Showing posts with label Networks. Show all posts
Showing posts with label Networks. Show all posts

How to Secure Your Computer Network

Diposkan oleh : ghetux On 7:38 PM 0 komentar

Rarely a day goes by without a high profile security breach making the industry headlines. McAfee put the global cost of data breaches at £700Bn ($980Bn). A recent virus attack struck down three London hospitals –their computers had anti-virus software but it had been incorrectly configured, allowing an old virus in through a backdoor. The increase in data stealing malware (malicious software) is also very alarming and can attack the most diligent users. So, how can we protect our business from hackers, malware or viruses?

A few years ago one of my friends accidentally connected a laptop directly onto their ADSL modem to surf the web. The laptop had no security software. After less than an hour it had come to a standstill with almost 150 viruses and malware infections. I spent almost seven hours rescuing the laptop along with the data (no backup!).

You may think this is a rare case and not something that will affect you. I have to admit this is an extreme case; however, a single virus attacks on one computer may spread across many or all of your computers in minutes. One in twelve computer attacks will render network devices and services completely out of action. Our engineers have been called to several attacks where every member of staff had to be sent home while their computers were rendered completely out of action. The costs are significant due to loss of productivity of several hundred staff, IT staff costs to disinfect computers and loss of business (immediate and future).

In November last year an article in the Guardian warned computer users to be vigilant as “next Monday will be the worst day of the year for computer attacks”. What does this mean in real terms? It is difficult enough to keep a close eye on incoming emails for misspelt or otherwise suspicious subject lines but this is far from ideal. Not only is it naïve to think that every member of staff will be as vigilant as you are, but how do you quantify the cost of this daily distraction. Not only do we have the risk of email attacks, we also have browser attacks from infected web sites, corrupt Internet Messenger connections. It is almost impossible to stay one step ahead in IT security.

Your business computers may also be brought to a near standstill by relatively ‘innocent’ applications such as Skype or peer-to-peer media sites where some of your business computers may be participating in peer-to-peer networking. This also introduces copyright infringement risk – I know of more than one case where a major US film company has issued a ‘copyright infringement warning’ to a UK company, having traced them through the Internet via their ISP. There are unlikely to be any obvious signs of this activity. As if this does not give us enough to worry about, email spam and the risk of direct attacks by hackers add to our headaches.

So, what can be done to protect our business without us having to spend all of our time attempting to police our IT infrastructure? It is obvious that only those who know the risks can develop strategies to protect against them.
Sophisticated attacks require a comprehensive security solution. This traditionally required a range of security appliances such as firewalls and intrusion detection systems but these generally required qualified IT security personnel to maintain updates – virtually a full time job. In recent years these devices were combined into single Unified Threat Management appliances with automatic updates, but even these solutions had difficulty keeping pace with the demands of a fast growing threat diversity. Also, some Unified Threat Management appliances operated with cut down security signatures based on the most common attacks rather than the majority of potential attacks.

The latest generation of UTM - Next Generation Threat Management (NGTM) promise affordable premium class security for large and small business, government and education networks. NGTM appliances are designed and built specifically as a security platform providing a very comprehensive IT security solution in a box.

NGTM comprise a full range of security tools including: Firewall, Intrusion Detection/Protection, Dual Inline Anti-Virus, Anti-SpyWare, MalWare Detection, Content Inspection, Anti-Spam, Remote Access, Virtual Private Network facilities as standard.

The greatest problem for any security solution is to keep pace with the rapid onslaught of hundreds of threats every hour. Next Generation Threat Management overcomes this problem with hourly automatic updates, significantly reducing the risk of these threats and human error or oversight to your business.

Security threats pose very real risks. Business owners, directors and managers ignore them at their peril. If you make economies on your IT security, you are gambling not only with your company, but also your career and you are potentially risking litigation.

Category : | Read More......

Broadband Users Being Pushed to the Limit

Diposkan oleh : ghetux On 7:37 PM 0 komentar

A recent survey has shown that only 22% of broadband providers actually advertise the true limits of the usage of their package. Despite claims of ‘unlimited’ bandwidth and downloads, customers are still finding their usage capped. Figures released also showed that 56% of those advertising unlimited packages actually capped customer’s usage, even cutting some off if they used it to the excess.

For many households broadband has become a necessity. Just as we need Electricity, Gas & Water, many users rely upon the internet to go about their every day life. Products like this need to be more transparent in order to give the customer a much clearer view of what they’re purchasing and the limits that will be in place.

However broadband providers could argue that people exceeding the usage is minimal, as limits are often set at 40 times the average download usage per customer. In fact research conducted by Internet Service provider TalkTalk, showed less than half its customers used less than 1GB which is only the equivalent of downloading 2 films a month. Also research has shown only 1 in 4 read the terms and conditions outline the allowed usage.

With the growth of sites like 4ondemand and the BBC and ITV iplayers, download demand is expected to increase significantly. With the increase in demand, providers are likely to offer an extended service but like everything, it will come at an added cost. Some, like Virgin already offer the service although when traffic is heavy the usage is shaped and will be significantly slower at busier times of day.

Category : | Read More......

Correcting Network Time

Diposkan oleh : ghetux On 9:46 PM 0 komentar

Distributed networks rely completely on the correct time. Computers need timestamps to order events and when a collection of machines are working together it is imperative they run the same time.

Unfortunately modern PC’s are not designed to be perfect timekeepers. Their system clocks are simple electronic oscillators and are prone to drift. This is not normally a problem when the machines are working independently but when they are communicating across a network all sorts of problems can occur.

From emails arriving before they have been sent to entire system crashes, lack of synchronisation can causes untold problems across a network and it is for this reason that network time servers are used to ensure the entire network is synchronised together.

Network time servers come in two forms – The GPS time server and the radio referenced time server. GPS NTP servers use the time signal broadcast from GPS satellites. This is extremely accurate as it is generated by an atomic clock on board the GPS satellite. Radio referenced NTP servers use a long wave transmission broadcast by several national physics laboratories.

