Windows XP requires gathering information, checking the drivers, verifying compatible hardware, and configuring wireless settings. Before you begin troubleshooting, make sure that you have answered the following questions:
  • What is the symptom? If it is an error message, note the full error message.
  • What wireless card is used? Note the manufacturer and the model number.
  • What is the driver version for the card? Look in Device Manager or click Configure in the Properties dialog box of the wireless connection.
  • What access point is in use? Note the manufacturer and the model number.
  • Are the wireless settings configured by using Windows or by using a third-party program? If a third-party program is used, what is the program and its version number?
  • Is the Wireless Zero Configuration service running? To determine if the Wireless Zero Configuration service is running, follow these steps:
    1. Click Start, and then click Run.
    2. Open box, type cmd, and then click OK.
    3. Type sc query wzcsvc, and then press ENTER
    4. If the Windows Zero Configuration service is running, the words "STATE : # RUNNING" will appear.
    5. If the problem is in the user interface, collect a screen shot of the issue, if you can. To collect a screen shot, press ALT+PRINT SCRN.
READ MORE - How to troubleshoot wireless network connections in Windows XP Service Pack 2

How to Use a Wireless Network Connection with a Windows XP Portable Computer at Home and Work

As there are several versions of Microsoft Windows, the following steps may be different on your computer. If they are, see your product documentation to complete these steps.
  1. Click Start, point to Connect To, click Show all connections, and then double-click your wireless network adapter.
  2. On the General tab, click Properties.
  3. Click the Wireless Networks tab, click your home network under Preferred Networks, and then click Properties.
  4. Click Data encryption (WEP enabled).
  5. Click the Association tab, and then make sure that the following are not selected:
    • Network Authentication (Shared mode)
    • The key is provided for me automatically
  6. Click the Authentication tab, and then make sure that the following is not selected:
    • Enable IEEE 802.1x authentication for this network
    Note Windows XP SP1 changed the process for authentication with 802.1x-enabled networks. If the 802.1x authentication does not complete properly, the connection is dropped. Because the MN-500 does not support 802.1x authentication, do not select this type of authentication.
  7. Type either a 64-bit or 128-bit network key by using 10 or 26 hexadecimal digits (0-9,A-F), respectively.

    Note Do not use a friendly alphanumeric name.
  8. Write down the wired equivalent privacy (WEP) key that you typed, and then type that same value in the Base Station Wireless Security HTML screen.
For specific information about the settings for the wireless network at your workplace, contact your system administrator.
READ MORE - How to Use a Wireless Network Connection with a Windows XP Portable Computer at Home and Work

Multi-core networking

6Wind has ported its Linux-based multi-core networking stack to a new PowerPC-based networking system-on-chip (SoC) from Freescale Semiconductor. The 6WindGate stack now supports Freescale's upcoming QorIQ P4080, having been ported to the platform using Virtutech's Simics simulation environment, the company says.

The 6WindGate stack is aimed at telecommunications, security, and networking equipment manufacturers, says the company. It includes routing, security, QoS (quality-of-service), mobility, and IPv4-6 support, along with an XML-based management system for integration with UTM (unified threat management) software. Other features include standard-compliant IPsec cryptography hardware, and "fast-path" modules said to support the OpenBSD Cryptographic Framework (OCF).

6WindGate EDS architecture

The 6WindGate stack comes in a symmetrical multiprocessing version called ADS, as well as a fast-path enabled SDS version that is said to offer a fast data path by dedicating some cores specifically to data plane processing via its real-time MCEE (Multi-Core Executive Environment) operating system. In this configuration, it assigns other cores to control plane tasks running Linux.

6WindGate's ADS, EDS, and SDS versions

6Wind also offers an EDS version that manages to accomplish fast-path performance without MCEE. Instead, it implements fast path as a Linux kernel module sitting between the Linux networking stack and the interface drivers (see diagram above).

QorIQ on the horizon

Announced in June, QorIQ is a pin- and software-compatible successor to Freescale's Linux-compatible PowerQUICC line of network processors. Based on one to eight e500 cores clocked from 400MHz to 1.5GHz, QorIQ is fabricated with 45nm process technology, leading to greater claimed power efficiency.


QorIQ P4 block diagram

The QorIQ P4080 is not expected to sample until mid 2009. However, Freescale collaborated with Virtutech in order to provide virtualized "Simics" simluation models for the chips. Using technology similar to processor virtualization, the Simics models mimic the QorIQ chips at the instruction-set level, enabling both hardware and software developers to get started in advance of hardware availability, the companies say.

6Wind provides its IP stack running on the Virtutech Simics Hybrid Virtual simulation platform, it says. Other companies touting early support for QorIQ, based on ports to Simics, include carrier-grade Linux distributors MontaVista and Wind River. 

The Linux-compatible QorIQ SoCs range from the single-core P1010, clocked at 400MHz and consuming only four Watts, to the eight-core P4 clocked at 1.5Ghz and requiring 30 Watts, says Freescale. QorIQ uses the same e500 Power Architecture core used by PowerQUICC. Each e500 is said to offer 36-bit physical addressing, double-precision floating-point support, a 32KB L1 instruction cache, and a 32KB L1 data cache. Other touted features include one private backside cache per core, tri-level cache hierarchy, datapath acceleration architecture (DPAA), and a CoreNet coherency fabric on-chip, high-speed, interconnect between e500 cores, says the company.

Stated Eric Carmes, CEO of 6Wind, "Adding Freescale Semiconductor to our large list of technology partners essentially defines 6WIND as a reference solution for L2/L3 embedded networking software specifically designed for multicore."

The 6WindGate stack has been validated on x86, IXP4xx, IXP2xxx, and multi-core MIPS64 processors from Cavium and Raza, 6Wind Says. Additionally, last week, the company announced a reference design aimed at 4G wireless base stations and smart media gateway equipment. The design combines 6WindGate with VirtualLogix's VLX-NI (network infrastructure) virtualization technology, running on Texas Instruments's C6000 multi-core digital signal processors (DSPs).

READ MORE - Multi-core networking

Subscribe Core Networking