Friday, January 31, 2014

Partitions With Fdisk And Format From Dos Tutorials And Notes

Partition A Hard Drive Using Fdisk And Format

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

ITKiDuniyaa Define Fdisk?

For computer file systems, fdisk (for "fixed disk") is a command-line utility that provides disk partitioning functions. In versions of the Windows NT operating system line from Windows 2000 onwards, fdisk is replaced by more advanced tool called diskpart. Similar utilities exist for Unix-like systems.

Implementations

DOS and Windows

IBM introduced fdisk, Fixed Disk Setup Program version 1.00, with the March 1983 release of the IBM PC/XT, the first PC to store data on a hard disk, and the IBM Personal Computer DOS version 2.0. Version 1 could be used to create one FAT12 DOS partition, delete it, change the active partition or display partition data. fdisk writes the master boot record, which supported up to four partitions. The other three were intended for other operating systems such as CP/M-86 and Xenix, which were expected to have their own partitioning utilities as fdisk did not support them.

In August 1984, PC DOS 3.0 added FAT16 partitions to support larger hard disks more efficiently.

In April 1987, PC DOS/fdisk 3.30 added support for extended partitions, which could hold up to 23 "logical drives" or volumes.

Support for FAT16B was added with Compaq MS-DOS 3.31, and later became available with MS-DOS/PC DOS 4.0.

Most DOS fdisk programs, including the fdisk program that came with the original Windows 95, are only capable of creating FAT partitions of types FAT12, FAT16 and FAT16B.

A derivative of the MS-DOS fdisk was provided with Windows 95, Windows 98, and later Windows Me. Only those fdisk versions shipping with Windows 95B or later are able to manipulate FAT32 partitions. Windows 2000 and later do not use fdisk, they have the Logical Disk Manager feature, as well as DiskPart.

Unlike the fdisk programs for other operating systems, the fdisk programs for DOS and Windows 9x/Me not only alter data in the partition table, but will also overwrite many sectors of data in the partition itself.[citation needed] (However, to create an extended partition any partition editor must put extended boot records before each logical drive on the disk.) Users must be sure the correct disk/partition has been chosen before using a DOS/Windows fdisk for partitioning. The fdisk /mbr switch is undocumented but well known for repairing the master boot record.

FreeDOS

The implementation of fdisk in FreeDOS has many advanced features and is free software.

Unix-like systems

Linux needs at least one partition, namely for its root file system. It can use swap files and/or swap partitions. Almost all Linux installations have a second partition dedicated as swap space.

Other Intel based Unix-like systems typically use a more elaborate arrangement. BSD-derived systems use a disklabel as their primary method of identifying distinct sections of the disk, usually termed slices. These slices may or may not correspond to partitions enumerated in the master boot record. A typical arrangement is for the entire Unix system to have a single partition allocated to it which is then subdivided into distinct slices for each filesystem and the swap area. Other partitions outside this dedicated one may be legitimately referenced in a disklabel - this is particularly true in dual boot scenarios, where it is desired that the Unix system be able to access partitions used by other operating systems residing on the same machine.

This approach is not mandatory since the MBR and bootlabel are two distinct records - it is technically possible (but not recommended) for the disklabel to describe a filesystem on an area of the disk that the MBR regards as unused. Regardless of the correlation between the two records, the 'entire disk' slice of the disklabel usually corresponds to the entire physical disk and not solely to the dedicated partition. In order to eliminate any possibility of confusion caused by these two (possibly contradictory) records, the sysadmin of these systems may elect to eliminate the master boot record from the disk. However, a disk laid out this way is unusable by any other operating systems.

The situation with System V-derived systems is similar to that with the BSDs, although the terminology usually used differs slightly. In this instance a single partition is subdivided using the divvy command, and such areas are often simply referred to as divisions.

On older Intel compatible hardware, the BIOS that boots the system can often only access the first 1024 cylinders of the disk. For this reason a separate filesystem, often of only a few megabytes, is often created at the start of the disk to store the kernel image and a few auxiliary files needed at boot time, ensuring that they are readable by the BIOS. Once the kernel is loaded and has taken over responsibility for disk activity, the filesystem is typically mounted on /boot or /stand. There may also be reasons of security, ease of administration and backup, or testing, to use more than the minimum number of partitions.

