Home Networking

In: Computers and Technology

Submitted By Nbdeuno
Words 1203
Pages 5
Computer Memory Hacking

Professor Dima Salman

February 15, 2015

Hackers was a term associated with computer programmers and geeks or intellectual people, mostly men exploring the advancement of technology. Hacking of memory is illegally accessing a computer for malicious gain. The hacker’s dictionary refer to hacking as unauthorized access to computer systems, either for fun or for malicious or fraudulent purposes (Hutchison, 2011). Technology is evolving on a daily basis. The need to protect your computer is at an all-time high. With the right tools, breaking into a computer’s encrypted data is very easy. Princeton did a study of low level tech hackers can access the most well protected computer (Roberton, 2008).

The most popular tools the hackers use are Back door remote administrative programs and Denial of Service (DoS) Back door remote works through an uploaded exe file on a website that seems to be trusted. This software is usually spread between pcs. The infected pc communicates with someone via email at a work computer. The infected pc infects the work pc and the virus spread. This is similar to the situation at JP Morgan Chase. The hackers where able to get through via an employee. The FBI is involved because as the writers says the attempted hacking should have stopped but they believe other holes in the system were left unprotected (Goldstein, 2014). The type of breach at Chase was a simple backdoor process which gained the hacker’s access to approximately 90 servers. The breach was discovered but it also uncovered a vulnerability in the infrastructure of a large bank that has challenges protecting their servers on a day to day basis (Krebs, 2014)

Denial of Service causes your pc to crash or become busy processing useless data, it ignores the breach going on. This is what happened with Home Depot and Target. The Malware was…...

Similar Documents


...presence of switches and can communicate without the need for intermediate devices such as routers. 5. Network Layer 6. Gateway describes the networking device that enables data to enter and exit a LAN, and is where the host computers forward data packets that need to exit LAN. 7. TCP/IP protocol 8. The packet will stay in the LAN because the destination IP address is in the same network as the host IP address and therefore has no need for forwarding or routing. 10. The destination subnet address for which is different subnet as the host. Therefore sent to the Gateway. 12. No they are not on the same network, they are on different Networks. 14. Router A, to Router E, to Router D, or Router E to Router D. 16. B is the only one attach 18. It could be E, D, or C. 20. Bits per second 9600, Data Bits 8, Stop Bits 1, Flow control none, Parity None 22.? 24. Show version 26. In the next highest command mode in the CLI mode hierarchy. 28. Enable after the router> prompt 30. conf t 32. enable secret my – secret 34. int fa0/1, ip address, no shut 36. DCE. 38. clock rate 56000 40. Keepalive indicates that the Fast Ethernet interfaces is connected to another networking device such as a hub, switch or router. 42. Status of down means no PC is connected administratively down indicates that the router......

Words: 319 - Pages: 2


...Networking When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks. Computer networks can be connected through cables, such as Ethernet cables or phone lines, or wirelessly, using wireless networking cards that send and receive data through the air. LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. InTCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by...

Words: 719 - Pages: 3


...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before......

Words: 1908 - Pages: 8


...Advantages and Disadvantages of MIMO Identify all advantages and disadvantages of MIMO. 1. Some of the benefits to using MIMO routers include faster speeds, greater distances between your paired devices, more simultaneous users, less signal fading and dead spots, and better resistance to interference. 2. Another important advantage is that throughput at on home networks are having a lower drop rate. Traditionally WLANs operated at distances of up to 300 feet, with perhaps less if walls or floors were in the way. Although MIMO routers are more expensive than other 802.11g routers, prices are expected to fall as the technology matures. The second disadvantage is that there is the impending release of the 802.11n router. This version would offer more distance and throughput but may not be ratified until the summer of 2007 or even later. Although some consumers are willing to wait for the release, the new version may not have an upgrade path or work with all the equipment that is being run on the particular network. MIMO Applications Describe how MIMO is currently being used within the telecommunications and networking industries, that is, cellular, WMAN, WWAN, and so forth. Future of MIMO In your opinion, what’s the future for MIMO? This should be a minimum one paragraph, four to five sentences. Multiple input/multiple output, or MIMO, has long promised to increase data speed, range and reliability of wireless network...

Words: 380 - Pages: 2


...Networking Carol Ridgeway Kaplan University IT331 Technology Infrastructure Professor Howard Weinraub Unit 3 Assignment May 7, 2013 Twisted Pair Cables is a pair of wires that are twisted together to provide protection against crosstalk and noise that is generated by the adjacent pairs that forms a circuit to can transmit data. There are two basic types of twisted-pair cables, unshielded twisted pair, UTP, and shielded twisted pair, STP (Cisco, 2003). Coaxial Cables have a hollow outer cylindrical conductor that is surrounded by a single inner wire that is made of two conducting elements, copper and a copper braid or metallic foil. The copper conductor is surrounded by a layer of flexible insulation that has a woven copper braid, or metallic foil, that helps to reduce the amount of outside interference. And finally, a cable jacket covers the shield (Cisco, 2003). A fiber optic cable contains strands of glass fibers that is inside of an insulated casing that is designed for long distance and very high bandwidth, gigabit speed, network communications by using pulse of light to carry a signal (Scocco, 2006). Wireless signals are electromagnetic waves that travels through the air. To receive the signals from the access point the computer, or laptop, must have a wireless adapter card, or wireless NIC, installed. Wireless signals use portions of the RF spectrum to transmit voice, video, and data. Satellite radio provides uninterrupted services to......

