Muutke küpsiste eelistusi

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security [Pehme köide]

(4-Degree Consulting, Macon, Georgia, USA)
  • Formaat: Paperback / softback, 390 pages, kõrgus x laius: 234x156 mm, kaal: 566 g, 30 Tables, black and white; 112 Illustrations, black and white
  • Ilmumisaeg: 21-Nov-2012
  • Kirjastus: Auerbach
  • ISBN-10: 1466511060
  • ISBN-13: 9781466511064
  • Formaat: Paperback / softback, 390 pages, kõrgus x laius: 234x156 mm, kaal: 566 g, 30 Tables, black and white; 112 Illustrations, black and white
  • Ilmumisaeg: 21-Nov-2012
  • Kirjastus: Auerbach
  • ISBN-10: 1466511060
  • ISBN-13: 9781466511064
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a networkWiresharkand explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hackingfrom keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.
Chapter 1 Introduction
1(16)
1.1 The TCP/IP Protocol Suite
1(12)
1.1.1 Applications
2(1)
1.1.1.1 Current Applications
2(8)
1.1.1.2 Emerging Applications
10(3)
1.2 Book Preview
13(4)
1.2.1 Examining the TCP/IP Protocol Suite
13(1)
1.2.2 IP and MAC Addressing
14(1)
1.2.3 Transport Layer Protocols
14(1)
1.2.4 Working with the Command Prompt
15(1)
1.2.5 Windows Built-in Networking Tools
15(1)
1.2.6 Network Monitoring
15(1)
1.2.7 Network Security
15(1)
1.2.8 Efficiency Methods
16(1)
Chapter 2 Examining the TCP/IP Protocol Suite
17(16)
2.1 ISO Reference Model
17(7)
2.1.1 OSI Reference Model Layers
19(1)
2.1.1.1 Layer 1: The Physical Layer
19(1)
2.1.1.2 Layer 2: The Data Link Layer
19(1)
2.1.1.3 Layer 2 Subdivision
20(1)
2.1.1.4 Layer 3: The Network Layer
20(2)
2.1.1.5 Layer 4: The Transport Layer
22(1)
2.1.1.6 Layer 5: The Session Layer
22(1)
2.1.1.7 Layer 6: The Presentation Layer
23(1)
2.1.1.8 Layer 7: The Application Layer
23(1)
2.1.2 Data Flow
23(1)
2.2 The TCP/IP Protocol Suite
24(6)
2.2.1 The TCP/IP Network Layer
25(1)
2.2.2 IP
25(1)
2.2.2.1 IPv4 Addressing
26(1)
2.2.2.2 IPv6 Addressing
26(1)
2.2.2.3 ARP
27(1)
2.2.2.4 ICMP
27(1)
2.2.3 The Transport Layer
27(1)
2.2.3.1 TCP
27(1)
2.2.3.2 UDP
28(1)
2.2.4 The Application Layer
29(1)
2.3 Data Flow within a TCP/IP Network
30(1)
2.4 Summary
31(2)
Chapter 3 Addressing at Layers 2 and 3 and the Internet Protocol
33(76)
3.1 Data Link Addressing
34(16)
3.1.1 Ethernet Frame Operations
34(2)
3.1.1.1 Basic Ethernet
36(8)
3.1.1.2 Full Duplex and the PAUSE Frame
44(2)
3.1.1.3 vLAN Tagging
46(2)
3.1.1.4 SNAP Frames
48(1)
3.1.1.5 Frame Determination
48(2)
3.2 Fast Ethernet
50(1)
3.2.1 4B5B Coding
50(1)
3.2.2 Delimiters
51(1)
3.2.3 Interframe Gap
51(1)
3.3 Gigabit Ethernet
51(12)
3.3.1 Standards Evolution
52(1)
3.3.1.1 Varieties
52(3)
3.3.2 Frame Format Modifications
55(1)
3.3.2.1 Carrier Extension
55(1)
3.3.2.2 Half-Duplex Use
56(1)
3.3.2.3 Frame Bursting
56(1)
3.3.2.4 Jumbo Frames
57(2)
3.4.10 Gigabit Ethernet
59(1)
3.4.1 Fiber Standards
60(1)
3.4.1.1 10GBASE-SR
60(1)
3.4.1.2 10GBASE-LR
