Home
Archives for 2009
Thursday, 31 December 2009
Sunday, 20 December 2009
0 National Do Not Call (NDNC) Registry – START DND to 1909
Informations from Author: Smith Solace
just visit my channel of the sms send sms on callmedaily
The National Do Not Call Registry (NDNC Registry) is setup to curb the Unsolicited Commercial Communication (UCC), which is any telecommunications service message, which is transmitted for the purpose of informing about or soliciting or promoting any commercial transaction in relation to goods, investments or services which a subscriber opts not to receive.
The NDNC Registry will be a database having the list of all telephone numbers of the subscribers who do not want to receive unsolicited messages. Telephone subscriber (land line or mobile) who does not wish to receive UCC, can register their telephone number with their telecom service provider for inclusion in the NDNC. Telecom Service Provider shall upload the telephone number to the NDNC within 45 days of receipt. The Telemarketer will have to verify their calling telephone numbers list with the NDNC registry before making a call.
An amount of Rs 500/- per call/message for the first call has been prescribed to discourage telemarketers who make calls to numbers registered in Do Not Call list. The second call will have a fine of Rs 1000/- and third time the line will be disconnected. The defaulter telemarketer will face disconnection of telecom service.
Each user need to register their number with their communication provider such as BSNL, Airtel, Reliance, Hutch etc. in order to register their cell number of land line number with the NDNC Registry. The provider may provide website interface or SMS interface for registering your number in NDNC Registry. Check with your provider for the details.
Saturday, 5 December 2009
0 THE TCP/IP FAMILY TREE
The Transmission Control Protocol (TCP) and the Internet Protocol (IP) together form the basis for TCP/IP, a low-level driver that lets computers talk to each other using a network of almost any size. The Internet is connected using TCP/IP as its foundation.
TCP/IP was proposed in 1973. Nine years later, in 1983, a standardized version of the protocol was developed and adopted for wide-area use. In 1983, it also became mandatory that all connections to ARPAnet, the Department of Defense’s predecessor to today’s Internet, be made with TCP/IP.
TCP/IP was developed to solve several problems in moving data from point A to point B. The most important requirement was to guarantee delivery of data on a network that might be under attack from a foreign power. Because the Department of Defense (DoD) developed the Internet, this requirement was paramount and fairly predictable. If an enemy were to attack the military’s computer systems and networks, data must continue to flow, secure and unhampered. The other established requirements were that data be moved efficiently and that its arrival be verified - yet the sending machine might not have any of the same operating characteristics as the receiving machine. TCP and IP both perform unique and vital functions that solve all the problems in moving data between machines over networks.
Transmission Control Protocol
TCP is the transmission layer of the protocol. Its primary function is to ensure reliable and verifiable data exchange between different hosts across a network. TCP performs its tasks by breaking data into manageable pieces and then wrapping the pieces with information called a header that routes the data to its final destination. TCP on the receiving machine then puts all the pieces back together, just as they were before the data was sent. The wrapped and bundled pieces are called datagrams.
The primary pieces of information in the TCP header are the source and destination port numbers, a sequence number for the datagram, and a checksum. Port numbers allow the data to be sent back and forth to the correct process running on each computer. (We cover ports in more detail later in this chapter.) The sequence number lets TCP reassemble the datagrams in the correct order. The checksum lets the protocol determine whether the data received is the data that was sent. The checksum calculates a number by adding all the octets of a datagram; this number is then inserted into the datagram’s header. The receiving computer performs the same calculation, and if the two calculations do not match, an error occurred somewhere along the line, and the datagram is resent.
After the TCP header is inserted into the datagram, TCP passes the datagram to the IP protocol to be routed to its final destinationshows the layout of a datagram with its TCP header structure.
Internet Protocol
IP is the network layer portion of TCP/IP. IP actually moves data from point A to point B across a network. This movement of data is called routing, and that’s really all IP does. (We cover routing in a bit more detail later in this chapter.) IP is typically considered unreliable, meaning that nothing guarantees that the data it routes will even arrive at its destination, much less in the order it was sent. IP relies on TCP to determine whether the data arrived successfully at its destination and to retransmit the data if it hasn’t.
To route data, IP inserts its own header into the datagram after it receives it from TCP. The contents of the IP header are the source and destination addresses, another checksum, and the protocol number. The header informs routers (or gateways) along the way of the datagram’s final destination. for a layout of a datagram complete with its TCP and IP headers. The IP header portion has a gray background.
0 NEW TCP IP PROTOCOLS
The TCP/IP family consists of several other protocols typically referred to as application protocols, which are specialized protocols that use TCP/IP as their foundation. With the ever-growing popularity of the Internet, new application protocols are being developed at a blistering pace. Let’s look at a few:
• Address Resolution Protocol (ARP) helps link a physical media access control address (an Ethernet address) with a node’s associated IP address.
• Internet Control Message Protocol (ICMP) works at the IP network layer level and helps with network layer management and control, ensuring that errors are noted and corrected.
• Universal Datagram Protocol (UDP) is a connectionless protocol that is generally considered an unreliable way to send data across a network because it does not guarantee that the data sent will ever arrive at its destination. UDP is, however, a very efficient and fast way to send data because it does not have to connect and disconnect to send it, thus reducing network overhead.
• Simple Network Management Protocol (SNMP) makes it possible to collect information from network devices and lets network administrators manipulate configuration settings.
• Simple Mail Transfer Protocol (SMTP) allows for basic e-mail service across a network.
• Network News Transfer Protocol (NNTP) enables the propagation of public discussion forums.
• Telnet is a terminal emulation program that lets a user log on to a computer from a remote location.
• Internet Relay Chat (IRC) lets numerous users connect to a server, where they can all "chat" using real-time text-based messages.
• The World Wide Web, or the Web, as it’s commonly called, is a hypertext transfer protocol that makes it possible to display documents containing clickable links to other documents.
• File Transfer Protocol (FTP) lets users transfer files across a network.
• Finger lets one user look up contact information about another user by asking a specific system for that information.
• Whois lets a user query the global Whois databases for contact and location information about a user or domain name.
• Gopher lets a user search for documents and files containing specific keywords and phrases.
• Archie searches for files by file name or parts of file names.
• RealAudio allows for the transmission and receipt of prerecorded and live audio across a network.
• VDOLive enables the transmission and receipt of prerecorded and live video across a network.
