SmartWhois Tutorial Domains and IP Addresses Demystified. Copyright TamoSoft, Inc. All Rights Reserved.
|
|
|
- Lillian Bridges
- 10 years ago
- Views:
Transcription
1 SmartWhois Tutorial Domains and IP Addresses Demystified Copyright TamoSoft, Inc. All Rights Reserved.
2 About This Tutorial Domains, IP addresses, host names, sites, and URLs have always been the source of many misconceptions, even amongst advanced Internet users. These notions are often misunderstood and/or confused. What's the difference between a domain name and host name? What do those numeric IP addresses mean? How can I learn who owns a domain? Can I trace a user by IP address? Throughout this tutorial, we'll try to answer these and many other frequently asked questions and show you how you can use SmartWhois by TamoSoft to perform Whois look-ups. Understanding the Basics Domain Names, IP Addresses, Host Names, Web Sites, URLs, and Whois Let's start with explaining the basic terms. Domain: A domain is a logical region of the Internet. Domain names consist of one or several parts separated by periods, for example: "yahoo.com." You can refer to all of the computers that share the right-most portion of a name as being in the same domain, for example: "weather.yahoo.com" and "finance.yahoo.com" are both in the "yahoo.com" domain. The top position in the domain hierarchy is occupied by Top Level Domains (TLDs). A TLD is the right-most portion of a domain name, and you obviously know many popular TLDs, for example:.com, or.net. Seven generic TLDs (.COM,.EDU,.GOV,.INT,.MIL,.NET, and.org) were created in 1980s, seven new TLDs were introduced in 2001 and 2002 (.BIZ,.INFO,.NAME,.PRO,.AERO,.COOP, and.museum), and, of course, there are over two hundred country-specific TLDs that consist of two letters, e.g..ca for Canada or.de for Germany (the complete list can be found on the IANA web site). A second-level domain (SLD) is the next portion of a domain name (we're moving from the right to left here). For example, there are millions of second-level domains in the.com top-level
3 domain zone, one of them being "yahoo.com." "Finance.yahoo.com" or " would be a third-level domain, etc. Every existing SLD has an owner, a company, an organization, or individual and a Whois tool allows you to find the SLD owner. IP Address: Every computer connected to the Internet is assigned a unique number known as an Internet Protocol (IP) address. This number identifies each sender or receiver of information that is sent in packets across the Internet. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, or could be valid IP addresses. Your computer, too, is assigned an IP address; because you can't access a web site or use any other Internet service, such as , without a valid IP address. Many IP addresses are assigned dynamically from a pool, while others are assigned on a permanent basis. Because IP addresses are usually assigned in country-based blocks, an IP address can often be used to identify the country from which a computer is connecting to the Internet. Host Name: A host name is only an alias for the IP address. It is assigned to a computer for easy reference by humans. Take, for example, a web server, " Its IP address is , but this number is not easy to remember. It's not likely that you will learn it by heart and enter it into your browser when you want to visit this web site, but is much easier to remember. When you enter into your browser, it quickly contacts the Domain Name System (DNS) server and finds out that translates into From that point on, your browser uses the obtained numeric IP address to send and receive data to/from this web site. A computer connected to the Internet may or may not have a host name, but it must have an IP address. Here are a few examples of host names: (a web site), pop-server.austin.rr.com (a mail server), cs houston.rr.com (a host name assigned to a broadband Internet user), dialup134.ts521.cwt.esat.net (a host name assigned to a dial-up user). Web Site and URLs: A web site is a group of web pages stored on a particular web server. A web server is just a computer connected to the Internet that runs the software necessary for serving web pages. Typically, web servers have host names that begin with "www," e.g. " although this is not always the case. A Uniform Resource Locator (URL) is the address of a resource that is retrievable using on of the Internet protocols, usually Hyper Text Transfer Protocol (HTTP). An example of a URL is " Whois: Whois is an Internet program that allows users to query a database of domains and IP addresses to retrieve information about the owners, administrators, geographic location, etc. As the name suggests, SmartWhois is a smart, feature-rich Whois utility capable of performing such queries. You will learn about what you can do with it in the next chapter. Using SmartWhois Understanding Domain and IP Address Queries Equipped with the knowledge of the Internet terminology, we can start using SmartWhois. Download it if you haven't done so already, run the installation on your Windows 95/98/Me/NT/2000/XP/2003 system, and launch the program:
4 Understanding the difference between domain and IP address / host name queries is the key to successful usage of SmartWhois. When trying to find information on a particular web site, users are frequently confused about what kind of query they should perform and what they should type in the input field. So let's consider an example: Suppose that you want to check who owns weather.yahoo.com, a popular site on weather. To find the owner of a web site, you should find out who owns the domain. In this example, the domain name is "yahoo.com." So you should type "yahoo.com" in the input field, click on the Query button, and select As Domain:
5 In just a few seconds, you see that "yahoo.com" belongs to Yahoo!, a California-based company. Why did we enter "yahoo.com" rather than "weather.yahoo.com"? Because "weather.yahoo.com" is not a second-level domain! Remember the previous chapter? In most of the cases, you should query only second-level domain names, such as "yahoo.com" rather than third-level domain names, such as "weather.yahoo.com." Actually, you can try to query "weather.yahoo.com" as a domain name: Yes, that's right, domain not found. Whois databases contain information on second-level domains only. In fact, there are a few exceptions to this rule, notably UK domains. Some countries have a domain system that is based on third-level domains, i.e. you buy a domain name with two dots already in, e.g. "jaguar.co.uk" or "bbc.co.uk." But this is rather uncommon. Now let's consider IP address / host name queries. Why they are grouped together? Because, technically, there is no difference between these two types of queries. As we mentioned in the first chapter, a host name is just an easy-to-remember alias for the IP address; therefore, querying a hostname and the corresponding IP address are equivalent. A host name query is just one step longer: SmartWhois needs to convert the hostname to the IP address by contacting a DNS server, and then, once the IP address for the entered hostname has been obtained, it will query one of the Whois databases for this IP address. When does one need to perform an IP address / host name query as opposed to domain query? For example, when you need to check where a web site is hosted geographically. When you need to find out who sent you from a certain IP address. Or when you need to send a spam/abuse report to an ISP. There are many situations in which you need such information. When you need to check an IP address or host name, just type or paste it into the entry field, click on the Query button, and select As IP/Hostname. A useful hint: You can just hit the "Enter" key :-) For domain queries, hit Enter while holding the "Ctrl" key.
6 We entered " and now we know that this site is located in the USA and is hosted by Pair Networks. Now, try to query "tamos.com" as a domain: That's right; "tamos.com" belongs to TamoSoft, a New Zealand-based company. This leads us to an important observation: Domain and IP address / host name queries usually give you different results, and this is quite understandable. Query a domain to find out who owns it. Query a host name or IP address to find out where the computer with the given host name is located and who owns the corresponding range of IP addresses. "Tamos.com" is owned by a company based in New Zealand, but the company's web server, " (at the time of writing, this
7 corresponds to ) is located in the USA in the data center that belongs to Pair Networks. Well, enough about the basics, let's look at a few other cool things you can do with SmartWhois. SmartWhois and Microsoft Internet Explorer What a Useful Button! Have you noticed that little SmartWhois button on the Internet Explorer (IE) toolbar? If it's not there, make sure that the IE add-in is activated (in SmartWhois, click Options => Integration => Add SmartWhois to Internet Explorer menu and toolbar) and restart IE. Using this handy button, you can invoke SmartWhois every time you want to get more information about the web site you are visiting: When you click on the toolbar button, the address field is pre-filled with the site address. What SmartWhois actually does is strips the URL in the IE address bar of the unnecessary parts. For example, if the current URL is " SmartWhois cuts off everything that does not constitute the site host name, " Now that we have the host name, we can perform a domain query on "anypay.com" (yes, SmartWhois will automatically cut off the unnecessary " part if you perform a domain query) to find out who owns this domain, or an IP address / host name query if you want to find out where the web server is hosted. SmartWhois and Microsoft Outlook Looking at Headers Just like in IE, you can find the SmartWhois button on the MS Outlook toolbar. If it's not there, make sure that the Outlook add-in is activated (in SmartWhois, click Options => Integration => Install SmartWhois for MS Outlook Add-in) and restart Outlook.