OS/2

OS/2 shipped with two partition table managers up until version 4.0. These were the text mode fdisk and the GUI-based fdiskpm. The two have identical functionality, and can manipulate both FAT partitions and the more advanced HPFS partitions.

OS/2 versions 4.5 and higher (including eComStation) can use the JFS filesystem as well as FAT and HPFS, and replace fdisk with the Logical Volume Manager (LVM).

ITKiDuniyaa Explains Fdisk In Simple Words

FDISK is a utility, included in all versions of MS-DOS and Windows, for formatting (preparing) a hard disk drive to hold data and to logically partition the disk, specifying and naming major portions of it for different uses. FDISK is used to prepare and partition a brand new hard drive, and typically most personal computers today arrive with the drive already partitioned and loaded with the operating system and perhaps other software. A typical personal computer today arrives with a single partition that is addressed by the operating system as the logical C drive. (Some PCs also have one or two diskette drives addressed as the A and B drives. PCs with CD-ROMs also usually address the CD-ROM as the D drive. But a hard disk drive can be divided into and addressed as several "logical" drives, or partitions.)

In addition to setting up a new hard disk drive, FDISK is used for repartitioning the hard drive when you want to change something. For example, a computer can be set up as a dual boot system, with one operating system (for example, Windows 2000) in one partition and another operating system (for example, Linux) in another partition. Disk partitioning is also commonly used on LAN servers, where different sets of users share different files and applications. The maximum partition size in the first version of DOS to use FDISK was 16 megabytes. Recent Windows systems support hard drives up to 2 terabytes (2,000 gigabytes) in size!

If you need to repartition your current hard drive, be sure to back up all data because it will be lost when you use FDISK. Be careful to follow the documented Microsoft and manufacturer directions.

The age of your computer and the operating system you use determines how difficult the hard drive installation will be. The Basic Input Output System (BIOS) in computers manufactured before 1994 does not support drives larger than 512 MB, which causes FDISK to display larger hard drives as only 512 MB in size. It is necessary to use disk management software that helps an older BIOS version to recognize a hard drive larger than 512 MB. Disk management software is usually included with your new hard drive or free upon request from the hard drive manufacturer. You can also purchase a BIOS upgrade such as an EPROM chip, flash memory BIOS software, a controller card, or a card with a BIOS chip on it depending on the manufacturer's recommendation. Depending on your operating system, you may have to create multiple partitions in order to use your hard drive's full capacity:

    DOS version 6.22 and later supports drives greater than 8.4 GB. Versions earlier than 6.22 do not.
    Windows 95A does support drives larger than 8.4 GB, but you have to partition the drive into at least four partitions depending on the hard drive's size because of FAT 16 file system's limitations used by Windows 95A. Windows 95B supports FAT 32, which allows one large partition on new hard drives and supports hard drives up to 2,000 GB in size.
    The first and later editions of Windows 98 support FAT 32 and hard drives up to 2,000 GB.
    Windows NT version 5.0 and later also supports large hard drives.


FDISK has its limitations. You can't move applications from one partition to another without uninstalling and reinstalling the software. FDISK erases all data on your hard drive. And you can't delete or create new partitions without going through the entire FDISK and formatting process again. However, special partitioning software such as PartitionMagic can be used instead of FDISK. Partitioning software allows you to create, delete, and resize partitions without losing your data. You can move applications from one partition to another without uninstalling and reinstalling the application. You can hide partitions to protect data from other users. You can also use partitioning software as a boot manager. A boot manager allows you to install and use more than one operating system easily. Partition software also eliminates the need for a BIOS upgrade in older computers.

ITKiDuniyaa Explains Fdisk In Short Words

A DOS and Windows utility that prepares a hard disk for formatting by creating one primary partition on the disk.

ITKiDuniyaa Define Formatting?

To format an unformatted floppy fresh from the box, put it into drive A or B and type:

format a:   or   format b:


and answer the prompts.


