Author Archive

utorrent_logo_mac

As many of you saw last week, we had a tutorial on automatically downloading TV Shows with Vuze.  Sure, Vuze can run on any computer; however uTorrent is by far the most popular torrent client on windows, so it is only fair we give you a tutorial on this one aswell:

What You Need:

  1. uTorrent
  2. ShowRSS Account (Tutorial Here)

Steps:

  1. First, click the button that says Add Torrent from URL
  2. 1
  3. Next put your ShowRSS feed address in the textbox and click OK
  4. 2
  5. Lastly, set your settings however you like by double clicking on the feed on the left hand side.  Here are my settings:
3

Enjoy!

Comments No Comments »

      Have you ever ran into the problem when you can’t connect to the internet, so you look at your IP Address and you see a 169.254.x.x IP Address?   You can thank APIPA (Automatic Private IP Addresing) for this.  What happens is your computer needs to start up the TCP/IP stack, but it can’t do this without and IP Address.  It attempts to get one from DHCP and if that fails then it loads up the non-routable APIPA address.  It does this so that TCP/IP can load and you can begin your troubleshooting.  The APIPA scope is from 169.254.0.1 to 169.254.255.254.  When I said it is a non-routable address, this means that you can not route from this network to any other network.  If you had two computers on the same APIPA network, they would be able to communicate though.

Now for a question for you techies that I will solve in a later tutorial; what class of IP Addresses is this range in?

Comments No Comments »

Hello all you ninjas fanatics,

The Network+ exam from CompTIA is one exam every network technician and administrator should have, and believe it or not this is very easy to achieve. Today we are going to be talking about the OSI model and how it applies to you. The OSI is not a specific way for how data is transferred; it is all theoretical. It is the idea for how data is being transferred from one spot to another. There are seven layers to this model and they are as follows:

  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data Link
  • Physical

Each layer has it’s own specific part for how the data is transferred. Physical, Data Link, and Network are all part of the Media Layer, while Transport Session Presentation and Application are all part of the host layer. The media layer deals with the hardware and how it is transferred through the cabling, routers, hubs, and interfaces and such while the host layer deals with anything that happens in the host, such as how the information is packaged to be sent in protocols. Data is sent “Down mine and Up yours”. This means that it starts at my application layer and goes down through my physical layer, and goes up starting at your physical layer all the way to your application layer. Here is an explanation of each of the seven layers.

Application- This is the layer closest to the user. You operate on this layer and it is what you see, or sometimes don’t see. This layer contains the most applications such as Telnet, FTP, HTTP, and SMTP.

Presentation- On this layer, encryption takes place. This is mainly the layer that converts information from the application layer into data that can be sent through the session layer.

Session- This is where the connections actually take place. It deals with the creation, maintaining, and closing of connections. There are three ways in which data is sent through this layer: full-duplex, half-duplex, and simplex. Full-duplex is where both ends can talk and receive at the same time. An example of this would be a phone conversation. While you might not want to, you can talk and listen at the same time and the phones will send the data. The next is half-duplex. This one is used for only sending in one direction at a time. An example of this would be walkie-talkies because you can only talk OR listen; you can not do both. And the last way to send data is simplex, and this is used when you only need to send data in one direction and no reply is needed.

Transport- This is where TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) take place. Data is sent through one of these. TCP is where there is a handshake and it is a connection-oriented protocol. If something goes wrong, it make sure the proper packets gets to the recieving end and they aren’t corrupt. UDP is connectionless-oriented. It just sends the data and it could care less if the data gets there or not.

Network- Yay we are at the layer where routing takes place! This is where your routers and multi-layer switches are. Instead of making a decision based off of the MAC Address, we use IP addresses now. The data would come in through one interface, and then the router will try to look up its destination inside its database called a routing table. If it can not find it’s path, it forwards the packet to it’s default gateway who then does the same look up. It repeats this process until it figures out where to be routed to.