8 Every message that you receive includes so called "headers," that messy block of text that precedes the actual message body. Headers are included in every message, but they aren't normally displayed to the user. However, every client can be configured to show this information, and the SmartWhois add-in can help you quickly display it. Headers contain information about the path the message took before reaching our box. Each computer that handled the message en route added something to the header, and it is this additional info we can use to help trace the message back to its source. Reading and understanding headers is not a black art, but it requires some knowledge and practice. This topic is outside the scope of this tutorial, but you can find many good articles on the Internet, for example: What Headers can Tell You About the Origin of Spam. Here, we'll simply show you how you can use SmartWhois to get information on the IP addresses that you can find in the headers. Here is a typical spam message: To look at the headers, click on the SmartWhois button on the toolbar and select Pass Headers to SmartWhois:
9 The IP address found in the headers are highlighted, just like hyperlinks on a web page. Clicking on any of the hyperlinks will make SmartWhois retrieve information about the selected IP address. You can also select any part of the text and query the selection as a host name or domain. Why would anyone want to find the originating IP address of a message? Well, there could be a number of reasons. You may want to find the physical location of your correspondent (someone who claims to be staying in France might be in Italy). You may want to find to which organization the IP address in question is registered (if you got a message from [email protected] but the message came from Nigeria, it's a good reason to think twice before submitting a web form with your account password). Or you may want to complain about spam. Regardless of the purpose of your query, it's important to understand the limitations of the technology. It's equally important to distinguish between the myth and reality. Read more about this in the next chapter. How Precise is the Information Myths and Reality You can usually get the precise information about the domain owner, as the owner s contact details are required to register a domain name. There are, of course, exceptions to this rule, because a domain may be registered using a stolen credit card and/or the owner may give fake personal information, although law in many jurisdictions prohibits this practice. Unlike domains, IP addresses are not individualized to that extent. Usually, when you query an IP address, you get the details of the organization that owns a certain range of IP addresses. This is usually an ISP or company. Therefore, you can find out which ISP the person is using or which company he/she works for, but you can't get the name or address of the specific person who is connected to the Internet using the given IP address. The degree of precision may differ, though. An IP address may belong to a small company or ISP that owns as few as 16 IP addresses. If that's the case, you're in luck: You can find out exactly where the person is located, up to the city
10 district. But if you come across a huge ISP, such as AOL in the United States, all you can get is the location of the main office, and you wouldn't be able to even find out the state or province of the user, although there are other techniques that may help (e.g. the time zone or host name that often reveals the location). These are extreme examples; usually, the degree of precision is rather high. That said, "I can get someone's address and phone number by IP his/her address" is a myth in most of the cases, at least if we consider an average "investigator." Naturally, a government agency may be capable of tracing the user by contacting the ISP and checking the connection log files. Another popular myth tells of a possibility to always find the sender's IP address in the e- mail headers. Well, that's not always the case, because it's not extremely difficult to hide one's IP address by using a proxy server (an HTTP proxy server in case of web-based services or SOCKS proxy server in case of the standard POP/SMTP clients). Again, a government agency may still trace the user. It's interesting to look at the situation from the standpoint of the user whose IP address is being queried or otherwise analyzed. Is it safe to reveal it? Do you need to hide it? The answer is not an easy one, and it's outside the scope of this tutorial. In brief, if you are looking for anonymity, you should consider implementing some measures to hide it. If you're not particularly concerned about anonymity or privacy, there are still situations where hiding your IP address might be advisable. Consider a news group posting that you made today using an alias, and another one that you made a month ago, under your real name. If you have a static IP address, searching news groups for your IP address will show all your postings, no matter what name you used. This is just one of many possible scenarios. Anyway, back to SmartWhois Complaining About Spam Just a Few Clicks Are you sick and tired of spam? We are too, sometimes to the extent that we want to complain about a particularly persistent spammer.
11 Carefully analyze the headers, find the spammer's IP address (the spammer could be using an open mail relay server or a "zombie" computer to send , but it's still good to let the ISP know), perform a SmartWhois query, locate the administrative or abuse contact, rightclick on the address, and select Send Abuse/Spam Report. There you go, a new message will be opened in your client and pre-filled with the template. Be sure to edit the text and add the details. You can send the report in a matter of minutes! Data Mining Learning More Using SmartWhois as a Starting Point SmartWhois is a great starting point for an online investigation. When you know the IP address or domain name that you want to learn more about, you can use SmartWhois for data mining. Select any part of the text in the right pane, right-click and use the Search command to search for the selected text using several search engines.