Ports and Sockets
Data sent from one computer to another on a TCP/IP network is sent to a port on the receiving computer. A port is like a person at a particular address. You can certainly send postal mail to any address you desire; however, you usually address the mail to a particular person or department so that it gets into the right hands. Ports let the correct process receive the data directly.
All ports are assigned unique numbers ranging from 0 to 32768. Today, many ports are numerically standardized and preassigned. For example, SMTP mail servers normally run on port 25, and Web servers normally run on port 80. TCP/IP uses a modifiable lookup table, usually stored in a file called Services, to determine the correct port for the correct data type. Ports may be queried by name or number. Ports can sometimes be defined on the fly by a program that facilitates other actions.
TCP uses the IP address of the receiving computer, along with the correct port number, to build the socket address. We discuss sockets later in this section; for now, just understand that sockets are low-level tools used to read and write data from, not to be confused with ports.
TCP creates a connection to the receiving computer using the socket address. Although TCP sometimes stays connected while data is being sent, staying connected while transferring data is not necessary and in fact is not the norm. After the data is sent, TCP simply disconnects from the socket. Furthermore, datagrams can arrive at the destination at different times and out of sequence. As I mentioned earlier, TCP/IP receives the datagrams and puts them together in the right order, complete with an acknowledgment to the sender.
Sockets are low-level interfaces to the TCP/IP family that were initially developed for Unix operating systems (the BSD Unix operating system was the first). Sockets are like files on your hard drive; you can read from them and write to them, which is exactly how they are used in a TCP/IP networking environment. A socket is created either to await a connection and any subsequent data exchange or to create a connection and initiate a data exchange. When a server uses a socket to wait for an incoming connection, it is a passive socket; when a client uses a socket to initiate a connection, it is an active socket. The only difference between active and passive sockets is the way different software packages use them.
0 TCP IP GENERATION NEXT
As you may have gathered, TCP/IP is an ever-evolving family of protocols. With the explosion of the Internet, we are seeing some of the limitations of this protocol suite. One problem in particular is that we will soon run out of usable IP addresses under the current specification, with so many new connections to the Internet being built and installed every day. Another major issue is security. Both of these serious problems are being addressed by various consortia that are quickly finding the answers. Let’s look at one of the foremost proposed solutions because it is likely to become a integral part of the protocol suite in the very near future.
The current version of the IP protocol is version 4, or IPv4, and the next generation, IPv6 or IPng (IP next generation), is set to become formally adopted. IPng was recommended by the IPng Area Directors of the Internet Engineering Task Force (IETF) at the Toronto IETF meeting held on July 25, 1994, as documented in RFC 1752, "The Recommendation for the IP Next Generation Protocol." (Request for Comments (RFCs) are a standard way to propose and debate the merits of any significant change or modification to a standard involving TCP/IP and the Internet in an open forum.) IPng was approved by the Internet Engineering Steering Group and made a Proposed Standard on November 17, 1994. The core set of IPng protocols was made an official IETF Proposed Standard on September 18, 1995.
IPng can be installed as a normal software upgrade to Internet devices and is interoperable with the current version of IPv4 found in today’s TCP/IP protocol. IPng is designed to run well on high performance networks, such as Asynchronous Transfer Mode (ATM), and at the same time is still efficient for low-bandwidth networks, such as wireless networks. In addition, IPng provides a platform for new Internet functions that will be required in the near future.
IPng was designed to be an evolutionary step up from IPv4 but not to be a radical step away from it. Functions that work in IPv4 were kept in the IPng specification, and likewise, the functions that didn’t work were removed. The changes from IPv4 to IPng fall primarily into the following categories:
• Expanded routing and addressing capabilities.
• IPng increases the IP address size from 32 bits to 128 bits, which obviously supports more levels of addressing and a much greater number of addressable nodes. IPng also facilitates a simpler means of automatically configuring IP addresses.
• A new type of address, the anycast address, is defined in IPng. An anycast address identifies nodes; a packet sent to an anycast address is delivered to one of the nodes. Using anycast addresses in the IPng source route lets nodes control the path along which their traffic flows. IPng address types are discussed further later in this section.
• Header format simplification - Some IPv4 header fields have been dropped or made optional to reduce the common processing cost of packet handling and to keep the bandwidth cost of the IPng header as low as possible despite the increased size of the addresses. Even though the IPng addresses are four times longer than the IPv4 addresses, the IPng header is only twice the size of the IPv4 header.
• Improved support for options - Changes in the way IP header options are encoded allow for more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options.
• Quality-of-service capabilities - A new capability enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as nondefault quality of service or real-time service.
• Authentication and privacy capabilities - IPng defines extensions that provide support for authentication, data integrity, and confidentiality. These definitions are included as a basic element of IPng and will be included in all implementations.
There are three basic types of IPng addresses: unicast, anycast, and multicast. Unicast addresses identify a single interface. Anycast addresses identify a set of interfaces so that a packet sent to an anycast address is delivered to one member of the set. Multicast addresses identify groups of interfaces, so that a packet sent to a multicast address is delivered to all the interfaces in the group. Multicast addresses in IPng supersede broadcast addresses.
IPng supports 128-bit addresses, or four times the number of bits as the IPv4 32-bit addresses. This 128-bit addressing scheme is several times the size of the current IPv4 32-bit address space - 4 billion squared times the current space, or 340,282,366,920,938,463,463,374,607,431,768,211,456 bits.
The Internet has a number of major security problems and lacks effective privacy and authentication mechanisms below the application layer. IPng corrects these shortcomings with two integrated options that provide security services. These two options may be used separately or together to provide different levels of security to different users. This feature is very important because different user communities have different security requirements.
The first security mechanism, the IPng Authentication Header, is an extension header that gives IPng datagrams authentication and integrity without confidentiality. Although the extension is algorithm independent and will support many different authentication techniques, the use of an MD5 security system has been proposed to help ensure this feature’s interoperability within the Internet.
The IPng Authentication Header can eliminate a significant class of network attacks, including host-masquerading attacks. Using the IPng Authentication Header is particularly important when source routing is used with IPng because of the known risks in IP source routing. Its placement at the Internet layer can help provide host origin authentication to those upper-layer protocols and services that currently lack meaningful protection schemes.