Both these methods are a good source of Coordinated Universal Time (UTC) the world’s global timescale. UTC is used by networks across the globe and synchronising to it allows computer networks to communicate confidently and partake of time sensitive transactions without error.

Some administrators use the Internet to receive a UTC time source. Whilst a dedicated network time server is not required to do this it does have security drawbacks in that a port is needed to be left open in the firewall for the computer to communicate with the NTP server, this can leave a system vulnerable and open to attack. Furthermore, Internet time sources are notoriously unreliable with many either too inaccurate or too far away to serve any useful purpose.

Category : | Read More......

Abstract

This paper investigates into the routing protocols in ad hoc wireless networks. Performance, quality-of-service, security, and power management failure cause the packet losses, delay variation and illegal authorization in ad hoc wireless networks. To handle these issues, different protocols have been proposed such as: battery-aware routing protocol, cooperative anomaly detection protocols, and a list of available protocol proficient to detect and trim down congestions.

Key words: routing protocols, security, power management, QoS

Introduction

Ad hoc wireless network is very sensitive network as it has no fixed infrastructure; there fore vulnerable possessions routing protocols must be evaluated escalating the number of nodes in network. Nodes are free to move independently and this movement should be settled down quickly. Routing is the processes of moving information in the form of packets across a network from a node-to-node. Routing protocols use metrics to evaluate the best promising path for the packet to reach on destination. Routers are the devices that route the packet on the network. They also maintain route information that helps in influencing the best path to various destinations. They are responsible to change information and to find a feasible path to destination with the help of hop length, power required (minimum or maximum), life time of wireless link, and utilize bandwidth type of information. Routing protocols must be durable to terrorization and vulnerabilities such as; resource consumption, denial-of-service, delay, packet delivery ratio and similar attacks possible against an ad hoc wireless network. Performance, security, quality-of-service, power management, reliability, and scalability are the major areas to provide good service. This paper discusses to widen curiosity in getting new concepts of routing protocols in ad hoc wireless networks. It is categorized in four classes with issues and their approaches: performance and methodologies, security and quality-of-service, and power management.

Issues and Problems

Routing protocol should be able to provide a certain level of quality-of-service in ad hoc wireless network as demanded by the nodes such as the parameters of quality-of-service can be throughput, packet delivery ratio, jitter, and supporting differentiated class of service. Node mobility, multicasting consumes high energy [1, 2]; large synchronization and multi-path forwarding increases the probability of duplication of messages [5] at large-scale replication.

Resource consumption, denial-of-service, information discloser, buffer overflow, interference and lake of central co-ordination make wireless network more vulnerable. Due to no central infrastructure, attackers attempt to break security and get authentication /authorization. Security can be weakened from lopsided target detection. Irregularity and non-secure protocols that based on On-demand Distance vector over IP V6 in wireless network cause the overcrowding and increase malicious nodes, attackers achieve their target.

Real time applications require a high energy to maintain performance where source and destination keep changing at every time. Major issues are power management, packet losses, security attacks and similarities in applications that decrease the performance. By the interruption of some selfish nodes, the establishment of a routing process to sends packets from source to destination, and during communication in ad hoc wireless network multicasting of addresses decreases total packet delivery.

Power management can be controlled significantly by utilizing the intelligent devices. Management designed routing protocol should be energy-efficient having good comprehension of network topologies. Some or all of the mobile nodes operate on batteries, for transmission communication applications need high energy [16]. Irregularity of message sequence of high density, like “hello packets”, consumes high energy due to short life of nodes. Forwarding of query based message end-to-end delay also consumes high energy in ad hoc wireless networks.

Approaches and Methodologies

Different routing protocols are active in wireless network pasture with intelligence properties. These abilities make network protected against attackers. As discussed above each application has different requirements to negotiate between host and network. It’s important to maintain quality-of-service on a per node level, per link, per flow of data in network, thus it is essential to have better coordination between source and destination to achieve quality-of-service. A Local Broad Clustering (LBC) and Call Hash Table routing protocol reduce the high-energy consumption from nodes and increase the communication range of nodes, also enhance the network life [4]. In other routing protocols, Multi-cost, Multiple description mechanism, Quality-of-service aware and Quality-of-service framework is active to achieve quality-of-service in ad hoc wireless networks.

Wireless network has been continued source of security breaches/flaws due to the nature of radio frequency transmission where everyone can receive the broadcast message. Protocols have been proven to be inadequate to today’s security. In proposed protocols, Random walk-based On-demand routing protocol handles the issues of distributed authentication.

To provide and maintain a high performance, different architecture and protocols have been implemented. The proposed architecture of swarm intelligent multi-path routing protocol reduces congestion and increases performance by taking action against packet loss, transmission delay, delay variation, and different intrusions [11]. Best route discovery and data transmission can be achieved with COMMIT protocol, which is based on the Visualization tool for Compiler Graph (VCG) and can, read a textual and readable specification of a graph and visualize the graph. It is the best protocol for the rout discovery. Other protocols, namely Periodic Hello Protocol (PHP), Adaptive Hello Protocol (AHP) and Reactive Protocol (RP) reduce congestion in network to increase performance in ad hoc wireless network.

Each node in wireless network participates in two kinds of activities, sending and receiving messages. Especially, hello messages consumes large amount of power. Requests can be set on priorities by using Prioritized Battery Aware routing protocol, allowing some routing connections having high priority and assigning power according to their rations. Another max-min routing protocol also performs same functions by reducing the irregularity of message sequence. It uses the distributed sensors to monitors large geographical areas as grid of computation. The most commonly used batteries in wireless devices are nickel-cadmium and lithium-ion batteries, which are widely used in laptops, cellular phones, PDAs, tablet PCs and other portable computing and communication devices. In the figure a complete processes of battery usage have been illustrated [16]. In figure (a) battery is showing a full charged state as well as the load increasing or node moving from source to destination battery starting to discharge (b).Battery voltage drops, it starts recovery (c). After recovering it gets stable again (d). In final session (e), (f) stage of battery dies with discharging loss and battery dies without discharging loss are shown. Other routing protocols such as: energy aware, ad hoc On-demand Distance Vector (AODV), Directional Local Recovery (DLR), and Dynamic Power Management (DPM) are also able to diminish power consumption.

