Friday, November 13, 2015

Business software or business application is any software or set of computer programs that are used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform business functions accurately.

By and large, business software is likely to be developed specifically for a business and therefore is not easily transferable to a different commercial enterprise, unless its nature and operation is identical. This is due to the unique requirements of each business that off-the-shelf software in unlikely to completely address. However, where an on-the-shelf solution is necessary, due to time or monetary considerations, some level of customization is likely to be required. Exceptions do exist, depending on the business in question, and thorough research is always required before committing to bespoke or off-the-shelf. [1]

Some business applications are interactive, i.e., they have a graphical user interface or user interface and users can query/modify/input data and view results instantaneously. They can also run reports instantaneously. Some business applications run in batch mode i.e. they are set up to run based on a predetermined event/time and business user does not need to initiate them or monitor them.

Some business applications are built in-house and some are bought from vendors (off the shelf software products). These business applications either are installed on desktops or on big servers. Prior to the introduction of COBOL (a universal compiler) in 1965, businesses developed their own unique machine language.. RCA's language consisted of a 12 position instruction. For example, to read a record into memory,the first two digits would be the instruction (action) code. The next . four positions of the instruction (A address) would be the exact leftmost memory location where you want the readable character to be placed. Four positions (B address) of the instruction would note the very rightmost memory location where you want the last character of the record to be located. A two digit B address also allowed a modification of any instruction. Instruction codes and memory designations excluded the use of 8's or 9's. The first RCA business application was implemented in 1962 on a 4k RCA 301.The RCA 301, mid frame 501, and large frame 601 began their marketing in early 1960. .

The term covers a large variation of users within the business environment, and can be categorized by using a small, medium and large matrix:

The small business market generally consists of home accounting software, and office suites such as OpenOffice.org or Microsoft Office.
The medium size, or small and medium-sized enterprise (SME), has a broader range of software applications, ranging from accounting, groupware, customer relationship management, human resource management systems, outsourcing relationship management, loan origination software, shopping cart software, field service software, and other productivity enhancing applications.
The last segment covers enterprise level software applications, such as those in the fields of enterprise resource planning, enterprise content management (ECM), business process management (BPM) and product lifecycle management. These applications are extensive in scope, and often come with modules that either add native functions, or incorporate the functionality of third-party computer programs.
Technologies that previously only existed in peer-to-peer software applications, like Kazaa and Napster, are starting to feature within business applications.
I remember being in my mid-twenties when the concept of a duplicable-business-system was introduced to me. My perspective about business changed forever. I found myself re-evaluating everything I had previously understood about smart business. I began to look for opportunities to understand the skill behind guiding a cohesive team, consisting of individuals with their own agendas, their own ideas and their unique ways of doing things.
I began to see McDonald’s as so much more than just a burger fast-food eatery that asked you to “upsize” at every opportunity. Developing smart business solutions is about so much more than just mass production, greed or limiting the self-expression of the individual. It’s about developing a strategy to create order, to facilitate communication and the sharing of knowledge in such a way that the whole team heads in the same direction, towards a common goal. Global statistics reflect that around 80% of all businesses started will fail within their first 5 years and 80% of the enterprises that survive the first 5 years will fail in the second 5 years. Let’s face it… the odds aren’t good. Systemization is one part of the puzzle in assisting businesses in becoming and remaining successful.
Refining your business system may involve minor tweaking of your current business processes or just simple and consistent documenting of team knowledge. You could introduce regular training workshops, refine some office standards or do something more dramatic like add a new documentation platform to your office environment.
Introducing new software, such as Revit, into your office can initially be disruptive, stressful and daunting. Changing a primary documentation platform will inherently raise any unresolved issues, some of which are not software related at all, but are rather management, work flow or documentation issues that may have remained unnoticed or unchecked for some time. This evaluation process however can be an invaluable opportunity for a company to refresh and review office processes and standards which may no longer be as efficient or even as necessary as they once were. The key to a successful implementation is to embrace this development process and to take the time to evaluate and review previous ways of doing things.
Most experienced Revit users will acknowledge that there is often more than one way to achieve a particular outcome using various tools; however each option has a set of ramifications that need to be understood and considered before deciding on a best documentation approach. By asking questions about how BIM-capable software, such as Revit, can improve the accuracy and consistency of your documentation you will instinctively re-examine previous workflows and begin to find ways to streamline and improve the documentation flow and output within your company.
So how does systemization relate to the construction industry or affect your specific business?
It is imperative to review our office processes and to challenge how we order, find, edit, manage, distribute, update and collate data, project files, drawings, warranties, legal papers etc. I believe that the industry pursuit of the BIM ideal, the advancement in software’s and new technologies all raise a real threat of information overload. Without good office systems disorganized companies could soon lose much of their profits as they become more and more inundated with all kinds of information.
Here are some brief examples of what a system-based-solution can prevent, thereby saving time, frustration, inefficiency and money.
•             Losing a file that someone has accidentally deleted moved or altered.
•             Not being able to determine the most current version of a working file instantly.
•             Inheriting a project file where no office conventions or apparent logic has been applied.
•             Finding corrupt files that have not been deleted, archived or worse, are still in use.
•             Transmit t als or revisions have not been accurately maintained or managed.
•             Insufficient or irregular protection and back-up of data on servers.
•             Tasks are often repeated by several team members due to insufficient communication or a lack of shared data collaboration.
It intrigues me why some systems work well and why others are ignored and fail. What is the secret?
I think there are several factors that seem to facilitate a successful outcome when refining a company’s processes.
Here are some secrets to making it work:
•             Management & leaders must support the new initiative and revised system.
•             Avoid creating processes that create additional workload for teams with minimal benefit.
•             A Business system and outlined processes need to be simple, easy to follow and should reduce confusion.
•             Any system worth creating is worth maintaining and monitoring. [Document management and process procedures clearly.]
•             Create well considered system solutions that pre-empt possible hurdles or risks of failure.
•             The system is designed to improve efficiency and/or output accuracy.
•             Don’t try to appease everyone but remember to consider the impacts on other departments.
•             Where possible create processes that can be supported across several, if not all, departments to ensure minimal variances in procedures. Consistency and simplicity is the key.
•             Steer clear of creating a system that is too inflexible.
•             Resist the temptation to create a procedure for absolutely everything. Avoid micro-management.
Knowledge and industry experience can be a company’s most valuable asset. Essentially knowledge management offers a company some protection and ensures that valuable knowledge and experience is duplicated throughout the office. Be sure that when senior or long-term staff members leave your firm that they do not walk out the door with their wisdom. Take the time to capture some of their insight and fundamental knowledge of office protocols so that you can use the knowledge to train and co-ordinate your staff to harness team strengths. Reward personnel who are eager to contribute to knowledge management and try and discourage a self-centered work ethos that perpetuate an isolated learning environment.
Here are some things that may be worth documenting:
•             What are the desired project workflows and office procedures?
•             How do various departments interact?
•             How is data managed, edited, repaired, updated and/or issued?
•             Who is accountable for documenting and updating relevant procedures? [Security permissions]
•             How should staff members be notified of changes in procedures?
Once you have captured some of the valuable knowledge the key is to reproduce it amongst your staff members. This can be achieved in the form of reference manuals, intranet or training and inductions. If you take the time to formalize the transfer of knowledge through various training materials you will be ensuring the correct knowledge is duplicated through the office environment and that everyone is following the same protocols. Consider setting a partnership/buddy program within your firm that supports and encourages the sharing of knowledge and mentorship.
Whilst working at Woolworths I created a Revit user guide which proved to be a useful tool to ensure everyone was heading in the same direction. I documented the Revit system, expected document outputs and company specific Revit practices. This guide became an invaluable means to ensure existing and new staff had a consistent reference to work from; thereby ensuring that six documentation offices across Australia all produced identical working drawings and staff could switch across projects, if needed, without any confusion with regard to project and office standards as well as content libraries.
In my experience Revit’s performance ability can be dramatically improved upon by clever and disciplined principles. I have found that a well-considered and consistently followed convention for shared parameters, family sub-categories, view templates and family naming can make a world of difference to how data can be controlled, maintained, repaired and monitored. What excites me most about Revit is how the software excels in an environment of order and how easy it can become to identify inconsistencies if chosen standards are closely followed. I think the key thing to keep in mind is to create systems that are clear, simple and flexible. See for yourself how systemization could benefit you, your team and create a better work environment.
Best of Luck!

