protocol

Tue
04
Jun
John Lister's picture

How to Fix: Patch BlueKeep Worm (XP, Vista, 7, Server 2008)

If you're still on Windows 7 or earlier, you need to make sure you have a recent security patch installed as soon as possible. It fixes a very serious operating system exploit, dubbed "BlueKeep". Note that a firewall and antivirus will not block ... operating system exploits , which is why using an unsupported operating system is incredibly dangerous . The bug is in the way that Remote Desktop Protocol (RDP) works. Remote Desktop Protocol lets somebody on one computer see and control another computer in another location. It has some extremely useful applications such as working away ... (view more)

Fri
08
Feb
Dennis Faas's picture

How to Fix: TP-Link Storage Sharing Not Working

Infopackets Reader Sam J. writes: " Dear Dennis, I have an older TPLink TL-WDR3500 router and I would like to attach a USB or external hard drive to it using the ' Storage Sharing ' option so that I can share files through my network. This would be ... ideal for me so I can share my Roboform passwords across devices. The issue is that the Storage Sharing option will only work if I enable CIFS 1.0 protocol in Windows because that is what the router uses to make the attached storage appear as a network drive letter in File Explorer. It is my understanding that CIFS 1.0 has a massive security issue ... (view more)

Fri
13
Jul
Dennis Faas's picture

How to Fix: Computer Name Won't Resolve on Network (April Update)

Infopackets Reader Steve J. writes: " Dear Dennis, Last week two of my systems (one a PC, the other a laptop) upgraded to Windows 10 version 1803, otherwise known as the 'April Creators Update' version of Windows 10. Ever since then, I can't access ... my laptop from my PC, though my PC can see the laptop. If I try and access either one directly, Windows 10 says it can't find the computer. Also my remote desktop protocol (RDP) no longer works. Researching ' network unc path april creators update broken ' in Google reveals that this is an incredibly widespread issue. Can you please help? " My ... (view more)

Fri
16
Dec
Dennis Faas's picture

How to Fix: Thunderbird: One Inbox, Multiple Accounts

Infopackets Reader Julia S. writes: " Dear Dennis, Thanks for your articles on Thunderbird. I have a question! I have multiple email accounts that I use with Thunderbird; one issue I find is that it's difficult to figure out which inbox has my new ... emails. Some accounts are set up with POP3, others with IMAP. The IMAP accounts have their own 'Inbox', 'Sent', 'Deleted items', etc, whereas the POP3 emails end up in my 'Local Inbox'. Is there a plug-in or a way to configure Thunderbird so everything goes into one single inbox? It would make my life so much easier! " My response: I wondered the ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Fri
24
Aug
Dennis Faas's picture

VPN Hack Used to Steal Passwords: Microsoft

Microsoft has revealed that a new Virtual Private Network (VPN) hack could be used to steal passwords and other sensitive information. It's called a "man-in-the-middle" attack. Security researcher Moxie Marlinspike first disclosed this VPN hack in a ... security advisory earlier this month. After investigating the issue, Microsoft has acknowledged that the threat is legitimate. Hacker Could Take Control of System, Network "An attacker who successfully exploited...cryptographic weaknesses could obtain user credentials," Microsoft said in its own advisory, released earlier this week. "Those ... (view more)

Thu
12
Jan
Dennis Faas's picture

Ftp

FTP or File Transfer Protocol is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol (such as the Internet or an intranet). There are two computers involved in an FTP transfer. The first computer is an ... FTP server. This computer listens on the network for connection requests from other computers. Another computer (called the client) can make a connection to the FTP server by using FTP client software. Once connected, the client can do a number of file manipulation operations such as uploading files to the server, download files from the server, ... (view more)

Fri
29
Apr
Dennis Faas's picture

'Protocol Handler', and 'Eraser'

Protocol Handler This sweet little program allows you to launch executables from web pages (read active desktop themes) without being bothered by a download dialog. It is used by schools, libraries, and even on public kiosk computers to allow users ... to launch applications in a user-friendly way. http://www.blackbit.net/ Eraser Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. http://www.heidi.ie/eraser/ ... (view more)

Tue
17
Sep
Dennis Faas's picture

Using Trace Route and Ping to trace pathways on the Internet

Tracert.exe? Ping.exe? What the heck is that? Trace Route (tracert.exe) is a DOS command line utility program that traces connection pathways along the Internet using the TCP / IP protocol. Ping (ping.exe) calculates how long it takes to transfer a ... packet of information from origin [you] to destination [a web site] and back again [to you]. What is TCP / IP? The TCP / IP protocol is a method used to communicate computers on the Internet. Any computer using the TCP / IP protocol has a unique address, referred to as an IP (Internet Protocol) address. An IP address can be thought of as a special ... (view more)

Subscribe to RSS - protocol