Saturday 16 March 2013

Networking Interview Questions & answers

1. Define Network?

A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.

2. What is a Link?

At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.

3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.

4. What is a gateway or Router?
A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another.

5. What is point-point link?
 If the physical links are limited to a pair of nodes it is said to be point-point link.

6. What is Multiple Access?
If the physical links are shared by more than two nodes, it is said to be Multiple Access.

7. Name the factors that affect the performance of the network?
a. Number of Users
b. Type of transmission medium
c. Hardware
d. Software

8. Name the factors that affect the reliability of the network?
a. Frequency of failure
b. Recovery time of a network after a failure

9. Name the factors that affect the security of the network?
a. Unauthorized Access
b. Viruses

10. What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.

11. Define Routing?
The process of determining systematically hoe to forward messages toward the destination nodes based on its address is called routing.

12. What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.


13. What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.
14. What are major types of networks and explain?
  1. Server-based network: provide centralized control of network resources and rely on server computers to provide security and network administration
  2. Peer-to-peer network: computers can act as both servers sharing resources and as clients using the resources.
15. What are the important topologies for networks?
  1. BUS topology: In this each computer is directly connected to primary network cable in a single line.
    Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
  2. STAR topology: In this all computers are connected using a central hub.
    Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
  3. RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.
16. What is mesh network?
A network in which there are multiple network links between computers to provide multiple paths for data to travel.
17. What is difference between baseband and broadband transmission?
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
18. Explain 5-4-3 rule?
In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.


19. What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

20.What is Proxy ARP?
It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.
21. What is SLIP (Serial Line Interface Protocol)?
It is a very simple protocol used for transmission of IP datagrams across a serial line.
22. What is RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between the routers.
23. What is source route?
It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.

24. What is BGP (Border Gateway Protocol)?
It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).
25. What is Gateway-to-Gateway protocol?
It is a protocol formerly used to exchange routing information between Internet core routers.
26. What is NVT (Network Virtual Terminal)?
It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

27. What is a Multi-homed Host?
It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

28. What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

29. What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

30. Expand IDEA.
IDEA stands for International Data Encryption Algorithm.
31. What is wide-mouth frog?
Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.
33. What is Mail Gateway?
It is a system that performs a protocol translation between different electronic mail delivery protocols.
34. What is IGP (Interior Gateway Protocol)?
It is any routing protocol used within an autonomous system.
35. What is EGP (Exterior Gateway Protocol)?
It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.
36. What is autonomous system?
It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

37. What are the different type of networking / internetworking devices?
  1. Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
  2. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
  3. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.
  4. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
38. What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.
39. What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.
40. What is difference between ARP and RARP?
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address
.
41. What is the minimum and maximum length of the header in the TCP segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.
42. What is the range of addresses in the classes of internet addresses?
Class A   -       0.0.0.0   -   127.255.255.255
Class B   -   128.0.0.0   -   191.255.255.255
Class C   -   192.0.0.0   -   223.255.255.255
Class D   -   224.0.0.0   -   239.255.255.255
Class E   -   240.0.0.0   -   247.255.255.255
43. What is passive topology?
When the computers on the network simply listen and receive the signal, they are referred to as passive because they don't amplify the signal in any way. Example for passive topology -linear bus.
44. What is Brouter?
Hybrid devices that combine the features of both bridges and routers.

45. What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

46. What is point-to-point protocol?
A communications protocol used to connect computers to remote networking services including Internet service providers.

47. How Gateway is different from Routers?
A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats.

48. What is attenuation?
The degeneration of a signal over distance on a network cable is called attenuation.

49.  What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.








Sunday 10 March 2013

Open Multiple File Formats With Single Software

    Is your Computer running too slow due to large number of applications which are installed.If you install a specific software for each file format you will end up with a lot of bloatware.It is a pain for a lot of users to install different softwares for different file formats after installing a fresh copy of their OS.You can save yourself from this trouble by installing a freeware application that is capable of opening multiple file formats (75+ formats) .
    It can give a breath of life to those systems which have low memory.Moreover it can be a lifesaver if you don’t have an idea about how to open a particular file extension, Just give it a try with Free Opener.

Supported File Formats:

    Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp)
    Web Pages (.htm, .html)
    Photoshop Documents (.psd)
    Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff)
    XML Files (.resx, .xml)
    PowerPoint Presentations (.ppt, .pptx, .pps)
    Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac)
    Microsoft Word Documents (.doc, .docx)
    SRT Subtitles (.srt)
    RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f)
    Icons (.ico)
    Open XML Paper (.xps)
    ML Paper (.xps)
    Torrent (.torrent)
    Flash Animation (.swf)
    Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip)
    Rich Text Format (.rtf)
    Text Files (.bat, .cfg, .ini, .log, .reg, .txt)
    Apple Pages (.pages)
    Microsoft Excel Documents (.xls, .xlsm, .xlsx)
    Comma-Delimited (.csv)
    Outlook Messages (.msg)
    PDF Documents (.pdf)
    vCard Files (.vcf)
    EML Files (.eml)
    Click here To Download Free Opener (25 mb)

How To Login As Admin Of Any Website



    Do you want to Admin of a website? Is this Possible? Yes! of-course it is Friends. Now this is possible with Tricks With Hacker. Today while surfing i came across a amazing but yet simple trick by the help of which you will be able to log in as the admin of any Website.
    Note -I don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only and so that if you are a webmaster or owner of a site which is using the same username and password can than you can immediately take steps to prevent unauthorized access to your site.

