Thursday, November 27, 2008

What is VPN (Virtual Private Networking)?

VPN gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network.

Advantages

  • Allows you to be at home and access your company's computers in the same way as if you were sitting at work.
  • Almost impossible for someone to tap or interfer with data in the VPN tunnel.
  • If you have VPN client software on a laptop, you can connect to your company from anywhere in the world.

Disadvantages

  • Setup is more complicated than less secure methods. VPN works across different manufacturers' equipment, but connecting to a non-NETGEAR product will add to difficulty, since there may not documentation specific to your situation.
  • The company whose network you connect to may require you to follow the company's own policies on your home computers ( ! )

VPN goes between a computer and a network (client-to-server), or a LAN and a network using two routers (server-to-server). Each end of the connection is an VPN "endpoint", the connection between them is a "VPN tunnel". When one end is a client, it means that computer is running VPN client software such as NETGEAR's ProSafe VPN Client. The two types of VPN:

VPN Client-to-Server (Client-to-Box)






VPN Server-to-Server (Box-to-Box)






From : http://kbserver.netgear.com/kb_web_files/n100858.asp

About Network

In information technology, a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain subnetworks.

The most common topology or general configurations of networks include the bus, star, Token Ring, and mesh topologies. Networks can also be characterized in terms of spatial distance as local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).

A given network can also be characterized by the type of data transmission technology in use on it (for example, a TCP/IP or Systems Network Architecture network); by whether it carries voice, data, or both kinds of signals; by who can use the network (public or private); by the usual nature of its connections (dial-up or switched, dedicated or nonswitched, or virtual connections); and by the types of physical links (for example, optical fiber, coaxial cable, and Unshielded Twisted Pair). Large telephone networks and networks using their infrastructure (such as the Internet) have sharing and exchange arrangements with other companies so that larger networks are

LAN
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or as many as thousands of users (for example, in an FDDI network).

Major local area network technologies are:

Ethernet
Token Ring
FDDI

Ethernet is by far the most commonly used LAN technology. A number of corporations use the Token Ring technology. FDDI is sometimes used as a backbone LAN interconnecting Ethernet or Token Ring LANs. Another LAN technology, ARCNET, once the most commonly installed LAN technology, is still used in the industrial automation industry.

Typically, a suite of application programs can be kept on the LAN server. Users who need an application frequently can download it once and then run it from their local hard disk. Users can order printing and other services as needed through applications run on the LAN server. A user can share files with others at the LAN server; read and write access is maintained by a LAN administrator. A LAN server may also be used as a Web server if safeguards are taken to secure internal applications and data from outside access.

In some situations, a wireless LAN may be preferable to a wired LAN because it is cheaper to install and maintain.

From : http://searchnetworking.techtarget.com/

Monday, November 3, 2008

MIRC Remote Script

Code examples

The code below is in the remote scripts format. If placed into an alias file, the command names should not be preceded by the word "alias". Test Comments include the common /* comment */ and ;comment.

Here is an example of alias:

;Defines the alias 'hello' in the remote script

;Note: if this is placed in an alias script, the 'alias' part must be removed (result: hello {)
;Usage: /hello
alias hello {

;Displays(/echo) 'Hello World!' into the active window(-a)
echo -a Hello World!

}

Counting to 10:

alias ten {

;'%i' is locally set as 1
var %i = 1

;The while loop continues until '%i' is greater than 10, then stops.
while (%i <= 10) {

;Displays(/echo) '[value of %i]' into the active window(-a)
;'[value of %i]' will be 1 at the beginning of the execution.
echo -a %i

;To continue the while loop, '%i' must be increased, or you'll
;have yourself an infinite loop (can be breaked with Ctrl+Pause/Break)
inc %i

;Don't forget to close the while loop scope.
}
}

A remote script event handler:

;Placed in a remote script.

;Literally: when any user joins #IRCHelp, message to the channel: Hello [nickname that joined]
on *:JOIN:#IRChelp: msg # Hello $nick

;To do this for any channel, the code would be:
on *:JOIN:#: msg # Hello $nick

A remote script to automatically respond to certain text

;Placed in a remote script

;When a user types Hello! in a channel, you answer back: Hello, [nickname]!
on *:TEXT:Hello!:#: msg # Hello $nick $+ !

;When a user types Hello! in a private message, you answer back: Hello, [nickname]!
on *:TEXT:Hello!:?: msg $nick Hello $nick $+ !

Here is an example of picture windows:

alias cir {

;Create a picture (-p) window (@cir)
window -pek @cir

;Draw a circle (on window @cir) with color 4 (red), size of 50 at coordinates (200,200)
drawdot @cir 4 50 200 200

}