Future work

As a future work security related factors and fragile scenarios will be considered and tested on the subject of the system effectiveness. A resource-efficient detection model will be investigated to improve performance in ad hoc wireless network.

Conclusion

In ad hoc wireless networks, quality of service, security, performance and power management are achieved by routing protocols. Actually, it is very sensitive service. That’s way it is difficult to maintain routing protocols. Outlay of data is more then a billons there fore, it need more sanctuary and solitude. Security attacks form intruders who try to attempt authentication, authorization, and damage the data which leads to poor quality of service, pitiable performance, and extra utilization of power management. Routing protocols provides best solutions by using efficient routing mechanism.

References

  1. 2. Energy-Aware Routing in Wireless Ad-Hoc Networks
    Found in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), By Panagiotis C. Kokkinos, Christos A. Papageorgiou , Emmanouel A. Varvarigos. Issue Date: June 2005, pp. 306-311

  2. 11. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Found in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05), By Saida Ziane , Abdelhamid Melouk, Issue Date: October 2005, pp. 620-626

  3. 12. COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes Found in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12, By Stephan Eidenbenz , Giovanni Resta , Paolo Santi Issue Date: April 2005, pp. 239b

  4. A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks
    Found in: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, By Li Layuan , Li Chunlin, Issue Date: April 2005, pp. 609-614

  5. Energy Aware Routing Protocol for Mobile and Wireless Ad hoc Networks
    Found in: 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), By Azzedine Boukerche, Harold Owens II, Issue Date: October 2003 pp. 768

  6. 19. Power Management in Wireless Ad Hoc Networks Using AODV
    Found in: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), By Liang Cheng , Anu G. Bourgeois , Bo Hyun Yu, Issue Date: May 2005, pp. 436-443

Category : | Read More......

Abstract

This paper investigates into the routing protocols in ad hoc wireless networks. Performance, quality-of-service, security, and power management failure cause the packet losses, delay variation and illegal authorization in ad hoc wireless networks. To handle these issues, different protocols have been proposed such as: battery-aware routing protocol, cooperative anomaly detection protocols, and a list of available protocol proficient to detect and trim down congestions.

Key words: routing protocols, security, power management, QoS

Introduction

Ad hoc wireless network is very sensitive network as it has no fixed infrastructure; there fore vulnerable possessions routing protocols must be evaluated escalating the number of nodes in network. Nodes are free to move independently and this movement should be settled down quickly. Routing is the processes of moving information in the form of packets across a network from a node-to-node. Routing protocols use metrics to evaluate the best promising path for the packet to reach on destination. Routers are the devices that route the packet on the network. They also maintain route information that helps in influencing the best path to various destinations. They are responsible to change information and to find a feasible path to destination with the help of hop length, power required (minimum or maximum), life time of wireless link, and utilize bandwidth type of information. Routing protocols must be durable to terrorization and vulnerabilities such as; resource consumption, denial-of-service, delay, packet delivery ratio and similar attacks possible against an ad hoc wireless network. Performance, security, quality-of-service, power management, reliability, and scalability are the major areas to provide good service. This paper discusses to widen curiosity in getting new concepts of routing protocols in ad hoc wireless networks. It is categorized in four classes with issues and their approaches: performance and methodologies, security and quality-of-service, and power management.

Issues and Problems

Routing protocol should be able to provide a certain level of quality-of-service in ad hoc wireless network as demanded by the nodes such as the parameters of quality-of-service can be throughput, packet delivery ratio, jitter, and supporting differentiated class of service. Node mobility, multicasting consumes high energy [1, 2]; large synchronization and multi-path forwarding increases the probability of duplication of messages [5] at large-scale replication.

Resource consumption, denial-of-service, information discloser, buffer overflow, interference and lake of central co-ordination make wireless network more vulnerable. Due to no central infrastructure, attackers attempt to break security and get authentication /authorization. Security can be weakened from lopsided target detection. Irregularity and non-secure protocols that based on On-demand Distance vector over IP V6 in wireless network cause the overcrowding and increase malicious nodes, attackers achieve their target.

Real time applications require a high energy to maintain performance where source and destination keep changing at every time. Major issues are power management, packet losses, security attacks and similarities in applications that decrease the performance. By the interruption of some selfish nodes, the establishment of a routing process to sends packets from source to destination, and during communication in ad hoc wireless network multicasting of addresses decreases total packet delivery.

Power management can be controlled significantly by utilizing the intelligent devices. Management designed routing protocol should be energy-efficient having good comprehension of network topologies. Some or all of the mobile nodes operate on batteries, for transmission communication applications need high energy [16]. Irregularity of message sequence of high density, like “hello packets”, consumes high energy due to short life of nodes. Forwarding of query based message end-to-end delay also consumes high energy in ad hoc wireless networks.

Approaches and Methodologies

Different routing protocols are active in wireless network pasture with intelligence properties. These abilities make network protected against attackers. As discussed above each application has different requirements to negotiate between host and network. It’s important to maintain quality-of-service on a per node level, per link, per flow of data in network, thus it is essential to have better coordination between source and destination to achieve quality-of-service. A Local Broad Clustering (LBC) and Call Hash Table routing protocol reduce the high-energy consumption from nodes and increase the communication range of nodes, also enhance the network life [4]. In other routing protocols, Multi-cost, Multiple description mechanism, Quality-of-service aware and Quality-of-service framework is active to achieve quality-of-service in ad hoc wireless networks.

Wireless network has been continued source of security breaches/flaws due to the nature of radio frequency transmission where everyone can receive the broadcast message. Protocols have been proven to be inadequate to today’s security. In proposed protocols, Random walk-based On-demand routing protocol handles the issues of distributed authentication.