Thursday, November 12, 2015


HRM software allows you to manage and monitor key human resource tasks, including; 

Administration (defining company structure‚ pay grades and other information)
Personal Information (employee related information‚ including personal information‚ detailed qualifications and work experience‚ job related information etc). 
Reports (customize reports according to your needs with an appropriate report filing system).
Leave (defines the approval processes and information leave entitlement‚ balance‚ history etc. An electronic HRM system can significantly streamline all leave related procedures‚ eliminates paperwork and saves costs.)
Time and attendance (HRM software can enhance the organization’s performance by eliminating paperwork and manual processes associated with time and attendance needs)
Benefit (This HRM software allows businesses to manage employee medical and welfare records in one easily accessible location.)
Recruitment (procedures for staff recruitment‚ approval of vacancies‚ eligibility requirements‚ managing candidate’s information‚ short-listing‚ interview notes and other features).  
Performance (simplifying the performance review process you can communicate the key performance indicators for each job title allowing the employees to understand and achieve your expectations).
Orange HRM is an opensource HRM tool suitable for use in both micro enterprises and medium size enterprises that can help you monitor all the above factors for your business.


To find out more about OrangeHRM click on the image above to go to the OrangeHRM website or view the YouTube video below on OrangeHRM features.
Customer Relationship Management is part of every business, regardless of whether or not your business uses CRM software.

Regardless of the size or aspirations of your business, it is advisable to recognize the importance of CRM in acquiring and retaining customers.


Modern basic CRM software includes the following functions:
  • Customer and personal data maintenance with various  customer classifications
  • Assistance in managing customer encounters
  • Assistance in control of the sales process
  • CRM plans and  how to implement them
  • Targeting tools and multi-channel communication for marketing
  • Customer service support systems
  • Report, analyze and search tools
vTiger CRM is one of the most popular open source CRM systems and was developed  to meet the needs of small to medium  sized businesses.vTiger offers sales force automation, marketing automation, customer support and service, inventory management, activity management, as well as reporting and dashboards features.

 The full version is completely free, but you can also purchase a support subscription or a hosted version at a cost.