The second security extension header provided with IPng is the IPng Encapsulating Security Header. This particular mechanism provides integrity and confidentiality to IPng datagrams. It’s simpler than similar security protocols, such as the Network Layer Security Protocol (ISO NLSP), but it remains flexible and algorithm independent. To ensure this header’s interoperability over the Internet, the Data Encryption Standard (DES) algorithm in the Cipher Block Chaining (CBC) mode (DES CBC) is being used as the standard algorithm. The DES CBC encryption process employs a 64-bit cryptographic key system.
Overall, IPng appears to be a very promising way of minimizing, if not eliminating, a few of the major problems in TCP/IP networking, especially Internet and security problems. You can expect every major vendor on the planet to adopt and implement this new protocol version in its hardware and software.
0 TCP IP STEP 1
So far, we have learned how TCP and IP work together to move data across a network. In this section, we cover what IP addresses are and what is needed in conjunction with an IP address to move data. This section helps you understand why IP addresses are so necessary and how they are used on TCP/IP networks.
Ethernet Addresses
Each Ethernet interface or Ethernet network card installed on a network has its own unique hardware address, known as an Ethernet address or media access control (MAC) address.
A MAC address is a 48-bit number that is preprogrammed by the manufacturer of the hardware device. MAC addresses consist of a unique six-part number annotated in hexadecimal; the value of each part ranges from 00 to FF. The first three parts of the MAC address are called the organizationally unique identifier (OUI) and are assigned by the Institute for Electrical and Electronics Engineers (IEEE). OUIs are purchased by Ethernet device manufacturers, who then assign the last three parts of the MAC address, thereby making each address assignment unique. For example, 01:b7:a3:0b:e1:19 is a MAC address, where 01:b7:a3 is the OUI and 0b:e1:19 is the unique number assigned by the manufacturer.
0 TCP IP STEP 2 CLASSIFICATIONS
TCP/IP requires each host on a TCP/IP network to have its own unique IP address. An IP address is a 32-bit number, represented by a four-part decimal number (n.n.n.n), with each of the four parts - called octets - representing an 8-bit portion of the whole address number. Each octet can have a value ranging from 1 to 254. IP addresses used on the Internet are assigned and regulated by the Internet Assigned Numbers Authority, who in turn delegates the assignment process to the InterNIC. You should ask your Internet Service Provider for IP addresses when connecting your network to the Internet.
Another term to know is address pools. Address pools are blocks of IP addresses that are commonly referred to as networks. There are five types of address pools: Class A, Class B, Class C, Class D, and Class E. The first octet of the IP address represents the Class A network number; the second octet represents the Class B network number; and the third octet represents the Class C network number. The fourth octet of an IP address represents the actual host number. When you put all the octets together (e.g., 207.91.166.2), you have an IP address. Class D and Class E networks are special networks. They’re defined below, along with A, B, and C networks.
• Class A networks number large networks. The high-order bit of the first octet is always zero, which leaves seven bits in the first octet to define up to 127 networks. The remaining 24 bits of the 32-bit IP address are used to define the hosts, creating the possibility of 16,777,216 unique host addresses.
• Class B networks number medium-sized networks. The first two high-order bits of the first octet are always 10. Class B networks define up to 16,384 networks that can contain as many as 65,535 unique host addresses.
• Class C networks are typically used most often for numbering small networks. The first three bits are always 110, leaving room to define up to 2,097,152 networks, with each network having as many as 254 unique host addresses.
• Class D networks are made up of special multicast addresses that cannot be used for addressing devices on a network. The first four high-order bits are always set to 1110.
• Class E networks are reserved for experiments, with the first four high-order bits set to 1111.
IP Subnets
An IP subnet is a way of breaking a set of addresses, commonly referred to as an IP network, into smaller, more controllable pieces. When IP networks are subnetted, they can be routed independently to different gateways, which uses address space and bandwidth much more efficiently. An IP subnet operates by defining a subnet mask. The subnet mask is very similar in structure to an IP address in that it also has four parts, or octets. However, the allowable values of those octets are not quite the same as those in an IP address.
Subnet masks modify a 32-bit IP address by performing a mathematical calculation of the IP address and subnet mask at the bit level. Subnetting actually modifies the IP address by using the host address bits as additional network address bits.
The most common type of subnetting is performed on an even-byte boundary, although you may subnet a network using a bit boundary as well. An example of a subnet mask for a Class C network using an even-byte boundary is 255.255.255.0. If you use a Class C network address pool of 207.91.166.0, with usable host addresses ranging from 207.91.166.1 through 207.91.166.254, in combination with a subnet mask of 255.255.255.0, then all the addresses in that pool can be routed to the same gateway, and all are considered a part of the same logical IP network.
Subnetting can reduce the size of routing tables, minimize network traffic, isolate networks, maximize performance, and enhance your ability to secure a network. How you implement subnetting depends on many factors related to the use and design of your network.
Multihoming
A host may have more than one IP address; these hosts are known as multihomed hosts. Normally, hosts have just a single IP address; however, multihoming is necessary for several purposes, including establishing virtual Web servers. Multihoming can be useful for routing on a host computer containing more than one network card. Each card has its own unique IP address, and in practice, each of those cards could be connected to different physical network segments. With this type of configuration, more than one route to any given host can exist, which increases the probability of reaching it. This setup is useful when a network link goes down or becomes saturated with traffic.
0 TCP IP STEP 2
TCP/IP relies on certain functions and configuration settings to operate correctly. In this section, we look at some of the most crucial aspects of the protocol suite and other functions on which it depends. Pay special attention to these items because without an understanding of them, you’re probably going to find yourself either suffering from a big headache or pulling your hair out from frustration.
Gateways and Routing
Routing is the process of getting your data across a network. Routing a datagram is very similar to traveling in your car. Before you drive off to your destination, you must determine which roads you are going to take to get there, and sometimes you have to change your mind along the way, altering your route for any number of possible reasons - a road may be closed, or traffic may be too heavy on a certain highway. TCP/IP routing follows this same concept.
The IP portion of the TCP/IP protocol takes care of identifying the starting point and the destination for your data. If IP doesn’t know the address of the destination for the datagram and can’t find out, it sends the datagram to its gateway. Typically, each host on a TCP/IP network has a gateway - an off-ramp for datagrams that are not destined for the local network. If a datagram is sent to the gateway, the gateway then takes on the job of forwarding the datagram to the remote destination.