60(1)
3.4.1.3 10GBASE-LRM
60(1)
3.4.1.4 10GBASE-ER
60(1)
3.4.1.5 10GBASE-ZR
61(1)
3.4.1.6 10GBASE-LX4
61(1)
3.4.2 Copper
61(1)
3.4.2.1 10GBASE-CX4
61(1)
3.4.2.2 10GSFP+Cu
62(1)
3.4.2.3 Backplane 10 GBps Ethernet
62(1)
3.4.2.4 10GBASE-T
62(1)
3.5 The IPv4 Header
63(8)
3.5.1 Vers Field
63(1)
3.5.2 Hlen and Total Length Fields
63(1)
3.5.3 Type of Service Field
64(1)
3.5.4 Identification Field
65(1)
3.5.5 Flags Field
66(1)
3.5.6 Fragment Offset Field
66(1)
3.5.7 Time to Live Field
67(1)
3.5.8 Protocol Field
67(4)
3.5.9 Checksum Field
71(1)
3.5.10 Source and Destination Address Fields
71(1)
3.5.11 Options and Padding Fields
71(1)
3.6 IPv4 Addressing
71(20)
3.6.1 Overview
72(1)
3.6.2 Addressing
73(1)
3.6.3 Basic Addressing Scheme
74(1)
3.6.3.1 Address Classes
75(1)
3.6.3.2 Address Formats
76(1)
3.6.3.3 Address Composition and Notation
76(1)
3.6.3.4 Special IPv4 Addresses
77(5)
3.6.3.5 Subnetting and the Subnet Mask
82(8)
3.6.3.6 Classless Networking
90(1)
3.7 The IPv6 Header
91(8)
3.7.1 Ver Field
92(1)
3.7.2 Priority Field
92(1)
3.7.3 Flow Label Field
93(1)
3.7.4 Payload Length Field
93(1)
3.7.5 Next Header Field
93(1)
3.7.6 Hop Limit Field
94(1)
3.7.7 Source and Destination Address Fields
94(1)
3.7.7.1 Address Types
95(1)
3.7.7.2 Address Notation
95(1)
3.7.7.3 Address Allocation
96(1)
3.7.8 Provider-Based Unicast Addresses
97(1)
3.7.9 Multicast Addresses
97(1)
3.7.10 Transporting IPv4 Addresses
98(1)
3.8 ICMP and ARP
99(10)
3.8.1 ICMP
99(1)
3.8.1.1 ICMPv4
99(2)
3.8.1.2 ICMPv6
101(2)
3.8.2 ARP
103(1)
3.8.2.1 LAN Delivery
103(4)
3.8.3 RARP
107(2)
Chapter 4 Transport Layer Protocols
109(24)
4.1 TCP
109(19)
4.1.1 TCP Header
110(1)
4.1.1.1 Source and Destination Port Fields
110(4)
4.1.1.2 Sequence and Acknowledgment Number Fields
114(1)
4.1.1.3 Hlen Field
115(1)
4.1.1.4 Code Bit Field
116(1)
4.1.1.5 Window Field
117(1)
4.1.1.6 Checksum Field
117(1)
4.1.1.7 Urgent Pointer Field
118(1)
4.1.1.8 Options Field
118(1)
4.1.1.9 Padding Field
118(1)
4.1.2 Connection Establishment
118(1)
4.1.2.1 Connection Function Calls
119(1)
4.1.2.2 Port Hiding
119(1)
4.1.2.3 Passive OPEN
120(1)
4.1.2.4 Active OPEN
120(1)
4.1.3 The Three-Way Handshake
121(1)
4.1.3.1 Overview
121(1)
4.1.3.2 Operation
121(2)
4.1.3.2 The TCP Window
123(2)
4.1.3.3 Avoiding Congestion
125(2)
4.1.4 TCP Retransmissions
127(1)
4.1.5 Session Termination
127(1)
4.2 UDP
128(5)
4.2.1 UDP Header
128(1)
4.2.1.1 Source and Destination Port Fields
129(1)
4.2.1.2 Length Field
129(1)
4.2.1.3 Checksum Field
129(1)
4.2.2 Operation
130(1)
4.2.3 Applications
130(3)
Chapter 5 Working with the Command Prompt
133(26)
5.1 The Command Prompt Location
133(5)
5.1.1 Options
136(1)
5.1.2 Positioning upon Opening
137(1)
5.1.3 Controlling the Command Prompt Window
137(1)
5.2 Working with Function Keys and Commands
138(21)
5.2.1 Function Key Use
139(1)
5.2.2 Repertoire of Commands
139(2)
5.2.2.1 The Help Command
141(3)
5.2.2.2 The CLS Command