Accessible at: http://www.vtiger.com/
Financial management is an integral part of the software needs of a budding entrepreneur.  Depending on your business needs and your financial management knowledge you can choose whether you want to pay for a comprehensive accounting software tool or a less detailed software tool. All this depends on the size of your business. Basic accounting software will allow you to manage your accounts, track income and expenditure and produce invoices for your customers. Accounting software can also help you present your financial dealings in a professional and simple format.
If you are in need of full accounting and want an online solution, look for sample options such as QuickBooks Online or Working Point (links are located in the resource section on the right).


Alternatively there is a number of open source accounting software available for download online. GnuCash is an open source accounting software that allows you to create and track;
  • Bills
  • Professional Invoices
  • Expenses
  • Payments
Spreadsheets can help but they quickly become time consuming and complex. This is where accounting software can help out. GnuCash is compatible with online banking and allows real time tracking of orders and stocks. You can also set up and track numerous accounts relating to your business. The double entry function ensures that changes that are made to one account are checked to ensure your other accounts are updated accordingly.
GnuCash can give you some of the additional business features you need, like tracking customers, vendors, invoices, accounts payable and accounts receivable. It is also compatible with Quicken and OFX formats, so you can transfer your existing data if you are currently working with different accounting software.

Accessible at: http://www.gnucash.org/


Start-up costs for outfitting an office with networking and computing equipment is important to all new start up businesses. Google apps offer free alternatives to the software which companies buy to help them to set up their e-mail accounts, schedule their meetings and to the office suites that businesses typically use to prepare documents, spreadsheets and presentations.
Instead of paying IT staff to set up, host and maintain your own mail servers,Google Apps can handle custom email addresses at your own company’s URL. As an alternative to Microsoft Outlook worth considering, Gmail also integrates nicely with Google Calendar for all your scheduling needs.
And whereas once Microsoft Office was one of your only choices in the office suites department, Google Documents now handles documents, spreadsheets and presentation preparation while making it easy to share and collaborate with colleagues without having to email documents or check items out of a central repository.
Visit www.google.com/apps to see how Google apps can help your business performance.
Email basics
You will already be aware of how to set up a personal e-mail account and send an email but there is a number of functions within your email account that may not be quite as simple.
Send email: You can send the e-mail by typing your intended recipient's email address into the “to” field.
What is cc?
The cc field allows you to send a "carbon copy" of your email to additional recipients. Input the email address of the person you want to send a copy of the email to into the "cc" field under the "to" field.
What is Bcc?
Bcc is a "Blind carbon copy".  If you would like to send an e-mail to many people and you do not want them to see who else has received this email; put their email addresses in the “Bcc”. This should be used during mail merges as you should not share the addresses of others with third parties.

Google is one of the most innovative IT companies today. Google has many great applications, such as a translator function, Google maps and an e-mail service.

You can easily get access to all of these great applications; all you need is a Gmail account.
Go to mail.google.com and create your own email account. It is free to use and with your account; you are able to access and use all of the innovative applications that Google have on offer.
In Gmail, there is also an online calendar which is very useful. You can synchronize your calendar information, for example, with your mobile phone, keeping you up to date all the time.


Project Management Software allows you to plan and execute projects, store information, and assign tasks using software on your computer.
Project Management software allows you to set tasks against a defined deadline as well as track, monitor and assign tasks as necessary. This software can be very useful if you will be undertaking a number of tasks at the same time. While a journal or notepad can be useful, project management software can significantly reduce the time you spend planning and removes the threat of making an error when planning tasks.
There are many different software choices available for project management. You can download basic project management software for free online.
OpenProj is a free, open source project management solution. OpenProj is a replacement of Microsoft Project and other commercial project solutions. The OpenProj solution has been download more than 1,250,000 times in the few months since it was launched and is being used in over 142 countries.
Access this software at: http://openproj.org/
Many people are aware of the importance of technology in business today. This module aims to present some of the most popular open source, free, applications for running your business. These include:

1. Project Management software which enables you to track and plan tasks and duties through a single computer application. This can help ensure your business tasks and schedules are achieved.

2. Email collaboration software can simplify the process of maintaining contacts and distributing information to many at the push of a button.

3. Office Productivity suites which allow you to develop documents, charts and presentations for use in your business.

4. Voice over Internet Protocol (VoIP) allows you to remotely contact business partners or clients through the internet. Skype is a widely known type of VoIP.

5. Google Apps provides you with a variety of applications to help you manage your time and file your documents in a central location.

6. Accounting Software helps you track the money coming in and going out of your business through your computer. This software also includes payroll and invoicing features.

7. Customer Relations Management (CRM) and Human Resource Management (HRM) software helps you store and maintain information on both your customers and employees respectively. This software may not be that relevant at start up stage but should be considered when staff levels increase.

While all of these software applications may not be relevant to you depending on the size or type of your business, they serve as a sample of the online resources that are available to businesses to assist in the running of your operations. 

Check out the software you think would be useful to you and download the applications to start working with them. These are downloadable from the software websites, are safe to use and free of charge.

