SlideShare a Scribd company logo
1 of 19
Download to read offline
What is a MS Windows network drive?
Drive letters are only of relevance within a MS Windows environment,
and has no relevance on other Operating Systems. In other words it's
ONLY a MS way of assigning a disk resource.
It is a drive letter assigned LOCALLY to a LAN filespace resource. This
drive letter is only valid for use on the LAN and has NO relevance on
WANs, including the Internet.
If some disk space is made available to users, and the user has
permission to access this resource, then on a MS Windows machine
only, and assuming the correct network protocols are being used, then
this disk space can be assigned to a drive letter.
dforbes on 'SATURN (nthomes.inf.brad.ac.uk)' is assigned to drive z:
in this example the contents of 'dforbes' filespace on the server called
'SATURN' is assigned to a drive letter z:.
So drive z: is only of relevance to 'dforbes' on his machine. Other users
can also be using a drive z:, but their z: will contain completely different
files from the 'dforbes' user filestore area.
... One drive letter ..... different filestores .... lots of confusion.
How is a filestore assigned to a drive letter?
In 'Windows Explorer' , 'My Network Places', 'Entire Network', 'Microsoft
Windows Network', available workgroups and domains on the LAN are
viewable.
If you are a registered user in a domain, you can enter and view
resources, otherwise.....
Assuming a workgroup or domain service is available.........open the
command prompt.
To view all workgroups and domains on the LAN, type:
c:> net view
If a machine called, say, 'SATURN' is available to you, then connect in the
following way.
c:> net use k: SATURNWebSpace
c:> net use z: SATURNdforbes
The command completed successfully.
SATURN is a Windows compatible NETBIOS name for the server, which is
actually a Unix machine pretending to be a Windows server.
The 'real' name of SATURN is 'nthomes.inf.brad.ac.uk' and 'saturn.inf.brad.ac.uk'.
How can a Unix filestore 'pretend' to be a Windows filestore?
The protocols used are called SMB or 'Server Message Blocks' which are an open
standard. The information transfer using SMB looks the same on a Unix box
running a SAMBA server, as on a Windows box running FileServer.
Internet Hacking Tools - Unix and Windows
What must I understand completely to be a beginner?
• telnet
• ftp
Use telnet to linux1.inf.brad.ac.uk
telnet linux1.inf.brad.ac.uk
Tools to hack with
• YoLinux: List of Linux Security and Hacker Software Tools
http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
• Unix tools track hackers
http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm
http://www.antihackertoolkit.com/tools.html
• For DNS lookups use -
'dig' (domain information groper) or
host -a 143.53.29.129 ns2.splice1.com or
nslookup Note: nslookup is deprecated and may be removed from future
releases. or
http://www.dns.net/dnsrd/tools.html
C:>nslookup 143.53.29.129 ns1.splice1.com
Server: server4.splice1.com
Address: 66.45.242.178
Name: d209.inf.brad.ac.uk
Address: 143.53.29.129
C:>
Where is the site hosted?
traceroute/tracert
Is the site on-line?
ping
Is there a back door or way in?
nmap
How is the network routing configured?
netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
143.53.28.0 * 255.255.255.0 U 0 0 0 eth1
169.254.0.0 * 255.255.0.0 U 0 0 0 eth1
127.0.0.0 * 255.0.0.0 U 0 0 0 lo
default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1
How are the network cards configured?
ifconfig/ipconfig
satan - Security Administrator Tool for Analyzing Networks
Internet Corporation for Assigned Names and Numbers (ICANN)
http://www.icann.com/
www.internic.net:
• The InterNIC® web site is a public information resource for Internet users
worldwide.
• It provides information on the domain-name system, the domain-name
registration process, and domain-name registrars.
• To access information regarding registered domains, please go to the Registry
Whois.
• For Whois information about country-code (two-letter) top-level domains, try
Uwhois.com.
• http://www.whois.net/
• http://www.betterwhois.com/
• http://www.nic.uk/
• Nominet UK is the registry for .uk internet names.
• Manages the authoritative database of .uk domain name registrations.
• A not-for-profit company - has members instead of shareholders.
• Nominet is officially recognised as the .uk domain name registry by the internet
industry, users and the UK Government.
What Is a Mail Message?
• A mail message generally consists of
• a message body, which is the text of the
message,
• and special administrative data specifying
recipients, transport medium, etc., as you see
when you look at an envelope of a real letter.
A typical mail header may look like this:
Return-Path: <ph10@cus.cam.ac.uk>
Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by
al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for
<terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100
Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13
#1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000
Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT)
From: Philip Hazel <ph10@cus.cam.ac.uk>
Reply-To: Philip Hazel <ph10@cus.cam.ac.uk>
To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com>
Subject: Electronic mail chapter
In-Reply-To: <38921283.A58948F2@animats.net>
Message-ID: <Pine.SOL.3.96.1000130111515.5800A-200000@ursa.cus.cam.ac.uk>
This list is a collection of common header fields
From: This contains the sender's email address and possibly the “real name.” A complete
zoo of formats is used here.
To: This is a list of recipient email address e s. Multiple recipient address e s are separate d by
a com m a.
Cc: This is a list of email address e s that will receive “carbon copies” of the mess a g e.
Multiple recipient address e s are separate d by a com m a.
Bcc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. The
key differenc e betwe e n a “Cc:” and a “Bcc:” is that the address e s listed in a “Bcc:” will
not appear in the header of the mail mess a g e s delivered to any recipient. It's a way of
alerting recipients that you've sent copies of the messa g e to other people without telling
them who those others are. Multiple recipient address e s are separate d by a com m a.
Subject: Describe s the content of the mail in a few words.
Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may
be useful if you have several accou nts, but want to receive the bulk of mail only on the
one you use most freque ntly. This field is optional.
How Is Mail Delivered?
• Generally, you will compose mail using a mailer interface like pine.
• These programs are called mail user agents, or MU A s. If you send a mail
mess a g e, the interface progra m will in most cases hand it to another progra m
for delivery. This is called the mail transportagent, or MT A. On most syste m s
the same MTA is used for both local and remote delivery and is usually
invoke d as a progra m such as sendmail.
•
• Local delivery of mail is, of course, more than just appending the inco min g
mess a g e to the recipient's mailbox. Usually, the local MT A understa n d s
aliasing (setting up local recipient address e s pointing to other address e s) and
forwardin g (redirecting a user's mail to some other destination). Also,
mess a g e s that cannot be delivered must usually be bounced, that is, returne d
to the sender along with some error mess a g e.
• Mail delivered over a network using TCP/IP, commonly
uses Simple Mail Transfer Protocol (SMTP).
• SMTP was designed to deliver mail directly to a
recipient's machine, negotiating the message transfer
with the remote side's SMTP daemon.
• Today it is common practice for organizations to
establish special hosts that accept all mail for
recipients in the organization and for that host to
manage appropriate delivery to the intended recipient.
Email Addresses
• Email addresses are made up of at least two parts.
• One part is the name of a mail domain that will ultimately
translate to either the recipient's host or some host that accepts
mail on behalf of the recipient.
• The other part is some form of unique user identification that
may be the login name of that user, the real name of that user in
“Firstname.Lastname” format, or an arbitrary alias that will be
translated into a user or list of users.
• Internet sites adhere to the RFC-822 standard, which requires
the familiar notation of user@host.domain, for which
host.domain is the host's fully qualified domain name. The
character separating the two is properly called a “commercial at”
sign, but it helps if you read it as “at.”
How Does Mail Routing Work?
• The process of directing a message to the
recipient's host is called routing .
• Apart from finding a path from the sending site
to the destination, it involves error checking and
may involve speed and cost optimization.
Mail Routing on the Internet
• On the Internet, the destination host's configuration determines
whether any specific mail routing is performed.
• The default is to deliver the message to the destination by first
determining what host the message should be sent to, and then
delivering it directly to that host.
• Most Internet sites want to direct all inbound mail to a highly
available mail server that is capable of handling all this traffic
and have it distribute the mail locally.
• The Mail Exchanger is a machine that states that it is willing to
act as a mail forwarder for all mail addresses in the domain.
DOS - Disk Operating Systems
DOS provides the prime means of interaction between the user and
the computer hardware.
The command interface (DOS prompt) converts keyboard
commands into instructions understood by the machine hardware.
Without DOS there is no means of interpreting input commands.
The GUI "sits" on top of DOS and provides a graphical equivalent of
keyboard commands.
Windows - written by Microsoft for PC's.
UNIX and UNIX clones, eg. Linux, Apple

