Utilize Windows https://www.utilizewindows.com Information Technology Info Tue, 01 Sep 2020 15:17:08 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.1 https://www.pgpisos.com.br/?big=uwwp/wp-content/uploads/2016/12/cropped-UtilizeWindows_Icon-32x32.png Utilize Windows https://www.utilizewindows.com 32 32 103703577 Difference between WEP, WPA, WPA2, WPA3, WPS WiFi Security https://www.pgpisos.com.br/?big=difference-between-wep-wpa-wpa2-wpa3-wps-wifi-security/ https://www.pgpisos.com.br/?big=difference-between-wep-wpa-wpa2-wpa3-wps-wifi-security/#respond Tue, 01 Sep 2020 19:14:36 +0000 https://www.pgpisos.com.br/?big=?p=2023 Read more]]> Most of us had connected to a WiFi network with our laptop, tablet or smartphone, and to join that network we had to select a network name and supply a password. Supplying a password implies (better) security, but there are different methods and protocols that are used in wireless networks to ensure security, some being less secure and some being more secure. Different WiFi security protocols include WEP, WPA, WPA2, WPA3 and WPS.

Open WiFi network

WiFi network can be just open with no password required. That means that anybody can join it. However in the majority of cases WiFi networks will be secured and will require a password. There are several different protocols that are used for securing a Wi-Fi network, and the oldest one being WEP.

WEP (Wired Equivalent Privacy)

WEP or Wired Equivalent Privacy was developed in 1999 and it’s the earliest security protocol that was used for wireless networks. As its name implies, it’s meant to supply the same security to wireless networks as it did for wired networks.

However, this turned out not to be the case. After some time it turned out that a 40-bit encryption key that WEP used was vulnerable and not secure, and therefore was easily hackable. That’s why today WEP is no longer used and modern WiFi routers won’t even have it as an option anymore. So a better security protocol was needed for wireless networks, and that brings us to WPA.

WPA (Wi-Fi Protected Access)

WPA or Wi-Fi Protected Access is another wireless security protocol that was developed to solve the problems of WEP. WPA is far better than WEP and this is because it uses a stronger encryption method called TKIP which stands for Temporal Key Integrity Protocol. TKIP dynamically changes its keys as it’s being used and this ensures data integrity.

Even though WPA is more secure than WEP, today even WPA is outdated because TKIP did have some vulnerabilities. And that brings us to WPA2.


WPA2 was developed to provide even stronger security than WPA, and it does this by requiring the use of a stronger encryption method. While WPA uses TKIP for encryption, which is known to have some limitations, WPA2 uses AES which stands for Advanced Encryption Standard.

AES uses a symmetric encryption algorithm and it is strong enough to resist a brute-force attack. AES is so secure that the U.S. federal government has adopted it and is now using it to encrypt sensitive government data.

WPA / WPA2 combined

On some WiFi routers there will be an option which includes both WPA and WPA2 protocols. This is a mixed security option which enables WPA and WPA2 at the same time, using both TKIP and AES security.

The reason for this option is for compatibility purposes because some older devices like prior to 2006 may not be compatible with using AES encryption that’s used in WPA2. These older devices will connect to the older WPA protocol but at the same time modern devices will connect to WPA2.

Why not just choose the mixed option all the time, since it’s the most compatible with all devices? Well you can do this but the problem is that in addition to using AES it’s also using TKIP. Since TKIP is not as strong as AES you’re leaving your network more vulnerable to a breach. If all of your devices are modern then the best option is to choose WPA2 which only uses AES.


The next generation of wireless security is WPA3. WPA3 was introduced in 2018 and according to the official WiFi website https://www.wi-fi.org/, WPA3 provides cutting edge security protocol to the market. It adds new features to simplify WiFi security and enable more robust authentication, and provide increased protection from password guessing attempts.

So far we discussed a few password protected security protocols, but there is another wireless security method that doesn’t require you to type in a password. This method is called WPS.

WPS (WiFi Protected Setup)

WPS stands for WiFi Protected Setup and it was designed to make it as easy as possible for devices to join a wireless network. There are a couple of different methods that are used with WPS, but the most common one is the ‘push button’ method.

For example, most routers today will have a physical WPS button that you can press. Let’s say that you have a printer which also has a WPS button, so to connect this wireless printer to your WiFi network you would press the WPS button on your WiFi router and within 2 minutes you would press the WPS button on your printer. This would initiate a connection process and your printer would connect to the Wi-Fi router in a few seconds. Another method is to use a WPS pin number during the WPS connection process.

WPS is the easiest way to join a wireless network and a lot of manufactures have built their wireless products with WPS. There’s one more method we need to talk about and this is called the Access Control or in some routers it’s called the MAC Filter.

