Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x

Networking

91K

Solutions

66K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

Charter has upgraded their Internet speed from 60MB/s to 100MB/s recently for residential customers. I subscribe to the Internet-only service from them.

I contacted them recently via their chatline and they switched me from 60 to 100 at no cost. It literally took about 5 minutes over their live-chat system. Here's the log, just so I can come back to it in case they raise my price later :)

Dennis H: Thank you for contacting Spectrum. This is Dennis H. How may I assist you?
Dennis H: Thank you for providing me the opportunity to help you today.
Just so you are aware, this chat is encrypted for your privacy and protection.
Certain information like ZIP Code or phone numbers may show as '####' for you, but we see them.
How can I help?
lucas bishop: Hi Dennis, I currently have an account at Charter:
lucas bishop: Account Number: ################
lucas bishop: I see you are advertising Internet service starting at 100Mbps. Is that something I get by default? Or is it something I have to pay for an upgrade too?
Dennis H: Thank you very much, lucas. Please bear with me just a moment while I pull up some information for you.
lucas bishop: ok
Dennis H: Upon further review of your account, In order to upgrade to Spectrum Internet services, I would need to transition your account over to one of our newer packages so that your account is compatible for voice services. Your speed would increase from 60mbps to 100 mbps. This will change your monthly rate from $64.99 to $64.99. 

Open in new window

6
 
LVL 3

Expert Comment

by:Anthony Pangilinan
Charter, you should join the site and take control of the conversation. Also give us free internets. I know you're seeing this.

eyes.gif
3
 
LVL 17

Expert Comment

by:Kyle Santos
take control of the conversation
give us free internets.
They, and Ajit Pai, totally do not want to and made sure of it already by getting rid of Net Neutrality.
0
Free Tool: ZipGrep
LVL 11
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Everything you need to know about Meltdown, Spectre and why it's not all Intel's fault.

Brilliant summary of the CPU vulnerability that will slow network servers across the world and force a change in processor architecture  - Unrolled from Twitter feed by @nicoleperlroth

https://threadreaderapp.com/thread/948684376249962496.html



7
 
LVL 1

Expert Comment

by:Giridhara Raam
Mitigate @intel bugs,

Join this free #webinar titled "How to mitigate #Meltdown and #Spectre bugs" on Jan 10, 11:00 am EDT to get hands on experience.

https://www.manageengine.com/products/desktop-central/meltdown-and-spectre-webinar.html?EE

melt-webinar-social-banner.jpg
0
Just found a new IP Lookup tool which shows your IP address along with your location on a map.
To see what your IP Address reveals about you, follow What is my IP Address.
0
A29J_130789574330391040IMb0cMkpFw.jpgEdge router x by ubnt is a router which is not expensive but is has a lot of advanced futures. It has its down side to it that its GUI is hard to figure out, also vary little documentation available. But once you get to know it there is a lot you can do with it.
What I will be focusing is when having two networks on the router and you want to create a firewall between the two networks. This can be useful for example, where you have one secure network and one that is a not that secure [can be a wireless network, etc.] and you want to protect the secure network from any attack that my come from the not secured network.
A ubnt router could be configured by port, you can have as many networks as the amount of ports on the router (without having a vlan although you can have a vlan as well).
Now Let’s start with a example we have 2 networks one is 192.168.1.1 on eth0 which is not the secure network, and 192.168.2.1 on switch0 which runs on eth2/eth3/eth4/eth5 (eth1 we use for the WAN)  which is the secure network. You also want to restrict the .1.1 from having access to the .2.1 and from accessing the router management.
1-      Create a firewall port group that will include ssh port (22) http (80) https (443) and telnet (23).
2-       Go to the Firewall/NAT tab, firewall/add ruleset, name it, set the default action to accept.
3-      On the newly created ruleset, action/configuration/roles/add new rule, name it, action -drop, next move to advanced, check -established …
0
https://www.observium.org Network Monitoring for Network Specialists - worth a view - promise ... :D
0
Had the following issue and took these steps to solve it. I am sharing my experience since it “may” be a help for others.  
Issue: although file sharing discovery was turned on and it the network area in file explorer I could see all computers on the network, but could not access the shared folders on other computers, “window cannot access……”
Troubleshoot steps: after verifying the file shred discovery is turned on, and the folders are shared with the right permissions at the destination computer. I opened a cmd line and did a ping with the destination computer name, did not get a replay but got the IP address of the destination computer (could get it with ipconfig on the destination computer as wall). Did a ping with the IP address got no replay. Now I know something on the destination computer is blocking. The first thing move aside is the firewall, so I turned off the firewall on the destination computer (Kaspersky- I am moving all my clients from Kaspersky to Symantec, since I find Kaspersky being to restrict causing to many issues). Then did a ping with the IP and I got a replay. Now I did a ping with the name of the destination computer, did not get a replay, in the cmd prompt, I typed net view \\shraedpath did not get a replay, this told me there is a name resolution issue. So I changed the following setting Control Panel\Network and Internet\Network and Sharing Center\change adopter settings right click on the network adopter\properties\IPV4 click on …
3

