Best IT Computer Services in Hisar
Sometimes, we use tech terms and explain things in a way that a not-so-technical person may have a hard time understanding. This blog will try to explain those terms in an easy-to-understand way. Enjoy!
An Internet Protocol Address or IP address for short is like your computer’s phone number. Without it, your computer wouldn’t be able to connect to the Internet. Every computer, tablet, smartphone, and the internet-enabled device has its own IP address (even some light bulbs have an IP address these days). An IP address consists of numbers and periods (192.168.1.1).
Static IP Address
A static IP address is one that doesn’t change, it is assigned to you by your ISP (Internet Service Provider) and often costs extra money. A static IP address is YOURS and will never change (unless you cancel the subscription).
A static IP address is fixed, much like a telephone number. If your ISP gives you a static address, you will always use the same address. Servers usually have static addresses, so they can always be found at the same location.
A dynamic IP address changes each time you connect to your Internet Service Provider (ISP). This allows ISPs to keep a pool of addresses available to subscribers. If you disconnect from the ISP, your address is returned to the pool, becoming available to the next computer that connects. A Dynamic IP address is one that is NOT static. It changes from time to time. If you are unsure if your IP address is static or dynamic, chances are pretty high that it is dynamic. They are more cost-effective for your ISP.
DNS stands for Domain Name Service. DNS servers translate names, such as “yourname.com” into the numeric IP address that the Internet uses to send and receive information. Most ISPs and companies run their own DNS servers, and there are thousands of them on the Internet.
DNS Resolution (Resolving) - During DNS resolution, a DNS server is contacted and the IP address of the URL you are trying to reach is returned. So, your computer asks the DNS server, “what is the IP address for ITCloud.co.in“, and the DNS server replies with the current IP address, which connects you to the correct website. This is the bread and butter of the Internet and how it works.
Delegation- Delegation is where you are assigning a group of name servers to be responsible for a domain name. During the resolution process the name servers that are assigned to a domain are directly asked what to respond with (what IP address) for a DNS request.
A domain name is a name given to an organization of computers on the Internet. For example, “google.com” and “yahoo.com” are domain names.
A process of performing an RFC 2136 “DNS Update” to add, modify or delete DNS resource records on the fly without reloading the entire DNS zone master file.
Is a protocol that is very commonly used in computer networks.
A Fully Qualified Domain Name is the combination of a hostname and a domain name, with the hostname being to the left of the domain name. For example: “www.google.com” and “www.yahoo.com” are fully qualified domain names.
An Internet protocol designed for the purpose of a client downloading files from an FTP server. No-IP.com does not provide FTP space but our users are encouraged to run their own FTP server.
A Host or Hostname is a textual name given to a computer. A computer can have more than one name. Common hostnames are “www”, “mail” and “ftp”, but you can name a host just about anything.
HTTP is the standard protocol used by web servers to transmit data back and forth to your browser.
HTTP- Hypertext Transfer (or Transport) Protocol, the data transfer protocol used on the World Wide Web. The secure and encrypted version of HTTP is HTTPS. If you are browsing the internet and want it to be secure, add the S. Make sure websites that you enter passwords and private data on have the HTTPS. Without that S, you're not browsing securely.
The Internet Protocol (IP) address is assigned to your computer, providing a numeric address necessary for connecting to the Internet or another IP-based network.
The Internet is a large collection of computers that are inter-connected and using the TCP/IP protocol to communicate.
A company that provides individuals and other companies access to the Internet and other related services such as website building and email services.
Is an Internet standard protocol that is used to allow users to download their email to their computer from the mail server.
This is the standard port that mail servers listen on. Many ISP’s block inbound and outbound port 25 to stop spammers from abusing their networks. This makes running a mail server on one of these ISP’s networks nearly impossible. See Mail Reflector and Alternate-Port SMTP for No-IP based solutions to get around this problem.
This is the standard port that web(http) servers run on. Many ISP’s have blocked port 80 to stop viruses such as Nimda from slowing down their networks and infecting their customers computers. Use No-IP’s port redirect or web redirect host type to get around this issue.
A root nameserver is a DNS server that answers requests for the root namespace domain and redirects requests for a particular top-level domain to that TLD’s nameservers.
A Registrar is the company or organization that you purchased or registered your domain name through.
This is an Internet standard protocol that is used to send outgoing email over the internet to an email (SMTP) server.
Spam is unsolicited bulk or junk email.
The highest level in the Domain Name System hierarchy. The portion of the domain name that comes after the dot “.” (.com, .net, .org, .uk).
URL- Abbreviation of Uniform Resource Locator (URL). It is the global address of documents and other resources on the World Wide Web. (www.itcloud.co.in). A URL is a way to specify the location of something found on the Internet. A URL typically points to a website and appears as a link on web pages.
Also known as HTTP Redirect or URL Redirect. Replace a long url with an easy to remember shorter one using a web redirect.
Port Forwarding
If you have a router at home or your office, you will need to forward ports in order for outside traffic to get into your network. Think of your router as being a huge electric fence or wall, with a few doors or openings. This electric fence, or wall serves as your barrier and security blanket from the scary outside Internet world. Your router comes pre-configured with a few of those doors (or ports) open to let you access the internet, but the others are closed tight. So, in order to run a mail server, game server, access your computer remotely, etc you will need to open an extra door or two in your router in order for the outside traffic to get inside. This is called Port Forwarding.