Access Control / MAC Filter

With Access Control feature you can either allow or block devices from joining your network. Every network adapter has a MAC address (MAC address is a hexadecimal number that uniquely identifies each device on a network). With Access Control you can either allow or block access by using the device’s MAC address. When a device is blocked it would only be able to get an IP address from your router but it won’t be able to communicate with any other device and it would not be able to connect to the Internet. The Access Control is just an extra layer of security that’s in addition to your WiFi password. However, keep in mind that MAC address can be easily spoofed.

https://www.pgpisos.com.br/?big=difference-between-wep-wpa-wpa2-wpa3-wps-wifi-security/feed/ 0 2023
What are FTP, SFTP, FTPS & TFTP and their differences https://www.pgpisos.com.br/?big=what-are-ftp-sftp-ftps-tftp-and-their-differences/ https://www.pgpisos.com.br/?big=what-are-ftp-sftp-ftps-tftp-and-their-differences/#respond Mon, 17 Aug 2020 18:58:06 +0000 https://www.pgpisos.com.br/?big=?p=2006 Read more]]> FTP, SFTP, FTPS and TFTP are protocols that are used to transfer files over a network.


FTP stands for File Transfer Protocol. This is a standard protocol that is used to transfer files between computers and servers over a network, such as the Internet. In a nutshell, FTP is the language that computers use to transfer files over a TCP/IP network.

For example, if someone anywhere in the world wanted to make their files available for other people to download, all they would have to do is upload their files to the FTP server and then other people from anywhere in the world can simply connect to that FTP server and download the files using the FTP protocol.

For this, we can use a dedicated FTP server or we can also configure our own computer to act as an FTP server. For example, in Microsoft Windows this can be done using the Internet Information Services Manager.

FTP servers usually require an account with a username and password, but sometimes you can just log in anonymously. It just depends on what type of authentication that the owner of the FTP server has set up. It’s also important to note that FTP is a connection-oriented protocol that uses TCP for file transfer, meaning it guarantees file delivery.

There are a couple of ways to transfer files using FTP. You can use your standard Internet browser or you can use an FTP client. For example, using web browser you would simply type in the address of the FTP server that you want to connect to, just as if you were going to a regular web site. Let’s say that the web address of the FTP server is ftp.example.com. For this you would type the address ftp://ftp.example.com/ as the URL in your web browser. Normally, if you were going to a regular web site, the prefix would be ‘http://’, but since we are going to an FTP site, the prefix is ‘ftp://’. Once you are connected to the FTP server, you will have a view of files and folders on the server. From here you can browse different folders that’s on the FTP server depending on what the owner has made available, and then you can view and download what you want.

Another way that you can connect to an FTP server is by using an FTP client. There are a number of FTP clients that you can use, but probably the most popular free FTP client is called FileZilla, which you can download for free. Advantage of using an FTP client is that it provides a graphical user interface and a better overall experience than using a web browser. The first step is to set up a connection by providing the address of the FTP server along with a username and password if required and the port number (common port for FTP is 21). Once connected, you will usually have the left pane where you will have the files and folders on your local computer, and the right pane where you have a view of the files and folders that are on the remote FTP server. From here you can just click or drag and drop files from the FTP server. To download files to your computer just click on them or drag them over from the right pane to the left pane. If you have proper permissions you can also upload files from your computer to the FTP server by dragging them from the left pane to the right pane.

Transferring files between computers is a common use of FTP, especially when you’re transferring files in bulk. Another common use of using FTP is to give the ability of website designers to upload files to their web servers.

The main drawback of using FTP is that it’s not a secure protocol, meaning that the data that’s being transferred is not encrypted. All data is sent in clear text which can cause security concerns. Because of that, FTP should only be used on a limited basis, or on only trustworthy networks, or if the data that’s being transferred is not sensitive.

If you’re going to transfer data that needs to be protected, a more secure transfer protocol should be used, and that’s where SFTP comes.


SFTP stands for Secure File Transfer Protocol. Secure FTP is just like FTP, except that it adds a layer of security. Using secure FTP the data is actually encrypted using Secure Shell (SSH) during data transfer (no data is sent in clear text). Secure FTP authenticates both the user and the server and it uses port 22.


FTPS stands for File Transfer Protocol Secure. So, there are two secure variations of FTP: SFTP and FTPS. FTPS uses SSL/TLS, and the biggest difference between Secure FTP (SSH) and FTP Secure (SSL/TLS) is that the latter is able to make use of TLS/SSL certificates issued from a CA in order to transfer data, making it very secure.

There are two incompatible variants of FTPS: explicit and implicit. FTPS explicit is the most recent and most widely used variant. FTPS implicit is older and is generally being phased out. FTP and FTPS explicit can coexist on the same port (usually 21), in fact FTPS explicit connections start out as FTP connections before being switched to SSL/TLS. FTPS implicit requires its own dedicated port (usually 990).

