How to Create an Emergency Repair Disk

Written by Stephen Bucaro

---------------------------------------------------------- Permission is granted forrepparttar below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made andrepparttar 107831 byline, copyright, andrepparttar 107832 resource box below is included. ---------------------------------------------------------- How to Create an Emergency Repair Disk

By Stephen Bucaro

If your operating system is Windows XP Professional or Windows 2000, it isn't bootable with a boot disk. With these operating systems you need an Emergency Repair Disk that works withrepparttar 107833 systems built-in repair functions.

Note: Windows XP Home Edition doesn't use an Emergency Repair Disk, instead it usesrepparttar 107834 Windows Me style System Restore feature.

To create an Emergency Repair Disk, prepare a formatted floppy disk and label it "Emergency Repair Disk" along withrepparttar 107835 date and specify which computer it was made with. An Emergency Repair Disk is specific torepparttar 107836 system that you created it on.

Click Start | Programs | Accessories | System Tools | Backup. The Backup utility window will appear. Click onrepparttar 107837 "Emergency Repair Disk" button. When prompted to, insertrepparttar 107838 formatted floppy disk that you prepared intorepparttar 107839 floppy disk drive. Setrepparttar 107840 check box to also backuprepparttar 107841 registry. Then click onrepparttar 107842 "OK" button.

Afterrepparttar 107843 Emergency Repair Disk has been written, clickrepparttar 107844 "OK" button and removerepparttar 107845 disk.

If your computer fails to start,repparttar 107846 Emergency Repair Disk will help you repair your system files. it works with information stored in your computers C:WINNT/repair folder.

To userepparttar 107847 Emergency Repair Disk to restore your computer:

1. Make sure your BIOS is configured to boot fromrepparttar 107848 CD-ROM Drive. Then start your computer from your Windows XP Professional or Windows 2000 setup CD. You may be prompted to press a key to boot fromrepparttar 107849 CD-ROM drive.

The security risks and ways to decrease vulnerabilities in a 802.11b wireless environment

Written by Richard Johnson

This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. Wireless networks have not been around for many years. Federal Express has been using a type of wireless networks, common torepparttar 802.11 networks used today, butrepparttar 107830 general public has recently just started to use wireless networking technology. Because of weak security that exists in wireless networks, companies such as Best Buy have decided to postponerepparttar 107831 roll-out of wireless technology. The United States Government has done likewise and is suspendingrepparttar 107832 use of wireless until a more universal, secure solution is available.


What is Wireless?

Wireless LANs or Wi-Fi is a technology used to connect computers and devices together. Wireless LANs give persons more mobility and flexibility by allowing workers to stay connected torepparttar 107833 Internet and torepparttar 107834 network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site.

Besides being very simple to install, WLANs are easy to understand and use. With few exceptions, everything to do with wired LANs applies to wireless LANs. They function like, and are commonly connected to, wired Ethernet networks.

The Wireless Ethernet Compatibility Alliance [WECA] isrepparttar 107835 industry organization that certifies 802.11 products that are deemed to meet a base standard of interoperability. The first family of products to be certified by WECA is that based onrepparttar 107836 802.11b standard. This set of products is what we will be studying. Also more standards exist such as 802.11a and 802.11g.

The original 802.11 standard was published in 1999 and provides for data rates at up to 2 Mbps at 2.4 GHz, using either FHSS or DSSS. Since that time many task groups have been formed to create supplements and enhancements torepparttar 107837 original 802.11 standard.

The 802.11b TG created a supplement torepparttar 107838 original 802.11 standard, called 802.11b, which has becomerepparttar 107839 industry standard for WLANs. It uses DSSS and provides data rates up to 11 Mbps at 2.4 Ghz. 802.11b will eventually be replaced by standards which have better QoS features, and better security.

Network Topology

There are two main topologies in wireless networks which can be configured: Peer-to-peer (ad hoc mode) – This configuration is identical to its wired counterpart, except withoutrepparttar 107840 wires. Two or more devices can talk to each other without an AP.

