If there is no response from the default gateway, then make sure you indeed have the correct default gateway in your IP Stack. Do ipconfig /all and verify that the correct gateway is configured. If it is then try to ping it. If you can't ping it then find out if you have some security control...
A proper site survey will tell you all you need to know. There are several things that could be causing this. Interference and many other forms of RF Lan degradation. There are several tools to use to gather most of the channel, frequency, and range information of any potentially interfering...
http://www.rsasecurity.com
http://www.didya.com/
www.athena-scs.com/product.asp?pid=22
All three of these work with Windows, and you get the needed software from the same vendor. There's no way around it, you're going to have to do some reading and research on the products and figure out...
Is it a Windows environment? Unix? Linux? If it's Windows, just make sure you have plenty of disk space and use the event log, just configure it to log on success/failure.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3, MCSA, CEH, Security+, Network+, CTT+, A+
I would have to disagree with dglienna. First, yes you should turn off ssid broadcasting. Secondly, you shouldn't be using Windows Wireless Zero Config anyway. It's pretty much garbage and gives you NO control over anything. Turn it off and use a client utility from your card vendor. If you...
dglienna,ahhhh MVP stands for Most Valuable Professional, NOT Microsoft Valuable Professional. If you're going to claim to be something on a public forum, it's a good idea to at least know what the letters stands for.
Good day.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3, MCSA, CEH...
Ummm, also you need to verify if the administrator log you're seeing is for a local administrator or a network administrator. This should narrow your search down tremendously. Also you could have a trojan running from the compromised machine of an individual (especially if you're a Windows...
To get into forensics and start learning it programming knowledge is not always needed, however, if you ever want to be serious about forensics or information security, you will have to learn some decent programming skills eventually. So you might as well start now. Some of my most cherished...
A spectrum analyzer is indeed one part, but there are more things you need to address also.
1. Has a site survey ever conducted before? There might be valuable information you can find in previous surveys.
2. What existing wireless equipment (if any)is currently onsite and/or installed? If...
The best ones I've used and experienced are the ones from Sprint and Verizon (they are actually the same). Keep in mind, these "air cards" are only as good as the network they're being used on (which is why these two are the best). The actual makers of the cards is Novatel. They are then...
Check to see if the DHCP service is still running on the access point as the others lease might not have expired yet. Also check to make sure you have the wireless card on the problem machine set to obtain it's ip information automatically.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3...
This means that the My doom virus attempts to exploit port 3127 and it should probably be closed. What kind of router are you referring to? You'll need to tell us this so that we might help you close the port. First you should find out if any of your applications use this port. One way to do...
Group policy will not resolve this issue for you. I've had many clients experience this problem (usually from someone installing a wireless access point and enabling dhcp on it, then plugging it in to the network). The reason group policy wont solve your problem is the fact that group policy...
If you have non, start with Security+. It's a good appetizer for the other stuff like C|EH, SSCP, and CISSP.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3, MCSA, CEH, Security+, Network+, CTT+, A+
Icemel. The reason Microsoft has the 290 in the requirements for MCDBA is to try to ensure that you are a solid DB admin. In other words, as a DB admin, you shouldn't have to sit around and wait on someone else to come and assign permissions to certain files/folders, create user groups etc...
You don't need a paid subscription, you just need to create a login.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3, MCSA, CEH, Security+, Network+, CTT+, A+
In your wireless access point configuration, look for DHCP and then look for lease times. Most importantly, check your vendors documentation and/or website for specifics on how to find this information.
CISSP,ISC2 Affiliate & Instructor, MCT, MCSE2K/2K3, MCSA, CEH, Security+, Network+, CTT+, A+
I use the Pix to do most Layer 2 and 3 filtering, acl, etc. The Sonicwall interface is very user friendly and is a good choice if you want to train department managers and supervisors on monitoring traffic and content. I like the Sonicwall more for it's application level functionality and it's...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.