Monday, October 12, 2015

When you connect to the Internet, your Internet Service Provider (known as ISP) assigns an IP address. Depending on the type of service you subscribed, you may be allocated to use static or dynamic IP address. A static IP address is a permanent (non-changing) IP address assigned to you. Most users on the other hand gets an dynamically assigned IP address from their ISP. The device (a router, gateway or computer) connected to your ISP allows you to connect to the Internet, and also allows you to change its IP address. This article only pertains to changing an IP address of dynamically assigned IP address (via the DHCP).

Change your IP Country with a Virtual Private Network

You may want to change your public IP address for a variety of reasons. If your IP address is banned by certain game servers or your download allowance from a P2P network has expired, obtaining a different IP address from your current ISP will solve your problem (see instruction below). However, if you wish to bypass regional block and wish to obtain an IP address from a different country, changing an IP address from your ISP will not help you. For example, if you want to watch BBC, Netflix, Spotify or Hulu from a region where those services are blocked, you will need a VPN service to obtain an IP address of a country where the service is allowed. With VPN, you'll also surf Internet anonymously with added security.
Here are a few VPN providers we recommend:

We receive compensation when a purchase is made from the referred link. Our recommendation is based on our research and positive feedback we received from the users who've used the services.

Ok, I got it so how do I change IP address?

If you renew your IP address from your current ISP, your ISP may or may not assign you a new IP address. Depending on how you're connected to the Internet, you may have to reset different device. If you're connected via a router, you'll have to change IP address of your router. If you're connected directly to the Internet via a layer-2 gateway, you'll have to change your computer's IP address. Most home network is connected via a router, so chances are that you need to change IP address of your router. In this article, I will describe how to change IP address of your router and also show you how to change IP address of your computer. There are a number of ways to change IP address, so I'll describe easiest method first and then describe a bit more complicated methods.
In order to verify that you've changed an IP address of your device, you'll have to visit Find My IP page of our website.

How to change IP address of a router?

A router is a layer 3 networking device that connects multiple computers to the Internet. In home network with dynamically assigned IP address, a router is assigned a public IP address and all the computers connected to the router is assigned a private IP address. When computers connected to the router visits the Internet, the world views your computer with a public IP address of your router. So, if you want the world to see you with a different IP address, you'll have to change IP address of your router. Here are a few ways to change IP address of your router.
  • Turn off your router for a minute and turn it back on. The common nature of DHCP is to "remember" the device and assign you the same IP address you had before, so simply turning off your router and turning it back on will not likely change IP address. However, if you try multiple times you may get lucky and will obtain a new IP address from your ISP. If multiple tries doesn't get you a new IP address, try leaving the router turned off overnight and restart in the morning.
  • Reconnect your router to your ISP via administrative Interface. Most routers allow you to disconnect from upstream ISP, and reconnect via a point-and-click from the Administrative Console. Each router vendor provides a different UI to achieve this, but once you login to the Administrative Console of the router you should be able to locate the reconnect button. The screenshot below is the method provided by the Asus RT-N66W model.

How to change IP address of a computer?

  • Shutdown your computer for a minute and turn it back on. Again, the common nature of DHCP is to assign the device same IP address each time it connects to the network, it's unlikely that you'll receive different address first time your restart your computer. If you restart a few times, you may get lucky and get a new IP address from your router.
  • Renew your IP address. You may manully release your IP address and obtain a new IP address with Windows ipconfig utility. Please follow the following steps.
  • On Windows 7 and below, click Start -> Run, and type cmd as shown below. On Windows 8, type WIN key and X key to bring Power User Menu -> Choose Run.
    On the Command Prompt screen, run "ipconfig /release" and "ipconfig /renew" commands as shown below. You'll have to start Elevated Command Prompt (Run as System Administrator) to execute ipconfig command.
    C:\> ipconfig
    
    Windows IP Configuration
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 192.168.1.101
            Subnet Mask . . . . . . . . . . . : 255.255.255.0
            Default Gateway . . . . . . . . . : 192.168.1.1
    
    C:\> ipconfig /release
    Windows IP Configuration
    
    No operation can be performed on Local Area Connection while it has its media
    disconnected.
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 0.0.0.0
            Subnet Mask . . . . . . . . . . . : 0.0.0.0
            Default Gateway . . . . . . . . . :
    
    Ethernet adapter Local Area Connection:
    
            Media State . . . . . . . . . . . : Media disconnected
    
    C:\> ipconfig /renew
    
    Windows IP Configuration
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 192.168.1.102
            Subnet Mask . . . . . . . . . . . : 255.255.255.0
            Default Gateway . . . . . . . . . : 192.168.1.1
    
    Verify that you have a new IP address by either typing ipconfig command, or by visiting Find My IP page. On our example above, the IP address has been changed from 192.168.1.101 to 192.168.1.102. Again, the nature of DHCP is to assign the device same IP address as before so you may have run this step multiple times to change your IP address.
  • You may use a proxy server or VPN to conceal your true IP address, and borrow an IP from a 3rd-party Proxy or VPN provider.

Use someone else's network

As with Hide IP Address, you can always use someone else's network and obtain an IP address from that network. Try using free Wi-Fi services from a local coffee shop, hotel, library or any other public offerings. An IP address does not travel with your computer, so using someone else's network may be a viable solution.