Data Link- This is the layer where switches are located at. Switches do not route, rather they quiet the network down by cutting the network into segments. They send data based off of the MAC Address on the NIC (Network interface card) of the computer. If the MAC Address is on the left side of the network, instead of sending it everywhere and broadcasting the whole network it will only send the data to the left side of the network. Switches are becoming more sophisticated though and multi-layer switches are starting to come out with routing capabilities that also operate on layer three. Switches communicate with each other using the Spanning Tree Algorithm to prevent broadcast storms. Broadcasts are used to communicate with everyone on the network, or to find a certain node for communication such as the DHCP server to get an IP address. Let’s say there are two switches on the same network. The broadcast would get to one switch, and that switch would repeat it to every interface. Then the data would get to the next switch, and it would also repeat it to every interface. What would happen if they both kept repeating the same data back and forth to each other? The amazing broadcast storm until your network fails. My point; they are slowly becoming more sophisticated to avoid problems.

Physical- The physical layer holds all the physical media for which data is transferred. There is no computing done on this layer at all. It is solely used for the transferring of data through this layer. It consists of the cabling, hubs, repeaters and network adapters. Notice how all of those do no computing on their own and they are used for transferring the media or repeating it. There is no routing that takes place on this layer.

If you plan on getting this certification which is highly recommended, you must know the OSI concept and how it operates because it is highly tested on the exam. One way to remember this model is to use acronyms. A great one is Please Don’t Ninja The Stupid Pirates Apples. There are many places on the internet to find information about it, but why not ask some people who have passed the test? Head over to the forums and ask any questions you might have!

Have a great ninja day!

Comments 2 Comments »

Site SundayHey guys,

I know some of you are hardcore Myspace ninjas, so here is a way to stalk your own Myspace and see who visits your Myspace! Everyone starts off unknown but once you compare a time that Trakzor says someone visited, and a time that you get a message or comment and identify them, then they stay identified forever! Head over to Trakzor and register now!

Comments No Comments »

What makes Firefox better than Internet Explorer you ask? Besides for the enhanced security, Firefox has addons! From Chatzilla to Foxytunes and organizing downloads with the Download Statusbar, if you think of it, there is an addon for it.

Be sure to navigate over to the Mozilla website to see what other great addons Firefox has to offer!

Link!

Comments 1 Comment »

UltraVNC is a tool that can be used to get help from someone, or to monitor other computers on your network. Here is one way to simply set it up to monitor another computer on your network, or who knows, maybe even mess with your brother a little bit.

First, you need to go to the computer you want to install the server on(aka monitor) and download the file. It is located here.

There are two was in which one can go about installing the file. You can either:

  1. Install it by double clicking on the executable file and going through the steps.
  2. Open the program through cmd with a few commands attached to it. Do this to install the file simply and silently

I believe most people know how to double click a file and install it, so I will go in depth with #2. First, open up cmd(command prompt) and navigate to the folder in which your installation file is in. Once you are there, copy and paste the filename of your file and paste it into command prompt. After that, you need to add a few extra codes. Once you are done your command should be as follows

UltraVNC-102-Setup.exe dir="C:\Program Files\VNC" /norestart /verysilent /log

Here is a screenshot of what it should look like.

Command Prompt Example

Now the file is installed, so we need to set it up to run silently in the background. Open UltraVNC Server and a window should pop up. Add a password and check the boxes under the Misc Tab that says “DisableTrayIcon” and “Disable Client Options in Tray Icon Menu” Click Apply and Ok.

Now to add the file to startup, follow this.

Start > All Programs > UltraVNC > UltraVNC Server > Install WinVNC Service

Now you must get the IP address of the computer that you have the server installed on. To do this go to:

Start > Run > cmd and hit enter.

In cmd, type the command “ipconfig” and you’ll see their IP address.

Once you are done with that, the server is all set up! Now you can go back to your computer and open up the viewer, type in the IP address of the computer you installed the server on.

VNC Client

And Happy monitoring!

Comments 5 Comments »