0 TCP IP STEP 3
Datagrams may travel to a particular destination one way one time and another way another time. The route is determined by many variables that occur along the route. For instance, overloaded gateways processing too much traffic may not respond in a timely manner or may simply refuse to route your traffic, causing a timeout. That timeout causes the sending gateway to seek an alternative route for the datagram. A timeout could also be caused by network links or network devices being down or many other factors.
In most cases, routes can be predefined and made to remain static if need be. Alternative routes can also be predefined, providing a maximum probability that your datagrams will arrive at their final destination. The way routing is handled on your network is purely a matter of preference. You should note that improper routing can lead to poor network performance; network routers may become overburdened with traffic or may inadvertently assign longer routes than necessary.
Hosts, Host Names, and Domain Names
The word host describes various devices on the network. Technically, any device on a network that has some sort of address and is capable of sending and/or receiving data or information can be called a host. A printer can be a host, a network fax machine can be a host, and a computer system can certainly be a host. However, hosts are usually thought of as computer systems on a network. On most networks, hosts have names. On TCP/IP networks, hosts have names that are a subset of domain names.
0 TCP IP STEP 3
Domain Name Service
Domain Name Service, or DNS, cross-references specific information to translate host names and domain names to IP addresses and vice versa using a lookup table that the network administrator defines and configures. For example, when you type www.ntshop.net in your Web browser, the DNS server returns 206.91.166.2 as an answer, allowing the Web browser to locate the server and load the home page.
Although you can run a TCP/IP network without it, DNS is considered an essential part of any TCP/IP network because it makes the task of remembering addresses much easier. Although humans think best in words, computers work best with numbers. DNS lets the human remember the name while DNS remembers the corresponding numbers, much like a phone book.
DNS tables compile records that are defined in a particular structure. Depending on the record type, the structure can be composed of four or five parts, but for the purposes of this book, we’ll focus on the three important parts: the host name, the record type, and the host address pointer.
DNS tables can store several different types of records. The most common record types are address records, mail exchange records, and alias records. Let’s look at address records, commonly eferred to as A records. A records correlate host names to IP addresses. An address record entry for a host named "mail" in the "ntshop.net" domain is shown below.
mail.ntshop.net. IN A 207.91.166.2
The next record type we’ll look at is the mail exchange record. Mail exchange records point to the mail servers for a given domain name and describe where mail for that domain should be sent. It is possible to specify several mail servers in order of preference for a given domain, thereby increasing the probability that mail will arrive at its destination if one of the servers is down or not responding.
0 TCP IP STEP 4
yourhost.ntshop.net. IN MX 10 mail.ntshop.net.
yourhost.ntshop.net. IN MX 20 mail2.ntshop.net.
yourhost.ntshop.net. IN MX 30 mail3.ntshop.net.
CNAME records, or canonical name records, are also called alias records. CNAME records allow hosts to have more than one name. For example, you may want your Web server, named www, to run your FTP server as well. You could simply create a CNAME record that creates an alias of "www" for "ftp." CNAME records depend on previously defined address records, so you need to establish an address record for "www" before "ftp" would be usable. Sample CNAME records and their associated address records are shown below.
www.ntshop.net IN A 207.91.166.2
ftp.ntshop.net IN CNAME www.ntshop.net.
When you put all these record types together in a file, you have a DNS table:
mail.domain.com IN A 207.91.166.2
mail2.domain.com IN A 207.91.166.198
www.domain.com IN A 207.91.166.4
ftp.domain.com IN CNAME www.domain.com.
host1.domain.com IN MX 10 mail.domain.com.
host1.domain.com IN MX 20 mail2.domain.com.
You can use other types of DNS records; however, we won’t cover them all in this book. DNS can be a complex subject. You should seek out one of the many books devoted to the subject if you want a complete understanding of its intricacies.
0 TCP IP STEP 5
Windows Internet Naming Service (WINS) is an essential part of the Microsoft networking topology. WINS works with TCP/IP to map NetBIOS names to IP addresses. (NetBIOS is a session-layer protocol that manages data exchange and network access on Windows operating systems.) Because TCP/IP cannot operate with NetBIOS directly, it relies on WINS to get the job done.
WINS operates much as DNS does in that it maintains a table of NetBIOS names mapped to their associated IP addresses. The main difference between WINS and DNS is that the WINS server automatically builds and updates its own tables without user intervention, whereas DNS tables must be built and updated manually. Remember, DNS maps TCP/IP host names to IP addresses, and WINS maps NetBIOS host names to IP addresses.
Each time you need to access a network resource on a Windows NT network using TCP/IP, your system needs to know the host name or IP address. WINS lets you continue using the NetBIOS names that you have already become accustomed to.
The WINS server’s IP address is defined when you configure TCP/IP after installing Windows NT, as you will see later in this chapter. When a Windows NT machine running TCP/IP is booted and attached to the network, it uses the WINS address settings in the TCP/IP configuration to communicate with the WINS server. The Windows NT machine then gives the WINS server various bits of information about itself so that the WINS server may include that information in its dynamic tables. WINS periodically refreshes this information so that its table remains current and accurate.
0 TCP IP STEP 6
One real advantage to this setup becomes apparent when you use Dynamic Host Configuration Protocol (DHCP) to dynamically assign IP addresses to machines on your network. You may recall that DNS requires static IP addresses to be defined for each host and that DNS has no way of knowing when that address changes. With WINS at its side, a Microsoft DNS server can automatically keep up with the ever-changing IP addresses by simply relying on WINS to track them automatically. Then, when DNS needs to know an IP address, it can ask the WINS server.
You can certainly use WINS and DNS on your network, or you could use one without the other. Your choice should be based on whether your network is connected to the Internet and whether you use DHCP. If you use DHCP and are connected to the Internet, you’re probably going to find that things work best with both WINS and DNS installed.
0 TCP IP STEP 7
Now that we have a basic understanding of TCP/IP and how it works on a network, let’s walk through installing and configuring TCP/IP on Windows NT Server 4.0. In this section, we work with these basic assumptions:
• you are using an Internet domain name of "company.com"
• your server’s TCP/IP host name is "www"
• your server’s IP address is 204.176.47.2
• your server has a subnet mask of 255.255.255.0
• this particular server has only one network card installed
• you have a WINS server installed and running with an IP address of 204.176.47.1
Follow these steps to install TCP/IP.
