Thursday, September 15, 2011

How to remove rememberd password in shearing server on window

This command is useful to remove the add user and their password on any shearing server(samba). Using this command you can also add user and user password on any shearing server.
rundll32.exe keymgr.dll, KRShowKeyMgr
copy this command and past on command prompt.

Wednesday, September 14, 2011

Security cameras and multimedia streaming are affecting your network

There was a time when security cameras were hardwired back to a central location with lots of screens. Here people sat and watched and made sure that tapes of footage were changed and properly stored. In today's world, these devices are now IP-based and share computer networks with everything else.
I was visiting one of the largest football stadiums in Europe a few weeks back. The network manager gave me a very interesting tour, which focused on the IT infrastructure. Systems such as security cameras, crowd control monitoring, public announcement systems and the large screens around the arena are all now connected to a shared computer network.  This gives greater flexibility when deploying these systems as you don't need to run separate cables. However, it does create challenges for the IT manager as this data is now carried on their network.
This type of network traffic is not limited to places like arenas with lots of TV screens. While reviewing traffic rates on a university network recently, I found that over 75% of all traffic was associated with IP-based security cameras. They had a flat network with a single VLAN so it was becoming a big problem.
If you want to check for this activity on your network, I suggest you should be familiar with layers 2 and 3 of the OSI model. Over on the EtherGeek blog, Josh Stephens has some useful information on understanding layer 2 of the OSI model and understanding layer 3 of the OSI model.
In most cases, systems which generate audio or video outputs will stream this data onto a network using one of these methods.
  • Multicast traffic. IP multicast is typically used for sending IP datagram's to a group of interested receivers in a single transmission
  • User Datagram Protocol (UDP) traffic with specific source and destination IP addresses.
For those of you considering rolling out systems like IP-based security cameras or multimedia screens which get updates from the network, I would recommend that you create a specific VLAN for this traffic. This will keep it separate from other business critical applications.
I would also suggest that you check for this activity on your network. You can either do a periodic audit or have a system in place that constantly checks your network. There are two things to watch out for:
  1. Monitor traffic as it goes through the core of your network. You are looking for UDP activity. Normally applications which use TCP are the most active. If you find lots of UDP traffic, look at the source and destination IP addresses. If these are associated with media streaming then it could be time to consider moving this to a separate VLAN.
  2. Check for multicast activity. If your traffic analysis system allows you to use filters, check for activity associated with the network. This block of IP addresses has been reserved for multicast. If you also use IPv6, then you should also check for activity associated with the ff00::/8 prefix.  
Finally, IPTV services are also getting popular. An IPTV is a service through which Internet television is delivered to end-users. The number of global IPTV subscribers is expected to grow significantly over the next few years. I will also deal with this topic in more detail in an upcoming post. In the meantime, you should keep an eye on any unusual activity on your Internet gateway which is using lots of bandwidth over long time periods. This can be a sign of large downloads or constant streaming media coming into your network.