The main difference between the FTP and FTPS ports’ usage is the expected security behavior of clients and servers communicating through them. A server that receives a request via Port 990 will immediately perform an SSL handshake, because connection via that port implies the desire for a secure connection (Implicit security). Control connections established via Port 21 will require an additional AUTH command to invoke security (known as Explicit security because the client must explicitly ask to secure the connection).


TFTP stands for Trivial File Transfer Protocol. This is a very simple File Transfer Protocol. It is not used to transfer files over the Internet like FTP, SFTP or FTPS does. It’s mainly used for transferring files within a local area network. For example, it’s often used to transfer configuration files and firmware images to network devices such as firewalls and routers. It uses port 69.

TFTP is something that most people will never use, and unlike FTP and Secure FTP that use the TCP protocol for file transfer, TFTP is a connection-less protocol that uses UDP instead. Because it uses UDP instead of TCP, it’s an unreliable transfer protocol. TFTP does not provide any security during the transfer.

If you’re not familiar with TCP and UDP, read our introduction that explains the difference between the TCP and UDP protocols.

https://www.pgpisos.com.br/?big=what-are-ftp-sftp-ftps-tftp-and-their-differences/feed/ 0 2006
What is Port Forwarding https://www.pgpisos.com.br/?big=what-is-port-forwarding/ https://www.pgpisos.com.br/?big=what-is-port-forwarding/#respond Mon, 13 Jul 2020 13:11:09 +0000 https://www.pgpisos.com.br/?big=?p=2001 Read more]]> Port forwarding allows computers over the Internet to connect to a specific computer or service within a private network. It’s basically making your computer accessible over the Internet, even though you’re behind a router.

For example, let’s say a friend of yours at their home wants to remotely control your computer at your home using a service such as Remote Desktop. Now, Remote Desktop Connection is a service built into Microsoft Windows that enables you to connect to another computer running Microsoft Windows. Once you’re connected to the remote computer you can use that computers programs and files just as if you were sitting in front of it.

Your friend is ready to connect to your computer, so he starts up the Remote Desktop connection and sends the request to your public IP address with a specific port number. A port is a logical connection that is used by programs and services to exchange information. Ports uniquely identify these programs and services that are running on a computer.

In the case of Remote Desktop, it uses port 3389, so the request with that port number will make its way through the Internet to your router. Once it reaches your router, your router needs to know where to forward the request for port 3389. Without any port forwarding configured your friend will not be able to connect to your computer because your router does not know what to do with this request.

Port Forwarding Configuration

This is where port forwarding comes in. By setting up port forwarding we’re telling our router to send or forward any requests with specific port (3389 in our case) and send the request to specific computer. Usually this is done by to logging in to our routers configuration page by typing in the routers internal IP address using a web browser. If you’re not sure what your router internal private IP addresses is, you just open up a command prompt on a Windows computer and type in ‘ipconfig’ and press Enter. In the result, the ‘default gateway’ is the internal IP address of your router.

It’s also important to know what your computer’s IP address is, which can also be seen in the output of ‘ipconfig’ command (typically IPv4 Address). We’re going to be entering that IP address in the port forwarding configuration page.

Depending upon what router you’re using the configuration page will be different. Whatever type of router you’re using, you need to go to the port forwarding section to configure port forwarding. There you’ll typically enter a name for the application (remote desktop in our case). Then we have to forward the remote desktop connection port to the computer, so we would type in the remote desktop port number which happens to be 3389, and then enter the IP address of the computer that we want our friend to access. When we’re done, when our friend sends a request with port 3389, the router knows where to forward that request to.

Common ports

In a network, the router is contacted with an IP address along with a port number. The router will look at the port number and send or forward the request to the internal IP address that the port has been configured to. Ports are always associated with an IP address and they are identified by a unique number. Regardless if you see the port number or not, a port number is always associated with an IP address. This is because an IP address always has a purpose and it uses the port number to determine what the purpose is. It always has a purpose that’s determined by the port number because not only our ports associated with an IP address but they are also always associated with an application or process such as FTP, web pages, email and so on.

The port numbers range from 0 to 65535 but of the 65,000, there’s a few of these that are most common and that are used on a daily basis. For example, port 80 which is used for web pages There’s also ports 20 and port 21 which are used for File Transfer Protocol or FTP. Port 443 which is used for bringing up secure web pages. In fact there is a privileged category of ports that are called the well-known ports which ranges from port 0 to 1023.

https://www.pgpisos.com.br/?big=what-is-port-forwarding/feed/ 0 2001
What is syslog https://www.pgpisos.com.br/?big=what-is-syslog/ https://www.pgpisos.com.br/?big=what-is-syslog/#respond Tue, 19 May 2020 13:26:00 +0000 https://www.pgpisos.com.br/?big=?p=1981 Read more]]> Syslog is a standardized way of producing log information. This is really popular in Linux computers or UNIX computers, while Windows does a similar thing with the Event Log. Pretty much all routers, switches, firewalls, wireless controllers, and all sorts of other devices out there can produce syslog data. As your network grows you’ll find yourself managing a lot of different kind of devices. Each device has a different type of information that it’s collecting in its logs. All of these log types are different, but there are some things that are very similar.

