Wednesday, July 25, 2012

How to Enable DHCP in Windows XP

How to Enable DHCP in Windows XP thumbnail
DHCP is a networking service used for computers to communicate with each other.
Dynamic Host Configuration Protocol, or DHCP, is a networking service that allows computers to download an Internet Protocol, or IP, address and other configuration settings automatically when connecting to a new network. For DHCP to work, your PC must have a DHCP client installed and enabled. You must be connecting to a network that is setup to provide configuration data via DHCP, which almost all home networks are. Windows XP comes with a bundled DHCP client, which can be enabled by users with administrator privileges.

Instructions


  • 1
    Log on to your computer with an account that has administrative rights. Click the Windows "Start" Menu and select "Control Panel."

  • 2
    Click “Network and Internet Connections” and choose“Network Connections.”


  • 3
    Look at the list of network connections and determine which adapter you would like to enable DHCP on. If you are using a wireless connection to access the Internet, look for an adapter titled “Wireless Network Connection.” If your computer is physically plugged into a router, cable modem, DSL modem or other networking device, look for a connection titled “Local Area Connection.”

  • 4
    Right-click on the appropriate adapter and select “Properties.” In the window that opens, find the section titled “This connection uses the following items.” Scroll down until you see an item titled “Internet Protocol (TCP/IP)” and double-click it.

  • 5
    Select the radio buttons titled “Obtain an IP address automatically” and “Obtain DNS server address automatically” to enable DHCP. If you do not see these radio buttons, make sure you have the "General" tab selected. Click the “OK” button to close this window. Then click the “OK” button to close the adapter properties window.

  • Why should you use the Windows host-based firewall?

    Many companies today secure their network using the "hard outer shell / gooey center" approach. What this means is that they create a strong perimeter around their network with firewalls and IPS systems, protecting themselves from malicious attackers on the Internet. However, if an attacker could penetrate the outer perimeter and gain access to the internal network, there would only be Windows authentication security to stop them from gaining access to the company's most valuable assets - their data.
    This is because most IT Pros don't secure their servers with host-based firewalls. Why is that? We see host-based firewalls as being "more trouble than they are worth".
    After reading this article, I hope that many of you will take a second look at the Windows host-based firewall. With Windows Server 2008, the host-based firewall is built in to Windows, is already installed, now has more features, and is now easier to configure. Plus, it is really one of the best ways to secure a crucial infrastructure server. So, what can the Windows Server Advanced firewall do for you and how do you configure it? Let’s find out.

    What does the new advanced firewall offer & how can it help you?

    New with Windows Server 2008, the built-in firewall is now “advanced”. And it isn’t just me saying that, Microsoft now calls it the “Windows Firewall with Advanced Security” (let’s abbreviate that as WFAS).
    Here are the new features that help justify that new name:
    • New GUI interface – an MMC snap-in is now available to configure the advanced firewall.
    • Bi-directional – filters outbound traffic as well as inbound traffic.
    • Works better with IPSEC – now the firewall rules and IPSec encryption configurations are integrated into one interface.
    • Advanced Rules configuration – you can create firewall rules (exceptions) for Windows Active Directory (AD) service accounts & groups, source/destination IP addresses, protocol numbers, source and destination TCP/UDP ports, ICMP, IPv6 traffic, and interfaces on the Windows Server.
    With the addition of being a bi-directional firewall, a better GUI, and advanced rules configuration, the Windows Advanced firewall is bordering on being as good as traditional host-based firewalls (like ZoneAlarm Pro, for example).
    I know that the first concern of any server admin in using a host-based firewall is: what if it prevents critical server infrastructure apps from functioning? While that is always a possibility with any security measure, WFAS will automatically configure new rules for any new server roles that are added to the server. However, if you run any non-Microsoft applications on your server that need inbound network connectivity, you will have to create a new rule for that type of traffic.
    By using the advanced windows firewall, you can better secure your servers from attack, your servers from attacking others, and really nail down what traffic is going in and out of your servers. Let’s see how it is done.

    What are the options for configuring Windows Firewall with Advanced Security?

    Previously, with Windows Server, you could configure the Windows firewall when you went to configure your network adaptor or from the control panel. The configuration was very basic.
    With Windows Firewall with Advanced Security (WFAS), most admins will configure the firewall either from Windows Server Manager or the MMC with only the WFAS snap-in. Here is what they both look like:

    Figure 1: Windows 2008 Server Manager

    Figure 2: Windows 2008 Firewall with Advanced Security MMC only
    What I have found is that the quickest & easiest way to start the WFAS MMC is to just type firewall in the Start menu Search box, like this:

    Figure 3: Windows 2008 Firewall with Advanced Security MMC only
    There is also a new netsh advfirewall CLI option for configuring WFAS.

    What can I configure using the new WFAS MMC Snap-in?

    Because there are so many possible features you can configure with the new WFAS MMC snap-in, I can’t possibly cover them all. If you have ever seen the configuration GUI for Windows 2003 built-in firewall, you will quickly notice how many more options there appear to be with WFAS. However let me hit on a few of the most frequently used.
    When you first go into the WFAS MMC snap in, by default, you will see that WFAS is ON and blocking inbound connections that don’t have a matching outbound rule. In addition, the new outbound firewall is turned off.
    Something else you will notice is that there are also different profiles for WFAS (see Figure 4 below).