Words: 524 - Pages: 3


...1. List two advantages of wireless networking. User mobility in the workplace, and cost effective networking media for use in areas that are difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard? Physical Layer (PHY): The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.) Medium Access Control (MAC): The reliability of the data service, access control to the shared wireless medium, protecting the privacy of the transmitted data. MAC management protocols and services: Authentication, association, data delivery, and privacy. 3. What is an ad hoc network? In this network, the wireless clients (stations) communicate directly with each other. 4. What is the purpose of an Extended Service Set? By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended. 5. What are the four physical layer technologies being used in 802.11 wireless networking? Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS); Infrared, and Orthogonal Frequency Division Multiplexing (OFDM) 6. Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking. It implements 14 channels (each consuming 22 MHz) over approximately 90 MHz of RF spectrum in the 2.4 GHz ISM (industrial, scientific, and medical) band. 7. Define a pseudorandom sequence as it applies to FHSS. Pseudorandom means the......

Words: 1208 - Pages: 5


...1. Which of the following terms is the closest synonym to the term "computer networking"? Datacom 2. Ann uses her email address, me@here.com, to send an email to bob, whose email address is you@here.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that bob receives this email? B. The process of sending an email from Ann to Bob uses Ann's outgoing email server and Bob's incoming Email server. 3. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers). b.The call uses only digital electrical signals d. The call represents short sounds as a unique set of bits 4. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two home telephones in the United States? (Choose two answers) c. The call represents short sounds as a unique set of bits. d. The call uses both analog and digital electrical signals 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video which of the following answers is the least likely to impact the size of the video file? a. A character set 6. A student records a video of a professor teaching a......

Words: 585 - Pages: 3


...Telecommunications and Networks Ghana Telecom University College Lecturer - Lempogo Forgor 2013 Objectives  By the end of this unit, students should be able to: Demonstrate understanding of computer networking, including the concepts and types as well as hardware and software Compare and contrast internet, extranet and intranet Demonstrate practical knowledge of using the internet Discuss the business value of computer networks INF 162: Introduction to Information Systems - GTUC 2013 Delivery Overview  Computer Networks and Networking  Types of computer networks  Network Connection technologies  Hardware in computer Networking  The business value of internet, extranet and intranet INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is a Computer Network?  A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.  Computer Network is a set of interconnected computer systems using special communication devices, media and software. INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is Computer networking?  Networking in the field of computing is the practice of linking computer devices together to support digital communication among them.  The computers and devices on the network are called Network Nodes. ......

Words: 2597 - Pages: 11


...properly based on delays on responses. Exercise 2.1.2 1. Most modern computers have device drivers for network interfaces that manage most of these elements automatically. What characteristics of modern computer networks allow this type of integration? Use your textbook and Internet research to support your answer. a. Those that use LAN or WAN connections, as well as wireless connections. All use a NIC of some design that allows for communication to occur with other devices with the proper protocols. Exercise 2.1.3 1. For this exercise, you will enable peer- to- peer communication on your Windows XP machine. Complete the steps that follow to enable this service. What other networking services are available for installation? a. Computer, network, set up home group connection, discovered other computer, enabled both computers, set what could and could not be shared. Exercise 2.1.4 1. Briefly explain why wireless connections between peer devices do not need specialized......

Words: 325 - Pages: 2


...end instruments are computers.”[1] The first networks were narrowly used by important personnel like military bases so they can maintain connection with their traveling co-workers, keeping them safe, and giving them direction. These networks were not connected to the Internet, as we know it. They were just basic networks for the sake of communication. Networks became much more widely used in the 1990’s when the internet emerged to the masses. Now corporate offices and residential homes alike could start a network of their own so they can to connected to whatever they like. The importance of networking was realized very quickly, the number of networks rose at a rapid pace, and today there are billions of people connected to each other in different ways. Whether it be in a small corporate office connecting employees, or the network that connects a business to its manufacturer in China, its very obvious that the network changed the world, and helped it prosper. In this paper I will discuss every networking feature in the Windows operating system as well as its importance to the network. Importance Of A Network Now that it is common for a household to have multiple devices with the ability to connect, networks have become more important than ever. Computers are no longer used just for basic communication like e-mail. These days the daily usage of a computer seems like a life requirement. People are using them for work, entertainment, and shopping, all of which most likely......

