Anda di halaman 1dari 43

Tools used in

Computer Network
and Computer system
configuration

COMPUTER NETWORK CONFIGURATION


A network configuration is the overall design of some type of
communications network. As part of this configuration, both
software and hardware are arranged in a manner that allows
for optimum efficiency with the process of transmitting voice,
audio, and data between two or more points. A network
configuration may be local and somewhat contained, or
involve a collection of locations or nodes that are found across
the country, or even across the world.

Ping
-to reply, it will respond with packets of its
own. The ping command sends ICMP echo
request packets to a destination. For example,
you could runping google.comorping
173.194.33.174to ping a domain name or IP
address.
These packets ask the remote destination to
reply. If the remote destination is configured

Traceroute/tracert/tracpath
The traceroute, tracert, or tracepath command is similar to
ping, but provides information about the path a packet
takes. traceroute sends packets to a destination, asking
each Internet router along the way to reply when it passes
on the packet. This will show you the path packets take
when you send them between your location and a
destination.

Ip config
The ipconfig command is used on
Windows, while the ifconfig command is
used on Linux, Mac OS X, and other
Unix-like operating systems. These
commands allow you to configure your
network interfaces and view information
about them

Ns lookup

The nslookup command will look up the IP


addresses associated with a domain name. For
example, you can runnslookup
howtogeek.comto see the IP address of HowTo Geeks server. Nslookup also allows you to
perform a reverse lookup to find the domain
name associated with an IP address. For
example,nslookup 208.43.115.82will show
you that this IP address is associated with
howtogeek.com.

whois

The whois command looks up the


registration record associated with
a domain name. This can show you
more information about who
registered and owns a domain
name, including their contact
information

Netstat
- Net stat stands for network statistics.

This command displays incoming and


outgoing network connections as well as
other network information. Its available
on Windows, Mac, and Linux each
version has its own command-line
options you can tweak to see different
types of information.

finger

The finger command is old and is no longer


widely used. In theory, this command allows you
to view information about users logged onto a
remote computer. If the computer is running a
finger service or daemon, you can use the finger
command on your computer to see whos logged
in on that remote computer, their email address,
and their full name. In practice, almost no
computers are running a finger service you can
connect to.

Post scan/
nmap
The nmap utility is a common tool used for
port scans, but there are many utilities that
can run this sort of scan. A port scan is the
process of attempting to connect to every
port on a computer ports 1 through
65535 and seeing if theyre open. An
attacker might port-scan a system to find
vulnerable services. Or, you might port scan
your own computer to ensure that there are
no vulnerable services listening to the
network.

Computer system configuration


Incommunicationsorcomputer systems, a
configurationis an arrangement of
functional unitsaccording to their nature,
number, and chief characteristics. Often,
configuration pertains to the choice of
hardware, software,firmware, and
documentation. The configuration affects
system function and performance.

Windows memory diagnostic


Windows includes a Memory Diagnostic tool
that can restart your computer and test your
memory for defects, like the popular
MemTest86 application. If you want to check
your computers memory for errors, you dont
need a third-party tool just open
theWindows Memory Diagnostictool.

Resource
monitor
The Resource Monitor application offers a
detailed look at your computers resource
usage. You can view computer-wide CPU,
disk, network, and memory graphics, or
drill down and view per-process statistics
for each type of resource.
This means that you can see which
processes are using your disk or network
heavily, view which processes are
communicating with which Internet
addresses, and more. The Resource Monitor
provides much more detailed resource
statistics than the Task Manager does.

Performance
monitor
The Performance Monitor application
allows you to collect performance reports
and view them. It can be used to log
performance data over time, including
determining how system changes affect
performance, or to monitor the
performance of a remote computer in
real-time.

Computer Management and


Administrative Tools
The Performance Monitor is actually one
of many Microsoft Management Console
(MMC) tools. Many of these can be found
in theAdministrative Toolsfolder, but
they can be opened in a single window by
opening theComputer
Managementapplication. Among other
things, this window contains the following
tools:

Task Scheduler: A tool that allows you to view and


customize the scheduled tasks on your computer, in addition to creating your
own custom scheduled tasks.
Event Viewer:A log viewer that allows you to view and filter system events
everything from software installation to application crashes and
blue screens of death.
Shared Folders: An interface that displays the folders shared over the
network on your computer, useful for viewing what folders are being shared at
a glance.
Device Manager: The classic Windows Device Manager that allows you to
view the devices connected to your computer, disable them, and configure
their drivers.
Disk Management:A built-in partition manageryou can use without
downloading any third-party tools.
Services: An interface that allows you to view and control the background
services running in Windows.

Advanced user account and tool


Windows contains a hidden User Accounts utility that
provides some options not present in the standard
interface. To open it, press WinKey+R to open the Run
dialog, type eithernetplwizorcontrol
userpasswords2, and press Enter. This window also
contains a shortcut to launch theLocal Users and
Groupstool, which offers more user management
tasks, but cant be used on Home or standard
versions of Windows.

Disk Cleanup
Windows Disk Cleanup utility isnt quite as
hidden as some of the other utilities here, but
not enough people know about it. It will scan
your computer for files that can be deleted,
from temporary files and memory dumps to
old system restore points and leftover files
from Windows upgrades. It does the same job
aPC cleaning utilitydoes, but its free and
doesnt try to extract any money from you.
Advanced users may preferCCleaner, but Disk
Cleanup does a decent job.

Group Policy
Editor

The Group Policy Editor is only available on


Professional or Ultimate editions of Windows, not
the standard or Home editions. It provides a wide
variety of settings that are
designed for use by system administrators to cust
omize and lock down PCs on their networks
, but the local group policy editor also contains
some settings that average users might be
interested in. For example, on Windows 8, the
group policy editor can be used to
disable the lock screen and skip directly to the log
-in screen
.

Registry
Editor
Many tweaks that can be made in the Group
Policy Editor have equivalent tweaks that can
be made in the registry editor. For example, on
Windows 8, users with the standard edition of
Windows 8 cant disable the lock screen via the
Group Policy Editor but they can
disable the lock screen with a registry hack.

Ms config
The System Configuration window is another
classic tool that many people know about.
Prior to Windows 8, which features
a startup-program manager built into its Tas
k Manager
, this tool was the only included way of
controlling startup programs on Windows. It
also allows you to customize your boot
loader, which is particularly useful if you
have multiple versions of Windows installed.

System
Information
The System Information utility allows you to view
information about the current computer
everything from the model number of its CD-ROM
drive to its attached peripherals, configured
environment variables, and startup programs. It
doesnt provide the slickest interface, nor does it
provide all the information a third-party system
information tool like Speccy does, but it will
display a lot of system information without forcing
you to install another program.

Windows
firewall
is a software component of
MicrosoftWindowsthat provides
firewalling and packet filtering
functions. It was first included
inWindowsXP andWindowsServer
2003. Prior to the release
ofWindowsXP Service Pack 2 in
2004, it was known as Internet
ConnectionFirewall.

Thank you
for
listening!!...

Anda mungkin juga menyukai