A Virtual Private Network (VPN) is a network technology which extends private network (such as LAN) over a public network such as the Internet. A VPN allows a computer (or a network) to be connected securely as if they are physically wired together. Corporations use VPN to allow remote workers to connect securely to their private network. A VPN is also used to interconnect remote offices with a head office as if they are physically connected.
Besides interconnecting private networks, a VPN is also used to hide ip address or change ip addressby connecting to a 3rd-party VPN provider to protect oneself from exposing to public networks.

Advantages

  1. The primary reason for implementing VPN technology is to create a secure connection to the other endpoint. Creating a WAN connectivity is very costly, and may not be practical for individual users making client to server connection. The information exchanged between the two VPN endpoints is encrypted, and hence no eavesdropping can occur when information is transmitted over public network.
  2. A VPN can also be used to hide your privacy by disguising true IP address of the user's computer. Online gamers may use VPN to hide IP address of their computers, and business owners may use VPN to change IP address to protect their identity from their competitors.

Disadvantages

  1. Since all virtual private network traffic is encrypted, there will be 10-15% increase in payload transmitted over VPN. This additional overhead causes (1) computing devices to use more processing power to encrypt the data, (2) send more data over the network, and finally (3) takes longer to transmit data as there will be 10-15% additional data. With advancement in computing and network technologies, the additional processing power required to encrypt/decrypt and additional data transmission have negligible impact on overall usage of the network.
  2. Not all VPN appliances interoperate well, so a VPN device from one vendor may not work well from a device from another vendor. A network engineer implementing the VPN technology must verify compability between the two endpoints. Similarly, a client to server connection may cause slowness (or degrade in QoS) if VPN is not properly setup.

VPN Protocols

A virtual private network is created by establishing a virtual tunnel between two endpoints via a virtual tunneling protocol or by data encryption. Some of the most popular VPN protocols include IPsec, SSL/TLS, PPTP and L2TP.

Authentication

A VPN connection whether it's a client to server or network to network, tunnel endpoints must be authenticated before establishing a secure connection. A user initiated VPN connection either use password or two-factor authentication whereas network-to-network tunnels often use digital certificates (private/public key combination).
If you have any questions about VPN technology, please post your question on VPN Forum.

Many readers of our website are contacting us for help on *allegedly* hacked IP address, and remedies for getting it back. One of the user is telling us his IP address used to be 64.3.x.y in Dallas and now it's 67.72.x.y located in Utah (per ip lookup); and hence his IP address is stolen, and his computer is running very slow and acting abnormal.
For a non-computer person, this may sound like a user's IP address has been hacked but in reality your IP address cannot be hacked. Chances are that you're getting your IP address dynamically from your Service Provider whom may be servicing multiple areas. When you disconnect from your ISP and reconnect to the Internet, you're getting a new IP address from your Internet Service Provider and this IP address may or may not be the same as previously assigned. This does not mean you're sharing this IP address with someone else, as you've just assigned a new IP address and your old IP address may have been assigned to a new person in Utah. As ISPs servicing multiple cities, they may allocate their IP address how ever they desire, and this may cause location of IP address to be incorrectly shown. Getting an IP address that shows remote location (Utah) does not slow down your computer, or cause it to act abnormal.
If your computer is acting slow or behave abnormal, you may have spyware or virus on your computer. Slowness of your computer has nothing to do with your IP address. You may wish to scan your computer for virus, and remove them.

If someone knows my IP address, can they hack my computer?

Depending on how your computer is connected to the Internet and the type of security in place, your computer may vulnerable for hack. In reality, chances of your computer being hacked from your known IP address is very unlikely. The trouble of hacker trying to gain access to your computer doesn't justify hacking into your computer unless you have billions of dollars in your bank account accessible from your personal computer. The most easiest way for hackers to gain access to your computer is through virus, not by attacking an IP address.

I have a static IP address. Can my computer (or server) hacked?

Having a static IP address doesn't increase the chance of your server being hacked, but vulnerable software and configuration may allow hackers to randomly attack your computer. Hackers learn known vulnerability on certain types of software, and using known vulnerability hackers randomly attack machines. Servers directly connected to the Internet are more exposed than the personal computers sitting behind the router with firewall. Unless you're a network professional managing servers, chances of your personal computer hacked is very small. Again, the easiest way to hack into your computer is by through a rootkit or virus.
IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonate another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in the IP header. IP spoofing involves solving the algorithm that is used to select the order sent values, and to modify them correctly.
Ipconfig is a MS-DOS command-line tool used to display and manage the network settings of your computer. Ipconfig is available on Windows machines, and it displays the current network connection details and DHCP client settings.
Ipconfig is an external MS-DOS command, and is available on Windows 95, Windows 98, ME, NT, 2000, XP and Windows Vista Operating Systems. On Windows 9x machines, a graphical tools such as winipconifg or winipcfg may be used instead. On Linux machine, the ifconfig command performs equivalent function.

C:\> ipconfig /?

USAGE:
    ipconfig [/? | /all | /renew [adapter] | /release [adapter] |
              /flushdns | /displaydns | /registerdns |
              /showclassid adapter |
              /setclassid adapter [classid] ]

where
    adapter         Connection name
                   (wildcard characters * and ? allowed, see examples)

    Options:
       /?           Display this help message
       /all         Display full configuration information.
       /release     Release the IP address for the specified adapter.
       /renew       Renew the IP address for the specified adapter.
       /flushdns    Purges the DNS Resolver cache.
       /registerdns Refreshes all DHCP leases and re-registers DNS names
       /displaydns  Display the contents of the DNS Resolver Cache.
       /showclassid Displays all the dhcp class IDs allowed for adapter.
       /setclassid  Modifies the dhcp class id.