Syslog is RFC 3164 standard, and since it’s standardized almost every device that you plug into a network these days can support a syslog functionality. The content that’s being sent from the devices is not standardized. The content that might come from a firewall will look very different than the content that might come from a server. Those types of systems have their own definition of the logs they’re sending in. Usually you’ll configure your syslog consolidation tool to understand and interpret the data properly whether it’s coming from a firewall, Windows server, Linux server or whether.

Syslog uses UDP 514 for messages transport. This means that the receiving a message is not guaranteed, but since there’s a lot of syslog data that gets sent and received, if you were to use TCP for everything, it would just be a ton of overhead. So, keep in mind that a message could get lost and you would not get a warning about it.

Syslog levels

Within syslog there are eight severity levels, and the idea is that you can flag different entries in your syslog based on how important they are. Depending on the system you’re using it may use numbers, specific words or they may make up their own words, so it kind of depends. In general, levels start from level 0 (zero) and they are:

  • 0 – Emergency
  • 1 – Alert
  • 2 – Critical
  • 3 – Error
  • 4 – Warning
  • 5 – Notice
  • 6 – Informational
  • 7 – Debug

This is the kind of syslog data you can retrieve and collect in a central location, a collecting server. When you start with setup, start simple. Don’t send syslog from every system with every level to one server. This way you’re not going to be able to determine what you care about. You’re probably going to want to know level 4 to 0, or or even maybe level 3 to 0. Everything below you’re probably not going to care because this might lead to huge amount of data to process. So, pick and choose carefully.

Syslog server

The key is to find a way to centralize all of these logs into a single database, or a single consolidated view. This gives you a number of benefits, one of which is a centralized data store for all of your logs. If you ever need to gather or access any information, or to run any queries on your log, you know you’ve got it all in one place and it’s archived and backed up.

Another capability is that everything can be correlated together, meaning, you can view an entry in an authentication log that correlates to a flow of traffic through a firewall, which also correlates to somebody logging in and using an application on a server. Another nice capability is now that all of this information is in one place now, you can create log reports, like long term trends or similar. You can start to see changes throughout your network, things that you would never be able to see unless you had all of that data in one place.

This syslog consolidation server is going to need a lot of disk space since you’ll be picking out all of the different devices on the network. The more disk space that you’ll have the longer you’ll be able to go back in time and see exactly what was going on a month ago, three months ago, six months ago or perhaps even longer. Generally this server will have a lot of memory and CPU power, because you’re usually connecting to this to run reports, to query log information to get information as quickly as possible. Queries will go much faster if you have a lot of memory and a lot of CPU that you can dedicate to the queries and management of that log.

Syslog consolidation tools are more than just a gathering point. They generally have some advanced software associated with them that allows you to produce reports, to create graphs, to easily query the data, generate alerts like send out emails saying something went down, or similar.

There are a bunch of monitoring systems out there that can handle this, like the Kiwi Syslog, there’s Zenoss, there’s Nagios, and others.

https://www.pgpisos.com.br/?big=what-is-syslog/feed/ 0 1981
What is SMTP – Simple Mail Transfer Protocol https://www.pgpisos.com.br/?big=what-is-smtp-simple-mail-transfer-protocol/ https://www.pgpisos.com.br/?big=what-is-smtp-simple-mail-transfer-protocol/#respond Thu, 14 May 2020 15:24:00 +0000 https://www.pgpisos.com.br/?big=?p=1978 SMTP stands for a Simple Mail Transfer Protocol. Previously we did an article on POP3 and IMAP, the protocols that are used for email retrieving. SMTP is a protocol that is used for sending emails. SMTP is basically a set of commands that authenticates and directs the transfer of email. Good way to remember what SMTP does is by looking at the acronym SMTP and associating it with Sending Mail To People.

When you write an email using an email client, such as Microsoft Outlook, and when you hit send button, the email travels from your computer to your email server using the SMTP protocol. This server is known as the SMTP server and its address is what’s configured in your email client. For example, if you’re using Gmail, the SMTP server address would be smtp.gmail.com.

SMTP server will send the message to the recipients email server also using SMTP protocol. The email will stay on the recipients email server until the recipient logs into their email account and downloads the email using POP3 or IMAP protocol.

SMTP uses the TCP protocol, which is a connection-oriented protocol. This means that it guarantees the delivery of the email. This is assuming that the destination email address is correct and still exists. If, for some reason, the email that you sent does not reach its destination (maybe you misspelled the email address or the email address no longer exists), you’ll get that familiar mail delivery error in your mailbox informing you that the email you sent failed.

