Apple Computers have had their own set of protocols for many years. More and more operating systems today now can communicate with Apple systems using Apple networking protocols.
ADSP - AppleTalk Data Stream Protocol is used to provide data stream service for sockets. The data stream is full duplex meaning communication may be sent both directions at the same time. Works at the OSI network model session layer.
AEP - AppleTalk echo protocol uses echoes to tell if a computer, or node,...
Home » Archive for November 2011
IPX/SPX Protocols

IPX/SPX is a routable protocol and can be used for small and large networks. It was created by Novell primarily for Novell NetWare networks, but is popular enough that it is used on products that are not from Novell. NCP - NetWare Core Protocol provides for client/server interactions such as file and print sharing. It works at the application, presentation, and session levels.
SAP - Service Advertising Protocol packets are used by file and print servers to periodically advertise the...
Posted by Unknown
at 3:32 PM,
Add Comment
Read more
Microsoft Protocols

Microsoft developed a suite of protocols around NetBIOS using NetBEUI for transport. The primary advantage of this protocol is that it is easy to configure and Microsoft claims that it runs faster. Microsoft has been switching to a wider use of TCP/IP in recent years, probably in support of larger organizational networks.
NetBIOS - Network Basic Input/Output allows browsing of network resources and handles basic functions of a Windows network. Two way acknowledged data transfer is used. It is...
Posted by Unknown
at 6:20 PM,
Add Comment
Read more
TCP/IP Networking Protocols

The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexiblity and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services.
TCP/IP by LayerLink LayerSLIP - Serial Line Internet Protocol. This protocol places data packets into data frames in...
Posted by Unknown
at 5:22 PM,
Add Comment
Read more
Network Layers
The layered concept of networking was developed to accommodate changes in technology. Each layer of a specific network model may be responsible for a different function of the network. Each layer will pass information up and down to the next subsequent layer as data is processed.
The OSI Network Model StandardThe OSI network model layers are arranged here from the lower levels starting with the physical (hardware) to the higher levels.
Physical Layer - The actual hardware.
Data Link...
Posted by Unknown
at 7:22 PM,
Add Comment
Read more
Network Models

When dealing with networking, you may hear the terms "network model" and "network layer" used often. Network models define a set of network layers and how they interact. There are several different network models depending on what organization or company started them. The most important two are:
The TCP/IP Model - This model is sometimes called the DOD model since it was designed for the department of defense It is also called the internet model because TCP/IP is the protocol used on...
Posted by Unknown
at 6:00 PM,
Add Comment
Read more
The CTDP Protocol Summary Version 0.6.0

Introduction This document is a summary of protocols that are used for networking, security, and other functions. This document only covers protocols. It does not cover services, network architecture, or media (method of hardware transport) associated with networking. The CTDP Networking Guide or Certification Guide is best used to learn about services or media. Protocols are sets of standards that define operations and how they will be done. Without protocols there would be much confusion...
Posted by Unknown
at 6:56 PM,
Add Comment
Read more
Networking Section Introduction

This section contains networking documentation and networking information contributed by members of the CTDP. There is much TCP/IP information and documentation in this section. Currently this section contains three documents:
The CTDP Networking Tutorial - Describes networking from the ground up, including how routers and firewalls work along with descriptions of the various network protocols. The Network Tutorial is available in PDF form It includes the following information: Network...
Posted by Unknown
at 7:19 AM,
Add Comment
Read more
Basic Computer Terms

Bit - A binary unit of data storage that can only be a value of 0 or 1.
BIOS - BIOS stands for Basic Input/Output System and it is a low level program used by your system to interface to computer devices such as your video card, keyboard, mouse, hard drive, and other devices.
Boot - A term used to describe what happens to a computer when it is turned on, the operating system begins to run, and then the user is able to use the computer successfully.
Byte - 8 bits of data which has a possible...
Posted by Unknown
at 3:57 PM,
Add Comment
Read more
Summary

There are several things you should do to make your system more secure, and keep it performing better.:
Change your file view settings on Windows systems so you will see all file extensions.
Always run anti-virus software and keep the virus definitions updated at least twice per week.
Never connect to the internet unless you are using a personal firewall or are behind an organizational firewall on a private network.
Never open e-mail attachments without being sure of who sent them. Keep the...
Posted by Unknown
at 4:11 PM,
Add Comment
Read more
Making a Boot Disk
Open the Windows backup program on Windows 2000 by selecting Start, then Programs, then Accessories, then System Tools, then Backup. The backup utility will start as shown below.
When the Welcome tab is displayed in the Backup program, click on the "Emergency Repair Disk" button near the bottom. When the "Emergency Repair Diskette" dialog box appears select the checkbox next to "Also backup the registry to the repair diretory..." and click OK. You will need to put a blank...
Posted by Unknown
at 4:16 AM,
Add Comment
Read more
Removing Viruses