More Related Content

What's hot (20)

Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
 
main
mainmain
main
 
Cn u5
Cn u5Cn u5
Cn u5
 
Email and DNS
Email and DNSEmail and DNS
Email and DNS
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
Domain Name Service
Domain Name ServiceDomain Name Service
Domain Name Service
 
DNS & HTTP overview
DNS & HTTP overviewDNS & HTTP overview
DNS & HTTP overview
 
Web technologies: HTTP
Web technologies: HTTPWeb technologies: HTTP
Web technologies: HTTP
 
Dns
DnsDns
Dns
 
HTTP
HTTPHTTP
HTTP
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
Lecture17
Lecture17Lecture17
Lecture17
 
Http protocol
Http protocolHttp protocol
Http protocol
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Http
HttpHttp
Http
 
HyperText Transfer Protocol
HyperText Transfer ProtocolHyperText Transfer Protocol
HyperText Transfer Protocol
 
Basic concept of internet
Basic concept of internetBasic concept of internet
Basic concept of internet
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 

Viewers also liked

Video tech final
Video tech finalVideo tech final
Video tech finalKieran Ryan
 
Q3 summary-student information-partial
Q3 summary-student information-partialQ3 summary-student information-partial
Q3 summary-student information-partialKieran Ryan
 
To Understand Video
To Understand VideoTo Understand Video
To Understand Videoadil raja
 
Composition 2.pptx
Composition 2.pptxComposition 2.pptx
Composition 2.pptxKieran Ryan
 
Guardians institutions.pptx
Guardians institutions.pptxGuardians institutions.pptx
Guardians institutions.pptxKieran Ryan
 
15 mise en scene infographics
15 mise en scene   infographics15 mise en scene   infographics
15 mise en scene infographicsKieran Ryan
 

Viewers also liked (7)

Video tech final
Video tech finalVideo tech final
Video tech final
 
Q3 summary-student information-partial
Q3 summary-student information-partialQ3 summary-student information-partial
Q3 summary-student information-partial
 
To Understand Video
To Understand VideoTo Understand Video
To Understand Video
 
Composition 2.pptx
Composition 2.pptxComposition 2.pptx
Composition 2.pptx
 
Composition
CompositionComposition
Composition
 
Guardians institutions.pptx
Guardians institutions.pptxGuardians institutions.pptx
Guardians institutions.pptx
 
15 mise en scene infographics
15 mise en scene   infographics15 mise en scene   infographics
15 mise en scene infographics
 

Similar to What is a MS Windows Network Drive

Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Bill Condo
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxmanju772238
 
Presentation 1
Presentation 1Presentation 1
Presentation 1aisadhsa
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfShanthalaKV
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniEstelaJeffery653
 
Intro. to the internet and web
Intro. to the internet and webIntro. to the internet and web
Intro. to the internet and webdofirfauzi1302
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 

Similar to What is a MS Windows Network Drive (20)

Application layer
Application layerApplication layer
Application layer
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Application layer
Application layerApplication layer
Application layer
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Internet
InternetInternet
Internet
 
Application layer
Application layerApplication layer
Application layer
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
 
Intro. to the internet and web
Intro. to the internet and webIntro. to the internet and web
Intro. to the internet and web
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Internet
InternetInternet
Internet
 

More from adil raja

A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specificationadil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehiclesadil raja
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystifiedadil raja
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)adil raja
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Researchadil raja
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocoladil raja
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Socketsadil raja
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Executionadil raja
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistanadil raja
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousingadil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPadil raja
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specificationsadil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 

More from adil raja (20)