144(1)
5.2.3 Controlling Output and Additional Commands
145(1)
5.2.3.1 Redirection Methods
145(6)
5.2.3.2 Other Useful Commands
151(5)
5.2.3.3 Wildcards
156(3)
Chapter 6 Windows Built-In Networking Tools
159(82)
6.1 Ping
159(5)
6.1.1 Discovery via Ping
162(1)
6.1.2 Ping Options
162(1)
6.1.3 Using the Round-Trip Delay
163(1)
6.2 Tracert
164(3)
6.2.1 Using Tracert
167(1)
6.3 The Pathping Command
167(3)
6.4 The ipconfig Command
170(5)
6.4.2 The Release and Renew Options
173(1)
6.4.3 The Flushdns Option
174(1)
6.4.4 The Displaydns Option
174(1)
6.5 ARP
175(4)
6.5.1 Reverse ARP (RARP) and ARP and IPv6
178(1)
6.6 The Getmac Command
179(2)
6.7 The Netstat Command
181(10)
6.7.1 Command Format
181(1)
6.7.1.1 The -a Switch
181(2)
6.7.1.2 The -b Switch
183(1)
6.7.1.3 The -e and -s Switches
184(1)
6.7.1.4 The -f Switch
185(1)
6.7.1.5 The -n Switch
185(1)
6.7.1.6 The -o Switch
186(1)
6.7.1.7 The -p Switch and Interval Use
186(1)
6.7.1.8 The -r Switch
187(4)
6.7.1.9 The -s Switch
191(1)
6.7.1.10 The -t Switch
191(1)
6.8 The Route Command
191(8)
6.8.1 Command Format
192(1)
6.8.1.1 -f Switch
193(1)
6.8.1.2 -p Switch
193(1)
6.8.1.3 -4 Switch
193(1)
6.8.1.4 -6 Switch
193(1)
6.8.2 Commands Supported
193(1)
6.8.3 The Destination Option
194(1)
6.8.4 Mask and Netmask
194(1)
6.8.5 The Gateway Option
194(1)
6.8.6 The Metric Option
194(1)
6.8.7 The If Interface Option
195(1)
6.8.8 Working with Route
195(1)
6.8.8.1 The IPv4 Routing Table
196(1)
6.8.8.2 The IPv6 Routing Table
197(2)
6.9 The Nslookup Command
199(3)
6.10 The Getmac Command
202(1)
6.11 The Net Command
203(18)
6.11.1 The Net Accounts Command
204(1)
6.11.1.1 Net Accounts Options
204(2)
6.11.2 The Net Computer Option
206(1)
6.11.3 The Net Config Option
206(1)
6.11.4 The Net Continue, Start, and Stop Options
206(1)
6.11.5 The Net File Option
207(1)
6.11.6 The Net Group Option
207(2)
6.11.7 The Net Helpmsg
209(1)
6.11.8 The Net Send Command
209(1)
6.11.9 The Net Localgroup Option
210(1)
6.11.10 The Net Share Command Option
210(3)
6.11.11 The Net Session Command
213(1)
6.11.12 The Net Statistics Command
214(3)
6.11.13 The Net Time Command
217(1)
6.11.14 The Net Use Command
218(3)
6.12 The Net User Command
221(3)
6.13 The Netsh Command
224(17)
6.13.1 The Netsh Wlan Command
228(3)
6.13.1.1 The Add Subcommand
231(2)
6.13.1.2 The Connect Subcommand
233(1)
6.13.1.3 The Delete Subcommand
234(2)
6.13.1.4 The Export Profile Subcommand
236(2)
6.13.1.5 Other Netsh Wlan Functions
238(3)
Chapter 7 Network Monitoring with Wireshark and WinDump
241(58)
7.1 Wireshark
241(28)
7.1.1 Program Evolution
241(1)
7.1.2 Obtaining the Program
242(2)
7.1.3 Program Overview
244(2)
7.1.4 The Capture Screen
246(1)
7.1.4.1 Packet Colors
246(1)
7.1.4.2 Examining a Packet
247(3)
7.1.4.3 File Menu Options
250(1)
7.1.5 Working with Filters
250(3)
7.1.5.1 Filter Expressions
253(1)
7.1.5.2 Applying a Filter
254(2)
7.1.6 Statistics
256(1)
7.1.6.1 Summary Data
