background preloader

Networkstuff

Facebook Twitter

How to Watch Security Camera Streams on the Internet: 5 steps. Favorite This Article Edit Article Search Queries Edited by anthony eide, Josh H., Maluniu, Sondra C and 101 others Security cameras are everywhere, it seems, but what are they looking at? How much of our comings and goings do they capture? If you have ever been curious about it, we will show you not only how to see through the eyes of Big Brother, but even how you can sometimes zoom, pan, tilt, capture, and save images right from your computer! Ad Steps 1Open up your web browser. 4Manipulate the camera. Search Queries 1The list is continuously evolving so if you find a query that doesn't work, edit this page and remove it from the list.inurl:/view.shtmlinurl:ViewerFrame?

Tips You can take a screenshot or use a screen recording program to record the video stream. Warnings This does not fall within most school or business guidelines for acceptable use of their computers. How to Crack a Wi-Fi Network's WEP Password with BackTrack. How to Subnet a Network : Learn-Networking.com.

A properly designed subnet can do wonders for the security and performance of a network. The main idea in subnetting is to divide a network into smaller pieces, which we call subnets. Actually implementing a subnet is typically more difficult than simply using the default subnet mask of 255.255.255.0. This usually means that temporary or smaller networks do not need to be subnetted. Security sees benefit since the IP addresses of the host computers on each subnet are masked by the network address- which means they are invisible to the outside world. We call this network address translation, or NAT. A Basic Review on Subnetting If you’re a little rusty on the basics of subnetting, don’t worry. The current version of internet protocol, or IP, is IP version 4. Each IP address is usually represented in decimal form, as seen above as “192.168.2.1”.

The IP version 6 protocol was created for when the transition is needed. Classes One final note before we move on. Subnet Masks 1. Alright Already! Setting up a reverse SSH tunnel. Learn to forward a port on a remote machine to a local machine while initiating the SSH tunnel from the local machine. SSH is an extremely useful tool in that it allows you to do many things in a secure fashion that you might not otherwise be able to do. One of the things SSH allows you to do is to set up a reverse encrypted tunnel for data transfer. Typically, when you initiate an SSH tunnel, you forward a port on the local machine to a remote machine which can allow you to connect to an insecure service in a secure way, such as POP3 or IMAP.

However, you can also do the reverse. You can forward a port on the remote machine to the local machine while still initiating the tunnel from the local machine. This is useful if you have a service on the remote end that you want to have connected to something on the local machine, but you don't wish to open up your firewall or have SSH private keys stored on the remote machine. To set up the reverse tunnel, use: IP Subnet Mask Quick Cheat Sheet | Ask The Admin. Besides the fact that I am studying for another Microsoft test and staring at subnets all day long – I also get asked on a regular basis how many addresses can i get from a /24 subnet or what does 255.255.255.0 mean. Let me break it down for you real quick like: When you use 255.255.255.0 as your subnet you are limiting yourself to a network containing all the same ip’s except for the last number. Like 192.168.1.0 where the 0 changes. And using 255.255.0.0 Would limit you to the last two digits changing like 192.168.0.0 .

Are you with me? Check out this IP Subnet Tool Calculator – MINT! _TheSubnettingAdmiN_ FreeDNS - Free DNS - Dynamic DNS - Static DNS subdomain and domain hosting.