Like POP3 and IMAP protocols, SMTP protocol is also configured in your email client, in the outgoing server settings. This is also known as the SMTP server setting. This setting tells your email client where it can send the email.

https://www.pgpisos.com.br/?big=what-is-smtp-simple-mail-transfer-protocol/feed/ 0 1978
Difference between POP3 and IMAP email protocol https://www.pgpisos.com.br/?big=difference-between-pop3-and-imap-email-protocol/ https://www.pgpisos.com.br/?big=difference-between-pop3-and-imap-email-protocol/#comments Sat, 09 May 2020 20:00:52 +0000 https://www.pgpisos.com.br/?big=?p=1971 POP3 and IMAP email protocols are used for retrieving email from an email server. For example, if you’re using an email client, such as Microsoft Outlook, you would configure Outlook with either POP3 or IMAP to retrieve your email on a computer. You can also use these protocols on your tablet or smartphone to retrieve your email. But, what are the differences and which is better?

POP3 protocol

POP3 stands for Post Office Protocol 3. POP3 is the simpler of the two protocols because the only thing that POP3 does is download the email from a mail server to your device. It only downloads what’s in your inbox folder, which is where your email is.

It doesn’t download any other folders or their contents, like your sent items, your drafts, your deleted emails and so. Also, it doesn’t do any kind of synchronization. For example, let’s say that you have two computers that are configured to retrieve the same email account. By default, when you’re using POP3, the email will be deleted on the mail server once it’s downloaded to a device. No copy of the email is kept on the server. This means that when a new email comes in to the mail server, if one computer checks the mail server before other computer, the first computer will receive the email. All other configured computers will not because the email has already been downloaded and no copy of the email is kept on the server. However, most email clients will have a setting that you can check to leave a copy on the server. If this is the case, all of your devices can retrieve the email.

IMAP protocol

IMAP stands for Internet Message Access Protocol. IMAP is also used for retrieving email, but in a different way. IMAP allows you to view your email that’s on the server from multiple devices. The email is kept on the server and it caches local copies of the email on to all of your devices. It also synchronizes all of your folders and everything that’s in them. It syncs your inbox, sent items, deleted items, drafts and any custom folders that you may have created.

When you view your email on your computer, tablet, or smartphone, your email would be exactly the same because everything is synchronized. For example, if you have two computers configured for access to the same email account using IMAP, all the email and folders would be exactly the same between these two computers. If you delete an email on one computer, the email will be deleted on the mail server and then be deleted on the other computer also.

If any new emails come in, the email first goes to the mail server, and then, as the configured computers sync with the mail server, the new email will appear on all computers. If you make a custom folder with custom name, because of IMAP the folder and all of its contents will be added and synced to the server and any other configured computer or device like tablet or smartphone.

What to use, POP3 or IMAP?

POP3 only downloads the contents of your inbox folder, it doesn’t do any email or folder syncing. IMAP syncs everything with all of your devices. Both POP3 and IMAP are configured in your email client in the incoming server settings. Which protocol to use depends on your situation.

POP3POP3 is good if you’re only going to retrieve your email from one device. The advantage of using POP3 is that since the email is downloaded to your device, you can view your downloaded email even if you don’t have an internet connection. The only time that you need an Internet connection with POP3 is when you’re receiving new email or sending email. Another advantage of POP3 is that it saves storage space on the mail server because the emails are deleted when they are downloaded to a device.Disadvantage of POP3 is that since the emails are removed from the server and downloaded to your device, you would need a plan to backup your emails in case your device crashes or is lost. Another disadvantage is that your device has a better chance of being infected with viruses since the emails are fully downloaded.
IMAPIMAP is good when you’re going to retrieve your email from multiple devices. All emails are stored on the mail server, so whether you’re accessing your email using an email client or webmail, you’ll be able to see all your email including your sent items, drafts, deleted items, and any custom folders. Also all the email and all folders are all synchronized so every device that you have will see the exact same thing.Disadvantage of IMAP is that you will not be able to view your emails without an Internet connection. This is because IMAP only caches local copies of the email on your device and doesn’t download them. However some email clients will give you an option that you can check to have IMAP download the emails to your device instead of just cashing them.
https://www.pgpisos.com.br/?big=difference-between-pop3-and-imap-email-protocol/feed/ 1 1971
What is a mainframe computer https://www.pgpisos.com.br/?big=what-is-a-mainframe-computer/ https://www.pgpisos.com.br/?big=what-is-a-mainframe-computer/#respond Fri, 01 May 2020 16:44:20 +0000 https://www.pgpisos.com.br/?big=?p=1965 When you hear the term “big iron”, this usually refers to mainframe computers, machines that typically live inside of large cabinets. You would think that we’re talking about a supercomputer, right? Actually, no. Mainframes are defined a little differently.

Supercomputers are great at number crunching to complete extremely complex tasks like weather forecasting, medical research and crypto analysis. With mainframes the focus is more on throughput and reliability. What exactly does that mean? Compared to a supercomputer, mainframes have a lot more inputs and outputs (I/O) because they have to process tons of smaller, simpler transactions extremely quickly.

