DHCP server and sends NetBIOS name resolution

DHCP DHCP (Dynamic Host Configuration Protocol) It easy and completely automatically provides IP addresses to Computer Users, the main fact about DHCP is that you so you do not need to configure and install any options. It does everything automaticallyfor you. To set DHCP go to Network settings, then choose adapter settings, then click on component-TCP/IPv4, click on it and click properties, then click OK. DNS DNS (Domain Name System) Computers/Devices use the language of numbers, while users preferthe language of words. Both languages are used in the modern Internet, providing convenient navigation method choices for both computers and computer users, means that there are two for each server in the name or address. Example you or your browser requestsa value www.WEBSITE.com gets in response Public DNS Public DNS (Domain Name System) it provides fast loading of Web pages by increasing the efficiency of the cache data. Also, improved protection against spoofing. Many people use free DNS serversto configure their servers. Often used the well-known Google’s DNS and Private DNS Private DNS (Domain Name System) – When you get personal DNS server, it is associated with your network and Control Panel. The server is operated and maintainedby system administrators. Also, you can manage all of your domains through control panel. WINS WINS (Windows Internet Name Service) – Server stores NetBIOS names and determinate them to IP addresses. When a TCP/IP host is configured with the IP addressof the WINS server, the TCP/IP host registers its NetBIOS names on this WINS server and sends NetBIOS name resolution queries. The WINS server is strongly recommended for networks consisting of more than one segment, and if you have computers with operatingsystems. APIPA APIPA (Automatic Private IP Addressing) it creates automatic private IP addresses, which makes Windows-based computers determine IP address to communicate on the network. First, they try to find a DHCP server and if unsuccessful computersselect an IP address from a specific sender. There main classes of IP Addresses Class A IP Addresses – It uses the first octet (8 bits) of 32 bits display the address of the network. The remaining three octets are used for host addresses. Class A IP Addresses– It uses two (16 bit) of the four octets (32 bits) for display the address of the network. The remaining two octets specify the host address. Class A IP Addresses – It uses with the first three octets (24 bit) IP address to determine the network address,and the remaining octets reserved for hosts. Figure 1. Some IP addresses are reserved for specific purposes and cannot be assigned to destination devices on your network. Loopback Address Loopback address the special reserved IP address, whichallows users of your system to communicate with each other in local mode. MAC Address Mac Address (Media Access Control) This is a unique identifier for the network interface (regularly the Ethernet card) for the implementation of communication devicesin the network. A unique number that is stored in read-only memory that is assigned to the network card of its manufacturer. MAC address is written as six groups using characters or numbers. Example MAC address look like 00:11:22: 33:44:55. To find theMAC address of the network device on your computer, open the command line, enter the command “ipconfig /all”. Default Gateway Default Gateway – Required to send a packet from the local network. If the network part of the address of the recipient of thepackage differs from the host network-sender, the package must be sent outside of the original network. For this packet is sent to the gateway. This gateway is a router interface connected to the local network. IP Config IP config command “ipconfig” aquick way to find out your IP address of your device or local network. Trace Route Trace Route Command “tracert” command displays the path of the transmitted packets to the destination address. By using it, for example, you can determine delays in transit.PING Ping command “ping” a quick way to identify problems in the network. Connect to resources using a web browser Popular Web browsers The browser – One of the most important programs on your computer (laptop, phone, etc.) is required to connect to theInternet. Refer to Figure 2 the most popular web browser in the world. HTTP HTTP (Hypertext Transfer Protocol) is the transport protocol application used to retrieve information from Web sites. HTTPS HTTPS (Hypertext Transfer Protocol Secure) Extensionof the HTTP protocol that supports encryption via SSL and TLS. Used through encryption of data exchange and authorization on servers require to protect data security. URL URL (Uniform Resource Locator) This is a form of unicast address of a resource onthe Internet. In this case, the resource can be understood as a separate document, website or image. Typing its URL name in the address bar, the user can find it. Example typing www.google.com. FTP FTP (File Transfer Protocol) standard TCP network protocolfor file transfer used to organize sending and receiving files from server or remote PC. HTTP Methods: GET vs. POST HTTP Get Request – This method is used to retrieve information from the server to the specified URLs. Client requests using the GET methodto receive only the data and there is no anyway to affect the data. HTTP Post Request – This method is used to send data to the server. Example from HTML contact form that fills the site user. HTTP Put Request – This method is used to load the contentsof a request for the specified URL in the same query. Local security policy Password Policy – By setting up this option your password must meet complexity requirements. The purpose of this option is to set hard password so nobody guesses your accountpassword. Usually passwords are set to 123456 or your user name. This option will prevent to do that. Account Lockout Threshold Policy – Another good security barrier. By setting up this option it will controls the number of failed log in attempts. Usuallyyour account will be blocked after 3 attempts. Configure, manage and troubleshoot local user and group accounts Built-In System Groups Everyone – Network, Dial-up and authenticated users. This group provides access to Windows system resources. AuthenticatedUsers – Users who access Windows system through the login process. This relate to access to shared resources and domain, such as files in a shared folder, which should be available to all computer users. Creator Owner – A user who created a file or afolder. Used to automatically grant permissions to the creator of a file or folder. Network – Users who can access the system through the Network. This allows access to a system only for remote users. Interactive – Users that is registered locally. Thisallows access to a system only for local user. Anonymous Logon – Users that accessing the system through an anonymous login. It is used for anonymous access such as browsing “incognito mode”. Dial-up – Users that accessing Windows system through a dial-upconnection. New Object – User To do this you need to open Control Panel, then click Administrative Tools and then in the window open “Active Directory Users and Computers.”. Click on the right mouse button and from the menu, select new and then clickthe new user. When you select the option “password never expires” the password of a user account. This option will give that the password never expires and never will be changed Security Identifier (SID) Security Identifier (SID) – SID is a unique valuethat is assigned to a Computer user, Domain, or Domain members. Each SID consists of a SID version 48-bit code agent Security Identifier (SID) – Using command prompt run the following command “wmic useraccount get name,sid” Example SID: S-2-7-23-913267222-143260087-1542234367-500.Delegation of Control Wizard Delegation of Control Wizard it makes simpler providing rights for common tasks to standard users or administrators. At this stage we will give standard user rights to reset passwords for standard users. You need to goto Administrative Tools, then open the Active Directory Users, then right-click. At this stage, we choosing three options for an assessment purpose. We`re successfully completed the Delegation of Control Wizard. Now logging into user Account and testingthe added features.