Friday, August 17, 2012

CCNA questions Part 2

More Networking Questions and Answers for you, typical of Cisco, they are more like English questions, remember to read twice, answer once  - happy learning.
 1. Which switching mode has the highest degree of error checking?

A) Fragment-Free
B) Fast-Forward
C) Cut-Through
D) Store-and-Forward
E) FIFO

2. What Application layer protocol is a method of transferring files, especially useful if you need to list available files?

A) Telnet
B) FTP
C) TFTP
D) NFS
E) SMTP

3. What TCP/IP layer are TCP and UDP protocols associated with?

A) Application
B) Host-to-Host
C) Internet
D) Network Access

4. The Cisco Spanning Tree protocol is compatible with IEEE 802.1d?

A) True
B) False


5. What is the default administrative distance of a static route?

A) 1
B) 90
C) 100
D) 110
E) 120




1. Correct Answer: D

Store and forward switching method is known as store and forward because the switch will store the incoming data frame in its internal buffer, then when the complete frame has been received the switch will then run a Cyclic Redundancy Check (CRC) against the frame. If the CRC passes, the switch will then look up the destination MAC Address in its MAC filter table to forward it on to its destination.

2. Correct Answer: A

3. Correct Answer: B

TCP and UDP protocols are associated with the Transport layer of the TCP/IP model, which is sometimes referred to as the "host-to-host transport layer".

4. Correct Answer: B

The original Spanning-Tree protocol was created by Digital Equipment Corporation (DEC) which is now part of Compaq. The IEEE created its own version called IEEE 802.1d which is not compatible with the original version.

Cisco enhanced the original 802.1d specification with features such as Uplink Fast, Backbone Fast, and Port Fast to speed up the convergence time of a bridged network. However these new features are proprietary, and can only be configured on Cisco switches.

5. Correct Answer: A

Friday, July 13, 2012

Mircosoft store clearance

 

 We are excited to announce MIcrosoft Store has just launched a big PC clearance!  Please post this offer and let your customer's take advantage of these deeply discounted PC's.   Offers vaild while supplies last so check it out asap! Microsoft Store PC Clearance! Live 7.09.12 for a limited time, while supplies last!

Sunday, July 8, 2012

What is phishing?


 
What is phishing?

Phishing (pronounced "fishing") is a type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.

Con artists might send millions of fraudulent email messages with links to fraudulent websites that appear to come from websites you trust, such as your bank or credit card companies, and set up a scenario that would require you to provide personal information. Criminals can use this information for many different types of fraud, such as to steal money from your account, open new accounts in your name, or to obtain official documents using your identity.

FAQs about phishing

Phishing - General

  • What should I do if I receive an email phishing scam? If you think you've received a phishing scam, delete the email message. Do not click any links within the message.
  • What should I do if I think I've responded to a phishing scam? Take these steps to minimize any damage if you suspect that you've responded to a phishing scam with personal or financial information or entered this information into a fake website.
    • Change the passwords or PINs on all your online accounts that you think could be compromised.
    • Place a fraud alert on your credit reports. Check with your bank or financial advisor if you're not sure how to do this.
    • Contact the bank or the online merchant directly. Do not follow the link in the fraudulent email.
    • If you know of any accounts that were accessed or opened fraudulently, close those accounts.
    • Routinely review your bank and credit card statements monthly for unexplained charges or inquiries that you didn't initiate.
  • How do scammers get my email address or know which bank I use? Criminals who send out phishing scams (often called "phishers") send out millions of messages to randomly generated email addresses. They fake or "spoof" popular companies in order to attempt to dupe as many people as possible.

Recognize Phishing Scams

  • Can an email message that contains a company's official logo be a phishing scam? Yes. Phishing scams often use the official logos of the companies they're trying to spoof. If you think an email message is a phishing scam, delete it, or type the web addresses directly into your browser, or use your personal bookmarks.
  • Can I tell if an email message is a phishing scam just by reading it? Not necessarily. Phishing email messages often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites. They might also contain phrases like:
    • "Verify your account."
    • "Update your account."
    • "During regular account maintenance…"
    • "Failure to update your records will result in account suspension."
  • I received an email message that requests banking information. Is that a phishing scam? Any email message that requests banking information is probably a phishing scam. Most legitimate banks and financial institutions do not request this information by email. If you receive a message to an email address that is not the one you use to log in to your bank account, this is probably a phishing scam.
  • I received an email message telling me I'd won the Microsoft Lottery. Is this a phishing scam? Yes, this is a type of phishing scam known as "advance fee fraud."