To provide and maintain a high performance, different architecture and protocols have been implemented. The proposed architecture of swarm intelligent multi-path routing protocol reduces congestion and increases performance by taking action against packet loss, transmission delay, delay variation, and different intrusions [11]. Best route discovery and data transmission can be achieved with COMMIT protocol, which is based on the Visualization tool for Compiler Graph (VCG) and can, read a textual and readable specification of a graph and visualize the graph. It is the best protocol for the rout discovery. Other protocols, namely Periodic Hello Protocol (PHP), Adaptive Hello Protocol (AHP) and Reactive Protocol (RP) reduce congestion in network to increase performance in ad hoc wireless network.

Each node in wireless network participates in two kinds of activities, sending and receiving messages. Especially, hello messages consumes large amount of power. Requests can be set on priorities by using Prioritized Battery Aware routing protocol, allowing some routing connections having high priority and assigning power according to their rations. Another max-min routing protocol also performs same functions by reducing the irregularity of message sequence. It uses the distributed sensors to monitors large geographical areas as grid of computation. The most commonly used batteries in wireless devices are nickel-cadmium and lithium-ion batteries, which are widely used in laptops, cellular phones, PDAs, tablet PCs and other portable computing and communication devices. In the figure a complete processes of battery usage have been illustrated [16]. In figure (a) battery is showing a full charged state as well as the load increasing or node moving from source to destination battery starting to discharge (b).Battery voltage drops, it starts recovery (c). After recovering it gets stable again (d). In final session (e), (f) stage of battery dies with discharging loss and battery dies without discharging loss are shown. Other routing protocols such as: energy aware, ad hoc On-demand Distance Vector (AODV), Directional Local Recovery (DLR), and Dynamic Power Management (DPM) are also able to diminish power consumption.

Future work

As a future work security related factors and fragile scenarios will be considered and tested on the subject of the system effectiveness. A resource-efficient detection model will be investigated to improve performance in ad hoc wireless network.

Conclusion

In ad hoc wireless networks, quality of service, security, performance and power management are achieved by routing protocols. Actually, it is very sensitive service. That’s way it is difficult to maintain routing protocols. Outlay of data is more then a billons there fore, it need more sanctuary and solitude. Security attacks form intruders who try to attempt authentication, authorization, and damage the data which leads to poor quality of service, pitiable performance, and extra utilization of power management. Routing protocols provides best solutions by using efficient routing mechanism.

References

  1. 2. Energy-Aware Routing in Wireless Ad-Hoc Networks
    Found in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), By Panagiotis C. Kokkinos, Christos A. Papageorgiou , Emmanouel A. Varvarigos. Issue Date: June 2005, pp. 306-311

  2. 11. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Found in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05), By Saida Ziane , Abdelhamid Melouk, Issue Date: October 2005, pp. 620-626

  3. 12. COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes Found in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12, By Stephan Eidenbenz , Giovanni Resta , Paolo Santi Issue Date: April 2005, pp. 239b

  4. A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks
    Found in: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, By Li Layuan , Li Chunlin, Issue Date: April 2005, pp. 609-614

  5. Energy Aware Routing Protocol for Mobile and Wireless Ad hoc Networks
    Found in: 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), By Azzedine Boukerche, Harold Owens II, Issue Date: October 2003 pp. 768

  6. 19. Power Management in Wireless Ad Hoc Networks Using AODV
    Found in: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), By Liang Cheng , Anu G. Bourgeois , Bo Hyun Yu, Issue Date: May 2005, pp. 436-443

Category : | Read More......

Daftar CMS Berdasarkan Kategori

Diposkan oleh : ghetux On 3:22 PM 0 komentar

Ada banyak sekali CMS yang beredar bukan hanya sekedar Joomla atau Mambo saja, namun banyak sekali CMS lain yang perlu kita kenal dan kita coba sesuai kebutuhan kita. Berikut saya tampilkan daftar listing CMS berdasarkan kategorinya.


Ads Management:
Openads http://www.openads.org/
phpList http://www.phplist.com/

BBS/Forum/Message Boards:
Aterr http://chimaera.starglade.org/aterr
bbPress http://www.bbpress.org/
Ekinboard http://www.ekinboard.com/
FUDforum http://www.fudforum.org/
MyBB http://www.mybboard.com/
miniBB http://www.minibb.net/
Phorum http://www.phorum.org/
phpBB3 http://www.phpbb.com/
PunBB http://www.punbb.org/
SMF http://www.simplemachines.org/
UNB http://newsboard.unclassified.de
UseBB http://www.usebb.net/
Vanilla http://www.getvanilla.com/
W-agora http://www.w-agora.net/
Xchangeboard http://www.xchangeboard.de/
XMB Forum http://www.xmbforum.com/
Yappa-ng http://www.zirkon.at/
YetAnotherForum http://www.yetanotherforum.net/

Blogs:
b2evolution http://www.b2evolution.net/
bBlog http://www.bblog.com/
BirdBlog http://www.birdblog.org/
BLOG:CMS http://www.blogcms.com/
blur6ex http://www.blursoft.com/
boastMachine http://www.boastology.com/
DotClear http://www.dotclear.net/
feedonfeeds http://www.feedonfeeds.com/
LifeType http://www.lifetype.net/
Loudblog http://www.loudblog.de/
Nucleus http://www.nucleuscms.org/
Pixelpost http://www.pixelpost.org/
pMachine Free http://www.pmachine.com/
reBlog http://www.reblog.org/
sBLOG http://www.servous.se/
Serendipity http://www.s9y.org/
Simplog http://www.simplog.org/
Textpattern http://www.textpattern.com/
TruBlog http://www.trublog.org/
Wheatblog http://wheatblog.sourceforge.net
WordPress http://www.wordpress.org/
WordPress MU http://mu.wordpress.org
WordPattern http://www.wordpattern.org/