Client/Server (infrastructure networking) – This configuration is identical to its wired counterpart, except withoutrepparttar 107841 wires. This isrepparttar 107842 most common wireless network used today, and what most ofrepparttar 107843 concepts in this paper apply to.

Benefits of Wireless LANs

WLANs can be used to replace wired LANs, or as an extension of a wired infrastructure. It costs far less to deploy a wireless LAN than to deploy a wired one. A major cost of installing and modifying a wired network isrepparttar 107844 expense to run network and power cables, all in accordance with local building codes. Example of additional applications whererepparttar 107845 decision to deploy WLANs include: Additions or moves of computers. Installation of temporary networks Installation of hard-to-wire locations

Wireless LANs give you more mobility and flexibility by allowing you to stay connected torepparttar 107846 Internet and torepparttar 107847 network as you roam.

Cons of Wireless LANs

Wireless LANs are a relatively new technology which has only been around since 1999. With any new technology, standards are always improving, but inrepparttar 107848 beginning are unreliable and insecure. Wired networks send traffic over a dedicated line that is physically private; WLANs send their traffic over shared space, airwaves. This introduces interference from other traffic andrepparttar 107849 need for additional security. Besides interference from other wireless LAN devices,repparttar 107850 2.4 GHz is also used by cordless phones and microwaves.

Security Issues of WLANs

War-driving War-driving is a process in which an individual uses a wireless device such as a laptop or PDA to drive around looking for wireless networks. Some people do this as a hobby and map out different wireless networks which they find. Other people, who can be considered hackers, will look for wireless networks and then break intorepparttar 107851 networks. If a wireless is not secure, it can be fairly easy to break intorepparttar 107852 network and obtain confidential information. Even with security, hackers can breakrepparttar 107853 security and hack. One ofrepparttar 107854 most prevalent tools used on PDAs and Microsoft windows devices is, Network Stumbler, which can be downloaded at Equipped withrepparttar 107855 software and device, a person can map out wireless access points if a GPS unit is attached. Adding an antenna torepparttar 107856 wireless card increasesrepparttar 107857 capabilities of Wi-Fi. More information can be found at: and to name a few.

War-chalking War-chalking is a method of marking wireless networks by using chalk most commonly. War-driving is usuallyrepparttar 107858 method used to search for networks, and thenrepparttar 107859 person will markrepparttar 107860 network with chalk that gives information aboutrepparttar 107861 network. Some ofrepparttar 107862 information would include, whatrepparttar 107863 network name is, whetherrepparttar 107864 network has security, and possiblyrepparttar 107865 contact information of who ownsrepparttar 107866 network. If your wireless network is War-chalked and you don't realize it, your network can be used and/or broken into faster, because of information shown about your network.

Eavesdropping & Espionage Because wireless communication is broadcast over radio waves, eavesdroppers who just listen overrepparttar 107867 airwaves can easily pick up unencrypted messages. These intruders put businesses at risk of exposing sensitive information to corporate espionage. Wireless LAN Security – What Hackers Know That You Don't Copyright 2002

Internal Vulnerabilities Within an organization network security can be compromised by ways such as, Rouge WLANs (or Rouge Aps), Insecure Network Configuration, and Accidental Associations to name a few.

Rouge Access Points – An employee of an organization might hook up an access point withoutrepparttar 107868 permission or even knowledge of IT. This is simple to do, all a person has to do is plug an Access point or wireless router into an existing live LAN jack and they are onrepparttar 107869 network. One statistic in 2001 by Gartner said that, “at least 20 percent of enterprises already have rouge access points.” Another type of attack would be if, someone from outsiderepparttar 107870 organization, enters intorepparttar 107871 workplace and adds an Access Point by means of Social Engineering.

Cont'd on page 2 ==> © 2005
Terms of Use