The default is to display only the IP address, subnet mask and
default gateway for each adapter bound to TCP/IP.

For Release and Renew, if no adapter name is specified, then the IP address
leases for all adapters bound to TCP/IP will be released or renewed.

For Setclassid, if no ClassId is specified, then the ClassId is removed.

Examples:
    > ipconfig                   ... Show information.
    > ipconfig /all              ... Show detailed information
    > ipconfig /renew            ... renew all adapters
    > ipconfig /renew EL*        ... renew any connection that has its
                                     name starting with EL
    > ipconfig /release *Con*    ... release all matching connections,
                                     eg. "Local Area Connection 1" or
                                         "Local Area Connection 2"

C:\>ipconfig /all

Windows IP Configuration

        Host Name . . . . . . . . . . . . : topwebhosts
        Primary Dns Suffix  . . . . . . . :
        Node Type . . . . . . . . . . . . : Hybrid
        IP Routing Enabled. . . . . . . . : No
        WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        Description . . . . . . . . . . . : Intel(R) PRO/Wireless LAN 2100 3B Mi
ni PCI Adapter
        Physical Address. . . . . . . . . : 00-0C-F1-65-5B-70
        Dhcp Enabled. . . . . . . . . . . : Yes
        Autoconfiguration Enabled . . . . : Yes
        IP Address. . . . . . . . . . . . : 192.168.1.100
        Subnet Mask . . . . . . . . . . . : 255.255.255.0
        Default Gateway . . . . . . . . . : 192.168.1.1
        DHCP Server . . . . . . . . . . . : 192.168.1.1
        DNS Servers . . . . . . . . . . . : 192.168.1.1
        Lease Obtained. . . . . . . . . . : Thursday, February 08, 2007 2:27:17
PM
        Lease Expires . . . . . . . . . . : Thursday, February 15, 2007 2:27:17
PM

Ethernet adapter Local Area Connection:

        Media State . . . . . . . . . . . : Media disconnected
        Description . . . . . . . . . . . : Intel(R) PRO/1000 MT Mobile Connecti
on
        Physical Address. . . . . . . . . : 00-0D-60-FB-4E-E9

To learn the names of ethernet adapters that you can optionally specify with "ipconfig" command, you may simply type ipconfig command by itself. The command output displays all adapters by name that are available on your computer: e.g. "Local Area Connection", "Wireless Network Connection".
Ipconfig command is most often used to diagnose network problem on a Windows machine. If you're using DHCP, you may try releasing and renewing IP address by performing "ipconfig /release" and "ipconfig /renew" commands shown below.
C:\> ipconfig /release
Windows IP Configuration

No operation can be performed on Local Area Connection while it has its media di
sconnected.

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        IP Address. . . . . . . . . . . . : 0.0.0.0
        Subnet Mask . . . . . . . . . . . : 0.0.0.0
        Default Gateway . . . . . . . . . :

Ethernet adapter Local Area Connection:

        Media State . . . . . . . . . . . : Media disconnected

C:\> ipconfig /renew

Windows IP Configuration

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        IP Address. . . . . . . . . . . . : 192.168.1.100
        Subnet Mask . . . . . . . . . . . : 255.255.255.0
        Default Gateway . . . . . . . . . : 192.168.1.1

To workaround DNS caching issue, you may perform "ipconfig /flushdns" to clear DNS cache value on your computer. DNS uses TTL (Time-To-Live) value which let the intermediate name servers to cache DNS information. If you changed your DNS settings, and your computer doesn't see the change immediately, you may perform "ipconfig /flushdns" to clear the DNS cache.
C:\> ipconfig /flushdns

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.


FAQ:

On Windows Vista machine, if you are getting an error "The requested operation requires elevation", you'll need to run Command Prompt as an administrator. To do this, you'll need to do the following:
All Programs -> Accessories -> right click Command Prompt and click Run as administrator!

An IP address is an address assigned to a device on the Internet. It is analogous to postal address where a letter is delivered, and an IP address is computer's address where internet traffic is delivered. An IP address is assigned to you by your Internet Service Provider (ISP). When you signup with your ISP, your ISP either assigns you a static IP address or a dynamic IP address depending on the contract. If you need to setup a web server or an email service, you'll need a static IP address. If you are just browsing an Internet, you may just get by with a dynamic IP address.

What is a static IP address?

A static IP address is an address that is permanently assigned to you by your ISP (as long as your contract is in good standing), and does not change even if your computer reboots. A static IP address is usually assigned to a server hosting websites, and providing email, database and FTP services. A static IP address is also assigned to a commercial leased line, or public organization requiring same IP address each and every time. Since static IP address is assigned to you, you'll have to manually configure your machine (router or server) to use the static IP address assigned to you.
Static IP address Advantages
  • Address does not change - good for web servers, email servers and other Internet servers.
  • Use DNS to map domain name to IP address, and use domain name to address the static IP address. Similar can be achieved with Dynamic DNS for dynamic IP address, but it's not as clean as the static IP address.
Static IP address Disadvantages
  • Expensive than dynamic IP address - ISPs generally charge additional fee for static IP addresses.
  • Need additional security - Since same IP is assigned to a machine, hackers try brute force attack on the machine over period of time.