FLOPPY DISK SIZES

There are four floppy disk capacities:

Diameter  Capacity  Name
5.25"     1.2MB     High density
5.25"     360KB     Low density (Double Density)
3.5"    1.44MB     High density
3.5"     720KB     Low density (Double Density)




Higher-density drives can read and write low-density disks. But to format a low-density disk in a high-density drive, you must modify the command as follows.


FORMATTING 5.25" DISKS

To format a 360K disk in a 1.2M drive, type:

format a: /4         All versions
format a: /f:360     DOS 4.01 and up




Caution!
360K disks formatted on very early 1.2MB drives may cause reading problems.


FORMATTING 3.5" DISKS

To format a 720KB disk in a 1.44MB drive, type:

format a: /n:9 /t:80  All versions
format a: /f:720      DOS 4.01 and up



To format a 1.44M disk in a 2.88M drive, type:

format a: /f:1.44



REFORMATTING A FLOPPY (As of DOS 5)

The /q switch causes Format to bypass checking for bad sectors. To quickly reformat a formatted disk that you know is OK, type:

format a: /q



Previous to DOS 5, the format program completely formatted a floppy losing all data if previously formatted. As of DOS 5, Format creates a "safe format" by saving additional data on the disk. This takes a bit longer but allows the disk to be unformatted. Since you will not have to unformat blank disks, you can format "unconditional" and speed up the format process with the /u switch:

format a: /u


Also previous to DOS 5, any bad sector on a diskette eliminated the entire track. As of 5, only that sector is marked as bad.


CREATING A BOOTABLE FLOPPY

To format a floppy and make it "bootable" by copying DOS from the hard disk onto it, type:

format a: /s


The DOS COMMAND.COM file is also necessary on the bootable floppy. Starting with DOS 5, the Format command copies COMMAND.COM to the floppy automatically. In DOS 4.01 and earlier, you have to copy COMMAND.COM manually.


Formatting a Hard Disk Is Three Steps

WHAT YOU DO         WHAT YOU USE
1. Low-level format    Low-level format program
2. Create partitions   FDISK.EXE program
3. High-level format   FORMAT.COM program




LOW-LEVEL FORMAT

All IDE hard disks and most SCSI disks are already low-level formatted at the factory. Sometimes the SCSI host adapter (controller card) requires that a low-level format be performed on each new SCSI drive that is added to the system. Read the instructions that come with your host adapter to be sure. The low-level SCSI format utility is typically built into the host adapter and is launched by pressing a certain key immediately after the computer is turned on.


CREATE PARTITIONS WITH FDISK

Every hard disk must be partitioned after it is low-level formatted. Even if one drive letter serves the entire disk, you must use the Fdisk utility to create a primary partition for that disk. If your DOS version cannot support the full size of the disk, or if you want to divide up your disk for your own storage reasons, you first make a primary partition and then an extended partition for the logical drives to reside in.

DOS       Disk size
Version   Supported
3.3       32MB
4.0       512MB
5.0       2GB
6.0       2GB




To Fdisk your C: drive, boot the computer with a bootable floppy in drive A:, which also contains the FDISK.EXE program. At the A: prompt, type:

A:\>fdisk


Select from the options. In Fdisk, drives are not letters, they are numbered (1, 2, etc.). In Fdisk, the active partition is the one you boot from and is assumed to be the C: drive. If it is not, you can change that in Fdisk.

If you want to Fdisk a second or subsequent hard disk, load Fdisk from the C: drive:

C:\>fdisk



HIGH-LEVEL FORMAT

The final step is to run the Format command for each logical drive (C:, D:, etc.). This step creates the directory structure and FAT tables and places startup data in the boot sector.

To format your C: drive, boot the computer with a bootable floppy in drive A:, which also contains the FORMAT.COM program. Use the /s switch to transfer DOS to the hard disk as soon as the formatting is completed. To format drive C, type:

A:\>format c: /s



To format a second or subsequent hard drive, load Format from your C: drive. For example, to format drive D:, type:

C:\>format d:

How to Use The Fdisk Tool To Partitions Or Repartitions A Hard Disk [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 2
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 3
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 4
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 5
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 6
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 7
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 8
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Partition Making With Fdisk Step 9
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

How To Use The Format Tool To Formatting Drives [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Drives Formatting With Format Command Step 1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Drives Formatting With Format Command Step 2

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Drives Formatting With Format Command Step 3
For More Latest Tech Updates, Stay With Us On itkiduniyaa.blogspot.com
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Thursday, January 30, 2014

Creat New VPN L2TP/IPSec Connection In Windows XP

VPN L2TP/IPSec Connection Definition

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

ITKiDuniyaa Define VPN L2TP/IPSec Connection?

