Backup Software- Dont Buy It!

Computer Backup- Forget About It! Backup Software is for the birds! Computer Backup is too hard, too much trouble and a pain in the butt. Lets just forget about it. Backup Software is touted as the savior of your computers critical business and personal files. They claim that all computer hard drives (where our files … Continue reading Backup Software- Dont Buy It!

Computer Backup- Forget About It!

Backup Software is for the birds! Computer Backup is too hard, too much trouble and a pain in the butt. Lets just forget about it.

Backup Software is touted as the savior of your computers critical business and personal files. They claim that all computer hard drives (where our files are stored) eventually will have a 100% failure rate. They try to tell us that the failure of our hard drives is just a matter of WHEN, not IF.

Do your backups they shout!

Poppycock!

BACKUP SOFTWARE- LETS GET REAL

You and I know the real story. The real story is that new computers are so well made that they almost never fail, right?

Therefore, we dont need to worry about buying backup software and setting up a computer backup system, do we? It would just be a waste time– for sure!

After all we know that all the press about hard drive failures, natural disasters and terrorist attacks is just a conspiracy by the backup software companies to get us to buy their products.

Personally I never had a hard drive failure (that I recall). If my computer stops working for whatever reason, thats life.

Therefore, I ignore these software backup companies that try to push their backup software products on the unsuspecting public even though they make data and file restorations easy. I dont give them the time of day.

Therefore as you see, I dont need backup software, do you? Of course not.

BACKUP SOFTWARE- STARTING OVER WITHOUT IT IS EASY

In the unlikely event that I got a virus or a bunch of spyware on my computers Ill just bite the bullet and move on. After all, if I lost all my data to a virus, then so what? Who needs backup software?

Heck, Id just buy a new computer and begin again and Id still wouldnt need backup software because its just too much hassle.

If ALL my business data was lost due to a hard drive crash or virus corruption then Id just start my business over. No big deal. Its not that hard, right? Using backup software is just a pain.

BACKUP SOFTWARE FOOLISHNESS

So by now were all agreed that using backup software for computer backup is just for the foolish, right? Right.

Who would want to use backup software that automatically and easily backs up EVERYTHING on your computer hard drive to a DVD Rewriteable disk or USB external hard drive? That would mean you could easily recover from any computer disaster. That makes too much sense and is far too logical.

They claim that backup software is a virtual computer insurance policy against fire, flood, theft, earthquake, hurricanes, tornados and terrorist attacks.

Balderdash!

Ridiculous.

Hey, the businesses who survived Hurricane Katrina didnt need backup software did they? OK, OK I admit a lot of businesses without backup software and off site backup lost EVERYTHING and now they cannot recover their data and reconstitute their business. But thats life. Now these businesses and their employees can now move on to something new. How exciting!

Look, life without backup software is just so much more interesting.

By the way, did I tell you how much I enjoy playing Russian Roulette?

Did I neglect to mention my brief stay (it was really was only a few days) at the mental hospital? Ahh, thats ancient history. Lets get back to the present.

BACKUP SOFTWARE- THE PRESENT DAY

Want to hear something silly? My friend Ben down in New Orleans owned an insurance company. It made a very good living for him and his family. He didnt believe in backup software either. All his computers were destroyed by Hurricane Katrina.

Ben just laughed and said, No problem, this disaster gives me the chance to write the Great American Novel that Ive always dreamed of writing.

What about his 10 employees and his thousands of customers he was asked? Ben said, Heck, things always work out for the best dont they?

What about the income from the business that supported his family he was asked? Ben said, Oh, FEMA (Federal Emergency Management Agency) told me they would take care of us and not to worry.

See, Ben is all set and is none the worse for wear even though he didnt have backup software.

BACKUP SOFTWARE LESSONS

So boys and girls what have we learned about this backup software thing?

* If we dont have backup software, so what, it just makes life after a hard drive crash more interesting and fun.

* After a natural disaster that destroys your computers, FEMA will make it OK.

* All the hubbub about backup software is just a bunch of advertising hype to sell product.

* Just because you like to play Russian Roulette, you arent really crazy.

FINALLY- BACKUP SOFTWARE FOLLYIES

I know another guy, Carl Jordan, who is crazier than I am. Carl and the rest of the loonies at Tweak All Consultants actually believe backup software can save your bacon.

In my own strange way I try to be fair and balanced. Therefore
if you disagree with me check out the About the Author Resource Box below for a link to Carl’s opposing view.