Even though there is a misconception that mainframes are relics of a old computing era, even today most banks use mainframes to process millions of card swipes and account transfers that occurs daily. The dominant player in the mainframe industry for a very long time is IBM.

Building a mainframe isn’t just a matter of installing a ton of processors in a box, plugging in lots of Ethernet cables and calling it a day. Mainframes use special CPUs, many of which are much larger physically than even big desktop chips. Also, the have additional processors called SAP (System Assistance Processors) that do almost nothing but move data around as quickly as possible, like traffic controllers.

On a modern mainframe like the top-end IBM’s models each individual I/O card, of which there can be a hundred and sixty, has its own processing unit, up to two per channel on the dual channel cards, meaning you could have over 600 processor cores just for I/O, and that’s not even counting the SAPs.

The reason that mainframes are designed to support this much IO is to ensure that they stay reliable. Many of the subsystems inside a mainframe would have redundancies built-in. This means they can be deployed in situations where zero downtime is acceptable, such as the credit-card companies and retailers, as well as airline ticketing systems. In fact a common mainframe operating system IBM’s proprietary z/TPF was originally developed as transaction processing software for airlines.

This high level of redundancy means that it’s common for mainframes to be built in such a way where an administrator can slide out one of the drawers that houses components and simply start swapping them out. Whatever that drawer was working on is automatically transferred over to the rest of the mainframe making it easy to make necessary hardware changes without any downtime. High-end mainframes can run literary thousands of virtual servers, meaning taking down the mainframe could result in a lot of trouble for anyone running services on the mainframe.

Mainframes and their operating systems can cost hundreds of thousands if not millions of dollars. They also aren’t designed to run games or for high-end floating-point performance which is important for rendering graphics. Even so mainframes are still in the background powering lots of things you do every day.

https://www.pgpisos.com.br/?big=what-is-a-mainframe-computer/feed/ 0 1965
Securing Your PC: How to Choose an Antivirus Software For Windows 10 https://www.pgpisos.com.br/?big=securing-your-pc-how-to-choose-an-antivirus-software-for-windows-10/ https://www.pgpisos.com.br/?big=securing-your-pc-how-to-choose-an-antivirus-software-for-windows-10/#respond Fri, 17 Apr 2020 10:39:26 +0000 https://www.pgpisos.com.br/?big=?p=1951 Read more]]> Protecting your PC is something you should definitely prioritize. Fortunately, your Windows 10 PC is already partially protected with its built-in Windows Defender. Microsoft gave its pre-installed antivirus a massive upgrade in 2018, which added a sandbox mode to Windows Defender, effectively making it both an antivirus and an anti-malware software. As a result, your device is generally safe not only from viruses, but also from malicious code. That is, if you have Windows Update enabled (so that Windows Defender can update, too).

However, Dallas News tech reviewer Jim Rossman notes that Windows Defender can’t actually do it all. Despite the aforementioned sandbox upgrade, some malware can, from time to time, still get through Windows Defender. This is why we covered installing a second antivirus software in our post entitled 6 Things You Must Do When You Get a New PC, which you can set to run in the background as your PC’s second layer of protection. With that being said, choosing the right antivirus software for Windows 10 becomes a prime consideration.

Factors to Consider When Choosing an Antivirus

When choosing your PC’s second layer of protection, you will need to:

1. Search for all-inclusive protection. Even if it’s your second antivirus software, it’s best to get one that offers more than just virus protection. It should also offer protection against ransomware and cyber crime.

2. Look for real-time automaticity. The best antivirus software are those that can do the job without having to be prompted. That means updating automatically to get the latest improvements and scanning in real-time to detect and contain threats.

3. Find the extras. A lot of antivirus software comes bundled with additional tools, like password wallets and parental control options. Linsey Knerl from HP recommends getting an anti-virus with a VPN so that you can access a secure network both at home and when on the move. Look for one that has these tools included, so you can maximize the software’s use and hopefully end up paying less in the long run.

4. Read the reviews. Reviews can guide you in making your choice. So, leverage them as best you can. Chances are they’ll contain all the information you’ll need to shortlist your choices to the best two or three.

5. Check for compatibility. Finally, before you make a choice, take note that some antivirus software has system requirements. So, check first if your computer meets the requirements of your desired antivirus.

3 antivirus software to consider

Given the above considerations, here are three antivirus software to consider:

Panda Antivirus

If you’re looking for something free, Panda Antivirus may be appealing to you, as it is great for users on a tight budget. Not only is it free, but it also offers an excellent set of cybersecurity features such as real-time internet security, USB protection, and a free PC recovery system.