Removing viruses can be risky to your operating system and may cause you to need to re-install your operating system. If you do not feel comfortable with the instructions in this section, you should get a computer professional to do the job. For more information read Applying the latest patches to your Windows 2000 Operating system to prevent viruses and worms. It contains information about how to remove viruses along with other useful information. Virus Removal ProcedureBe sure you have good...
Posted by Unknown
at 7:09 AM,
Add Comment
Read more
Spam
Spam is unsolited junk e-mail sent to large numbers of e-mail addresses. It is used to promote some product or service and many spam e-mails are pornographic in nature.
Spam Prevention Unfortunately there are not very many good ways of preventing spam other than keeping your e-mail address secret. It should be kept at a level of security somewhere between your phone number and your social security number. You should be careful about who you give your email address to. Many companies will sell...
Posted by Unknown
at 3:57 PM,
Add Comment
Read more
E-mail Viruses

Viruses that spread through e-mail have a common method of spreading. This page will discuss how common e-mail viruses currently spread.
The Virus Lifecycle Viruses begin their life when someone releases them on the internet. They begin to spread. At this early stage of their lifecycle, no one is aware of their presence. As the virus becomes more widely spread, someone will recognize an abnormal problem with their system and investigate. Eventually a computer expert will conclude that a...
Posted by Unknown
at 6:48 AM,
Add Comment
Read more
The Internet Email System

The email system that is currently used on the internet was not designed to curb the abuses presented by viruses and SPAM as they are occurring today. The email system today allows:
Anyone can set the "From" field in the email to any value they want. This means that you can send an email message and make it look like the President of the United States sent the message. There are ways to tell that this is not the case, but on the surface it will appear like the President of the United...
Posted by Unknown
at 4:05 PM,
Add Comment
Read more
Securing Your System

There are several measures which you can take to secure your system. The first and most important is to become informed about how your system works and what the threats are. Reading this guide and acting on the tips contained here is a good start.
Personal firewall - If you are not behind a corporate firewall, purchase and install a personal firewall on your computer. This will help protect your system from many vulnerabilities that some worms will try to exploit.
Updates - Perform system...
Posted by Unknown
at 5:04 PM,
Add Comment
Read more
Worms and Prevention

Since worms spread by taking advantage of vulnerabilities in operating systems or application programs (remember from earlier discussion, vulnerabilities are software errors that allow some kind of unauthorized access when they are used or exploited). You do not need to do anthing special to get a worm except to connect to the internet or an infected network with a system that has vulnerabilities. There are several good defenses against worms.
What is a Firewall?A firewall is a device...
Posted by Unknown
at 4:13 PM,
Add Comment
Read more
Viruses and Worms

In general terms a virus is a program that runs on a system against the owner's or user's wishes and knowledge. Viruses have one or more methods they use to spread. Most commonly they will attach a file to an e-mail message and attempt to trick victims into running the attachment. Virus Damage In most cases, viruses can do any amount of damage the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin your...
Posted by Unknown
at 5:12 PM,
Add Comment
Read more
File Backups
File backups are very important to protect your data. Is your hard drive fails or your operating system malfunctions, you could loose all your data. If you do regular backups, you will drastically reduce the data loss that could occur.
Using the Network for BackupsBacking up your data is very important. If you are operating on a corporate or organizational network and have disk drives shared from a file server it is likely that files stored there are backed up every night. If possible...
Posted by Unknown
at 8:39 PM,
Add Comment
Read more
View Settings
The Default Windows Setting is Dangerous Windows systems come with default file view settings. The default is to "Hide file extensions for known file types". This setting can be used to decieve a computer user into believing that a file is safe to open when it is not. Files containing viruses can be sent to a computer with the name "document.txt.exe" which is a file that the computer will run. The file will appear to the computer user as "document.txt" making the user believe that it is safe to...
Posted by Unknown
at 4:55 PM,
Add Comment
Read more
File Management
File Organization Files can be placed in folders similar to the way single sheets of paper can be placed into folders in a file cabinet. Folders can be created on the hard drive or nested inside each other any way the computer user desires. Browsing Your files using WindowsIf using a Windows operating system double click on the "My Computer" icon on your desktop. A window like the one shown below will open.
The first drive in the window shown is a floppy drive. It is labeled as drive...
Posted by Unknown
at 8:37 PM,
Add Comment
Read more
Subscribe to:
Posts (Atom)