DOWNLOADS

Guides, Tutorials, Published Papers, and Informational Documents

Network Evaluation provides a number of published white papers, tutorials and step-by-step guides to assist end users in managing their own systems, and in educating the community at large on security-related topics. All papers, tutorials, presentations are provided as-is. While we've made our best efforts at ensuring accuracy, errors may exist in these, for which we offer no warranty or guarantee. If anyone finds errors in these, please notify us by email to: info@networkeval.com

Computer Maintainance & Management Guides and Tutorials for Windows Users

Computer Information - Why is My Computer So Slow? - A list of common reasons why computers run more slowly than usual, with references to some of Network Evaluation's Computer Cleanup guides below.

Computer Information - Why is My Computer Dying or Dead? - A list of common reason why computers fail partially or completely, with suggestions on how to avoid or mitigate these problems

Computer Cleanup - Checking for Impending Hard Drive Failure - Step-by-step instructions with illustrations on how to easily check your computer for possible impending hard drive failure

Computer Cleanup - Accurately Reporting Error Messages - Step-by-step instructions with illustrations on how to easily save an error message for your computer support person.

Computer Cleanup - Checking the Hard Disk - Step-by-step instructions with illustrations on how to easily check your system's hard disk for problems - and repair many of them

Computer Cleanup - Defragmenting the Hard Disk - Step-by-step instructions with illustrations on how to easily defragment your computer's hard disk. This is a necessary part of good computer care.

How to Download and Install "Spybot Search & Destroy" - Step-by-step instructions with illustrations on how to easily get the freely-available anti-spyware utility "Spybot Search & Destroy" and install it on your computer.

How to use "Spybot Search & Destroy" - Step-by-step instructions with illustrations on how to easily run Spybot Search & Destroy to detect, repair, and protect your computer from thousands of spyware programs.

How to track "suspect" web surfing - Step-by-step instructions with illustrations on how to check on the web surfing habits of someone - particularly when they have tried to hide or eliminate evidence of their activities.

How to change file ownership - This procedure should only be undertaken on the advice of a professional.

Technical Information and Standards

Sample Audit Report - This is a "sanitized" excerpt from an actual customer audit report. It contains an Executive Summary, Observations & Recommendations, SANS/FBI "Top 20 Vulnerability Report, Vulnerability Testing, Full Port Scan Test Results, DNS (Name Server) Analysis - both forward and reverse. Available as a PDF file. (Requires Adobe Acrobat Reader).

How and Why to read Firewall Logs - Presented at "The Internet Security Conference" June 2001. Available as an MS-Word document and MS-PowerPoint slides.

Auditing Inside the Enterprise via Port Scanning & Related Tools - February, 2002. Available as an MS-Word document.

Introduction to Networking - A set of Power Point slides introducing generalized networking concepts. The slides are not specific to IP and cover older protocols as well (XNS, AppleTalk, IPX, etc.)

Introduction to IP - A set of Power Point slides that build on the previous introduction to further explain the underlying structure and operation of the Internet Protocol - often called TCP/IP.

Technical Information and Standards

Explanation of PING parameters - How to make effective use of this venerable and useful tool. (Text File)

Undocumented Port Numbers - One of many lists describing undocumented port numbers. This list is based on observed behavior on networks, and includes many ports not documented elsewhere. It also attempts to describe certain port behavior where the underlying source or mechanism is unknown.

Recommended Wireless Security Practices - Intended for corporate environments. Comments are invited. (PDF file)

Simplified Wireless Security Practices - Similar to the document above, but aimed at home users, or other small environments. (PDF file)

Utilities written in PERL, Bourne Shell or C


Provided as-is, without formal support: Intended as examples for those users wishing to write their own.

Network Evaluation provides a number of scripts as examples for the community to adapt and enlarge upon. All of these have been used in production environments on a regular basis to speed up, automate, or sift through large amounts of data to produce useful reports or analyses. Most require PERL.

PERL Log Parsing script - Parses long system log files and reduces the data into summary format. Based on the format of Cisco PIX firewall logs: can be easily adapted to other layouts.

Drive Mapping Perl Script for Legion Sharename Lists - Uses a list of known sharenames from Legion, NetScanToolsPro, and others as input and writes an MS-DOS batch file which makes a connection to each share in turn, and tests and reports on which ones are writeable.

 

Other Guides and Tutorials

How to Change the IP address for a pcAnywhere Client - Testing

How to Uninstall / Reinstall the Network Adapter in Windows XP - Testing

Private and Public key setup for automated secure copy - Testing

Meeting Network Security & Control Requirements: (408) 395-3921