12 Examples? Sure! The "xyz.com" domain is registered by "John Doe, Ltd."? Fine, let's see what Altavista knows about John Doe, Ltd. You have received an sent from ? Great, let's use Google to see what traces were left by that IP address on the Internet. Well, it's not something you can't do on your own using copy & paste commands, but it makes life easier. And you can configure this command to use any search engine. SmartWhois for Advanced Users Batch Processing, Exchanging Data, Custom Queries, and Other Tips Now that we've talked about the program's core functionality, let's mention a few other useful things you can do with SmartWhois. Some users need to query many IP addresses, host names or domains at a time. With SmartWhois, that's really easy. Click File => Open => Batch File => As IP/Hostname List or click File => Open => Batch File => As Domain List to have SmartWhois load and process a multi-line file. You can do the same using command-line arguments, which is described in the help file in detail. Command-line arguments even allow you to launch SmartWhois, have it process the list, save the results to a file and exit, all without any user interaction. There is only one thing to remember: It's a bad idea to overload Whois servers, so if your list contains a few thousand entries, there is a good chance that Whois servers will temporarily block your access to their service. You can, however, use the Options window to adjust the delay between the queries to reduce the server load. Be a good Netizen! Once you've obtained the required data, there are a number of formats in which you can save the results. If you want to make a quick note of what you've just found, the easiest way is to drag-and-drop the contents of the right pane to the desktop. This will create an HTML file that you can view in your favorite browser. If you want to save many results and/or import the data into some other application, consider one of the other formats supported by SmartWhois, namely
13 XML, XLS, TXT, HTML, or SmartWhois native format. The latter is good when you want to load the saved file into SmartWhois and browse through the results. Sometimes you need to perform Whois queries using extended syntax. For example, you may need to query a certain handle in a Whois database. This is not a problem: select Query => Custom Query to bring up a Whois Console, with which you are free to connect to any Whois server and send any query string. Moving On IP addresses, host names, and domains are an interesting part of Internet technology. We hope that this tutorial has been instrumental in understanding this technology and has provided some helpful hints on the usage of the ultimate Whois tool: SmartWhois. Visit us today at for more information, excellent technical support, instant online ordering, and more!
SPAM UNDERSTANDING & AVOIDING
SPAM UNDERSTANDING & AVOIDING Modified: September 28, 2006 SPAM UNDERSTANDING & AVOIDING...5 What is Spam?...6 How to avoid Spam...6 How to view message headers...8 Setting up a spam rule...10 Checking
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Transferring Hosting to Fasthosts
Fasthosts Customer Support Transferring Hosting to Fasthosts This guide will show you how to transfer hosting to Fasthosts from another provider Customer Support Transferring Hosting to Fasthosts Contents
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Web Publishing (Ch. 11.4)
Web Publishing (Ch. 11.4) Web publishing is the process of uploading web pages to a web server. Web server For a web page to be placed onto the Internet, it needs to be stored on a computer with the following
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ACCESSING YOUR CHAFFEY COLLEGE E-MAIL VIA THE WEB
ACCESSING YOUR CHAFFEY COLLEGE E-MAIL VIA THE WEB If a District PC has not been permanently assigned to you for work purposes, access your Chaffey College e-mail account via the Web (Internet). You can
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
The World Wide Web Using Microsoft Internet Explorer
The World Wide Web Using Microsoft Internet Explorer lab 13 Objectives: Upon successful completion of Lab 13, you will be able to Define the terms World Wide Web and URL Use a Web browser to load a Web
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
Using Google Docs in the classroom: Simple as ABC
What is Google Docs? Google Docs is a free, Web-based word processing, presentations and spreadsheets program. Unlike desktop software, Google Docs lets people create web-based documents, presentations
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
DNS and E-mail Interface User Guide
DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Admin Guide Web Hosting (Windows Websites) MailStreet Hosting Control Panel (CP)
Admin Guide Web Hosting (Windows Websites) MailStreet Hosting Control Panel (CP) DOCUMENT REVISION DATE: October, 2009 Web Hosting Admin Guide / Table of Contents Page 2 of 112 Table of Contents HOW TO
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
Creating and Configuring Web Sites in Windows Server 2003
Page 1 of 18 Admin KnowledgeBase Articles & Tutorials Authors Hardware Links Message Boards Newsletters Software Control USB stick usage - Network-wide control with LANguard PSC. - Dl Admin KnowledgeBase
SmartWhois Help Documentation
SmartWhois Help Documentation Copyright 1998-2012 TamoSoft Introduction About SmartWhois SmartWhois is a useful network information utility that allows you to find out all available information about an
RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. [email protected] AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787
RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: [email protected] Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Using Outlook WebAccess
Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
NETWORK SET UP GUIDE FOR
NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,