Calendars:
Maian Events http://www.maianscriptworld.co.uk/

Clasified Ads:
Classifieds http://classifieds.phpoutsourcing.com

CMS/Portals:
Bitweaver http://www.bitweaver.org/
CivicSpace http://www.civicspacelabs.org/
Clever Copy http://clevercopy.bestdirectbuy.com
CMS Made Simple http://www.cmsmadesimple.org/
Community Server http://www.communityserver.org/
Contenido http://www.contenido.org/
Dragonfly CMS http://www.cpgnuke.com/
Dev http://dev-wms.sourceforge.net
DotNetNuke (DNN) http://www.dotnetnuke.com/
Drupal http://www.drupal.org/
e107 http://www.e107.org/
EcwCMS http://www.ecwcms.com/
Exponent http://www.exponentcms.org/
eZ publish http://www.ez.no/
Fundanemt http://www.fundanemt.com/
fuzzylime http://www.fuzzylime.co.uk/
Geeklog http://www.geeklog.net/
IndexScript http://www.indexscript.com/
Indexu http://www.nicecoder.com/
Jaws http://www.jaws.com.mx/
Jetbox http://jetbox.streamedge.com
Joomla! http://www.joomla.com/ atau http://www.joomla.org/ *koreksi dari dwikristianto*
Jupiter http://www.highstrike.net/
Mambo Open Source http://www.mamboserver.com/
MDPro http://www.maxdev.com/
MODx http://www.modxcms.com/
Moodle http://www.moodle.org/
Netious http://www.netious.com/
OneCMS http://www.insanevisions.com/
Open-Realty http://www.open-realty.org/
Ovidentia http://www.ovidentia.org/
Papoo http://www.papoo.de/
PHP-Fusion http://www.php-fusion.co.uk/
PHP-Nuke http://www.phpnuke.org/
PhpComasy http://www.phpcomasy.org/
phpLinkDirectory http://www.phplinkdirectory.com/
phpSlash http://www.php-slash.org/
phpWCMS http://www.phpwcms.de/
phpWebSite http://phpwebsite.appstate.edu
PHPX http://www.phpx.org/
Plume CMS http://www.plume-cms.net/
Post-Nuke http://www.postnuke.com/
PROPS http://props.sourceforge.net
Siteframe http://www.siteframe.org/
SPIP http://www.spip.net/
toendaCMS http://www.toenda.com/
Typo3 http://www.typo3.org/
vtiger http://www.vtiger.com/
Website Baker 2 http://www.websitebaker.org/
Xaraya http://www.xaraya.com/
Xoops http://www.xoops.org/
YACS http://www.yetanothercommunitysystem.com/

Customer Support:
Crafty Syntax Live Help http://www.craftysyntax.com/
Help Center Live http://www.helpcenterlive.com/
osTicket http://www.osticket.com/
PerlDesk (Commercial, needs license) http://www.perldesk.com/
PHP Support Tickets http://www.triangle-solutions.com/
phpMyChat http://www.phpheaven.net/
PHPTickets http://www.phpsupporttickets.com/
Support Logic Helpdesk http://www.support-logic.com/
Support Services Manager http://scripts.sheddtech.com

E-Commerce:
CubeCart http://www.cubecart.com/
Osc2nuke http://www.osc2nuke.com/
OSCommerce http://www.oscommerce.com/
OSCommRes http://www.oscommres.com/
PHPAdsNew http://www.openx.org/
PHPauction http://www.phpauction.org/
phpShop http://www.phpshop.org/
SugarCRM http://www.sugarforge.org/
ZenCart http://www.zen-cart.com/

FAQ:
FAQMasterFlex http://www.technetguru.net/
phpMyFAQ http://www.phpmyfaq.de/

GroupWare Tools Project Managements:
ACollab http://www.atutor.ca/
dotProject http://www.dotproject.net/
eGroupWare http://www.egroupware.org/
netOffice http://netoffice.sourceforge.net
phpGroupWare http://www.phpgroupware.org/
PHProject http://www.phprojekt.com/
PMTool http://www.pmtool.org/

Guestbooks:
MJguest http://www.mdsjack.bo.it/
ViPER Guestbook http://www.vipergb.de.vu/

Hosting Billing:
AccountLab Plus http://www.netenberg.com/
phpCOIN http://www.phpcoin.com/
phpFormGenerator http://phpformgen.sourceforge.net

Image Galleries:
4images Gallery http://www.4homepages.de/
Coppermine Photo Gallery http://coppermine.sourceforge.net
DAlbum http://www.dalbum.org/
Gallery http://gallery.menalto.com
Gallery2 http://codex.gallery2.org
JAlbum http://www.jalbum.net/
LinPHA http://linpha.sourceforge.net
MG2 http://www.minigal.dk/
Plogger http://www.plogger.org/
Singapore http://singapore.sourceforge.net
Snipe Gallery http://www.snipegallery.com/
WEBalbum http://www.web-album.org/

Mailing List:
PHPlist http://www.tincan.co.uk/

Polls and Surveys:
phpESP http://phpesp.sourceforge.net
PHPSurveyor http://phpsurveyor.sourceforge.net

Search Engine:
Copernic http://www.copernic.com/

Site Builders:
Soholaunch Pro Edition
(Commercial, needs license) http://www.soholaunch.com/
Templates Express http://www.netenberg.com/

Social Bookmarking:
PLIGG htpp://www.pligg.com/ *tambahan dari 2mk*

Website Add-Ons:
Aardvark Topsites PHP http://www.aardvarktopsites.com/
ObieWebsite.sf.net http://obiewebsite.sourceforge.net
Perl Script Page http://www.proxy2.de/

Wiki:
DokuWiki http://wiki.splitbrain.org/
ErfurtWiki http://erfurtwiki.sourceforge.net
MediaWiki http://www.mediawiki.org/
PhpWiki http://phpwiki.sourceforge.net
PmWiki http://www.pmwiki.org/
QwikiWiki http://www.qwikiwiki.com/
TikiWiki http://www.tikiwiki.org/
UniWakka http://uniwakka.sourceforge.net
WackoWiki http://www.wackowiki.com/
WikkaWiki http://www.wikkawiki.org/
Wikepage http://www.wikepage.org/
WikkiTikkiTavi http://tavi.sourceforge.net
WikiWikiWeb http://www.phpwiki.org/

Other Scripts:
All Free Download Script by Category http://www.download3000.com/scriptsall.html *tambahan dari tanahsirah*
Comic Update Script (phpComic) http://cusp.sourceforge.net
Dew-NewPHPLinks http://www.dew-code.com/
evoDev http://www.evo-dev.com/
Factory Nova http://www.factorynova.com/
FormMail http://www.formmail.com/
Matt’s Script Archive http://www.scriptarchive.com/
Noah’s Classifieds http://classifieds.phpoutsourcing.com
openDB http://opendb.iamvegan.net
phpArena http://www.phparena.net/
phpCollab http://www.php-collab.com/
phpmycounter http://www.timlinden.com/
SiteBar http://www.sitebar.org/
sRecommender http://www.biglickmedia.com/
WebCalendar http://webcalendar.sourceforge.net
WebCards http://www.mywebcards.net/

post by : www.cyberkios.com

Category : | Read More......

