TadEvil - Networking
Data Communications and Networking
Behrouz A. Forouzan
- The book teaches data communications and networking to students without requring heavy technical background while still providing challenges to more experienced students.
- More than 700 figures provide complete, visual presentation of the material.
- Many examples have been developed in each chapter to demonstrate the concepts.
- An On-line Learning Center is available to provide extra material to both students and instructors. Some features of the on-line learning center include: PowerPoint Slides, Solutions, and Animated Figures.
- Summaries at the end of each chapter emphasize the key points.
- The practice set includes and extensive number of review questions, multiple choice questions, and extended exercises.
John the Ripper
Ifyou are using computer for long times and aware of the term hacking/hacking then i am sure inside in your mind in the nook, you wanted to hack someone's password ; whether it's a email password or windows login. Obviously i don't support hacking/ stealing pasword though i have done some occasional snoofing and cracking wireless password, just to try some softwares, using my own wireless connection and other (oops!). if you are interested in wireless staff, grab Kismet, Aircrack-ng or even Wireshark, that works ok in windows. Today i am going to focus on John the ripper - a software that mainly used of OS password cracking by system admin and both white & black hats. I have done the cracking as a part of a project in my cyber security class and the password file was provided to us. i will recommend to download the linux version of this software cause you will get slighly higher speed in linux, if you don't have linux installed in your pc, download vmware and network security toolkit (NST), which includes john the ripper. Anyway there is a windows version too and i will going to show how to use the windows version here. One more thing, you have a virus scanner installed and active it will recognize JTR as a virus and most the anti-virus software will delete the exe files, so stop the scanner for a moment and exclude JTR from the scanning areas.
Assuming you downloaded and extract the folder on your root drive and folder name is jtr - open the commnad prompt by going to run and type cmd and then follow the steps demonstrate in the image below (click for enlarged view).
Inside the run folder there are 2 exe file that you can use to run JTR, john-mmx/john-386, you can also rename the file to john. here i am going to use john-386.exe.
WLG 1101 - 1203 Driver
If you are still using generic wireless network card with WLG # model i am sure you had trouble finding the correct driver. Major problem is card manufacturer Cameo doesn't offer the driver anymore. You will find hundreds of fake driver sites that will offer the driver that won't work and some will try to sell the freely available driver to you! One of my friends were using WLG - 1203 card and was looking for card and request me find the driver for it. I had to google over 30 min to find the suitable driver. in the mean time i tried 3 driver packages, those didn't work; browse dozens of sites/forums with useless info. Finally i found the correct driver and it recognize and install without any problem. So if you are looking for driver for card like WLG - 1101, WLG - 1102, WLG - 1103, WLG - 1203,..... you can download from my site.
File format - Zip
File Size - 6.31 MB
Class Project - Spring 2008
This was a network design project for a small company. Me and my friend Max together done this final project.
Category 6 (Cat 6) UTP will be used as network medium inside the buildings. Cat 6 is the recommended UTP cabling standard for Ethernet applications over copper media at speeds up to 1 gigabit (1000 Mbps). Cat 6 is also backward compatible with cat 5 and cat 5e cable plants. Cat 6 cabling specified to operate at signaling rates of 200 MHz and that is the highest possible signaling rate in United States. Maximum cable length for this kind of cable is 100m and that should be sufficient for inside connectivity. Cat 6 cable is easy to install and maintenance is convenient.
Fiber-optic is the most expensive of all cabling options but on the other hand it’s not susceptible to eavesdropping and interference. Because distance between Media building is 500m fiber-optic is the only option here. Though Media and Administrative building are 100m apart, fiber-optic will be used as network medium for enhance security.
There will be wireless connectivity to internet in every building. Because visitors will come to the showroom we will make the wireless connection in the showroom accessible to public that mean no wireless security will be used there. But for the Media and Administrative buildings we will use enhanced and strong security – WPA2 (Wi-Fi Protected Access). WPA2 is more robust wireless security standard based on WPA called 802.11i that uses Advanced Encryption System (AES) for password protection.
Type of Connection:
When it comes to what type of connection we would use, we decided to go for T1; this is one of the most widely used high-speed digital lines. T1 is a DDS technology that uses two two-wire pairs to transmit full-duplex data signals at a maximum rate of 1.5 Mbps. T1 lines are expensive but they give better performance than usual Cable modem or DSL connection – Cable modem connection is shared and on the other hand DSL needs telephone lines. Because Media building needs high bandwidth, using shared connection isn’t a good idea.
For our Switch and Router we decided to go for Cisco products. All 3 buildings will be connected through routers, one for each building. Each router will be connected with switch modem. Modem will connect router to the internet and switch will enable multiple connection to the internet. Ethernet switching method will be applied as access method to the entire network. Because we are using Ethernet over fiber-optic cable for outside connectivity, 1000BaseSX standard would be the best choice because it can operates on 2000 Mbps in full-duplex mode and also has maximum cable length of 550 m in full – duplex MMF mode. For physical topology of the network – Extended star topology seems the best choice for this network. Extended star is the most widely used topology in networks containing more than just a few computers and this new company will surely need multiple workstations. Switch will act as the central device that sits in the middle of this topology that is a star of stars.