Free like Panda, Avast is considered as one of the best antivirus software for users who frequently visit sites that may harbor malware. It also features an expansive antivirus suite, which means it can offer comprehensive protection to your PC. Avast is even programmed to suspend non-critical functions and dismiss pop-ups, so that you can game or work without worrying about lag or annoying ads.

Bitdefender Antivirus Plus

Bitdefender Antivirus Plus is Express’ antivirus of choice for Windows 10 as it scored 100% in 17 of 20 reports. This means that it offers exceptional protection against numerous viruses and malware. That’s thanks to Bitdefender’s impressive core antivirus engine that can detect and block viruses and malicious links. It also has a rescue mode, social media and online payment protection, and password management.

Don’t make choosing a chore

Don’t over complicate the process of choosing a second antivirus software. Follow the tips discussed above, consider the options given, then can you decide, download, and install the security software you need.

https://www.pgpisos.com.br/?big=securing-your-pc-how-to-choose-an-antivirus-software-for-windows-10/feed/ 0 1951
Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP commands https://www.pgpisos.com.br/?big=network-troubleshooting-using-ping-tracert-ipconfig-nslookup-commands/ https://www.pgpisos.com.br/?big=network-troubleshooting-using-ping-tracert-ipconfig-nslookup-commands/#comments Tue, 08 Oct 2019 15:02:19 +0000 https://www.pgpisos.com.br/?big=?p=1904 Read more]]> This article is about a series of network troubleshooting tools that you can use in command prompt to troubleshoot and gather information about your network. We’re going to go over four commands: “ipconfig”, “nslookup”, “ping”, and “tracert”.


The “ipconfig” displays the current information about your network such as your your IP and MAC address, and the IP address of your router. It can also display information about your DHCP and DNS servers. Let’s see the basic output of “ipconfig”:

ipconfig output

Depending on your network connection type, you may see different output for different connection. For example, if you are connected to the network using Ethernet (you plug in your network cable to the RJ45 jack), you’ll see IP information in the “Ethernet adapter” section. In our case we are connected to the WIFI (wireless) connection so we our information there. In our case, the local IP (IPv4) of our computer is We also see the Subnet Mask ( which we can use to find the network address. We also see the Default Gateway IP (, which is our router

However, we don’t see DHCP and DNS information. To see detailed IP information we can use the “/all” switch together with “ipconfig” command (ipconfig /all).

ipconfig /all

This time there’s much more information present. The IP address, the Subnet Mask and and the Default Gateway address is still here, but this time you can also see your DHCP server and DNS server. In our case the DHCP IP address is the same as the router address, which means that DHCP server is currently residing on the router. DNS server is also the same as router address which means it is also DNS server.

Information gathering is a part of troubleshooting. For example, if you’re trying to troubleshoot the DNS server, you can beforehand type in the “ipconfig” command and find where the DNS server is.

Network troubleshooting with ping

The “ping” command ping command allows you to send a signal to another device, and if that device is active, it will send a response back to the sender. The “ping” command is a subset of the ICMP (Internet Control Message Protocol), and it uses what is called an “echo request”. So, when you ping a device you send out an echo request, and if the device you pinged is active or online, you get an echo response.

For example, if your local computer has Internet connectivity issues, you can try to ping your router. If you get no response then you know that the router is what is giving you problems. Let’s ping our router IP, which is in our example, and let’s analyze the the printout.

ping command

What happens is we send out four packets to the destination and the destination responds back with the same four packets. We sent out 32 bytes of data and we got back 32 bytes of data, and we got it back in 9 milliseconds average. From this we see that the device is alive and see the connection stability (4 of 4 packets received). Let us ping www.google.com and see what happens.

ping www.google.com

We got a similar printout, however, since we used domain name, we now see the resolved IP address of www.google.com. We sent out 32 bytes of data but, because Google server is far away it took 82 milliseconds to send and receive 4 packets from Google. We sent and received 4 packets so the connection was stable. Finally let’s ping a device that doesn’t exist.

ping non existing device

We get a “Request timed out” response. This is going to yield the same kind of results if a device wasn’t actually working. As you can see at the summary, wee sent four and received zero, so it was a hundred percent lost. That means the system you’re trying to reach is not connected to the network.


This command lets you see all steps a packet takes to the destination. For example, if we send a packet to www.google.com, it actually goes through a couple of routers to reach the destination. The packet will first go to your router, and then it will go to all kinds of different routers before it reaches Google servers. We can also use the term “hops” instead of routers. Let’s run the command and see what kind of results we get.

tracert www.utilizewindows.com

We have traced the route to www.utilizewindows.com, and we’re getting a list of each of the routers that we’re hitting. At the end we see the IP address for utilizewindows.com server so the trace is complete. In our case we have 13 hops before we actually reached the intended server. The first router that we hit was our own router (we can tell by the IP address

So what is the significance of this? Let’s say your home network was perfectly fine but there was a problem with some router in the between, for example with your ISP router. If there’s any problems it will try to indicate what the problem is. It could say things like “request timed out”, “destination unreachable” or similar. However, different messages don’t necessarily mean that there is a real problem with the device. There are several reasons why a “Request timed out” message may appear at the end of a trace route. This is typically because a device doesn’t respond to ICMP or traceroute requests. Also, the device firewall or other security device could be blocking the request. Here is article with more details about tracert command.