Open the Control Panel by clicking Start, choosing Settings, and clicking Control Panel. A window containing all the installed Control Panel applets will appear.
Once the Control Panel is active, scroll down until you locate the Network and double-click on it to bring up the Network Configuration dialog box Select the Protocols tab and click Add.
The Select Network Protocol dialog box will appear). Scroll down the list of available protocols until you see TCP/IP Protocol. Double-click TCP/IP Protocol or click the protocol and click OK to add it to your network configuration.
0 TCP IP STEP 8
You may be shown a dialog box like that in, asking whether you have a DHCP Server on your network and if you want to use it for dynamic IP address assignment. In most cases, you’ll want your server to have a static IP address, so click No even if you have a DHCP server on your network.
Next, the Network Protocol dialog box asks where it can find the Windows NT installation files it needs to complete the TCP/IP setup. They should be in the same place you installed your Windows NT from, usually your CD-ROM drive. Insert your CD-ROM, enter the drive letter in the dialog box as shown in and click Continue. TCP/IP Setup copies the necessary files to your hard drive and closes the dialog box to continue the setup procedure.
Now that all the necessary files have been copied, you need to set the properties of the TCP/IP drivers. Windows NT TCP/IP setup will continue by rebuilding the registry entries and bindings for the network. It will detect that TCP/IP has not been configured and bring up the TCP/IP Properties dialog box
The first tab is the IP Address tab. Make sure your network card is displayed in the Adapter list. Next, select Specify IP Address and fill in the IP Address, Subnet Mask, and Default Gateway fields. The Advanced button presents a dialog box that lets you add more IP addresses and gateways and manage some aspects of TCP/IP security. Because we assume that this host has only one gateway and one IP address, we won’t go into the Advanced dialog box at this time, but we cover the TCP/IP security settings later in this book.
Click the DNS tab to display the DNS properties First, type www, which is the host name. Now fill in the Domain field with your domain name or your ISP’s domain name; remember, we’re using "company.com" for this example. Now click Add under the DNS Service Search Order list box. You will see a dialog box where you enter an IP address of your first DNS server. After you have entered the first DNS server’s IP address, click OK, then click Add again to add your second DNS server’s IP address, if you have one. Windows NT lets you specify up to three DNS server addresses.
The Domain Suffix Search Order provides a list of domain names to search when you specify only a host name. Suppose you want to ping a host named mail.ntshop.net (ping sends a test packet to a host and waits for a response indicating that the packet arrived successfully). Open a DOS console window, type the command ping mail, and the TCP/IP protocol automatically appends your default domain name to the end, making it mail.ntshop.net, where mail is called the prefix, and ntshop.net is the suffix. Adding domain names to this list allows other domains to be searched automatically for a host with this same name. This feature can be very useful on some networks; however, for this installation example, we’ll leave this list blank.
Click the WINS Address tab to display the WINS Address properties, as shown in. Type the IP address of your WINS server in the Primary WINS server box. If your network has more than one WINS server, type the IP address of your secondary WINS server in the
0 TCP IP STEP NO 9
All computers on a TCP/IP network must use the same scope ID. Ask your network administrator whether a scope is defined for your network and type the scope ID in this field. If you don’t have a scope on your network, simply leave this field blank. Most Windows NT networks don’t use a Scope ID.
Next, click the DHCP Relay. DHCP lets workstations and servers be assigned IP addresses automatically. The primary reason for using DHCP is that it can provide a centralized method of managing IP addresses. We won’t delve into all the details of DHCP in this book, and for example purposes, we’ll assume that you are not using a DHCP server on your network, so no changes are necessary.
Now click the Routing tab to display the routing properties The Routing dialog box has a single checkbox labeled Enable IP Forwarding. IP forwarding allows datagrams to be forwarded on a multihomed host. A multihomed host has more than one network card installed or more than one IP address assigned to a network card. With multihomed hosts, sometimes datagrams need to be routed between the network cards to other parts or segments of the network. This setting is a key factor in establishing a secure network segment and is covered later in this book. For now, do not select the check box.
Now that you’ve completed configuring the TCP/IP properties, click OK to finish the setup process. The Binding Review is completed, and a dialog box asking whether you want to reboot now appears. It is always best to reboot whenever Windows NT asks you, so click Yes. Windows NT will write your settings to the registry and reboot. The registry can be viewed and modified with Regedt32.exe, which we cover later in this book.
After the server has rebooted, you can log on and test the configuration using the Ping utility. Open a DOS console window by clicking Start, selecting Programs, and choosing MS-DOS. When the DOS window opens, type the following command: ping 127.0.0.1. You should see a response similar to the one shown in
Ping sends a diagnostic packet to the address specified and waits for a response for a predetermined amount of time. We use the address 127.0.0.1 in this instance because it is a special loopback address designed for testing. If Ping does not receive a response in the predetermined amount of time, a time-out error is reported, as shown in
After you have pinged the localhost address, you should try to ping another host on your network to make sure everything is working correctly. For example, if you have another host on your network with the IP address 207.91.166.199, you can ping that address, as shown . You may also want to test your DNS or WINS setup at this time as well. You can
0 TCP IP INFORMATION WITH STEP 10
Also, if your network is already attached to the Internet, you can test your gateway by pinging a host that you know is somewhere on the Internet. For example, you could try pinging the Windows NT Magazine Web server by typing ping www.winntmag.com. You should always get a response similar to the one shown in except that the response times might be a bit longer, because your packets have to travel across the Internet and back.
Now that you have installed TCP/IP on your Windows NT machine, I’ll remind you that you have made an excellent choice for a networking protocol. TCP/IP is absolutely the most performance-oriented protocol you can use, and when it comes to connecting to the Internet, there is simply no other choice.
SUMMARY
Now that we have a basic understanding of TCP/IP and how it works, it should be clear that TCP/IP has many advantages. When you use TCP/IP on an intranet with Windows NT, you gain one distinct advantage over using TCP/IP with other types of network operating systems: ease of configuration and use. You should also understand that literally hundreds of vendors are creating software for the Windows NT operating system, which obviously increases the likelihood of finding software that does what you need.