What is a dynamic IP address?

A dynamic IP address is an IP address dynamically assigned to your computer by your ISP. Each time your computer (or router) is rebooted, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. Since your ISP dynamically assigns an IP address to a computing device on reboot, your device may not always receive the same IP address previous assigned to it. Even if your machine is always on and permanently connected, some ISPs do change IP address on-the-fly even though this is very rare. A sticky nature of DHCP generally reassigns same IP address to the same machine, it is not guaranteed to receive same IP address as IP pool may exhaust at times and lease time may expire. To find your dynamic IP address, you may visit What is my IP address page.
Dynamic IP address Advantages
  • Cheaper than static IP address.
  • Changing IP address gives more privacy.
Dynamic IP address Disadvantages
  • Requires DHCP server to obtain an IP address.
  • Non-static. Each time IP address changes, you may have to find you IP address again.

DHCP, Dynamic Host Configuration Protocol, is a communications protocol that dynamically assigns unique IP addresses to network devices. As a network device joins or leaves an IP-based network, DHCP automatically renews or releases an IP address.
DHCP runs in a client/server mode, where server sets up a pool of available IP addresses for a network. A DHCP server also provides network gateway, subnet masks, name server addresses and amount of time ("lease") that a given IP address will be valid. A DHCP client retrieve those parameters and use them to join the existing network.
DHCP allows network administrators centrally manage and automate the assignment of the IP addresses without having to worry about assigning duplicate addresses, making network administration a lot easier to manage.

TCP/IP, Transmission Control Protocol/Internet Protocol, is a suite of communications protocols used to interconnect network devices on the Internet. TCP/IP implements layers of protocol stacks, and each layer provides a well-defined network services to the upper layer protocol. TCP and IP are the two protocols used by TCP/IP, as well as the (higher) application, (lower) data link and (lower) physical layer protocols.
LayerProtocols
5. ApplicationDNS, FTP, HTTP, IMAP, POP3, SMTP, SSH, Telnet, SSL, ...
4. TransportTCP, UDP, ...
3. NetworkIP (IPv4, IPv6), ICMP, ARP, ...
2. Data Link802.3 (Ethernet), 802.11 (Wi-Fi), PPP, ...
1. PhysicalEthernet (NIC), Wireless (NIC), Cat 5/RJ-45, ...
Ethernet is the most widely used local area network (LAN) technology, that defines wiring and signaling standards for the physical layer of TCP/IP. Ethernet was originally standardized as IEEE 802.3 with a data transmission rate of 10 Mb/s. Newer versions of Ethernet were introduced lately to offer higher data rates. Fast Ethernet and Gigabit Ethernet support data rates of 100 Mbps and 1 Gbps (1000 Mbps) respectively. An Ethernet LAN may use coaxial cable (10Base2), unshielded twisted pair wiring (10BaseT, 100BaseT and 1000BaseT), or fiber optic cable. Ethernet devices compete for access to the network using a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). With prosperity of Internet, Wi-Fi, the wireless LAN technology standardized by IEEE 802.11, is used in hybrid with Ethernet LAN to offer portability.

2. Ethernet Standards

IEEE 802.3 is the signaling standards for Ethernet, and IEEE 802.11 is the standards for Wi-Fi. The standards documents may be obtained free of charge at the following website:http://standards.ieee.org/getieee802/
MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.
MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network administrator. DHCPrelies on MAC address to assign IP addresses to network devices.

How do I find a MAC address of network device?

Operating Systems support various command-line and GUI utilities to allow users to find MAC address of the system. On Unix variants including Solaris and Linux support "ifconfig -a""ip link list" or "ip address show" command that displays MAC address of the network device among other useful information. Windows including NT, 2000, XP and 2003 support "ipconfig /all" command that displays MAC address. On a MacOS, one can find MAC address by opening "System Preferences", then selecting "Network".
An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>) if additional subnetwork is needed. Use the Subnet Calculator to retrieve subnetwork information from IP address and Subnet Mask. It is called a subnet mask because it is used to identify network address of an IP address by perfoming a bitwise AND operation on the netmask.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts.
Examples of commonly used netmasks for classed networks are 8-bits (Class A), 16-bits (Class B) and 24-bits (Class C), and classless networks are as follows:
ClassAddress# of HostsNetmask (Binary)Netmask (Decimal)
CIDR/4240,435,45611110000 00000000 00000000 00000000240.0.0.0
CIDR/5134,217,72811111000 00000000 00000000 00000000248.0.0.0
CIDR/667,108,86411111100 00000000 00000000 00000000252.0.0.0
CIDR/733,554,43211111110 00000000 00000000 00000000254.0.0.0
A/816,777,21611111111 00000000 00000000 00000000255.0.0.0
CIDR/98,388,60811111111 10000000 00000000 00000000255.128.0.0
CIDR/104,194,30411111111 11000000 00000000 00000000255.192.0.0
CIDR/112,097,15211111111 11100000 00000000 00000000255.224.0.0
CIDR/121,048,57611111111 11110000 00000000 00000000255.240.0.0
CIDR/13524,28811111111 11111000 00000000 00000000255.248.0.0
CIDR/14262,14411111111 11111100 00000000 00000000255.252.0.0
CIDR/15131,07211111111 11111110 00000000 00000000255.254.0.0
B/1665,53411111111 11111111 00000000 00000000255.255.0.0
CIDR/1732,76811111111 11111111 10000000 00000000255.255.128.0
CIDR/1816,38411111111 11111111 11000000 00000000255.255.192.0
CIDR/198,19211111111 11111111 11100000 00000000255.255.224.0
CIDR/204,09611111111 11111111 11110000 00000000255.255.240.0
CIDR/212,04811111111 11111111 11111000 00000000255.255.248.0
CIDR/221,02411111111 11111111 11111100 00000000255.255.252.0
CIDR/2351211111111 11111111 11111110 00000000255.255.254.0
C/2425611111111 11111111 11111111 00000000255.255.255.0
CIDR/2512811111111 11111111 11111111 10000000255.255.255.128
CIDR/266411111111 11111111 11111111 11000000255.255.255.192
CIDR/273211111111 11111111 11111111 11100000255.255.255.224
CIDR/281611111111 11111111 11111111 11110000255.255.255.240
CIDR/29811111111 11111111 11111111 11111000255.255.255.248
CIDR/30411111111 11111111 11111111 11111100255.255.255.252