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

History

Published in 1999 as proposed standard RFC 2661, L2TP has its origins primarily in two older tunneling protocols for Point-to-Point communication: Cisco's Layer 2 Forwarding Protocol (L2F) and USRobotics Point-to-Point Tunneling Protocol (PPTP). A new version of this protocol, L2TPv3, was published as proposed standard RFC 3931 in 2005. L2TPv3 provides additional security features, improved encapsulation, and the ability to carry data links other than simply PPP (PPP) over an IP network (e.g., Frame Relay, Ethernet, ATM, etc.).

Description

The entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol (UDP) datagram. It is common to carry PPP sessions within an L2TP tunnel. L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. The combination of these two protocols is generally known as L2TP/IPsec (discussed below).

The two endpoints of an L2TP tunnel are called the LAC (L2TP Access Concentrator) and the LNS (L2TP Network Server). The LAC is the initiator of the tunnel while the LNS is the server, which waits for new tunnels. Once a tunnel is established, the network traffic between the peers is bidirectional. To be useful for networking, higher-level protocols are then run through the L2TP tunnel. To facilitate this, an L2TP session (or 'call') is established within the tunnel for each higher-level protocol such as PPP. Either the LAC or LNS may initiate sessions. The traffic for each session is isolated by L2TP, so it is possible to set up multiple virtual networks across a single tunnel. MTU should be considered when implementing L2TP.

The packets exchanged within an L2TP tunnel are categorized as either control packets or data packets. L2TP provides reliability features for the control packets, but no reliability for data packets. Reliability, if desired, must be provided by the nested protocols running within each session of the L2TP tunnel.

L2TP allows the creation of a virtual private dialup network (VPDN) to connect a remote client to its corporate network by using a shared infrastructure, which could be the Internet or a service provider's network.

Tunneling models

An L2TP tunnel can extend across an entire PPP session or only across one segment of a two-segment session. This can be represented by four different tunneling models, namely:

    voluntary tunnel
    compulsory tunnel — incoming call
    compulsory tunnel — remote dial
    L2TP multihop connection


L2TP packet structure

An L2TP packet consists of :

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Field meanings:

Flags and version
    control flags indicating data/control packet and presence of length, sequence, and offset fields.
Length (optional)
    Total length of the message in bytes, present only when length flag is set.
Tunnel ID
    Indicates the identifier for the control connection.
Session ID
    Indicates the identifier for a session within a tunnel.
Ns (optional)
    sequence number for this data or control message, beginning at zero and incrementing by one (modulo 216) for each message sent. Present only when sequence flag set.
Nr (optional)
    sequence number for expected message to be received. Nr is set to the Ns of the last in-order message received plus one (modulo 216). In data messages, Nr is reserved and, if present (as indicated by the S bit), MUST be ignored upon receipt..
Offset Size (optional)
    Specifies where payload data is located past the L2TP header. If the offset field is present, the L2TP header ends after the last byte of the offset padding. This field exists if the offset flag is set.
Offset Pad (optional)
    Variable length, as specified by the offset size. Contents of this field are undefined.
Payload data
    Variable length (Max payload size = Max size of UDP packet - size of L2TP header)

L2TP packet exchange

At the time of setup of L2TP connection, many control packets are exchanged between server and client to establish tunnel and session for each direction. One peer requests the other peer to assign a specific tunnel and session id through these control packets. Then using this tunnel and session id, data packets are exchanged with the compressed PPP frames as payload.