Another major advantage of using TCP/IP and Windows NT on your intranet is the cross-platform connectivity. TCP/IP is available for almost every operating system in production today. Because TCP/IP is a standard family of protocols, connecting dissimilar operating systems is a breeze. You can connect new systems to older legacy systems in a snap. For example, if your network is composed of Apple Macintosh systems, minicomputers, mainframes, Unix systems, IBM PCs running Novell, and IBM PC-compatible systems running some version of Windows, the components normally would not be able to communicate with each other at all. But with TCP/IP installed on each of them, they are all capable of communicating and transferring data back and forth with ease. This flexibility is not possible with any other networking protocol today.
TCP/IP is the revolution that the computer industry has needed for a long time; however, it has taken the vast popularity of the Internet to institute its wide-spread implementation. Here are some of the major benefits of using TCP/IP:
• TCP/IP is a routable protocol with the ability to send datagrams using a very specific route, which in turn reduces traffic on other parts of a network.
• TCP/IP has a lower overhead than other protocols, which allows much larger networks to be constructed.
• TCP/IP is reliable and has efficient data delivery mechanisms.
• TCP/IP is standardized for cross-platform implementation, making TCP/IP able to send data between computer systems running completely different operating systems, from PCs to mainframes and almost everything in between.
• TCP/IP provides a common addressing scheme across all operating system platforms.
• TCP/IP can run over a variety of network types including Ethernet, Token Ring, X.25, Frame Relay, and even dialup lines.
Sunday, 29 November 2009
0 Top Job sites for apply in for job
Email: i.jetmaster@gmail.com
www.naukri.com
www.3p-lobsearch.com
www.career1000.com
www.careerindia.com
www.employindia.com
www.indianjobs.com
www.placementindia.com
www.placementpoint.com
www.timesjobsandcareers.com
www.winjobs.com
www.redforwomen.com
www.go4careers.com
www.indiaventures.com
www.indiagateway.com
www.jobsahead.com
www.alltimejobs.com
www.careerage.com
www.headhunters.net
www.monster.com
www.careers.org
www.eresumes.com
www.careerxroads.com
www.nationjob.com
www.jobweb.com
www.aidnjobs.com
www.careerforyou.com
www.careergun.com
www.go4careers.com
www.lobs.itspace.com
www.joboptions.com
www.careermosaic.com
www.jobconnection.com
www.bestjobsusa.com
www.careerpath.com
www.americasemployers.com
www.job-interview.net
www.geojobs.bizland.com
www.job-hunt.org
www.e-netindia.com
www.mykeystone.com
www.gutterspace.com
www.netguide.com
www.tamilnadustate.com
www.cweb.com
www.espan.com
www.jobcurry.com
www.skillsandjobs.com
www.cioljobs.com
www.lampen.co.nz
www.gujaratjobs.com
www.rojgar.com
0 General shortcut keys for Windows 2007 latest edition 2009

Author: Smith Solace
Press this key
To do this
F1
Display Help
Ctrl+C
Copy the selected item
Ctrl+X
Cut the selected item
Ctrl+V
Paste the selected item
Ctrl+Z
Undo an action
Ctrl+Y
Redo an action
Delete
Delete the selected item and move it to the Recycle Bin
Shift+Delete
Delete the selected item without moving it to the Recycle Bin first
F2
Rename the selected item
Ctrl+Right Arrow
Move the cursor to the beginning of the next word
Ctrl+Left Arrow
Move the cursor to the beginning of the previous word
Ctrl+Down Arrow
Move the cursor to the beginning of the next paragraph
Ctrl+Up Arrow
Move the cursor to the beginning of the previous paragraph
Ctrl+Shift with an arrow key
Select a block of text
Shift with any arrow key
Select more than one item in a window or on the desktop, or select text within a document
Ctrl with any arrow key+Spacebar
Select multiple individual items in a window or on the desktop
Ctrl+A
Select all items in a document or window
F3
Search for a file or folder
Alt+Enter
Display properties for the selected item
Alt+F4
Close the active item, or exit the active program
Alt+Spacebar
Open the shortcut menu for the active window
Ctrl+F4
Close the active document (in programs that allow you to have multiple documents open simultaneously)
Alt+Tab
Switch between open items
Ctrl+Alt+Tab
Use the arrow keys to switch between open items
Ctrl+Mouse scroll wheel
Change the size of icons on the desktop
Windows logo key +Tab
Cycle through programs on the taskbar by using Aero Flip 3-D
Ctrl+Windows logo key +Tab
Use the arrow keys to cycle through programs on the taskbar by using Aero Flip 3-D
Alt+Esc
Cycle through items in the order in which they were opened
F6
Cycle through screen elements in a window or on the desktop
F4
Display the address bar list in Windows Explorer
Shift+F10
Display the shortcut menu for the selected item
Ctrl+Esc
Open the Start menu
Alt+underlined letter
Display the corresponding menu
Alt+underlined letter
Perform the menu command (or other underlined command)
F10
Activate the menu bar in the active program
Right Arrow
Open the next menu to the right, or open a submenu
Left Arrow
Open the next menu to the left, or close a submenu
F5
Refresh the active window
Alt+Up Arrow
View the folder one level up in Windows Explorer
Esc
Cancel the current task
Ctrl+Shift+Esc
Open Task Manager
Shift when you insert a CD
Prevent the CD from automatically playing
windows dialog box short cuts
Ctrl+Tab
Move forward through tabs
Ctrl+Shift+Tab
Move back through tabs
Tab
Move forward through options
Shift+Tab
Move back through options
Alt+underlined letter
Perform the command (or select the option) that goes with that letter
Enter
Replaces clicking the mouse for many selected commands
Spacebar
Select or clear the check box if the active option is a check box
Arrow keys
Select a button if the active option is a group of option buttons
F1
Display Help
F4
Display the items in the active list
Backspace
Open a folder one level up if a folder is selected in the Save As or Open dialog box
Windows Explorer shortcuts
Ctrl+Tab
Move forward through tabs
Ctrl+Shift+Tab
Move back through tabs
Tab
Move forward through options
Shift+Tab
Move back through options
Alt+underlined letter
Perform the command (or select the option) that goes with that letter
Enter
Replaces clicking the mouse for many selected commands
Spacebar
Select or clear the check box if the active option is a check box
Arrow keys
Select a button if the active option is a group of option buttons
F1
Display Help
F4
Display the items in the active list
Backspace
Open a folder one level up if a folder is selected in the Save As or Open dialog box
Ctrl+N
Open a new window
Ctrl+Shift+N
Create a new folder
End
Display the bottom of the active window
Home
Display the top of the active window
F11
Maximize or minimize the active window
Num Lock+Asterisk (*) on numeric keypad
Display all subfolders under the selected folder
Num Lock+Plus Sign (+) on numeric keypad
Display the contents of the selected folder
Num Lock+Minus Sign (-) on numeric keypad
Collapse the selected folder
Left Arrow
Collapse the current selection (if it's expanded), or select the parent folder
Alt+Enter
Open the Properties dialog box for the selected item
Alt+P
Display the preview pane
Alt+Left Arrow
View the previous folder
Right Arrow
Display the current selection (if it's collapsed), or select the first subfolder
Alt+Right Arrow
View the next folder
Alt+Up Arrow
View the parent folder
Ctrl+Mouse scroll wheel
Change the size and appearance of file and folder icons
Alt+D
Select the address bar
Ctrl+E
Select the search box
0 Virtual Memory to the Windows Xp Pc
Virtual pc paging memory
We have lots more ways to add the speed to the computer like for that we add the valuable hardware that cost us meanly a sort of precious dollars there are certain ways threw which we can add the speed without adding the hardware.