How To Login As Admin Of Any Website:

    Step 1). Go To Google.com and Then Search For the Following Piece of code,
    "adminlogin.asp" or "admin.asp"
    Step 2). Now Chose any website from the search results and then fill the below details in the login page,
    Username - admin
    Password - 'or''='
    Enjoy :P
    Warning- AgainI don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only.
    Hope you liked my article do share your views in the comments below.

Virtual PDF Printer



convert ur print in pdf file by using Virtual PDF Printer

Virtual PDF Printer simplifies the process of creating PDF document. Usually PDF documents are created by specific PDF composer software. However, it might be time-consuming compared with the alternative approach, which creates PDF documents from other file formats.

Virtual PDF Printer serves as a real printer to convert anything printable to PDF. The printer is a high quality PDF generator with high printing resolution, PDF document information creation, PDF content encryption with passwords protection, PDF access control, PDF scaling, PDF version and compatibility control, font embedding options and more.

Virtual PDF Printer is an affordable and effective solution offering dynamic generation of PDF documents, conversion to PDF from almost any file format and from nearly all Windows applications. The purpose of Virtual PDF Printer is to create PDF document with full options from any other file format printable with a simple click on "Printer" in Windows applications.

With Virtual PDF Printer, it is easy to create PDF documents from Word, Excel, PowerPoint, WordPerfect, Photoshop and other Windows applications. Virtual PDF Printer natively supports over 300 file formats and customers wouldn't expect anything less.



List of all RUN Commands

:- Accessibility Options : access.cpl
:- Add Hardware: hdwwiz.cpl
:- Add / Remove Programs: appwiz.cpl
:- Administrative Tools : control admintools
:- Automatic Updates: wuaucpl.cpl
:- Wizard file transfer Bluethooth: fsquirt
:- Calculator: calc
:- Certificate Manager: certmgr.msc
:- Character: charmap
:- Checking disk : chkdsk
:- Manager of the album (clipboard) : clipbrd
:- Command Prompt : cmd
:- Service components (DCOM) : dcomcnfg
:- Computer Management : compmgmt.msc
:- DDE active sharing : ddeshare
:- Device Manager : devmgmt.msc
:- DirectX Control Panel (if installed) : directx.cpl
:- DirectX Diagnostic Utility : dxdiag
:- Disk Cleanup : cleanmgr
:- System Information=dxdiag
:- Disk Defragmenter : dfrg.msc
:- Disk Management : diskmgmt.msc
:- Partition manager : diskpart
:- Display Properties : control desktop
:- Properties of the display (2) : desk.cpl
:- Properties display (tab "appearance") : control color
:- Dr. Watson: drwtsn32
:- Manager vĂ©rirficateur drivers : check
:- Event Viewer : Eventvwr.msc
:- Verification of signatures of files: sigverif
:- Findfast (if present) : findfast.cpl
:- Folder Options : control folders
:- Fonts (fonts) : control fonts
:- Fonts folder windows : fonts
:- Free Cell ...: freecell
:- Game Controllers : Joy.cpl
:- Group Policy (XP Pro) : gpedit.msc
:- Hearts (card game) : mshearts
:- IExpress (file generator. Cab) : IExpress
:- Indexing Service (if not disabled) : ciadv.msc
:- Internet Properties : inetcpl.cpl
:- IPConfig (display configuration): ipconfig / all
:- IPConfig (displays the contents of the DNS cache): ipconfig / displaydns
:- IPConfig (erases the contents of the DNS cache): ipconfig / flushdns
:- IPConfig (IP configuration cancels maps): ipconfig / release
:- IPConfig (renew IP configuration maps) : ipconfig / renew
:- Java Control Panel (if present) : jpicpl32.cpl
:- Java Control Panel (if present) : javaws
:- Keyboard Properties: control keyboard
:- Local Security Settings : secpol.msc
:- Local Users and Groups: lusrmgr.msc
:- Logout: logoff
:- Microsoft Chat : winchat
:- Minesweeper (game): winmine
:- Properties of the mouse: control mouse
:- Properties of the mouse (2): main.cpl
:- Network Connections : control NetConnect
:- Network Connections (2): ncpa.cpl
:- Network configuration wizard: netsetup.cpl
:- Notepad : notepad
:- NView Desktop Manager (if installed): nvtuicpl.cpl
:- Manager links: packager
:- Data Source Administrator ODBC: odbccp32.cpl
:- Screen Keyboard: OSK
:- AC3 Filter (if installed) : ac3filter.cpl
:- Password manager (if present): Password.cpl
:- Monitor performance : perfmon.msc
:- Monitor performance (2): perfmon
:- Dialing Properties (phone): telephon.cpl
:- Power Options : powercfg.cpl
:- Printers and Faxes : control printers
:- Private Character Editor : eudcedit
:- Quicktime (if installed) : QuickTime.cpl
:- Regional and Language Options: intl.cpl
:- Editor of the registry : regedit
:- Remote desktop connection : mstsc
:- Removable Storage: ntmsmgr.msc
:- requests the operator to removable storage: ntmsoprq.msc
:- RSoP (traduction. ..) (XP Pro): rsop.msc
:- Scanners and Cameras : sticpl.cpl
:- Scheduled Tasks : control schedtasks
:- Security Center : wscui.cpl
:- Console management services: services.msc
:- shared folders : fsmgmt.msc
:- Turn off windows : shutdown
:- Sounds and Audio Devices : mmsys.cpl
:- Spider (card game): spider
:- Client Network Utility SQL server : cliconfg
:- System Configuration Editor : sysedit
:- System Configuration Utility : msconfig
:- System File Checker (SFC =) (Scan Now) : sfc / scannow
:- SFC (Scan next startup): sfc / scanonce
:- SFC (Scan each dĂ©marraget) : sfc / scanboot
:- SFC (back to default settings): sfc / revert
:- SFC (purge cache files): sfc / purgecache
:- SFC (define size CAHC x) : sfc / cachesize = x
:- System Properties : sysdm.cpl
:- Task Manager : taskmgr
:- Telnet client : telnet
:- User Accounts : nusrmgr.cpl
:- Utility Manager (Magnifier, etc) : utilman
:- Windows firewall (XP SP2) : firewall.cpl
:- Microsoft Magnifier: magnify
:- Windows Management Infrastructure: wmimgmt.msc
:- Protection of the accounts database: syskey
vWindows update: wupdmgr
:- Introducing Windows XP (if not erased) : tourstart
:- Wordpad : write
:- Date and Time Properties : timedate.cpl