Redundant
This is a term to explain that the network is guarded against downtime because the domain or hostname that you are using is hosted on many different servers that are located in various locations across the globe, not just one. So, if you are located in Los Angeles, and there is an earthquake, your website will stay live even if the servers located in Los Angeles are not online.
How to track System shutdown and startup
Enter the event IDs below into the <All Event IDs> field, and click/tap on OK. (see screenshot below)
Events Used by TurnedOnTimesView http://www.nirsoft.net/utils/
TurnedOnTimesView uses the following events to determine the turn-off/turn-on times:
41, 1074, 6006, 6008
The event IDs below will show you these details.
Event ID Description
EventID 1 (Microsoft-Windows-Power-Troubleshooter): The system has resumed from sleep.
EventID 41 (Microsoft-Windows-Kernel-Power): The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.
EventID 42 (Microsoft-Windows-Kernel-Power): The system is entering sleep
EventID 1074 Logged when an app (ex: Windows Update) causes the system to restart, or when a user initiates a restart or shutdown.
EventID 1074 (USER32): The process xxx has initiated the xxx of computer xxx on behalf of user xxx for the following reason: xxx
Event ID 6005 will be labeled as “The event log service was started.” This is synonymous with system startup.
Event ID 6006 will be labeled as “The event log service was stopped.” This is synonymous with system shutdown.
Event ID 6006 Logged as a clean shutdown. It gives the message "The Event log service was stopped".
Event ID 6008 Logged as a dirty shutdown. It gives the message "The previous system shutdown at a time on the date was unexpected".
Event ID 6008 will let you know that the system started after it was not shut down properly.
Event ID 6009 indicates the processor information detected during boot time.
Event ID 6013, which will display the uptime of the computer, and
netsh wlan set hostednetwork mode=allow ssid=XXXXXX key=XXXXXX
netsh wlan start hostednetwork
and share internet connection and ENJOY!!!!!!!.
Event ID 4625
An account failed to log on. :
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
If you’re wondering how to find out who is currently logged into a Microsoft Windows 10 computer, there are several ways to proceed. Here are a few common methods you can use from a remote computer or logged into the local computer you are querying.
The “whoami” command displays the user you are currently logged in and using in Windows.
Hold down the Windows Key, and press “R” to bring up the Run window.
Type “CMD“, then press “Enter” to open a command prompt.
At the command prompt, type the following then press “Enter“:
whoami
The computer name or domain followed by the username is displayed.
This command allows you to see all users currently logged into the computer.
Locally
Hold down the Windows Key, and press “R” to bring up the Run window.
Type “CMD“, then press “Enter” to open a command prompt.
At the command prompt, type the following then press “Enter“:
query user
The computer name or domain followed by the username is displayed.
Remotely
Hold down the Windows Key, and press “R” to bring up the Run window.
Type “CMD“, then press “Enter” to open a command prompt.
At the command prompt, type the following then press “Enter“:
query user /server:computername
Replace “computername” with the actual computer name of the system you are querying.
The computer name or domain followed by the username is displayed.
Right-click the taskbar, then select “Task Manager“.
Select the “Users” tab.
Details on the users logged into the machine are displayed.
Hold down the Windows Key, and press “R” to bring up the Run window.
Type “CMD“, then press “Enter” to open a command prompt.
At the command prompt, type the following then press “Enter“:
WMIC /NODE:"computername" COMPUTERSYSTEM GET USERNAME
Replace “computername” with the actual computer name of the system you are querying. You can also replace “computername” with the IP address of the system.
WMIC /NODE:192.168.1.1 COMPUTERSYSTEM GET USERNAME
These two words you can find on event viewer in some Windows operating systems,
Special logons relate to administrator-level sessions A special logon is used. A special logon is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
Basically, when you log in, you generate logon events. There are different types:
2 Interactive A user logged on to this computer.
3 Network A user or computer logged on to this computer from the network.
4 Batch Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention.
5 Service A service was started by the Service Control Manager.
7 Unlock This workstation was unlocked.
8 NetworkCleartext A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
9 NewCredentials A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity but uses different credentials for other network connections.
10 RemoteInteractive A user logged on to this computer remotely using Terminal Services or Remote Desktop.
11 CachedInteractive A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials.
Most will be either 2 (interactive) or 3 (network) or 7 (unlock).
DISM /Online /Cleanup-Image /scanHealth
DISM /Online /Cleanup-Image /checkHealth
DISM /Online /Cleanup-Image /RestoreHealth
chkdsk c: /r /x
sfc /scannow
Perform Clean Boot.
msconfig
in admin PS run Export-WindowsDriver -Online -Destination D:\Drivers
On your keyboard, press the Windows logo key and R at the same time to open the Run dialog. Type cmd and then press Ctrl, Shift and Enter as the same time to run Command Prompt as administrator. You’ll be prompted for permission. Click Yes to open Command Prompt.
In Admin Command Prompt, type the following command line and press Enter:
dism /online /export-driver /destination:”D:\Drivers Backup”
Second Method is
C:\windows\system32\DriverStore