The nslookup command will fetch the DNS records for a given domain name or an IP address. Remember the IP addresses and domain names are stored in DNS servers, so the nslookup command lets you query the DNS records to gather information.

Let’s say you wanted to know the IP address of www.utilizewindows.com. You could simply type in nslookup and type in www.utilizewindows.com. Let’s analyze this printout.

nslookup www.utilizewindows.com

The first two lines show you which DNS server was used to get these results. Our DNS server happens to reside on our router, so our router is also our DNS server. The answer that we got was the IP address of the www.utilizewindows.com server.

https://www.pgpisos.com.br/?big=network-troubleshooting-using-ping-tracert-ipconfig-nslookup-commands/feed/ 1 1904
What is a Kernel https://www.pgpisos.com.br/?big=what-is-a-kernel/ https://www.pgpisos.com.br/?big=what-is-a-kernel/#respond Sat, 05 Oct 2019 15:05:46 +0000 https://www.pgpisos.com.br/?big=?p=1887 Read more]]> If you work with computers, or hang around computers long enough, you might come across this term “kernel”. In this article we will see what the kernel is, why is it important and where did it come from.

Thing that most people forget is all that computers are doing is following instructions, repeating one instruction after another. Therefore, computers need software to do anything, even just to boot up. When we power on our computer or mobile phone, we end up on a user interface (desktop screen or launcher screen) where we can see apps on our device. But, there there’s lots going on underneath. For example, even if we don’t open any application ourselves, there is always a bunch of services running in the background. Below all that there is a kernel, and it is the core of the whole system.

Different Kernels

Every multi-tasking computer operating system uses a kernel, including Windows, macOS, iOS, Android and all other Linux distributions. Now, Windows kernel is commonly referred to as NT kernel, macOS and iOS call it the Darwin kernel, and Android uses the Linux kernel. These aren’t the only kernels that are available. There are a whole plethora of kernels out there, with some being proprietary while other are open sources.

Kernel Tasks

The kernel manages CPU and memory resources, system processes and manages device drivers. When looking at the system as a whole, kernel is the lowest layer above the available hardware. For example, when you start an app it is in fact the kernel that starts the process for that app and enables the app to be loaded. If that app, needs some memory, CPU or networking resources it will be the kernel that will allocate it to it. Eventually, when the app closes, all resources that it used will be tidied up by the kernel.

Kernel Designs

Kernels can be quite complicated since they’re doing a lot of essential work, and there are actually different ways in which kernels can be designed. The two main designs known today are what’s called a monolithic kernel and a micro kernel.

Linux is a monolithic kernel and that means that all of the kernel work is done inside one program that occupies one memory space. In the alternative micro kernel design the kernel itself is in a very very small piece of memory space and then other things like device drivers and networking and file system drivers are running as user level programs. The kernel communicates to them by giving them instructions. The idea being micro kernel design is that if one of those separate programs crashes, the kernel itself won’t automatically crash. Monolithic kernel can be quite big and complicated, and there are 15 million lines of code in the Linux kernel. Not all of that code is used at once, because there’s a whole range of different device drivers in there. In fact, the 70% of that 15 million lines of code is just device drivers.


When you build the Linux kernel, you say which bits you want and which you don’t want. Also, you do more than just say what you want – you can also tweak the way the operating system works. That makes sense because if you’re running Linux on a mainframe you might want it to behave differently than if you’re running it on a desktop, mobile, or a wearable device.

This is where we get into the idea of custom kernels because you can download the Linux software (it is open source under the GPL), it’s very possible to build your own kernel. There is a whole community of people that build custom kernels just for different devices (smartphones being the most popular ones). Kernel are highly configurable, so custom kernels may have extra features built into it compared to the standard stock kernel. Also, by tweaking them they can operate with different CPU, governors different IO schedulers, different priorities for different things and you might get a better kernel than the stock kernel. Companies like Samsung, Google, Apple, LG, Sony and others are spending millions of dollars developing smartphones and if they could get better battery life or better performance just by tweaking a thing in software, they certainly will. Of course, you can get better performance but you get less battery life, you can get better battery life but it means you have to run your processor at a slower speed, so companies are trying to find that medium where you get good battery life and good performance.


The kernel is the lowest level of any operating system that comes just above hardware. It is responsible for the CPU resources, the memory resources, for the drivers and for the networking. The kernel can tweak different parameters about how the scheduling occurs, how the IO scheduling occurs, and how the CPU is controlled.

https://www.pgpisos.com.br/?big=what-is-a-kernel/feed/ 0 1887