Prevent ID theft from phishing scams

  • What can I do to help prevent identity theft from phishing scams? You can do the following to help protect yourself from phishing scams:

    • Don't click links in email messages.
    • Type addresses directly into your browser or use your personal bookmarks.
    • Check the site's security certificate before you enter personal or financial information into a website.
    • Don't enter personal or financial information into pop-up windows.
    • Keep your computer anti-malware software current with the latest security updates.
  • How can Internet Explorer help protect me from phishing scams? Internet Explorer includes the SmartScreen Filter, which can help protect you from web fraud and personal data theft.
  • What is the SmartScreen Filter? The Microsoft SmartScreen Filter is a feature of Internet Explorer 7 and Internet Explorer 8. It's designed to help protect you from fraudulent websites that try to steal your personal information.While you surf the Internet, SmartScreen Filter analyzes pages and determines if they have any characteristics that might be suspicious. If it finds suspicious web pages, it shows a yellow warning and advises you to proceed with caution. If the site matches an updated list of reported phishing sites, SmartScreen Filter notifies you with a red flag that it has blocked the site for your safety.
  • What does it mean when a website is flagged yellow and "suspicious"? A suspicious website has some of the typical characteristics of phishing websites, but it is not on the list of reported phishing websites. The website might be legitimate, but you should be cautious about entering any personal or financial information unless you are certain that the site is trustworthy.
  • What does it mean when a website is blocked and flagged in red as a reported phishing website? A reported phishing website has been confirmed by reputable sources as fraudulent and has been reported to Microsoft. We recommend that you do not give any information to such websites.

How to recognize phishing email messages or links

Phishing email messages are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal information. A few clues can help you spot fraudulent email messages or links within them.

What does a phishing email message look like?

Phishing email messages take a number of forms:
  • They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.
  • They might appear to be from someone listed in your email address book.
  • They might ask you to make a phone call. Phone phishing scams direct you to call a phone number where a person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data.
  • They might include official-looking logos and other identifying information taken directly from legitimate websites, and they might include convincing details about your personal history that scammers discover from your social networking pages.
  • They might include links to spoofed websites where you are asked to enter personal information.
  • They might contain alarmist messages and threats of account closures.
  • They might promise monetary reward for little or no effort.
  • They might feature deals that sound too good to be true.
  • They might solicite donations for charitable organizations after a disaster has been in the news – appealing to your good nature or willingness to help less fortunate individuals.


To make these phishing email messages look even more legitimate, the scam artists use graphics that appear to go to the legitimate websites (Windows Live Hotmail and Woodgrove Bank, respectively), but actually take you to a phony scam site or possibly a pop-up window that looks exactly like the official site.

Here are a few phrases that are commonly used in phishing email scams:
  • "Verify your account." Businesses should not ask you to send passwords, logon information or user names, Social Security numbers, or other personal information through email. If you receive an email message from Microsoft or any other business asking you to update your credit card information, do not respond: This is a phishing scam.
  • "You have won the lottery." The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft. There is no Microsoft Lottery.
  • "If you don't respond within 48 hours, your account will be closed." These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing email message might even claim that your response is required because your account might have been compromised.

What does a phishing link look like?

Sometimes phishing email messages direct you to spoofed websites.

HTML-formatted messages can contain links or forms that you can fill out just as you would fill out a form on a legitimate website.

Phishing links that you are urged to click in email messages, on websites, or even in instant messages, may contain all or part of a real company's name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate website.

Notice in the following example that resting (but not clicking) your mouse pointer on the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address. This is a suspicious sign.


Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered by adding, omitting, or transposing letters. For example, the address "www.microsoft.com" could appear instead as:
  • www.micosoft.com
  • www.mircosoft.com
  • www.verify-microsoft.com

This is called "typo-squatting" or "cybersquatting."