The list of L2TP Control messages exchanged between LAC and LNS, for handshaking before establishing a tunnel and session in voluntary tunneling method are

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

L2TP/IPsec

Because of the lack of confidentiality inherent in the L2TP protocol, it is often implemented along with IPsec. This is referred to as L2TP/IPsec, and is standardized in IETF RFC 3193. The process of setting up an L2TP/IPsec VPN is as follows:

        Negotiation of IPsec security association (SA), typically through Internet key exchange (IKE). This is carried out over UDP port 500, and commonly uses either a shared password (so-called "pre-shared keys"), public keys, or X.509 certificates on both ends, although other keying methods exist.
        Establishment of Encapsulating Security Payload (ESP) communication in transport mode. The IP protocol number for ESP is 50 (compare TCP's 6 and UDP's 17). At this point, a secure channel has been established, but no tunneling is taking place.
        Negotiation and establishment of L2TP tunnel between the SA endpoints. The actual negotiation of parameters takes place over the SA's secure channel, within the IPsec encryption. L2TP uses UDP port 1701.

When the process is complete, L2TP packets between the endpoints are encapsulated by IPsec. Since the L2TP packet itself is wrapped and hidden within the IPsec packet, no information about the internal private network can be garnered from the encrypted packet. Also, it is not necessary to open UDP port 1701 on firewalls between the endpoints, since the inner packets are not acted upon until after IPsec data has been decrypted and stripped, which only takes place at the endpoints.

A potential point of confusion in L2TP/IPsec is the use of the terms tunnel and secure channel. The term tunnel refers to a channel which allows untouched packets of one network to be transported over another network. In the case of L2TP/PPP, it allows L2TP/PPP packets to be transported over IP. A secure channel refers to a connection within which the confidentiality of all data is guaranteed. In L2TP/IPsec, first IPsec provides a secure channel, then L2TP provides a tunnel.

Windows implementation

Windows Vista provides two new configuration utilities that attempt to make using L2TP without IPsec easier, both described in sections that follow below:

    an MMC snap-in called "Windows Firewall with Advanced Security" (WFwAS), located in Control Panel ? Administrative Tools
    the "netsh advfirewall" command-line tool


Both these configuration utilities are not without their difficulties, and unfortunately, there is very little documentation about both "netsh advfirewall" and the IPsec client in WFwAS. One of the aforementioned difficulties is that it is not compatible with NAT. Another problem is that servers must be specified only by IP address in the new Vista configuration utilities; the hostname of the server cannot be used, so if the IP address of the IPsec server changes, all clients will have to be informed of this new IP address (which also rules out servers that addressed by utilities such as DynDNS).

L2TP in ISPs' networks

L2TP is often used by ISPs when internet service over for example ADSL or cable is being resold. From the end user, packets travel over a wholesale network service provider's network to a server called a Broadband Remote Access Server (BRAS), a protocol converter and router combined. On legacy networks the path from end user customer premises' equipment to the BRAS may be over an ATM network. From there on, over an IP network, an L2TP tunnel runs from the BRAS (acting as LAC) to an LNS which is an edge router at the boundary of the ultimate destination ISP's IP network. See example of reseller ISPs using L2TP.

ITKiDuniyaa Explains VPN L2TP/IPSec Connection In Simple Words

Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. The two main components that make up L2TP are the L2TP Access Concentrator (LAC), which is the device that physically terminates a call and the L2TP Network Server (LNS), which is the device that terminates and possibly authenticates the PPP stream.

PPP defines a means of encapsulation to transmit multiprotocol packets over layer two (L2) point-to-point links. Generally, a user connects to a network access server (NAS) through ISDN, ADSL, dialup POTS or other service and runs PPP over that connection. In this configuration, the L2 and PPP session endpoints are both on the same NAS.

L2TP uses packet-switched network connections to make it possible for the endpoints to be located on different machines. The user has an L2 connection to an access concentrator, which then tunnels individual PPP frames to the NAS, so that the packets can be processed separately from the location of the circuit termination. This means that the connection can terminate at a local circuit concentrator, eliminating possible long-distance charges, among other benefits. From the user's point of view, there is no difference in the operation.

ITKiDuniyaa Explains VPN L2TP/IPSec Connection In Short Words

Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the protocol.