Microsoft Patch Tuesday December 2017 updates


Microsoft Patch Tuesday December 2017 is here, with a list of 34 critical security updates & 2 key fixes, for 7 products. Since the vacation isn't two far, make sure all the patches are updated in your network and have a happy vacation. Adobe also has released its security update

Key fixes:

  1. CVE-2017-11940
  2. CVE-2017-11937

Adobe:

APSB17-42

Potential impact for 34 security updates:

  • Remote code execution
  • Elevation of privilege
  • Information disclosure
  • Spoofing
  • Security feature bypass

Products:

  • Microsoft Exchange Server
  • ChakraCore
  • Microsoft Windows
  • Microsoft Edge
  • Internet Explorer
  • Microsoft Malware Protection Engine
  • Microsoft Office Services and Web Apps
  • Microsoft Office

You can read a complete report on https://goo.gl/mwbq1Q
1
0
EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
 
LVL 8

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
This is my school project / assignment scenario - I have to draw a Logical Network Design...NEED HELP

The rollout of the wireless network has been suspended for now, but the stock analysis tool is being implemented. It is to be called My Stock Analysis Tool (MSAT). MSAT is going to use a three-tier client-server architecture. The tiers will be a web browser at the client end, a separate web server tier, and the MSAT server that performs application logic and all the data storage and access logic. In this way, there is no issue with installing/supporting a software client on end-user computers. Both customers and DRUB staff will use MSAT through a web-based interface, although staff may see extra options. Apart from accessing MSAT, staff also use Microsoft spreadsheet and word processing software on their computers (Windows XP PCs and laptops) for preparing reports, with work-in-progress files stored on staff computers.
0
 
LVL 34

Expert Comment

by:Rob Henson
Snowbella, well done for being honest and up-front that this is a school project; that will help experts guide you rather than propose answers as they would for normal questions.

However, to get better assistance you need to raise this as a question using the big blue button at the top of the page or this link:

https://www.experts-exchange.com/askQuestion.jsp
0
Become an Android App Developer
LVL 11
Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

Need with Logical Network Design
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like you are asking for help. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

If you do ask a question, please post the link to it back here so others can find your question and help you more quickly.

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
Is there any downloadable software for Windows or for other devices connected to our network (such as cell phones)that would detect devices that are sending out SPAM.  Our internet provider has suspended our outbound email services until they know that we've fixed the problem.  I'd like to test all devices on the network to find out the source of the spamming.  Any ideas?  
0
 
LVL 15

Expert Comment

by:Ben Personick (Previously QCubed)
Setup an SMTP server (such as the free one included in windows under IIS) to act as a relay.

Point all of your actual applications that sdnd mail to this relay.

block all devices (except the IP pf the mail relay) from having port 25 ourbound.

Now you can be pretty muxh assured that anything else which is sending email is blocked, and you can review the smtp logs of all devices which de relay through your local smtp relay server, allowing tou to troubleshoot connectivity and locate any abusive systems.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
1
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
Network Operation Center equipment? How to turn on and what he needs. Please let me know in detail.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
Cpa Network Spiroox
0
 
LVL 26

Expert Comment

by:Brian B
Could you please clarify what you are asking about? If you are trying to ask a question that requires a response from the Experts, please use the "Ask a question" button at the top of the screen.
0
Webroot Protects You Against Bad Rabbit

Webroot customers are protected from the Bad Rabbit malware that is affecting computers across Russia, Ukraine, Bulgaria, a few surrounding Eastern-European countries, as well as Japan.

What we know about Bad Rabbit thus far:

Bad Rabbit is a well-made piece of malware that uses a lot of clever tricks to spread, similar to NotPetya, which affected customers across the globe this summer.

Bad Rabbit has been successful as it has worm-like behavior, using embedded usernames and passwords to move laterally through the network.

Attackers used compromised websites, most of which are news sources local to the APAC/Eastern European region, as watering-hole infection vectors which helps explain the geographic location.

More about Bad Rabbit, what you can do to protect yourself even further, and what one of our Senior Advanced Threat Research Analyst had to say about it here.
0
Hi,
Every week, I need to run 7-8 reports from external software for same week period for almost 8 branches, is there any VBA codes which can help me to automate the process, where it saves all reports automatically from external software on network directory just by adjusting dates? Your help will be appreciated.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
 
LVL 26

Expert Comment

by:Brian B
0
Tech spooks happen to every business owner. Check out my top solutions to these issues and share a story of your own! Simply submit your #TechorTreat article before October ends and be entered to win a  tech gadget.
8
Hello, EE Experts!