Sign of a scam: bad grammar and misspelled words

We received a message from a reader who asked whether or not this email was a scam:

"Microsoft Corporation wish to notify all online customers as we celebrates the 35th year anniversary 2010; and also to inform you that you have emerged one of the beneficiary

Selected in this ongoing 35th Anniversary Program in conjunction with the Foundation of Software Products (F.P.S.) The Microsoft internet E-mail draw is held periodically and is organized to encourage the users of the Internet and promote computer literacy worldwide."

This email message continues with a request for personal and financial information. This is a scam. Email messages from Microsoft or other familiar and trustworthy organizations that are full of bad grammar and misspellings are fraudulent. If you receive one of these unsolicited e-mail messages, delete it.

The secret of life is not to do what you like but to like what you do.
By: Anonymous



Clickbank Products

Friday, June 29, 2012

CCNA Example Questions Part 1


And now for something different.  Below are 5 random questions that are typically found in Cisco CCNA (Cisco Certified Network Associate) accreditation exams.  Answers at the bottom of the post.



1. What is port 53 used for?

A.) FTP data
B.) FTP program
C.) Telnet
D.) DNS
E.) TFTP

2. What layer of the OSI Reference Model sends and receives bits and specifies the electrical, mechanical, procedural and functional requirements for maintaining a physical link between end systems?

A.) Session
B.) Transport
C.) Network
D.) Data Link
E.) Physical

3. Each port on a switch is a separate broadcast domain?

A.) True
B.) False

4, What would happen if you put the following ACL on an interface?

access-list 1 deny 172.168.0.1
access-list 1 deny 192.5.2.1

A.) All traffic from 172.168.0.1 and 192.5.2.1 would be denied
B.) All traffic would be denied
C.) Nothing
D.) These are not Cisco IOS ACL commands

5. What is the length of the MAC address in bits?

A.) 32 bits
B.) 48 bits
C.) 12 bits
D.) 80 bits

1 minutes explanation of IP address and subnet mask




=================================================================


1. Answer D  DNS uses port 53
2. Answer E  Physical layer
3. Answer B  Switches form individual collision domains but a single broadcast domain
4. Answer B  An access list has an explicit deny all statement at the bottom, to prevent this the general catch all statement access-list 1 permit any  is used at the end of the list.
5. Answer B A MAC address is 48 bits represented as 12 Hexadecimal characters.

How did you go? More questions will be published at random :-) 



Sunday, June 10, 2012

The first computer bug

An extract of a letter by Grace hopper detailing the first ever computer bug

In the summer of 1945 we where building Mark II; we had to build it in an awful rush - it was wartime - out of components we could get our hands on.  We where working in a World War 1 temporary building.  It was a hot summer and no air conditioning, so all the windows where open.  Mark II stopped, and we where trying to get her going. We finally found the relay that had failed.  Inside the relay - and these where large relays - was a moth that had been beaten to death by the relay.  We got a pair of tweezers, very carefully took out the moth, put it in the logbook and put scotch tape over it. 

Now the commander had a habit of coming into the room and saying "Are you making any numbers?" We had to have an excuse when we weren't making any numbers, we told him that we where debugging the computer.  This is where it started.







Full story and pictures here.

Saturday, May 5, 2012

Surfing TAE has just launched


Surfing TAE has just launched and they\'re giving away FREE JV Upgrades!





Use Promo Code



Welcome



And get started with



3 Solo Ads

3 Banners

3 Traffic Links

3 Hotlinks

30,000 Points





Surfing TAE has some of the BEST active member rewards on the internet!









        • Surf 10 pages...get 10,000 points!

        • Surf 25 pages...get a free solo ad!

        • Surf 50 pages...get a free solo ad, 10,000 points

        • and 25 cents!

        • View 10 solo ads...get a free solo ad!

        • View 20 Banners...get a free banner!

        • And many more!








Oh...and the best part?



Super JV Upgrades are currently JUST $3.00!



It\'s a great looking site, check it out - I\'ll see You There!























Wednesday, May 2, 2012

Well Known Port Numbers doc free ebook download from www.hackers-black-book.com

The port numbers are divided into three ranges: the Well Known Ports,
the Registered Ports, and the Dynamic and/or Private Ports.

The Well Known Ports are those from 0 through 1023.
Also known as System Ports are assigned by IETF
process for standards-track protocols


The Registered Ports are those from 1024 through 49151
Also known as User Ports are assigned by IANA using the "Expert Review" process,

The Dynamic and/or Private Ports are those from 49152 through 65535
  Dynamic Ports are not assigned.