Making an VPN L2TP/IPSec Connection Connection From Windows XP [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 2
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 3
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 4
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 5
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 6
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 7
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 8
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 9
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 10
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 11
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 12
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 13
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 14
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 15
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Creat New VPN L2TP/IPSec Connection In Windows XP Step 16
For More Latest Tech Updates, Stay With Us On itkiduniyaa.blogspot.com
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Wednesday, January 29, 2014

Ethernet CrossOver Cable Tutorials And Notes

CrossOver Cable Making

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

ITKiDuniyaa Define Ethernet CrossOver Cable?

An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through or patch cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub or router. A cable with connections that "cross over" was used to connect two devices of the same type: two hosts or two switches to each other. Owing to the inclusion of Auto-MDIX capability, modern implementations of the Ethernet over twisted pair standards usually no longer require the use of crossover cables.

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Overview

The 10BASE-T and 100BASE-TX Ethernet standards use one wire pair for transmission in each direction. This requires that the transmit pair of each device be connected to the receive pair of the device on the other end. When a terminal device is connected to a switch or hub, this crossover is done internally in the switch or hub. A standard straight through cable is used for this purpose where each pin of the connector on one end is connected to the corresponding pin on the other connector.

One terminal may be connected directly to another without the use of a switch or hub, but in that case the crossover must be done in the cabling. Since 10BASE-T and 100BASE-TX use pairs 2 and 3, these two pairs must be swapped in the cable. This is a crossover cable. A crossover cable may also be used to connect two hubs or two switches on their upstream ports.

Because the only difference between the T568A and T568B pin/pair assignments are that pairs 2 and 3 are swapped, a crossover cable may be envisioned as a cable with one modular connector following T568A and the other T568B (see Jack crossover wiring). Such a cable will work for 10BASE-T or 100BASE-TX. Gigabit Ethernet (and an early Fast Ethernet variant, 100BASE-T4) use all four pairs and also requires the other two pairs (1 and 4) also to be swapped.

The polarity of each pair is not swapped, but the pairs crossed as a unit: the two wires within each pair are not crossed.

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Crossover cable pinouts

In practice, it does not matter if non-crossover Ethernet cables are wired as T568A or T568B, just so long as both ends follow the same wiring format. Typical commercially available "pre-wired" cables can follow either format depending on the manufacturer. What this means is that one manufacturer's cables are wired one way and another's the other way, yet both are correct and will work. In either case, T568A or T568B, a normal (un-crossed) cable will have both ends wired according to the layout in the Connection 1 column.

Although the Gigabit crossover is defined in the Gigabit Ethernet standard, in practice all Gigabit PHYs feature an auto-MDIX capability and are designed for compatibility with the existing 100BASE-TX crossovers. The IEEE-specified Gigabit crossover is generally seen as unnecessary.

Certain equipment or installations, including those in which phone and/or power are mixed with data in the same cable, may require that the "non-data" pairs 1 and 4 (pins 4, 5, 7 and 8) remain un-crossed.

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Automatic crossover

Introduced in 1998, this made the distinction between uplink and normal ports and manual selector switches on older hubs and switches obsolete. If one or both of two connected devices has the automatic MDI/MDI-X configuration feature, there is no need for crossover cables.

Although Auto-MDIX was specified as an optional feature in the 1000BASE-T standard, in practice it is implemented widely on most interfaces.

Besides the eventually agreed upon Automatic MDI/MDI-X, this feature may also be referred to by various vendor-specific terms including: Auto uplink and trade, Universal Cable Recognition and Auto Sensing.

ITKiDuniyaa Explains Ethernet Crossover Cable In Simple Words

Definition: A crossover cable directly connects two network devices of the same type to each other over Ethernet. Ethernet crossover cables are commonly used when temporarily networking two devices in situations where a network router, switch or hub is not present.

Compared to standard Ethernet cables, the internal wiring of Ethernet crossover cables reverses the transmit and receive signals. The reversed color-coded wires can be seen through the RJ-45 connectors at each end of the cable:

    Standard cables have an idential sequence of colored wires on each end
    Crossover cables have the 1st and 3rd wires (counting from left to right) crossed, and the 2nd and 6th wires crossed


An Ethernet crossover cable will also feature the name "crossover" stamped on its packaging and wire casing.