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
 
Thesis
ThesisThesis
Thesis
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
 
VoIP
VoIPVoIP
VoIP
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

What is a MS Windows Network Drive

  • 1. What is a MS Windows network drive? Drive letters are only of relevance within a MS Windows environment, and has no relevance on other Operating Systems. In other words it's ONLY a MS way of assigning a disk resource. It is a drive letter assigned LOCALLY to a LAN filespace resource. This drive letter is only valid for use on the LAN and has NO relevance on WANs, including the Internet. If some disk space is made available to users, and the user has permission to access this resource, then on a MS Windows machine only, and assuming the correct network protocols are being used, then this disk space can be assigned to a drive letter.
  • 2.
  • 3. dforbes on 'SATURN (nthomes.inf.brad.ac.uk)' is assigned to drive z: in this example the contents of 'dforbes' filespace on the server called 'SATURN' is assigned to a drive letter z:. So drive z: is only of relevance to 'dforbes' on his machine. Other users can also be using a drive z:, but their z: will contain completely different files from the 'dforbes' user filestore area. ... One drive letter ..... different filestores .... lots of confusion.
  • 4. How is a filestore assigned to a drive letter? In 'Windows Explorer' , 'My Network Places', 'Entire Network', 'Microsoft Windows Network', available workgroups and domains on the LAN are viewable. If you are a registered user in a domain, you can enter and view resources, otherwise..... Assuming a workgroup or domain service is available.........open the command prompt.
  • 5. To view all workgroups and domains on the LAN, type: c:> net view If a machine called, say, 'SATURN' is available to you, then connect in the following way. c:> net use k: SATURNWebSpace c:> net use z: SATURNdforbes The command completed successfully. SATURN is a Windows compatible NETBIOS name for the server, which is actually a Unix machine pretending to be a Windows server. The 'real' name of SATURN is 'nthomes.inf.brad.ac.uk' and 'saturn.inf.brad.ac.uk'. How can a Unix filestore 'pretend' to be a Windows filestore? The protocols used are called SMB or 'Server Message Blocks' which are an open standard. The information transfer using SMB looks the same on a Unix box running a SAMBA server, as on a Windows box running FileServer.
  • 6. Internet Hacking Tools - Unix and Windows What must I understand completely to be a beginner? • telnet • ftp Use telnet to linux1.inf.brad.ac.uk telnet linux1.inf.brad.ac.uk
  • 7. Tools to hack with • YoLinux: List of Linux Security and Hacker Software Tools http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html • Unix tools track hackers http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm http://www.antihackertoolkit.com/tools.html • For DNS lookups use - 'dig' (domain information groper) or host -a 143.53.29.129 ns2.splice1.com or nslookup Note: nslookup is deprecated and may be removed from future releases. or http://www.dns.net/dnsrd/tools.html C:>nslookup 143.53.29.129 ns1.splice1.com Server: server4.splice1.com Address: 66.45.242.178 Name: d209.inf.brad.ac.uk Address: 143.53.29.129 C:>
  • 8. Where is the site hosted? traceroute/tracert Is the site on-line? ping Is there a back door or way in? nmap How is the network routing configured? netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 143.53.28.0 * 255.255.255.0 U 0 0 0 eth1 169.254.0.0 * 255.255.0.0 U 0 0 0 eth1 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1 How are the network cards configured? ifconfig/ipconfig satan - Security Administrator Tool for Analyzing Networks
  • 9. Internet Corporation for Assigned Names and Numbers (ICANN) http://www.icann.com/ www.internic.net: • The InterNIC® web site is a public information resource for Internet users worldwide. • It provides information on the domain-name system, the domain-name registration process, and domain-name registrars. • To access information regarding registered domains, please go to the Registry Whois.
  • 10. • For Whois information about country-code (two-letter) top-level domains, try Uwhois.com. • http://www.whois.net/ • http://www.betterwhois.com/ • http://www.nic.uk/ • Nominet UK is the registry for .uk internet names. • Manages the authoritative database of .uk domain name registrations. • A not-for-profit company - has members instead of shareholders. • Nominet is officially recognised as the .uk domain name registry by the internet industry, users and the UK Government.
  • 11. What Is a Mail Message? • A mail message generally consists of • a message body, which is the text of the message, • and special administrative data specifying recipients, transport medium, etc., as you see when you look at an envelope of a real letter.