Registred your IDM Manually for lifetime.



    Hello Friends, Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.
    I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses. This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Hack or crack IDM manually:

    Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.
    Step2: Now Go to START => Then go to RUN and type the following text and click enter:


    notepad %windir%\system32\drivers\etc\hosts
    Step3: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Detail Note about Granting Permission In Windows7:

    For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps : First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
    Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is "Permission for SYSTEM" by clicking all checkbox under "Allow" Name and press Ok.Dnt click on any Deny check box.
    Note: If you have login through admin then skip this step6 .Its just for granting permission for editing file.
    Step4: Now a notepad file appears something like this as shown below:
    Now copy the below lines of code and add to hosts file as shown above image box :
    127.0.0.1 tonec.com
    127.0.0.1 www.tonec.com
    127.0.0.1 registeridm.com
    127.0.0.1 www.registeridm.com
    127.0.0.1 secure.registeridm.com
    127.0.0.1 internetdownloadmanager.com
    127.0.0.1 www.internetdownloadmanager.com
    127.0.0.1 secure.internetdownloadmanager.com
    127.0.0.1 mirror.internetdownloadmanager.com
    127.0.0.1 mirror2.internetdownloadmanager.com
    After adding these piece of code, save the notepad file. And exit from there.
    Step5: Now open IDM and click on Registration. When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

    Step6: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
    RLDGN-OV9WU-5W589-6VZH1
    HUDWE-UO689-6D27B-YM28M
    UK3DV-E0MNW-MLQYX-GENA1
    398ND-QNAGY-CMMZU-ZPI39
    GZLJY-X50S3-0S20D-NFRF9
    W3J5U-8U66N-D0B9M-54SLM
    EC0Q6-QN7UH-5S3JB-YZMEK
    UVQW0-X54FE-QW35Q-SNZF5
    FJJTJ-J0FLF-QCVBK-A287M
    And click on ok to register.
    Step7: After you click ok, it will show an message that you have registered IDM successfully.
    Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
    That means it will remain full version for life time and you can update it without any problem in future.

Proof of Successfully Hacking IDM:

    Note: To update idm you have to remove those websites added in the host file, after removing those website,save that Hosts file and update IDM software. After succesfull updation again follow above steps to crack Internet Download manager.
    I hope you are now able to convert your Trial version of IDM into Full Version. If you have any problem in this tutorial on Hack and Crack IDM,
    please mention it in comments. Enjoy.....

 

Subscribe to our Newsletter

Contact our Support

Email us: youremail@gmail.com

Our Team Memebers