How to Configure the Windows DNS Server
Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows
Deploying Secure Internet Connectivity
C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security
Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
Parallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
How To Guide Edge Network Appliance How To Guide:
How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252
Access to Kozminski University library databases from home
Access to Kozminski University library databases from home All students and staff at Kozminski University can benefit from special, purchased by the Library of ALK, databases containing many interesting
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
Distribution List Manager User s Manual
Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
MailEnable Quick Start Guide
MailEnable Quick Start Guide Messaging Services For Microsoft Windows 2003/2008/2012 MailEnable Pty. Ltd. 59 Murrumbeena Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61 3 9568 4270 www.mailenable.com
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER
USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER Introduction For all Business Domain hosting services, Adam Internet provides the ability to add SPAM and VIRUS filtering. This service reduces the amount
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Plesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
JMM Software Email Suite
Page 1 of 36 JMM Software Email Suite Users Guide Version 1.5 System Requirements: Microsoft Windows 2000 or XP (Windows 9x not tested) & Total Retail Solution version 7 or greater JMM Email Suite - Email
IC3 Internet and Computing Core Certification Guide
IC3 Internet and Computing Core Certification Guide Global Standard 4 Living Online Lesson 12: The World Wide Web CCI Learning Solutions Inc. 1 Lesson Objectives the difference between the Internet, the
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Microsoft Office Access 2007 Training
Mississippi College presents: Microsoft Office Access 2007 Training Course contents Overview: Fast, easy, simple Lesson 1: A new beginning Lesson 2: OK, back to work Lesson 3: Save your files in the format
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
Search help. More on Office.com: images templates
Page 1 of 14 Access 2010 Home > Access 2010 Help and How-to > Getting started Search help More on Office.com: images templates Access 2010: database tasks Here are some basic database tasks that you can
The LSUHSC N.O. Email Archive
The LSUHSC N.O. Email Archive Introduction The LSUHSC N.O. email archive permanently retains a copy of all email items sent and received by LSUHSC N.O. Academic email users. Email items will be accessible
Regain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
The default option is that full headers appear at the BOTTOM of each received message.
AOL Email The email files are in an html format. The objective is to save the file in html format. This can be done as follows: - Open the email message you want to save, as if you were reading it - Near
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008.
1 How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008. By & Steve Smith, MVP SharePoint Server, MCT Penny Coventry, MVP SharePoint Server, MCT Combined
MTNL SMTP Relay User Guide
MTNL SMTP Relay User Guide Copyright (c) 2016. All rights reserved. Table of Contents Introduction 1 Why 1 Poor Reputation 1 Solution 2 Which users are affected? 3 Affected MTNL Users 4 Pre-requisites
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Page 1 of 5. How to unblock automatic picture downloads in e-mail messages you receive
Page 1 of 5 How to unblock automatic picture downloads in e-mail messages you receive Page 2 of 5 Block or unblock automatic picture downloads in e-mail messages To help protect you from junk e-mail senders,
SONA SYSTEMS RESEARCHER DOCUMENTATION
SONA SYSTEMS RESEARCHER DOCUMENTATION Introduction Sona Systems is used for the scheduling and management of research participants and the studies they participate in. Participants, researchers, principal
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Departmental (Service) Account Set Up
Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that
Modern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
Internet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
Colligo Email Manager 6.0. Connected Mode - User Guide
6.0 Connected Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License
OmniTouch 8400 Instant Communications Suite. My Instant Communicator for Microsoft Outlook User guide. Release 6.7
OmniTouch 8400 Instant Communications Suite My Instant Communicator for Microsoft Outlook User guide Release 6.7 8AL 90243USAD ed01 Sept 2012 Table of contents 1 MY INSTANT COMMUNICATOR FOR MICROSOFT OUTLOOK...
Email Basics. For more information on the Library and programs, visit www.bcpls.org BCPLS 08/10/2010 PEMA
Email Basics Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account
If you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
INTERNET DOMAIN NAME SYSTEM
INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download
Configuring Microsoft Dynamics AX 2012 Alerts and Email Notifications Using an SMTP Email Relay Server with Office 365
Configuring Microsoft Dynamics AX 2012 Alerts and Email Notifications Using an SMTP Email Relay Server with Office 365 With more AX Server machines being run in the cloud on Microsoft Azure we need a simple
Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Norman Email Protection
Quick Install Guide Norman Email Protection version 5.51 Features Email relay gateway with antivirus Email relay with antivirus and antispam Web application Table of Contents Overview... 3 System Requirements...
Section 1 Overview... 4. Section 2 Home... 5
ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