Jenis & Tipe dari Kabel UTP

Diposkan oleh : ghetux On 9:55 PM 0 komentar

Jenis & Tipe dari Kabel UTP


1. Straight
Biasa dipakai untuk menghubungkan 2 buah alat yang berbeda. misal : dalam 1 jaringan terdiri dari 5 komputer yang dihubungkan ke dalam 1 buah hub. Hubungan komputer ke hub bisa dikatakan hubungan alat yang berbeda.

Urutan kabelnya :

PO O PH B PB H PC C
PO O PH B PB H PC C



2. Cross
Biasa dipakai untuk menghubungkan 2 buah alat yang sama. misal : kita mau menghubungkan dua buah komputer (P2P).

Urutan kabelnya :
PO O PH B PB H PC C
PH H O B PB PO PC C

3. Rollover / Console
Biasa dipakai untuk mengkonfigurasi suatu alat jaringan (switch,router,dll).

Urutan Kabelnya :

PO O PH B PB H PC C
C PC H PB B PH O PO


Keterangan :
PO = Putih Orange
O = Orange
PH = Putih Hijau
H = Hijau
PB = Putih Biru
B = Biru
PC = Putih Coklat
C = Coklat


Cara memasang kabel UTP : Ketika memasukkan kabel ke dalam konektor RJ-45, sisi muka RJ-45 yang punya tembaga menghadap ke arah kita. Masukkan perlahan-lahan setelah disusun dgn rapi. Usahakan semua kepala kabel sampai ke bagian ujung dalam dari RJ-45.

Untuk memasang sisi ujung satu lagi dari kabel, harus menyesuaikan urutan kabel tsb dan RJ-45 sisi yang ada tembaga juga harus menghadap ke arah kita.

Jadi kedua ujung konektor RJ-45 harus semuanya yang punya tembaga menghadap ke arah pemasang kabel. Urutannya selalu dimulai dari paling kiri.

Category : | Read More......

Ethernet, Fast Ethernet, FDDI and Token Ring often referred to as traditional LAN, and they are sharing media, sharing of bandwidth shared LAN. In order to increase bandwidth, often using a network router division, will be divided into a network of more than one paragraph, each of the networks have different sub-address, different broadcasting domain, to reduce conflicts on the network, increase network bandwidth. Micro-paragraph of the network can not meet the LAN extension and the new high-bandwidth network applications to the demand, it is said that "traditional local area network has come to an end."

In recent years the exchange processes-LAN technology, to address shared by the LAN network inefficient and can not provide adequate network bandwidth and network expansion and a series of difficult issues. It fundamentally changed the structure of shared local area network, to solve the bandwidth bottleneck. At present, the exchange of Ethernet, token ring exchange, the exchange of FDDI and ATM, such as the exchange of local area networks, Ethernet one of the most extensive exchange. LAN exchange has become the mainstream LAN technology.

Switches provide the ability to bridge the existing network and increase bandwidth capabilities.

For the LAN switches on the bridge with similar because they all operate in the data link layer (level 2), M A C-layer, the inspection of all network traffic into the device address. And the bridge still has some similar switch to maintain an address on the table and used the information to decide how to filter and forward LAN flow.

And bridge different, switches using technology to increase the exchange of data input and output media and installation of the total bandwidth. General switch delay small forward, the economy and can be divided into small network of conflict domain, for each workstation to provide higher bandwidth.

Packet-switched network is the circuit-switched networks and packet switching network after a new exchange network, which mainly used for data communications. Packet switching is a store-and-forward of the exchange, it will at the user's text is divided into a certain length of the packet to packet for store-and-forward, therefore, than the utilization of circuit-switched, than when the message exchange Extensions to small, but with real-time communication capabilities. Packet-switched TDM principle of the use of statistics, a data link multiplexing into multiple Luojixindao, eventually forming an Caller, Called party transmission of information between the access road, called the VC (VC) to achieve data Packet sent.

Packet switching network has the following characteristics:

(1) packet switching with multiple Luojixindao the capacity utilization rate is high trunk circuits

(2) can be realized packet switching codes of the different online, the rate between the terminal and a point of order Interoperability;

(3) The packet switching error detection and correction of the capacity of the transmission circuit is a very small error rate

(4) packet-switched network-management capabilities.


Packet switching the basic business SVC (SVC) and PVC (PVC) two. SVC as telephone circuit, that is, two data communication terminals to be used when the first call to establish procedures for circuit (VC), and then sent the data, communications rewirable procedures used after the removal of VC. PVC as green, in the net division between the two terminals for the period of the contract to provide permanent logical connection, no call set-up and rewirable procedures, the data transmission phase, with the SVC the same.

Category : | Read More......

Citrix Netscaler

Diposkan oleh : ghetux On 11:42 PM 0 komentar

Citrix NetScaler is a set of appliances that form a web application delivery solution, which has the capacity to speed-up application performance by a maxiumum of 5x. Citrix NetScaler also constantly decreases data center costs, and enhances the security of your web applications. Applications available range from, the basic level, series 7000 and up to the most modern, MPX, which has the capabilities of 15 gigabits per second of throughput in both layers 4 and 7 with the highest constant use of all the functional modules. Perfect for network management for all enterprises that require acceleration in the running of existing web applications the Citrix Netscaler increases security in web applications and enhances the availability of the web application.