I wanted to make sure that all Apple users understand what's going on with the new Wi-Fi (WPA2) vulnerability "KRACK."

Apple is working on a fix to roll out as soon as possible to all its users. They've stated that there is a fix for this vulnerability in the beta versions, but that the fix is not in the latest update you have on your device.

So, what can you do?

Don't connect to Wi-Fi at hotels, coffee shops, or anywhere outside your place of business or home. Even at your house or area of work use a VPN.

Wait, even at my house?

Yes. Essentially the attacker can read all the information that is being transmitted wirelessly throughout your home. That said, if you use a VPN you're making an encrypted tunnel around the information you're sending and not relying on the WPA2 protocol that should keep your data safe. So, even if the attacker is looking at the data on your home network, the VPN is making it unreadable.

Also, if you're out and about, please turn off the Wi-Fi capability on your iPhone or iPad. By turning off the Wi-Fi, you're making your iPhone or iPad solely dependent upon cellular data, which is not susceptible to this attack.

Where can I get a VPN?

I use Encypt.me because it's fast, simple, relatively cheap, and works on all of my devices without In-app purchases. However, there are free VPNs that you can grab …
4
 
LVL 100

Expert Comment

by:John Hurst
IOS 11.1 is out today to address the Wi-Fi vulnerability. I am updating both phones here. Carrier settings are being updated at the same time.
0
Hire Technology Freelancers with Gigs
LVL 11
Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Hi
I have an excel sheet that contains long list of file names. My requirement is it should take file name from excel sheet and search in a network folder as well as sub folders. If found then copy that file and paste in a hard coded folder. Then excel sheet it will take next row file name and repeat the process. I mean we need to put in loop and repeat the process.

Any advice is really helpful.

Regards,
Byom

 
0
How can I share out an old *.exe application to multiple users in an AD environment who are connected from home via VPN? The requirement is that the execution of *.exe must be from the office network, the *.exe application calls a bunch of databases from other servers in the office and will disconnect if the application runs from the user's computer via VPN.

I am thinking of setting up a Windows 2012 servers and allow RDP connections for users to run the *.exe on the server from home(via VPN). Are there any other ways?
1
 

Author Comment

by:Panda 5888
Thanks
1
 
LVL 26

Expert Comment

by:Brian B
0
Tech Bomb - Currently GoDaddy DNS shows signs of lunacy. Problem appears to be in their communication of NS records to global DNS root servers. Via - dig $site ns - this shows up as a different list of NS records each time dig is issued, which leads to...

Symptom - site IP (DNS A records) are randomized. Sometimes correct. Sometimes random.

Effect - Ad Networks suspend your accounts. SEO plummets, as GoDaddy flags your site as serving Malware.

It’s unclear whether this is a GoDaddy technical issue or GoDaddy is being hacked somewhere deep in their systems.

*Fix* - Move all your DNS records out of GoDaddy + set your site’s DNS records to point to the outside DNS service.

This has come to light over the past few days when several of my clients have had their Ad Network accounts suspended + or sites flagged in Google Search Console as serving Malware, when sites are clean.

Just another day of tech randomness.
0
 
LVL 21

Expert Comment

by:Alan
Hi David,

Are you seeing issues only where a customer has multiple A records for a given hostname, or any issues where they have only a single IP for a given hostname?

I have not had any problems (that I know of yet!) but I don't have any with multiple IPs.

Thanks,

Alan.
0
why an organization might want two or more firewalls on a single network
0
 
LVL 39

Expert Comment

by:Mahesh
one firewall between production and DMZ and one between DMZ and internet
0
Protect DNS: A Conversation With Dave Dufour of Webroot

DNS is one of the basic services on which the web is based and it has proven to be robust and scalable to an astounding degree. Unfortunately, it's also vulnerable to hacking and can be a serious attack vector if left unprotected. Dave Dufour, director of cybersecurity and engineering at Webroot, is an expert on DNS and its implications in network security. Security Now talked with Dufour about the issues with DNS and what organizations should be doing to protect their networks, employees and customers from DNS-based threats.

Read more of the interview on Security Now.
2
Hello everyone, I am very new to the gaming world and wanted to buy a gaming console subscription prepaid card, for my newly purchased Xbox controller. When I discussed about this with one of my former friends, he suggested me to (Buy) Acheter Abonnement xbox live 12 mois ( https://www.press-start.com/fr/1-acheter-abonnement-xbox-live-gold-12-mois/ ) from Press-start a gaming Console store which sells all types of gaming consoles like Playstatsion network card, or Xbox gift card.
0

Networking

91K

Solutions

66K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.