  • 12. A typical mail header may look like this: Return-Path: <ph10@cus.cam.ac.uk> Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for <terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100 Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13 #1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000 Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT) From: Philip Hazel <ph10@cus.cam.ac.uk> Reply-To: Philip Hazel <ph10@cus.cam.ac.uk> To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com> Subject: Electronic mail chapter In-Reply-To: <38921283.A58948F2@animats.net> Message-ID: <Pine.SOL.3.96.1000130111515.5800A-200000@ursa.cus.cam.ac.uk>
  • 13. This list is a collection of common header fields From: This contains the sender's email address and possibly the “real name.” A complete zoo of formats is used here. To: This is a list of recipient email address e s. Multiple recipient address e s are separate d by a com m a. Cc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. Multiple recipient address e s are separate d by a com m a. Bcc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. The key differenc e betwe e n a “Cc:” and a “Bcc:” is that the address e s listed in a “Bcc:” will not appear in the header of the mail mess a g e s delivered to any recipient. It's a way of alerting recipients that you've sent copies of the messa g e to other people without telling them who those others are. Multiple recipient address e s are separate d by a com m a. Subject: Describe s the content of the mail in a few words. Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may be useful if you have several accou nts, but want to receive the bulk of mail only on the one you use most freque ntly. This field is optional.
  • 14. How Is Mail Delivered? • Generally, you will compose mail using a mailer interface like pine. • These programs are called mail user agents, or MU A s. If you send a mail mess a g e, the interface progra m will in most cases hand it to another progra m for delivery. This is called the mail transportagent, or MT A. On most syste m s the same MTA is used for both local and remote delivery and is usually invoke d as a progra m such as sendmail. • • Local delivery of mail is, of course, more than just appending the inco min g mess a g e to the recipient's mailbox. Usually, the local MT A understa n d s aliasing (setting up local recipient address e s pointing to other address e s) and forwardin g (redirecting a user's mail to some other destination). Also, mess a g e s that cannot be delivered must usually be bounced, that is, returne d to the sender along with some error mess a g e.
  • 15. • Mail delivered over a network using TCP/IP, commonly uses Simple Mail Transfer Protocol (SMTP). • SMTP was designed to deliver mail directly to a recipient's machine, negotiating the message transfer with the remote side's SMTP daemon. • Today it is common practice for organizations to establish special hosts that accept all mail for recipients in the organization and for that host to manage appropriate delivery to the intended recipient.
  • 16. Email Addresses • Email addresses are made up of at least two parts. • One part is the name of a mail domain that will ultimately translate to either the recipient's host or some host that accepts mail on behalf of the recipient. • The other part is some form of unique user identification that may be the login name of that user, the real name of that user in “Firstname.Lastname” format, or an arbitrary alias that will be translated into a user or list of users. • Internet sites adhere to the RFC-822 standard, which requires the familiar notation of user@host.domain, for which host.domain is the host's fully qualified domain name. The character separating the two is properly called a “commercial at” sign, but it helps if you read it as “at.”
  • 17. How Does Mail Routing Work? • The process of directing a message to the recipient's host is called routing . • Apart from finding a path from the sending site to the destination, it involves error checking and may involve speed and cost optimization.
  • 18. Mail Routing on the Internet • On the Internet, the destination host's configuration determines whether any specific mail routing is performed. • The default is to deliver the message to the destination by first determining what host the message should be sent to, and then delivering it directly to that host. • Most Internet sites want to direct all inbound mail to a highly available mail server that is capable of handling all this traffic and have it distribute the mail locally. • The Mail Exchanger is a machine that states that it is willing to act as a mail forwarder for all mail addresses in the domain.
  • 19. DOS - Disk Operating Systems DOS provides the prime means of interaction between the user and the computer hardware. The command interface (DOS prompt) converts keyboard commands into instructions understood by the machine hardware. Without DOS there is no means of interpreting input commands. The GUI "sits" on top of DOS and provides a graphical equivalent of keyboard commands. Windows - written by Microsoft for PC's. UNIX and UNIX clones, eg. Linux, Apple