Citrix NetScaler is the most efficient and secure way to maximize the delivery of web application and is one of the few IT products on the market that still produces the most amazing performance that can give benefits to any organisation.

NetScaler merges the features and functions of conventional data centre point devices into one single network appliance, built from the ground up to optimize the performance of the following web applications aspects:

* Load balancing,
* Caching,
* Compression,
* SSL offload and acceleration,
* Attack defence (DoS etc.),
* SSL VPN

From resellers point of view, NetScaler is a very technical sale and the results speak for themselves. Getting the customer to evaluate the product in a live environment (or as close to it as feasibly possible) is key to the success of the opportunity. Over 80% of evaluations result in a purchase order.

From an end user perspective, Citrix NetScaler products provide:

* Maximized application performance
* End-to-end application security
* Continuous application availability
* Reduced cost of operations

Citrix NetScaler products enhance the performance of Oracle, PeopleSoft, SAP, Siebel, Outlook Web Access, e-commerce applications and custom applications 70% or more, while also enhancing security and intensively reducing operational expenditure.

Citrix NetScaler utilises technology to maximize the TCP acceleration and accelerate the performance of web applications by up to five times. Citrix AppCompress and Citrix AppCache effectively transmit data compression and keep the static and dynamic contents on transitory storage (caching) to quicken the response from the web application. NetScaler TCP optimization provides network management solutions to settle the inconveniences of high latency, crammed network links and is transparent to the user and the server and only necessitates minimal of configuration or in some cases no configuration. To Real-Time Monitoring and identify all the Historical Page-Level end-users that are available on the Citrix EdgeSight for NetScaler.

Citrix NetScaler allows for the reduction in the cost of delivering web applications by lowering the number of servers required, and maximise the use of network bandwidth available. MPX is the latest series of Citrix NetScaler, and delivers numerous 10GE ports and power to run all the modules with the traffic throughput of 10 gigabits even in the layer 7. This performance offers the capability to prevent the network segmentation that is not required that can decrease the number of switches and other elements, consequently there can be savings in the cost of infrastructure. With the AppExpert Visual Policy Builder there is no need for coding or script when making application delivery policies. Also, the current NetScaler can lower the cost of operations with some ability to consolidate in one solution. Using the Citrix EasyCall, which is part of the NetScaler package, will increase the employees productivity and reduced cost of telephone communication. to set some NetScaler Appliances, NetScaler Command Center is available separately that can provide centralized administration for the system configuration, event management, performance management, and administration of SSL certification.

Citrix NetScaler delivers protection against assaults on the application layer, and assists in the prevention of the event of leakage or theft of customer data and companies data that are valuable. Citrix now have some capabilities such as open proxy for users who have permission, close proxy for users who do not have the permission with the Citrix Request Switching, which also is equipped with high-performance, and built-in defenses against denial of service attack (DoS).

With configuration of the Surge Protection function and Priority Queuing, I is easier to manage the surges on the application's traffic that inflict a web server application.

Citrix NetScaler provides an obvious direction of the user requirements to make sure of the maximum distribution of traffic is achieved. If more information is required on the layer 4 - Protocol and Port Number or traffic management policies for TCP applications can all refer to the Application-Layer content. An administrator can carry out traffic segmentation on applications step by step to the information held in the TCP pay-load or the HTTP request body. Also in the header information L4-7 as the URL, type of data application or cookies. With the large number of algorithms for load-balancing and the facility to create health checks the server application availability by making sure that high-needs (requests) the user is directed only at the appropriate time depending on the behaviour of the server.

While other solutions declare that they can enhance the performance of Web-enabled applications, only Citrix NetScaler products optimise the performance and security of Web-enabled applications. In addition, since NetScaler's single, integrated device takes the place of a number of point solutions, overall network infrastructures are considerably made easy, and total operational costs are significantly decreased.

Category : | Read More......

Affordable Network Security Software

Diposkan oleh : ghetux On 11:39 PM 0 komentar

As a reseller of Untangle for Singapore, Malaysia and the Philippines, Futuregen is proud to highlight the top of mind questions about the affordable network security software from Untangle.

Why do you need a network security software to secure your network?
If your network is connected to the internet, chances are you are being attacked, spammed, spoofed, or your enterprise assets are being compromised…without you even knowing it! It’s scary.

Securing your network not only protects your enterprise assets, it also ensures that your web facing applications are available to users when they need it. To learn more, here is a short video on the Untangle Network Security Software http://www.untangle.com/video_overview.

If network security is so important, why aren’t other businesses securing their network?
Two factors: Cost and expertise. Top of line security products do cost a lot. It comes with esoteric commands that require a highly trained security professional to operate.

But these are things of the past. Untangle's solution is not only free to download, it is also easy to use. The graphical interface enables you to set options and then wait for the executive summary reports to arrive via email!

With Untangle's solution, there really are no excuses for not protecting your network.

What can Untangle do as a Network Security Software?

Well a lot! Here is a list of what it can do, and we call the term in the security industry:

Router. Provides basic routing functionality, and DHCP and DNS servers. It may already be installed depending on the selections made during the setup wizard. If there is already a router on the network, there is no need to install the Router unless replacing the current firewall/router. Router makes the Untangle Server act like a router that by default serves DHCP and DNS with an internal IP of 192.168.1.1, much like a Linksys or Netgear router.

Firewall. You can define what types of traffic can enter your network. So it enables your network to show a ‘smaller attack footprint’ on the internet. In short, it limits the points of entry that are open to hackers.
Web Filtering. It blocks your employees from time-wasting and unproductive surfing. You control what sites are allowed and not allowed for users inside your network. Best of all, you can just select categories like violence, hacking, sex and the software will do the rest!

Spam Blocker. Uses all sorts of spam technologies like blacklists, bayesian filters, signatures, and optical character resolutions to scan email and detect spam. After installing Spam Blocker, it scans SMTP, POP3, and IMAP traffic and can block spam as it enters your network. Users won’t even need to download the spam, and frees them from having to delete it!

