When I had my first job in IT to wire network cables was one of my first things I had to learn. To remember which color was suppose to go where was always hard to remember. Here is a much simpler diagram and tutorial to help you remember. Straight through cables are used to connect a computer to a hub or switch. If your connection is PC to PC or Hub to Hub then you must use the crossed standard. The following diagrams shows the colour coding for CAT5e cables based on the two standards supported by TIA/EIA. 568B wiring is by far the most common wiring method. There is no difference in connectivity between 568B and 568A cables, so you can choose the method that suits you best providing that both ends of the cable uses the same standard. Crossover cables are used to connect PCs to one another or to connect a hub to hub. However, most hubs these days have an uplink port which allows you to connect to hubs together through this port using a straight connection; you should read your hub manual to check if it has this. The following diagram shows the wiring at both ends of the connectors. It shows crossing of all four pairs. Below is a diagram of the RJ45 connector and pin numbers so you can see which pin numbers relate to the diagrams above.
0 Comments
★ I am often asked what RAID means, how to set it up and how it benefits the user. Here is my explanation on what it all means. From complex to simple. What Is RAID? Known as: "Redundant Array of Inexpensive Disks" or RAID; is a storage technology that combines multiple disk drive components into a logical unit. Data is distributed across the drives in one of several ways called "RAID levels", depending on what level of redundancy and performance (via parallel communication) is required. Most common forms of a RAID array are RAID 0, 1, 5 and rarely used is RAID array 6. RAID O - Disk Striping (process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks). Pros: ★ Option to use a minimum of 2 - 32 HDD's. ★ Multiple drives work as one disk/maximize disk space. IE (4 x 250GB) = 1000GB/1TB solid. ★ Better read/write ability = faster performance. Cons: ★ One hard disk fails, all fail. ★ Keep backups ★ Bits of data stored and not all data itself ★ No redundancy drive or safety RAID 1 - Disk Mirroring (data is written to two duplicate disks simultaneously. This way if one of the disk drives fails, the system can instantly switch to the other disk without any loss of data or service). Pros: ★ Dual copy from 1 hard disk to another. ★ If one drive fails, data is still usable as there is a copy. ★ Faster performance. ★ Able to replace hard disk and rebuild the mirror. Cons: ★ Data storage space does not increase. IE. (2 x 250GB) = 250GB usable & 1 mirrored copy. RAID 5 - Disk Striping w/Parity Pros: ★ At least 3 hard disks needed - 32 hard disks max. ★ Bits written to each drive with 3rd (redundancy drive) having copy of 1. ★ If one fails, others will hold rest of the data / data still usable. ★ Replacing drive will re-construct the array. ★ Faster performance. ★ Increases space partially. ★ Hot swappable. Cons: ★ Only first two disks space increases, 3rd and onwards are redundant drives. RAID 6 - Disk Striping w/Parity Pros: ★ Duplication of RAID 5 with added drive for redundancy. Cons: ★ Gets expensive with adding another drive. Creating RAID Array:
Hardrive RAID: Pros: ★ Hard disk controller/PCI - Express card ★ All hard disks connected to that controller ★ Boot up to similar BIOS Screen to configure drives into preferred array ★ Can stall an operating system on the hard disk array ★ Fast/performance boost Con: ★ Expensive Software RAID: Pros: ★ Must have an operating system available to create the array ★ Good for storing data as redundancy ★ Installing windows server operating system or similar to config a raid of 0-5 etc ★ Less expensive Cons: ★ If the hardisk with the operating system dies, entire PC fails ★ Software raid can slow PC down as it will and/or can use RAM Size vs. Volume In RAID: In RAID 5: Any size hard disk can be used, from 80-1500 +. Drive only bigger than the smaller drives volume; Why? data gets striped over drives according to allocated space configured or preset. Smallest drive is the largest size to use in an array in regards to the other drives. Size & Volume Of Array: Size of an array - refers to total amount of hard disk space allocated for the hard disk array. IE (4 x 250GB) hard disks = 1000GB/1TB. Volume of an array - refers to the amount of usable space IE RAID 1 (mirror) (2 x 250GB) = 250GB volume. IE RAID 5 (4 x 250GB) = 750GB, IE RAID 0 doesn’t apply with volume. That concludes the tutorial. I hope this helps. Any queries feel free to contact me via the contact form right at the top next to the YouTube tab or alternatively you can simple comment on the post below. The tutorial is very simple and it will help you to be able to write protect any flash drive. This helps when your device is stolen or somebody wishes to delete your sensitive material without you knowing about it. The tutorial will concentrate on (1) How to write protect a flash drive; (2) How to remove write protection. The flash drive I will be using as a test device is a 8GB USB 2.0 Pen Cap Apacer AH322 Flash Drive & the operating system I will be using is Microsoft Windows 7 Ultimate x86. Enable Write Protection:Start this process by plugging your USB flash drive into and open USB port on your laptop or desktop computer. Wait for your computer to successfully read the new device and follow the steps below:
The following window below will appear - Type the following: diskpart Hit enter - Type the following: list disk From this short menu you will see a detailed list of storage devices plugged into the computer including the flash drive and the main storage drives for the operating system. What you want to identify here is the flash drive. Below I have identified the test flash drive. According to the list in the above image, the flash drive I am using is identified as: Disk 2 with a size of 7640 MB. Knowing that the flash drive is an empty 8GB drive & being aware of the other two drives I can safely assume that Disk 2 refers to the flash drive. - Type the following: select disk 2 You will receive a confirmation message stating: Disk 2 is now the selected disk - Type the following: attributes disk set readonly You will receive a confirmation message stating: Disk attributes set successfully Below is an example of the above mentioned. To test if your flash drive has been write protected, head over to Computer, find your flash drive, open the contents up and try deleting any file to test. You will receive an error like the one below. Now you have successfully write protected your flash drive. Nobody will be able to Delete, format or remove any files. - Type the following: exit This will close up the section of disk part used to protect devices. You may now exit the command prompt menu. Remove Write Protection:If you wish to remove the write protection from your flash drive follow the steps below.
- Type the following: diskpart Hit enter - Type the following: list disk You will once again see a detailed list of storage devices plugged into the computer including the flash drive and the main storage drives for the operating system. Identify the flash drive. Below I have identified the test flash drive again. - Type the following: select disk 2 You will receive a confirmation message stating: Disk 2 is now the selected disk - Type the following: attributes disk set readonly You will receive a confirmation message stating: Disk attributes set successfully Below is an example of the above mentioned. - Type the following: attributes disk clear readonly You can once again head to Computer, find your flash drive and you may now delete anything you wish. - Type the following: exit You may now close the command prompt window. This concludes the tutorial. I hope you find this useful. If you have any issues, feel free to comment on this post and/or send me an email. What Is Ethical Hacking? Ethical Hacking is process of finding and exploiting vulnerabilities in a system and then rectifying them to protect them from other hackers. Person performing ethical hacking is a person who has ethical hacking certification and holds good knowledge about computers, networks, programming and various vulnerabilities. His work is to secure his own network and protect it from all sort of cyber attacks. What Is A Hacker? An enthusiastic and skillful computer programmer or user who uses his skill set to bypass and improve a program, game or programming language also includes; someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal. There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades . The members of this culture originated the term ‘hacker’. Hackers built the Internet; Hackers made the Unix operating system what it is today; Hackers run Usenet; Hackers make the World Wide Web work. The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music. You can find it at the highest levels of any science or art. There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers. Real hackers call these people ‘crackers’ and want nothing to do with them. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers to no end. What Is A Cracker? A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system. The basic difference is this: hackers build things, crackers break them. Types of Hackers based on their knowledge: Coders: Coders are real hackers. They are programmers having immense knowledge about many programming languages, networking and working of programs. They are skilled programmers who can find vulnerabilities on their own and create exploits based on those vulnerabilities. They can code their own tools and exploit and can modify existing tools according to their use. Admins: These are the computer guys who are not sound enough in programming but holds enough information about hacking and networking. These guys have Hacking certifications and can hack any system or network with the help of tools and exploit created by codes. Majority of security consultants fall in this group. They are Certified Ethical Hackers who are trained for securing networks. Script Kiddies: This is the most dangerous type of hackers. These type of hackers does not actually know what they are doing. They just use the tools and partial knowledge they gain from internet to attack systems. They do it just for fun purpose and to be famous. They use the tools and exploits coded by other hackers and use them. They have minimum skills. Types of Hackers based on their motive of hacking: ★ White Hat Hackers: White hat hackers are ethical hackers with some certifications such as CEH( Certified Ethical Hacker). They break into systems just for legal purposes. Their main motive is to find loopholes in the networks and rectifying them. These type of hackers work with famous companies in securing their systems and protecting them against other hackers. ★ Black Hat Hacker: A black hat hacker may or may not have any hacking certification but they hold good knowledge about hacking. They use their skills for destructive purposes. They break into systems and networks either for fun or to gain some money from illegal means. They gain unauthorized access and destroy/steal confidential data or basically cause problems to their target. ★ Gray Hat Hacker: A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. Then they may offer to repair their system for a small fee. |
Archives
October 2022
Categories
All
|