DOWNLOADS
Guides,
Tutorials, Published Papers, and Informational Documents
Network
Evaluation provides a number of published white papers, tutorials
and step-by-step guides to assist end users in managing their
own systems, and in educating the community at large on security-related
topics. All papers, tutorials, presentations are provided as-is.
While we've made our best efforts at ensuring accuracy, errors
may exist in these, for which we offer no warranty or guarantee.
If anyone finds errors in these, please notify us by email to:
info@networkeval.com
Computer
Maintainance & Management Guides and Tutorials for Windows
Users
Computer Information
- Why is My Computer So Slow? - A list of common reasons why computers run more
slowly than usual, with references to some of Network Evaluation's
Computer Cleanup guides below.
Computer Information
- Why is My Computer Dying or Dead? - A list of common reason why computers fail partially
or completely, with suggestions on how to avoid or mitigate these
problems
Computer Cleanup
- Checking for Impending Hard Drive Failure - Step-by-step instructions with illustrations
on how to easily check your computer for possible impending hard
drive failure
Computer Cleanup
- Accurately Reporting Error Messages - Step-by-step instructions with illustrations
on how to easily save an error message for your computer support
person.
Computer Cleanup
- Checking the Hard Disk -
Step-by-step instructions with illustrations on how to easily
check your system's hard disk for problems - and repair many
of them
Computer Cleanup
- Defragmenting the Hard Disk - Step-by-step instructions with illustrations
on how to easily defragment your computer's hard disk. This is
a necessary part of good computer care.
How to
Download and Install "Spybot Search & Destroy"
- Step-by-step instructions with
illustrations on how to easily get the freely-available anti-spyware
utility "Spybot Search & Destroy" and install it
on your computer.
How to use "Spybot
Search & Destroy" -
Step-by-step instructions with illustrations on how to easily
run Spybot Search & Destroy to detect, repair, and protect
your computer from thousands of spyware programs.
How to track "suspect"
web surfing - Step-by-step
instructions with illustrations on how to check on the web surfing
habits of someone - particularly when they have tried to hide
or eliminate evidence of their activities.
How to
change file ownership -
This procedure should only be undertaken on the advice of a professional.
Technical
Information and Standards
Sample Audit Report - This
is a "sanitized" excerpt from an actual customer audit
report. It contains an Executive Summary, Observations &
Recommendations, SANS/FBI "Top 20 Vulnerability Report,
Vulnerability Testing, Full Port Scan Test Results, DNS (Name
Server) Analysis - both forward and reverse. Available as a PDF
file. (Requires Adobe Acrobat Reader).
How
and Why to read Firewall Logs
- Presented at "The Internet Security Conference" June
2001. Available as an MS-Word document and MS-PowerPoint slides.
Auditing
Inside the Enterprise via Port Scanning & Related Tools - February,
2002. Available as an MS-Word document.
Introduction
to Networking
- A set of Power Point slides introducing generalized networking
concepts. The slides are not specific to IP and cover older protocols
as well (XNS, AppleTalk, IPX, etc.)
Introduction
to IP
-
A set of Power Point slides that build on the previous introduction
to further explain the underlying structure and operation of
the Internet Protocol - often called TCP/IP.
Technical
Information and Standards
Explanation
of PING parameters
-
How to make effective use of this venerable and useful tool.
(Text File)
Undocumented
Port Numbers
-
One of many lists describing undocumented port numbers. This
list is based on observed behavior on networks, and includes
many ports not documented elsewhere. It also attempts to describe
certain port behavior where the underlying source or mechanism
is unknown.
Recommended
Wireless Security Practices - Intended
for corporate environments. Comments are invited. (PDF file)
Simplified
Wireless Security Practices - Similar
to the document above, but aimed at home users, or other small
environments. (PDF file)
Utilities
written in PERL, Bourne Shell or C
Provided
as-is, without formal support: Intended as examples for those
users wishing to write their own.
Network
Evaluation provides a number of scripts as examples for the community
to adapt and enlarge upon. All of these have been used in production
environments on a regular basis to speed up, automate, or sift
through large amounts of data to produce useful reports or analyses.
Most require PERL.
PERL
Log Parsing script
- Parses
long system log files and reduces the data into summary format.
Based on the format of Cisco PIX firewall logs: can be easily
adapted to other layouts.
Drive
Mapping Perl Script for Legion Sharename Lists - Uses
a list of known sharenames from Legion, NetScanToolsPro, and
others as input and writes an MS-DOS batch file which makes a
connection to each share in turn, and tests and reports on which
ones are writeable.
Other
Guides and Tutorials
How to Change the
IP address for a pcAnywhere Client - Testing
How to
Uninstall / Reinstall the Network Adapter in Windows XP
- Testing
Private and Public
key setup for automated secure copy - Testing |