1) Increase your paging memory
You can increase your paging memory in the windows xp with the help of the advance option that comes with the windows xp.
This is just common idea but very creative for all those who are in need to have speed.
Here is the first step
First of all click on my computer icon from the desktop just right click on it.
It will show the properties option from the right click menu. So click on it and then click on the advance option of the tab and then select the option.
Step two
From the performance option of the properties click on the settings then again select the advance after that select the change button from the dialog box appears there.
Step three
Actually this is the main option of adding the extra space of the hard disk to the memory area we can extend the limits of the paging memory of the computer by adding spaces of allocated gigabyte hard disk space then it will just like that given in the image.
After adding or changing the criteria of the space just do apply the changes with the applying changes you can have added spaces to the computer so paging memory increases the performance of the windows system it is just increasing the minor speed but still the speed is important in case of the fact that particular user is programmer.
Caution: it might be possible to certain extent that increasing the hard disk space of the computer to the paging memory will change your setting if there is lesser space on your computer hard disk so it might instable the computer system.
But it melts the computer is very rare case so don’t worry just you can use this option if there is enough space available on your hard disk friends.
Another way is to defrag the contents of the data.
Defrag: mainly is a term used to set up the data into particular sort of the order.
Normally it will do defrag and sets the data in to the particular order and as according the need of the computer processing unit.
For defrag just click on the analyze option then click on defrag it will show the file types and threads in different colors like green, red etc. after completing this the report will display and it will add the speed to the computer.
Sunday, 15 November 2009
0 101 Ways to make some one happy and Smile
Friends I dont know How am i look like and what my friends thinks for me but only i have learned that be happy and make someone happy because life is precious dont spoil it and do what others like in a way what you want from others same other expects from you in a way life is too small to carry problems and tensions forget worst things in your life and prey for the jesus ( god ) to make your life happy and sensitive to feel like positive emotions in your life this is my words and i am not forcing you but there is a way to smile that takes a feel of Life in Nature.
see 101 ways to happyness and smile .
01. Call an old friend, just to say hi.
02. Hold a door open for a stranger.
03. Invite someone to lunch.
04. Compliment someone on his or her appearance.
05. Ask a coworker for their opinion on a project.
06. Bring cookies to work.
07. Let someone cut in during rush hour traffic.
08. Leave a waitress or waiter a big tip.
09. Tell a cashier to have a nice day.
10. Call your parents.
11. Let someone know you miss them.
12. Treat someone to a movie.
13. Let a person know you really appreciate them.
14. Visit a retirement center.
15. Take a child to the zoo.
16. Fill up your spouse's car with gas.
17. Surprise someone with a small gift.
18. Leave a thank-you note for the cleaning staff at work.
19. Write a letter to a distant relative.
20. Tell someone you thought about them the other day.
21. Put a dime in a stranger's parking meter before the time expires.
22. Bake a cake for a neighbor.
23. Send someone flowers to where they work.
24. Invite a friend to tea.
25. Recommend a good book to someone.
26. Donate clothing to a charity.
27. Offer an elderly person a ride to where they need to go.
28. Bag your own groceries at the checkout counter.
29. Give blood.
30. Offer free baby-sitting to a friend who's really busy or just needs a break.
31. Help your neighbor rake leaves or shovel snow.
32. Offer your seat to someone when there aren't any left.
33. Help someone with a heavy load.
34. Ask to see a store's manager and comment on the great service.
35. Give your place in line at the grocery store to someone who has only a few items.
36. Hug someone in your family for no reason.
37. Wave to a child in the car next to you.
38. Send a thank-you note to your doctor.
39. Repeat something nice you heard about someone else.
40. Leave a joke on someone's answering machine.
41. Be a mentor or coach to someone.
42. Forgive a loan.
43. Fill up the copier machine with paper after you're done using it.
44. Tell someone you believe in them.
45. Share your umbrella on a rainy day.
46. Welcome new neighbors with flowers or a plant.
47. Offer to watch a friend's home while they're away.
48. Ask someone if they need you to pick up anything while you're out shopping.
49. Ask a child to play a board game, and let them win.
50. Ask an elderly person to tell you about the good old days.
51. During bad weather, plan an indoor picnic with the family.
52. Buy someone a goldfish and bowl.
53. Compliment someone on their cooking and politely ask for a second helping.
54. Dance with someone who hasn't been asked.
55. Tell someone you mentioned them in your prayers.
56. Give children's clothes to another family when your kids outgrow them.
57. Deliver extra vegetables from your garden
to the whole neighborhood.