Words: 2060 - Pages: 9


...Floppy Disks – They have insufficient capacity. 16. The Windows 7 component that enables the computer to support more than one language is called the MUI (Multi-Language User Interface) 17. The reason it is possible to remove the Windows 7 installation disk to supply the Setup program with drivers is that Windows PE runs on a RAM disk 18. To upgrade Windows XP to Windows 7, you must perform a Clean Install 19. The files and settings that Windows Easy Transfer can migrate to a Windows 7 computer are primarily stored in User Profile Folder 20. As a pre installation environment, Windows PE is a vast improvement over MS-DOS because it includes internal support for Networking and NTFS 21. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Windows 7 Home Basic – Emerging markets only. 22. The core module that provides all of the Windows 7 capability that isn’t language- or edition-specific is called MinWin. 23. When you copy a file to a library, Windows Explorer writes the file to the folder designated as the save location 24. To use federated search, you must download or create XML files for specific sites called Search connectors 25. The only operating system edition that you can upgrade in-place to Windows 7 Professional is Windows Vista Business 26. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk......

Words: 1613 - Pages: 7


...technology? There are many advantages to wireless networks. Some advantages of a wireless network are convenience, mobility, ease of set up, the cheaper cost in the long run, and with the newest 802.11 standards the throughput could be just as good as or even better than some Ethernet connections without the hustle of all the wires. 2. Also, what can you tell her to convince her that wireless networking could improve the company’s productivity? With the implication of a wireless network it opens up more options for employees such as the ability to use laptops and their smartphones to complete work so it can be completed however they would like. 3. Which employees could make best use of wireless connections and how? The production, order fulfillment, and research departments would probably benefit the most from the wireless connections so that they can work while on the go and easily update any data even when outside the office. 4. In what type of situations would all employees benefit from wireless networking? II. You have persuaded Welgreen Pharm’s CIO that wireless networking would benefit many of the company’s employees. However, she requests that you plan the network carefully and begin with a pilot network before migrating hundreds of clients to use wireless technology. You decide to begin with a pilot network in the distribution facility. The distribution facility is 400 feet long by 210 feet wide. It houses 65 employees during each shift, all on the same......

Words: 570 - Pages: 3


...Networking in My Life and Career Angel Salvador Maldonado DeVry University Author Note This paper was prepared for CEIS-100 taught by Professor Reinaldo Fernandez. Course Project Week #: 2 Networking in My Life and Career A network is defined as a group of computers that are connected to share information. An NIC is a Network Interface Card. It is the physical component of a computer that allows a computer to connect to a network. Three types of media used for network connections are cable television coaxial, fiber optic cable and wireless connections. There have often been times when I have had to access my home wireless internet network and have not been able too. I start to troubleshoot by disconnecting and re connecting to the wireless network in the Open Network and Sharing Center. If that does not work, I check my wireless router to see if the lights on the router are green indicating that it is working properly. If there is a red or orange light on the router, I unplug the power source of the router and let it reset. This usually resolves the issue. My career goal is to become a Network System Administrator. That being said, I will be dealing with networks on a daily basis. A Network System Administrator is responsible for designing, installing, maintaining and upgrading networks in businesses of different sizes. I still have not taken any networking classes. I do know that by the time I obtain my Associates in Network Systems Administration I will have......

Words: 298 - Pages: 2


...Networking Networking There are many different types of topologies and this paper will discuss many advantages and disadvantages of them. Bus Topology In a bus topology, all the network devices are in a linear shape which acts as a common backbone. There is a single cable which functions as the go between for the devices that are attached to this connector. The device will send the messages to all of the devices attached to this shared cable. However, only the intended device will receive and accept the message being processed. An example of a bus topology is an Ethernet cord which is easy to install. One problem with a bus topology if the main source fails, all devices attached will become unresponsive. Star Topology Star topologies are the most popular forms of networking used today, in both homes and businesses. The star is the central device of the network and is located in most homes today, the router. In order for the star topology to work, it does require more cabling than the bus topology, but unlike the bus topology, if a computer in the star topology fails, all other computers are not affected. However, if the router fails, this will cause the network to shut down. Ring topology is no longer used as widely as in the past. Mesh Topology Mesh topology works with many different routes. The term mesh is exactly the way mesh topology works, sending messages out and it will pick the shortest and easiest route. Mesh topology can also only travel in one direction,...

Words: 680 - Pages: 3


...and recapture some of the interpersonal cues that have been filtered out by the medium. Ultimately, the digital conversation lacks the spatial and temporal rules that govern embodied conversation, creating ambiguity and uncertainty for the users. How is context created and interpreted? How is conversation initiated and maintained? What function does it serve? How does searchability affect the ways that online users perform conversations? These are some of the questions that this paper attempts to answer by focusing on the conversations on Facebook, an online networking site. Facebook is an online networking site that allows its users to create detailed personal Profiles that link with other users. Features such as photo posting, commenting on other users’ “Walls,” and joining groups relating to a shared interest also form a large part of the Facebook experience. Facebook distinguishes itself from other social networking sites like Myspace and Friendster because its participation is determined by offline social networks. Initially requiring membership in a university community, Facebook more recently includes members from specific high schools, regions, and companies. Social browsing is limited to the Friends that the user lists and people from the user’s offline community (e.g. a university or city). Users can manipulate their Profile’s privacy settings to control access to their entire Profile, photos, wall posts, and other social information. Facebook has become a huge......

Words: 3201 - Pages: 13