Now, wheres my medication? My meds really smooth me out. They also help me forget about rational things like computer backup and backup software.

Cisco CCNA Exam Tutorial And Case Study: VLANs And IP

Cisco CCNA Exam Tutorial And Case Study: VLANs And IP Connectivity

In this CCNA case study, we’ll take some basic switching and trunking theory and put it into action. We have two routers (R2 and R3) along with two switches (SW1 and SW2). R2 is connected to SW1 at fast 0/2, and R3 is connected to SW2 at fast 0/3. Both routers have IP addresses on the 172.12.23.0 /24 network.

For these routers to be able to ping each other, the switches must be able to communicate. These are two 2950 switches, and they’re connected via two crossover cables. Before we worry about the router connectivity, let’s make sure the trunk link is up between the switches with the “show interface trunk” command.

SW2#show interface trunk

Port Mode Encapsulation Status Native vlan

Fa0/11 desirable 802.1q trunking 1

Fa0/12 desirable 802.1q trunking 1

< output truncated for clarity >

The default mode of these switches is for the ports to run in dynamic desirable trunking mode, so we didn’t even need to write a configuration to have the trunk form – it’s already there!

Show vlan brief reinforces the theory that by default, all switch ports are placed into VLAN 1 (except the trunk ports).

R2 and R3s Ethernet addresses have already been configured, the trunk line is operational, and both ports are in VLAN 1. We’ll ping R2s Ethernet interface from R3, and then R3s Ethernet interface from R2 to verify IP connectivity.

R2#ping 172.23.23.3

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.3, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms

R3#ping 172.23.23.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.2, timeout is 2 seconds:
!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms

With pings, exclamation points indicate IP connectivity, and periods indicate no connectivity.

So we’ve got connectivity! Now let’s see if we still have that connectivity when the ports are placed into different VLANs. Cisco CCNA theory states that devices in different VLANs can’t communicate without the intervention of a Layer 3 device, but let’s see if that’s true by placing R2 into VLAN 23. (VTP is already running on these switches.)

SW1#conf t

Enter configuration commands, one per line. End with CNTL/Z.

SW1(config)#int fast 0/2

SW1(config-if)#switchport mode access

SW1(config-if)#switchport access vlan 23

SW1(config-if)#^Z

Now that R2 and R3 are in separate VLANs, can they still send pings back and forth?

R2#ping 172.23.23.3

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.3, timeout is 2 seconds:
…..

Success rate is 0 percent (0/5)

R3#ping 172.23.23.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.2, timeout is 2 seconds:
…..

No, they cant. The difference is that theyre now in separate VLANs, and devices in different VLANs cant communicate unless routing is taking place somewhere. Here, no routing is taking place, so the pings dont go through.

Put R3s switch port into VLAN 23, and try the ping again.

SW2#conf t

Enter configuration commands, one per line. End with CNTL/Z.

SW2(config)#interface fast0/3

SW2(config-if)#switchport mode access

SW2(config-if)#switchport access vlan 23

R3#ping 172.23.23.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.2, timeout is 2 seconds:
!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms

R2#ping 172.23.23.3

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 172.23.23.3, timeout is 2 seconds:
!!!!!

Now that R2 and R3 are in the same VLAN, pings can go through. This just proves the theory – that inter-VLAN communicate requires a Layer 3 device. Layer 3 switches are becoming more and more popular, but router-on-a-stick is still around – and we’ll see how to configure that in our next tutorial!

Avoid Spam And Find MySpace Layouts

Using various MySpace layouts will sound very exciting, but at the same time users will have to check if the sites they access are free. This will include even links that are hidden in others profiles. While many users go to sites and start looking for layouts, they forget that there could be a lot of spam out there. Most of the designers who are part of MySpace layouts do indulge in free advertising.

As a result of this, there could be plenty of links exchange on the sites. Once the users begin to apply the layout to the profile, they are automatically inviting spam as well without knowing it. Thus a lot of care must be taken to pick the right MySpace layouts from the right sites. Most members on MySpace will get hooked to the use of the layouts.

Once they are hooked, they begin looking on sites with the help of search engines. And once this is done, there is really no need for them to look elsewhere, is what they think. They are wrong however; as there is the need to look through many sites before exploring for the right one and applying it. It should also be a good design besides being spam free.

So, just because all MySpace layouts are found on various sites, it does not mean that they can be immediately found. No one should be in a hurry to find the layout for their MySpace profile. Instead a lot of time and effort must be taken to do the needful. They must also be patient, as it might be difficult for users to find the right sites.