Subnetting an IP network is to separate a big network into smaller multiple networks for reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted by any node in a network. Performance of a network is adversely affected under heavy traffic load due to collisions and retransmissions.
Applying a subnet mask to an IP address separates network address from host address. The network bits are represented by the 1's in the mask, and the host bits are represented by 0's. Performing a bitwise logical AND operation on the IP address with the subnet mask produces the network address. For example, applying the Class C subnet mask to our IP address 216.3.128.12 produces the following network address:
IP:   1101 1000 . 0000 0011 . 1000 0000 . 0000 1100  (216.003.128.012)
Mask: 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000  (255.255.255.000)
      ---------------------------------------------
      1101 1000 . 0000 0011 . 1000 0000 . 0000 0000  (216.003.128.000)

Subnetting Network 
Here is another scenario where subnetting is needed. Pretend that a web host with a Class C network needs to divide the network so that parts of the network can be leased to its customers. Let's assume that a host has a network address of 216.3.128.0 (as shown in the example above). Let's say that we're going to divide the network into 2 and dedicate the first half to itself, and the other half to its customers.
   216 .   3 . 128 . (0000 0000)  (1st half assigned to the web host)
   216 .   3 . 128 . (1000 0000)  (2nd half assigned to the customers)
The web host will have the subnet mask of 216.3.128.128 (/25). Now, we'll further divide the 2nd half into eight block of 16 IP addresses.
   216 .   3 . 128 . (1000 0000)  Customer 1 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1001 0000)  Customer 2 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1010 0000)  Customer 3 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1011 0000)  Customer 4 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1100 0000)  Customer 5 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1101 0000)  Customer 6 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1110 0000)  Customer 7 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1111 0000)  Customer 8 -- Gets 16 IPs (14 usable)
   -----------------------------
   255 . 255 . 255 . (1111 0000)  (Subnet mask of 255.255.255.240)
You may use Subnet Calculator to ease your calculation.

CIDR - Classless Inter Domain Routing 
Classless InterDomain Routing (CIDR) was invented to keep the Internet from running out of IP Addresses. The IPv4, a 32-bit, addresses have a limit of 4,294,967,296 (232) unique IP addresses. The classful address scheme (Class A, B and C) of allocating IP addresses in 8-bit increments can be very wasteful. With classful addressing scheme, a minimum number of IP addresses allocated to an organization is 256 (Class C). Giving 256 IP addresses to an organization only requiring 15 IP addresses is wasteful. Also, an organization requiring more than 256 IP addresses (let's say 1,000 IP addresses) is assigned a Class B, which allocates 65,536 IP addresses. Similarly, an organization requiring more than 65,636 (65,634 usable IPs) is assigned a Class A network, which allocates 16,777,216 (16.7 Million) IP addresses. This type of address allocation is very wasteful.
With CIDR, a network of IP addresses is allocated in 1-bit increments as opposed to 8-bits in classful network. The use of a CIDR notated address can easily represent classful addresses (Class A = /8, Class B = /16, and Class C = /24). The number next to the slash (i.e. /8) represents the number of bits assigned to the network address. The example shown above can be illustrated with CIDR as follows:
   216.3.128.12, with subnet mask of 255.255.255.128 is written as
   216.3.128.12/25

   Similarly, the 8 customers with the block of 16 IP addresses can be
   written as:

   216.3.128.129/28, 216.3.128.130/28, and etc.
With an introduction of CIDR addressing scheme, IP addresses are more efficiently allocated to ISPs and customers; and hence there is less risk of IP addresses running out anytime soon. For detailed specification on CIDR, please review RFC 1519. With introduction of additional gaming, medical, applicance and telecom devices requiring static IP addresses in addition to more than 6.5 billion (July 2006 est.) world population, the IPv4 addresses with CIDR addressing scheme will eventually run out. To solve shortage of IPv4 addresses, the IPv6 (128-bit) address scheme was introduced in 1993.

Subscribe to RSS Feed Follow me on Twitter!