Ethernet crossover cables should only be used for direct network connections. In particular, attempting to connect a computer to a hub with a crossover cable will prevent that network link from functioning. Home broadband routers have become an exception to this rule: modern consumer routers contain logic to automatically detect crossover cables and allow them to function with other types of Ethernet devices.

ITKiDuniyaa Explains Ethernet Crossover Cable In Short Words

Similar to a null-modem cable, with the exception that the crossover cable is used for Ethernet connections, where the CTS (clear to send) and RTS (ready to send) lines are crossed over. On a null-modem cable the Tx (transmit) and Rx (Recieve) lines are crossed over.

How To Make An Ethernet Cross-Over Cable Urdu [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Cross-over Cable Step 1
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
ITKiDuniyaa Cross-over Cable Step 2
For More Latest Tech Updates, Stay With Us On itkiduniyaa.blogspot.com
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Sunday, January 26, 2014

Disable Windows Error Reporting Tutorials And Notes

Turn Off Windows Error Reporting Scenario For All Microsoft Windows

IT KI DUNIYAA | Reading for information | Needs of All Students And learners

Source:- Google.com.pk

ITKiDuniyaa Define Windows Error Reporting?

Windows Error Reporting (WER) (codenamed Watson) is a crash reporting technology introduced by Microsoft with Windows XP and included in later Windows versions and Windows Mobile 5.0 and 6.0. Not to be confused with the Dr. Watson debugging tool which left the memory dump on the user's local machine, Windows Error Reporting collects and offers to send post-error debug information (a memory dump) using the Internet to the developer of an application that crashes or stops responding on a user's desktop. No data is sent without the user's consent. When a dump (or other error signature information) reaches the Microsoft server, it is analyzed and a solution is sent back to the user when one is available. Solutions are served using Windows Error Reporting Responses. Windows Error Reporting runs as a Windows service and can optionally be entirely disabled. If Windows Error Reporting itself crashes, then an error reports that the original crashed process cannot be sent at all.

History

Windows XP

Microsoft first introduced Windows Error Reporting with Windows XP.

Windows Vista

Windows Error Reporting was improved significantly in Windows Vista. Most importantly a new set of public APIs have been created for reporting failures other than application crashes and hangs. Developers can create custom reports and customize the reporting user interface. The new APIs are documented in MSDN. The architecture of Windows Error Reporting has been revamped with a focus on reliability and user experience. WER can now report errors even when the process is in a very bad state for example if the process has encountered stack exhaustions, PEB/TEB corruptions, heap corruptions, etc. In earlier OSs prior to Windows Vista, the process usually terminated silently without generating an error report in these conditions. A new Control Panel applet, "Problem Reports and Solutions" was also introduced, keeping a record of system and application errors and issues, as well as presenting probable solutions to problems.

Windows 7

The Problem Reports and Solutions Control Panel applet was replaced by the Maintenance section of the Windows Action Center on Windows 7 and Server 2008 R2.

Third-party software

Software and hardware manufacturers may access their error reports using Microsoft's Windows Dev Center Hardware and Desktop Dashboard (was Winqual) program. In order to ensure that error reporting data only goes to the engineers responsible for the product, Microsoft requires that interested vendors obtain a VeriSign Class 3 Digital ID. Digital certificates provided by cheaper providers (such as Thawte, DigiCert, Comodo, GlobalSign, GeoTrust, Cybertrust, Entrust, GoDaddy, QuoVadis, Trustwave, SecureTrust, Wells Fargo) are not accepted.

Software and hardware manufacturers can also close the loop with their customers by linking error signatures to Windows Error Reporting Responses. This allows distributing solutions as well as collecting extra information from customers (such as reproducing the steps they took before the crash) and providing them with support links.