58. Call your spouse just to say, I love you.
59. Call someone's attention to a rainbow or beautiful sunset.
60. Invite someone to go bowling.
61. Figure out someone's half-birthday by adding 182 days, and surprise them with a cake.
62. Ask someone about their children.
63. Tell someone which quality you like most about them.
64. Brush the snow off of the car next to yours.
65. Return your shopping cart to the front of the store.
66. Encourage someone's dream, no matter how big or small it is.
67. Pay for a stranger's cup of coffee without them knowing it.
68. Leave a love letter where your partner will find it.
69. Ask an older person for their advice.
70. Offer to take care of someone's pet while they're away.
71. Tell a child you're proud of them.
72. Visit a sick person, or send them a care package.
73. Join a Big Brother or Sister program.
74. Leave a piece of candy on a coworker's desk.
75. Bring your child to work with you for the afternoon.
76. Give someone a recording of their favorite music.
77. Email a friend some information about a topic they are especially interested in.
78. Give someone a homemade gift.
79. Write a poem for someone.
80. Bake some cookies for your local fire or police department.
81. Organize a neighborhood cleanup and have a barbecue afterwards.
82. Help a child build a birdhouse or similar project.
83. Check in on an old person, just to see if they're okay.
84. Ask for the recipe after you eat over at someone's house.
85. Personally welcome a new employee at work and offer to take them out for lunch.
86. While in a car, ask everyone to buckle up because they are important to you.
87. Let someone else eat the last slice of cake or pizza.
88. Stop and buy a drink from a kid's lemonade stand.
89. Forgive someone when they apologize.
90. Wave to someone looking for a parking space when you're about to leave a shopping center.
91. Send a copy of an old photograph to a childhood friend.
92. Leave a pint of your spouse's favorite flavor of
ice cream in the freezer with a bow on it.
93. Do a household chore that is usually done
by someone else in the family.
94. Be especially happy for someone when they tell you their good news.
95. Compliment a coworker on their role in a successful project.
96. Give your spouse a spontaneous back rub at the end of the day.
97. Serve someone in your family breakfast in bed.
98. Ask someone if they've lost weight.
99. Make a donation to a charity in someone's honor.
100. Take a child to a ballgame.
And last, but not least...
101. Forward this list to 10 of your favorite people!
Sunday, 1 November 2009
0 The Wise Songbird- Special Story of the Month
Once upon a time there was a golden songbird that lived in a beautiful garden. It spent all its days singing the loveliest songs to the honour of its maker and the delight of all the people who heard it.
But the keeper of the garden, who was a foolish and greedy man, coveted the little songster, and one day he made a cunning net in which he snared it. The little bird begged the man to release him and promised to tell him three great secrets if only he would let him go. Now the gardener really was a very greedy man and rubbing his hands together, he eagerly released the bird.
Then the songbird told him it's three great secrets:Never believe all that you hear; Never regret what you have never lost, and never throw away that which you have in your keeping.
The gardener was furious when he heard this and said he had known these so-called 'secrets' since he was a little child and shouted that the bird had tricked him. But the songbird quietly replied that if the man had really known these three secrets, or only the last of them, he would never have let him go.
Then the bird added:"I have a most precious jewel weighing over three ounces hidden inside me and whoever possesses that marvellous stone will have every wish granted."
On hearing this, the keeper roared like a lion and cursed himself for setting the songster free. But the little bird only added fuel to his rage by explaining that since he weighed no more than half an ounce at most, as anyone with eyes could plainly see, how was it possible that a gem weighing more than three ounces could be hidden within it's tiny body?
At that the man tore his hair and lunged at the bird in a towering rage, but the little songbird flew to a nearby branch and added sweetly:"Since you never had the jewel in your hands you are already regretting what you never lost, and believing what I told you, you threw it away by setting me free."
Then the little songbird told the man to study well these three great secrets and so become as wise as the bird himself!
Sunday, 20 September 2009
0 Port Scanners
In Internet security, no hacking tool is more celebrated than the scanner. It is said that a good TCP port scanner is worth a thousand user passwords. Before I treat the subject of scanners in depth, I want to familiarize you with scanners. Try not to get inundated by the plethora of information that you can find on scanners. Get the basics right and you'll be well set.
What Is a Scanner?
A scanner is a program that automatically detects security weaknesses in a remote or local host. By deploying a scanner, a user in Los Angeles can uncover security weaknesses on a server in Japan without ever leaving his or her living room.
True scanners are TCP port scanners, which are programs that attack TCP/IP ports and services (Telnet or FTP, for example) and record the response from the target. In this way, they glean valuable information about the target host (for instance, can an anonymous user log in?). Other so-called scanners are merely UNIX network utilities. These are commonly used to discern whether certain services are working correctly on a remote machine. These are not true scanners, but might also be used to collect information about a target host.
A scanner might reveal certain inherent weaknesses within the target host. These might be key factors in implementing an actual compromise of the target's security. In order to reap this benefit, however, you must know how to recognize the hole. Most scanners do not come with extensive manuals or instructions. Interpretation of data is very important.
Limitations of Scanners
A scanner won't tell you the following:
A step-by-step method of breaking in.
The degree to which your scanning activity has been logged.
Basic features of a Scanner
The primary attributes of a scanner is the capability to find a machine or network Once having found a machine, to find out what services are being run on the host. The capability to test those services for known holes This process is not incredibly complex. At its most basic, it involves capturing the messages generated when one tries to connect to a particular service.
Importance of scanners
Scanners are important to Internet security because they reveal weaknesses in the network. Whether this information is used by hackers or crackers is immaterial. If used by system administrators, scanners help strengthen security in the immediate sense. If employed by crackers, scanners also help strengthen security. This is because once a hole has been exploited, that exploitation will ultimately be discovered. Some system administrators argue that scanners work against Internet security when in the hands of crackers. This is not true. If a system administrator fails to adequately secure his or her network (by running a scanner against it), his or her negligence will come to light in the form of a network security breach.
Going through this article, you may feel that scanners are only for UNIX machines. It is not so. But the fact remains that scanners were designed initially for the UNIX machines. And that was because almost 90% of the Internet was run on UNIX machines. Today you can find scanners for any platform, offering unlimited functionality and power. Scanners, unlike sniffers, e-mail bombers, trojans, etc are not illegal. They are viewed upon as tools to improve Internet security rather than breach it.
A good scanner that I'll recommend novices for the Win 32 platform is SuperScan.
0 what is the sub types of Viruses?
Types of viruses
Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Examples: Sunday, Cascade
Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk.
Examples: Invader, Flip, and Tequila
Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale
Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Macro Viruses: A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers.
Examples: DMV, Nuclear, Word Concept.
Active X: ActiveX and Java controls will soon be the scourge of computing. Most people do not know how to control there web browser to enable or disable the various functions like playing sound or video and so, by default, leave a nice big hole in the security by allowing applets free run into there machine. There has been a lot of commotion behind this and with the amount of power that JAVA imparts, things from the security angle seem a bit gloom.
These are just few broad categories. There are many more specialized types. But let us not go into that. We are here to learn to protect our self, not write a thesis on computer virus specification.