256(1)
7.1.6.2 Protocol Hierarchy
257(1)
7.1.6.3 Conversations
257(2)
7.1.6.4 Endpoints
259(1)
7.1.6.5 Packet Lengths
259(1)
7.1.6.6 IO Graphs
259(1)
7.1.6.7 Conversation List
260(1)
7.1.6.8 Endpoint List and Other Entries
260(1)
7.1.7 Telephony
261(1)
7.1.7.1 RTP
261(2)
7.1.7.2 Stream Analysis
263(2)
7.1.7.3 VoIP Calls
265(4)
7.1.8 The Tools Menu
269(1)
7.2 WinDump
269(30)
7.2.1 Overview
270(1)
7.2.1.1 Initial Operation
271(1)
7.2.1.2 Selecting an Interface
271(2)
7.2.1.3 Program Format
273(1)
7.2.1.4 Using Multiple Switches
274(2)
7.2.1.5 Program Switches
276(12)
7.2.2 WinDump Expressions
288(1)
7.2.2.1 Qualifiers
288(2)
7.2.2.2 Expression Primitives
290(1)
7.2.2.3 Relationship Operators
290(1)
7.2.2.4 Utilization Examples
290(9)
Chapter 8 Network Intrusion and Security
299(46)
8.1 Snort
299(23)
8.1.1 Requirements
300(2)
8.1.2 Installation
302(2)
8.1.3 Commencing Snort
304(1)
8.1.3.1 Sniffer Mode
304(3)
8.1.3.2 Packet Logger Mode
307(1)
8.1.3.3 Network Intrusion Detection System Mode
308(2)
8.1.4 Command Switches
310(1)
8.1.4.1 The -A Switch
310(2)
8.1.4.2 The -b Switch
312(1)
8.1.4.3 The -B Switch
312(2)
8.1.4.4 The -C Switch
314(1)
8.1.4.5 The -d Switch
314(1)
8.1.4.6 The -E Switch
314(1)
8.1.4.7 The -f Switch
314(1)
8.1.4.8 The -F Switch
314(1)
8.1.4.9 The -G Switch
314(1)
8.1.4.10 The -H Switch
314(1)
8.1.4.11 The -i Switch
315(1)
8.1.4.12 The -I Switch
315(1)
8.1.4.13 The -k and -K Switches
315(1)
8.1.4.14 The -l and -L Switches
315(1)
8.1.4.15 The -n Switch
315(1)
8.1.4.16 The -O Switch
316(1)
8.1.4.17 The -p and -P Switches
317(1)
8.1.4.18 The -q Switch
317(1)
8.1.4.19 The -r and -R Switches
318(1)
8.1.4.20 The -s and -S Switches
318(1)
8.1.4.21 The -T Switch
318(1)
8.1.4.22 The -U Switch
318(1)
8.1.4.23 The -v and -V Switches
318(1)
8.1.4.24 The -W Switch
318(1)
8.1.4.25 The -X and -x Switches
319(1)
8.1.4.26 The -y Switch
319(1)
8.1.4.27 The -Z Switch
319(1)
8.1.5 Network Intrusion Detection System Mode
319(3)
8.2 Using Spyware Blaster
322(10)
8.2.1 Obtaining the Program
323(2)
8.2.2 Adding Protection
325(2)
8.2.2.1 Restricted Site Protection
327(1)
8.2.2.2 System Snapshot
328(1)
8.2.3 The Tools Menu
329(1)
8.2.3.1 Flash Killer
330(1)
8.2.3.2 Custom Blocking
331(1)
8.2.4 Checking for Updates
331(1)
8.3 Using Online Armor
332(6)
8.3.1 Installation
332(3)
8.3.2 Operation
335(3)
8.4 AXCrypt File Encryption
338(7)
8.4.1 Installation
340(1)
8.4.2 Operation
340(5)
Chapter 9 Enhancing Network Performance
345(16)
9.1 Third-Party Networking Tools
345(7)
9.1.1 Bandwidth Tools
346(1)
9.1.2 IP Tools
347(1)
9.1.3 Miscellaneous Networking Tools
348(1)
9.1.4 Network Information
349(1)
9.1.5 Other Sites to Consider
349(1)
9.1.6 Using Search Tools
350(2)
9.2 Windows Built-in Networking Tools
352(9)
9.2.1 Disk Cleanup
352(2)
9.2.2 Why Disk Defragmentation Matters
354(1)
9.2.3 Resource Monitor
355(3)
9.2.4 System Information
358(3)
Index 361
Gilbert Held