    Figure 4: Profiles now available in Windows 2008 Firewall with Advanced Security
    There is a domain profile, private profile, and public profile for WFAS. What these different profiles allow you to do is take the many inbound & outbound rules you may have and apply that group of firewall rules to your computer based on where your computer is connected to the network (say the corporate LAN vs. the local coffee shop).
    Out of all the improvements we have talked about with WFAS, in my opinion, the most significant improvement is the more sophisticated firewall rules. Take a look at the Windows 2003 Server Firewall option to add an exception (a rule), in Figure 5.

    Figure 5: Windows 2003 Server Firewall Exception window
    Now, let’s compare that to Windows 2008 Server:

    Figure 6: Windows 2008 Server Advanced Firewall Exception window
    Notice how the Protocols and Ports tab is just a small part of the multi-tabbed window. You can also configure rules to apply to Users & Computers, Programs and Services, and IP address Scopes. With this type of sophisticated firewall rules configuration, Microsoft has pushed WFAS more toward Microsoft’s IAS server.
    The number of default rules offered by WFAS is truly amazing. In Windows 2003 Server, there were the 3 default exceptions (rules). Not so in Windows Server. WFAS offers about 90 default inbound firewall rules and at least 40 default outbound rules – WOW!

    Figure 7: Windows 2008 Server Advanced Firewall Default Inbound Rules

    How to Create an Inbound Custom Firewall Rule

    So how do you create a rule using the new Windows Advanced Firewall? Let’s step through it.
    Say that you have installed Apache web server for Windows on your Windows 2008 Server. If you had used IIS, built-in with Windows, the port would have been automatically opened for you. However, as you are using a third party web server and you have the inbound firewall enabled, you must manually open the port.
    Here are the steps to follow:
    • Identify the protocol you want to filter – in our case, it is going to be TCP/IP (as opposed to UDP/IP or ICMP)
    • Identify the source IP address, source port number, destination IP address, and destination port number – our web traffic will be coming from ANY IP address and any port number, going to this server, on port 80. (note that you could also create a rule for a certain program, such as the apache HTTP Server).
    • Open the Windows Firewall with Advanced Security MMC
    • Add the Rule - Click on the New Rule button in Windows Firewall with Advanced Security MMC to bring up the New Inbound Rule Wizard

    Figure 8: Windows 2008 Server Advanced Firewall MMC – new rule button
    • Select that you want to create a rule for a port
    • Configure protocol & port number – take the default of TCP and enter the port number as 80 and click Next.
    • Take the default of “allow this connection” & click Next.
    • Take the default of applying this rule to all profiles & click Next.
    • Give the rule a name and click Finish.
    At this point, you should have a rule that looks like this:

    Figure 9: Windows 2008 Server Advanced Firewall MMC – after rule was created
    I tested that my newly installed Apache web server would not work when just installed with the firewall enabled. However, after the rule, it works great!

    Open ftp port 21 on windows XP operating system

    MS-Windows XP service pack 2 comes with in build firewall. If Microsoft Windows Firewall is blocking a port that is used by a service or by a program, you can configure the Windows Firewall to create an exception. Windows Firewall may be blocking a program or a service if Programs do not respond to a client's request or you do not get data from server.
     
    Open ftp port 21
    To open ftp port 21 you need to change windows firewall settings.
    Click on Start > Settings > Control Panel > Click on Security center



    At the bottom window (Manage security setting for:) you will see Windows Firewall option. Click on this option. It will open Windows Firewall dialog box:



    Select Exception tab > Click on Add port





    Add port 21 and 20 and save the firewall (see above two figures).




    Save firewall by clicking on Ok button. You are done now your Windows XP box will allows incoming FTP connection. Please note that you need to run FTP server in order to establish connection.

    How to know the port number of a system ?

    To find open ports on a computer, you can use netstat command line.
    1. To display all open ports, open DOS command, type netstat and press Enter.
    2. To list all listening ports, use netstat -an |find /i "listening" command.
    3. To see what ports your computer actually communicates with, use netstat -an |find /i "established"
    4. To find specified open port, use find switch. For example, to find if the port 3389 is open or not, do netstat
    -an |find /i "3389".
    5. You can use PULIST from the Windows Resource Kit to find which process is using a specified port. For example,
    pulist |find /i "4125" may display

    Sunday, July 15, 2012

    Tsunami vpn working again in up

    Tsunami vpn working again in up


    This trick is an old hat Tsunami Vpn, but it has started working again atleast for UP. This VPN trick specially for UP and for other states where VPN (UDP port) has been blocked )
    Trick :-
    1:- Install OpenVpn

    http://swupdate.openvpn.org/community/releases/openvpn-2.2.1-install.exe

    2:- Register here for user name and password

    http://www.tsunamivpn.com/index.php/account/free-trial/register
    after registering you will get user name and password and account activation link on your email address.
    Click on that link for account activation.
    3- Run "Logan.exe" download from here.
    The links are given below.
    http://www.mediafire.com/?jdkoslg02rj0v3v
    PASS :- ravi_logan
    5- Run openvpn and connect via" Tsunami_by_LOGAN5.ovpn "
    Enjoy free internet on airtel with tsunami vpn.