Since there are so many sites available on the Internet, that too exclusively for MySpace layouts a lot of research needs to be done. If you really want to make your profile interesting, then you will have to take a lot of time to understand where you need to find these layouts. They can be found on reputed sites, and these you can find with the help of other users.

Most of the users on MySpace community are bound to have the use of layouts from other sites. This will be a highlight for the others. They can take suggestions, and they can then apply the layouts on their own profiles. They should be thought of well before being used, in the context that they are safe for the profile. You should ensure that your profile is not hidden with various links.

If you are familiar with the Internet, you will know which are the sites that can be avoided, and which ones can be used. For those who do not know, they should seek advice from those who know. This would help them make their profiles better. Not only do they have interesting profiles, they also have safe profiles.

How To Configure SSH (Secure Shell) For Remote Login On

How To Configure SSH (Secure Shell) For Remote Login On A Cisco Router

Prior to the introduction of SSH in the Cisco IOS, the only remote login protocol was Telnet. Although quite functional, Telnet is a non-secure protocol in which the entire session, including authentication, is in clear text and thus subject to snooping.

SSH is both a protocol and an application that replaces Telnet and provides an encrypted connection for remote administration of a Cisco network device such as a router, switch, or security appliance.

The Cisco IOS includes both an SSH server and an SSH client. This document is concerned only with the configuration of the SSH server component.

Prerequisites

Software

The SSH server component requires that you have an IPSec (DES or 3DES) encryption software image from Cisco IOS Release 12.1(1)T or later installed on your router. Advanced IP services images include the IPSec component. This document was written using c2800nm-advipservicesk9-mz.123-14.T5.bin.

Pre-configuration

You must configure a hostname and a domain name on your router. For example:

router#
router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
router01(config)#hostname router01
router01(config)#ip domain-name soundtraining.net

You must also generate an RSA keypair for your router which automatically enables SSH. In the following example, note how the keypair is named for the combination of hostname and domain name that were previously configured. The modulus represents the key length. Cisco recommends a minimum key length of 1024 bits (even though the default key length is 512 bits):

router01(config)#
router01(config)#crypto key generate rsa
The name for the keys will be: router01.soundtraining.net
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys …[OK]

Finally, you must either use an AAA server such as a RADIUS or TACACS+ server or create a local user database to authenticate remote users and enable authentication on the terminal lines. For the purpose of this document, we’ll create a local user database on the router. In the following example, the user “donc” was created with a privilege level of 15 (the maximum allowed) and given an encrypted password of “p@ss5678”. (The command “secret” followed by “0” tells the router to encrypt the following plaintext password. In the router’s running configuration, the password would not be human readable.) We also used line configuration mode to tell the router to use its local user database for authentication (login local) on terminals lines 0-4.

router01(config)#username donc privilege 15 secret 0 p@ss5678
router01(config)#line vty 0 4
router01(config-line)#login local

Enabling SSH

To enable SSH, you must tell the router which keypair to use. Optionally, you can configure the SSH version (it defaults to SSH version 1), authentication timeout values, and several other parameters. In the following example, we told the router to use the previously created keypair and to use SSH version 2:

router01(config)#
router01(config)#ip ssh version 2
router01(config)#ip ssh rsa keypair-name router01.soundtraining.net

You can now log on to your router securely using an SSH client such as TeraTerm.

Viewing SSH Configurations and Connections

You can use the privileged mode commands “view ssh” and “view ip ssh” to view SSH configurations and connections (if any). In the following example, the SSHv1 configuration from a Cisco 871 router is verified using “show ip ssh” and a single SSHv1 connection is displayed using the command “show ssh”. Notice that we did not enable SSHv2 on this router, so it defaulted to SSH version 1.99. Also note in the output of the “show ssh” command that SSH version 1 defaults to 3DES. SSHv2 supports AES, a more robust and efficient encryption technology. SSHv2 is also not subject to the same security exploits as SSHv1. soundtraining.net recommends the use of SSHv2 and disabling a dropback to SSHv1. Enabling SSHv2 disables SSHv1. This example is included only to demonstrate backwards compatibility:

router04#
router04#show ip ssh
SSH Enabled – version 1.99
Authentication timeout: 120 secs; Authentication retries: 3
router04#
router04#show ssh
Connection Version Encryption State Username
2 1.5 3DES Session started donc
%No SSHv2 server connections running.
router04#

You can also use the command “debug ip ssh” to troubleshoot SSH configurations.