Impact on future software

Microsoft has reported that data collected from Windows Error Reporting has made a huge difference in the way software is developed internally. For instance, in 2002, Steve Ballmer noted that error reports enabled the Windows team to fix 29% of all Windows XP errors with Windows XP SP1. Over half of all Microsoft Office XP errors were fixed with Office XP SP2. Success is based in part on the 80/20 rule. Error reporting data reveals that there is a small set of bugs that is responsible for the vast majority of the problems users see. Fixing 20% of code defects can eliminate 80% or more of the problems users encounter. An article in the New York Times confirmed that error reporting data had been instrumental in fixing problems seen in the beta releases of Windows Vista and Microsoft Office 2007.

Privacy concerns and use by the NSA

Although Microsoft has made privacy assurances, they acknowledge that personally identifiable information could be contained in the memory and application data compiled in the 100-200 KB "minidumps" that Windows Error Reporting compiles and sends back to Microsoft. They insist that in case personal data is sent to Microsoft, it won't be used to identify users, according to Microsoft's privacy policy. But in reporting issues to Microsoft, users need to trust Microsoft's partners as well. About 450 partners have been granted access to the error reporting database to see records related to their drivers, utilities and applications.

Older versions of WER sends data without encryption; only WER from Windows 8 starts using TLS encryption.

At December 2013, independent lab found that WER automatically sends to Microsoft some information, when new USB device is plugged to the PC.

According to Der Spiegel, the Microsoft crash reporter has been exploited by NSA's TAO unit to hack into the computers of Mexico's Secretariat of Public Security. According to the same source, Microsoft crash reports are automatically harvested in NSA's XKeyscore database, in order to facilitate such operations.

NOTES For Disable Error Reporting To Stop “Send Error Report” Message in Windows XP, Windows 2003.[Provided By ITKiDuniyaa]

How To Disable Error Reporting in Windows XP, Windows 2003 Urdu [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

NOTES For Disable Error Reporting To Stop “Send Error Report” Message in Windows 7, Windows 8, Windows 8.1 [Provided By ITKiDuniyaa].

How To Disable Error Reporting in Windows 7, Windows 8, Windows 8.1 [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Open up the start menu and type in problem reporting settings into the search box, or head to Action Center –> Change Action Center Settings –> Problem Reporting Settings. If you used the search, use the “Choose how to report problems” item in the list:
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Then you can easily choose the option from the list:
Again, you probably should leave it enabled, but this will let you disable it.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Disable Error Reporting in Windows 7, Windows 8, Windows 8.1 with Group Policy

Note: This method used Local Group Policy Editor which isn’t available in Home versions of Windows 7, Windows 8, Windows 8.1.

Click on Start and enter gpedit.msc into the search box and hit Enter.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Local Group Policy Editor opens and you want to navigate to User Configuration \ Administrative Templates \ Windows Components \ Windows Error Reporting and under Setting double click on Disable Windows Error Reporting.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Change it from Not Configured to Enabled, then click Apply and Ok and close out of Local Group Policy Editor.
That’s all……I hope i clear Our self  itkiduniyaa.blogspot.com
IT KI DUNIYAA | Reading for information | Needs of All Students And learners

NOTES For Disable Error Reporting To Stop “Send Error Report” Message in Windows Vista [Provided By ITKiDuniyaa]

How To Disable Error Reporting in Windows Vista [Tutorial Provided By ITKiDuniyaa]

IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Disable Error Reporting in Vista

To disable Error Reporting in Vista click on Start and open Control Panel.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Make sure you’re in Classic View and double click on Problem Reports and Solutions.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Under Tasks click on the Change Settings link.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
It’s worth noting here that if you choose Ask me to check if a problem occurs, error reporting is enabled but you get to choose whether or not to send the diagnostics to Microsoft. If you select Check for solutions automatically (recommended) then all data will be sent to Microsoft automatically. Since we want to disable it all together, click on the Advanced Settings link.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
In the next screen under For my programs, problem reporting is…select Off then click Ok to close out of the Problem Reports and Solutions window.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Next you’ll see that everything under Choose how to check for solutions to computer problems is grayed out. Click Ok to close out of this screen.
IT KI DUNIYAA | Reading for information | Needs of All Students And learners
Click Close on the message telling you that Error Reporting is turned off.
For More Latest Tech Updates, Stay With Us On itkiduniyaa.blogspot.com
IT KI DUNIYAA | Reading for information | Needs of All Students And learners