Virus Blocker. Scan all network traffic for viruses and drop them. No software is required on the end user desktop: all the scanning is done on the traffic as it transits through the Untangle server. Virus Blocker provides a great solution for those without virus protection on the end user desktops or for those wanting an extra layer of virus protection. Virus Blocker is completely configured by default and requires no extra tinkering or configuration.

Spyware Blocker. Protect users from websites and files that install malicious codes. Spyware Blocker uses numerous techniques to stop spyware from entering your network and stop users from going to places which infect them from spyware. This can save numerous hours of tracking down weird problems and slowness issues caused by malware and spyware.

Intrusion Prevention System. Protects the network from known attack signatures by preventing them from reaching their targets. Using snort signatures, Intrusion Prevention can detect, block, and log attacks. Intrusion Prevention is preconfigured with good defaults to maximize protection and minimize false positives. It gets zapped at the gateway!

Attack Blocker. It is a heuristic based intrusion prevention application which blocks attacks like floods and port scans based on reputation. Attack Blocker also requires no configuration.

OpenVPN. VPN solution that provides remote connectivity directly into the network over an SSL connection. Install OpenVPN and configure the OpenVPN application as a server and go through the setup wizard. In the exported address step, add any addresses to the list which users should be able to reach remotely. In many cases, this is the entire internal subnet, but it can be limited to only a few servers for security reasons.

If it’s a free Network Security Software, how does Untangle make any money?
Untangle sells commercial add-ons for advanced networks. These are sold as subscriptions. Commercial Add-ons include live support, advanced management features and applications for additional security and remote access.

How much does the Untangle Network Security software cost?
Many will get everything they need for free, but with Commercial Add-ons starting at just $5/mo anyone can afford Untangle. The Professional Package with live support is the best value and it starts at just $25/mo. Full price list available online.

Does it cost anything to join?
Nope. And training is free too. If you’ve got customers with spam, spyware, web filtering or remote access needs, we’d love to work with you.

How does subscription licensing work, if I have multiple offices and want to install an Untangle Server with the Professional Package at each one?
The software license is governed by each Untangle Server and the network it services. We have four pricing tiers based on the number of personal computers on the network. The tiers are 1 – 10, 11 – 50, and 51-150, and 151+.

Let’s look at an example:

You have a main office with 78 employees and two branch offices with 25 and 7 employees respectively. You install an Untangle Server in each office and want to run the Professional Package on all three servers. Your subscription would total $225/month broken out as follows:

$150/mo for the main office with 78 employees (51 - 150 license)
$50/mo for the branch office with 25 employees (11 – 50 license)
$25 for the branch office with 7 employees (1 – 10 license)
Additional discounts are available for longer commitments.

What is the difference between personal computers on the network versus employees?

Untangle’s subscription licensing is by personal computers on the network. If your employees share a set of common computers, you should base your license on the number of computers, not the number of employees. Likewise, if your employees have more than one personal computer each, the license is still based on the total number of personal computers.

If you are as excited as we are at this point, your next action should be to download the Network Security software and just try it out! You can also email marketing[at]futuregen.sg for any support or pre-sales inquries. Or visit BNS Hosting and talk with an online hosted solutions expert.

Category : | Read More......

Common Ntp Server Time Reference Problems

Diposkan oleh : ghetux On 11:36 PM 0 komentar

The NTP server (Network Time Protocol) is one of the most used but least understood computer networking items.

A NTP Server is just a time server that uses the protocol NTP. Other time protocols do exist but NTP is by far the most widely used. The terms ‘NTP server’, ‘time server’ and ‘network time server’ are interchangeable and often the terms ‘radio clock’ or ‘GPS time server’ are used but these simply describe the method which the time servers receive a time reference.

NTP servers receive a time source that they can then distribute amongst a network. NTP will check a devices system clock and advance or retreat the time depending on how much it has drifted. By regularly checking the system clock with the time server, NTP can ensure the device is synchronised.

The NTP server is a simple device to install and run. Most connect to a network via an Ethernet cable and the software included is easily configured. However, there are some common troubleshooting problems associated with NTP servers and in particular with receiving timing sources:

A dedicated NTP server will receive a time signal from various sources. The Internet is probably the most common sources of UTC time (Coordinated Universal Time), however, using the Internet as a timing source can be a cause for several time server problems.

Firstly Internet timing sources can’t be authenticated; authentication is NTP’s in-built security measure and ensures that a timing reference is coming from where it says it is. On a similar note to use an Internet timing source would mean that a gap would have to be created in the network firewall, this can obviously cause its own security issues.

Internet timing sources are also notoriously inaccurate. A survey by MIT (Massachusetts Institute of Technology) found less than a quarter of Internet timing sources were any where near accurate and often those that were, were too far away from clients to provide a reliable timing source.

The most common, secure and accurate method for receiving timing source is the GPS system (Global Positioning System). While a GPs signal can be received anywhere on the planet there are still common installation issues.

A GPS antenna has to have a good clear view of the sky; this is because the GPs satellite broadcast their signal by line of sight. He signal can not penetrate buildings and therefore the antenna has to be situated on the rood. Another common issue with a GPS time server is that they need to be left for at least 49 hours to ensure the GPS receiver gets a good satellite fix. Many users find that they are receiving an intermittent signal this is normally due to impatience and not letting the GPS system obtain a solid fix.

The other secure and reliable method for receiving a timing signal is the national radio transmissions. In the UK this is called MSF but similar systems exist in the US (WWVB), Germany (DCF) and several other countries. There are usually less problems faced when using the MSF/DCF/WWVB signal. Although the radio signal can penetrate buildings it is susceptible to interference from topography and other electrical appliances. Any issues with a MSF time server can normally be resolved by moving the server to another locale or often just angling the server so its in-built antenna is perpendicular to the transmission.

Category : | Read More......

About Me

My photo
"im the man not superman"

SPONSOR


Masukkan Code ini K1-YA6F17-2
untuk berbelanja di KutuKutuBuku.com

Followers