Tuesday, April 24, 2012

Random stuff

New Viruses discovered:

GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people mad just thinking about it.

FEDERAL BUREAUCRAT VIRUS: Divides your hard drive into hundreds of little units, each of which do practically nothing, but all of which claim to be the most important part of the computer.

OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

CONGRESSIONAL VIRUS #1: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously but doesn't allow the user to accomplish anything.

AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

FREUDIAN VIRUS: Your computer becomes obsessed with its own motherboard

ADAM AND EVE VIRUS: Takes a couple bytes out of your Apple computer.

RONALD REAGAN VIRUS: Saves your data but forgets where they are stored.

ARNOLD SCHWARZENNEGGER VIRUS: Terminates and stays resident. It'll be back.



Saturday, April 7, 2012

Things to know about QR codes.

qrcode
What is a QR Code?

A QR Code, (Quick Response Code),
first designed for the automotive industry, is also known as a two dimensional code, is a small white square with small sections of black covering it. It can be read by the camera of a smartphone, and once read it may instantly redirect the smartphone user to a webpage.
 
**Note: You have to download an app (that can read QR codes) to your smartphone before you can take advantage of this technology.


How are QR Codes used?

QR Codes can be used in a variety of ways to market a business, to provide further information on a product or service by encoding general text, URL, phone number, business card and even provide WiFi access. They are anywhere and everywhere:  in magazines, on billboards, on storefronts, in newspapers.  QR Codes can have unusual applications too, like their use in replacing informational signs on hiking or nature trails. QR Codes storing addresses and Uniform Resource Locators (URLs) may appear in magazines, on signs, on buses, on business cards, or on almost any object about which users might need information.

The QR code above points to Conversion Surf and was made very simply using the free tools at http://qrcode.kaywa.com/ A quick web search will give many other sites for code generators and readers.

Kaywa.com provides the HTML code for whatever Link, text, phone number or SMS data that you want to encode, which can be pasted into your website or blog just like that shown above.  Due to the expanding use of QR codes, it may give you an advertising advantage to use them on your sites!

I haven't explored many other free sites yet, but would be curious to know of other sites. 

A word of warning

Because of the unique ability of QR codes to bridge the gap between our virtual reality and actual reality, many consumers forget that QR codes pose the same dangers as emails and websites.

As QR Codes have grown in popularity, they have also given scammers and hackers, who are looking to steal your personal information or corrupt your cellphone, a new tool to use. QR Codes are an easy way for hackers to take advantage of you, because most of us are still getting used to the idea that our phone is nothing more than a small computer. This small, handheld computer is vulnerable in the same way as your computer at home.

By scanning a QR Code which may instantly launch your built-in web browser, your device could be directed to a malicious website designed to attack a vulnerability and compromise your phone.


QR Code Best Practices

To avoid damaging your smartphone or losing your information, use caution when using QR codes, and adhere to the following tips:
  • If it smells phishy, throw it back. Most of us aren’t tempted to open emails which are obviously spam. However, QR codes are tricky because you cannot weed out the bad from the good by simply looking at the code. Because the vulnerability is practically part of the design, consider downloading an app on your phone which provides a preview to each code before it opens a webpage. This way, you will have right of refusal if you think the QR code is corrupted.
  • Remember the old proverb, “Curiosity killed the cat.” Hackers prey on curiosity, thus if you see a lonely QR Code posted on a wall, DO NOT scan it to find out why is it there and what it does.
  • Back up your information. If you do get a virus from a QR Code which damages the software on your smartphone, not all will be lost if you have backed up your phone to your computer. Generally, a smartphone does this on its own each time you plug your phone into your computer. If you make it a practice to back up your information regularly, you may lose your phone, but at least not all will be lost.
  • Use caution when using your smartphone for banking, shopping etc.  We hear it all the time, but do we really listen?  Using your smartphone to do any of your finances means that you are taking a chance with your money.  As discussed earlier, QR codes are used to compromise devices thus putting all data on the device or interacting with the device at risk. Also pick-pockets and anyone with eyes can glean credit card numbers without your ever realising it.

Thanks for reading
Ian Begg
Always in motion is the future.
By: Yoda - Star Wars, Episode V