What is IP address?
The internet address (IP address) is 32bits that uniquely and universally defines a host or router on the internet. The portion of the IP address that identifies the network is called net id. The portion of the IP address that identifies the host or router on the network is called host id.

What is Special Public IP?
ISP have provided a specific public IP for you, you have full rights to use and manage this public IP into your network, because this public IP specifically for you and no one can use it. You like given the address or name on the internet to your network. ISP will give you a special price for this.

What is Common Public IP?
ISP is not given special IP address or name to you on the internet, but you still use public IP to be connected to the internet. In this case you will use the public IP together with all clients of your ISP and this public IP fully managed by ISP itself. You like being under their clients network there is no special name for your network.

What is Static Public IP?
Public IP that is used will not be changed because it is not planned to be changed, this public IP can be Special Public IP or Common Public IP as our terms.

What is Dynamic Public IP?
Public IP that always be changed dynamically when you use connect to internet, the changes have ranges as the network mask of the public IP that used by ISP. Same like Static Public IP, it can be Special Public IP or Common

What is Local IP?
Local IP addresses both serve the same purpose, the difference is scope. An external or public IP address is used across the entire Internet to locate computer systems and devices. A local or internal IP address is used inside a private network to locate the computers and devices connected to it.

Define LAN, MAN and WAN.
LAN- A local area network (LAN) is a privately owned and links the devices in a single office, building or campus. It allows resources to be shared between personal computers and work stations. MAN- A metropolitan-area network (MAN) spreads over an entire city. It may be wholly owned and operated by a private company, example local telephone company. WAN – A wide area network (WAN) provides long distance transmission of data, voice, image and video information over large geographic areas that comprise a country, a continent or even whole world.

Nepal Telecom ISP Upgrade System use the FortiGATE firewall

Nepal Telecom ISP Upgrade System use the FortiGATE firewall  

 Just few months ago Nepal Telecom (ISP) internet Service Provider Company upgrade the system & security, use next generation Fort iGATE firewall and network security now is filter the internet using suffer internet. The internet user protect the connection safe the hacker anti phishing our network Communication system. Nepal Telecom maintained system of Nepalese organizations more & more cyber criminals are targeting Nepal cyberspace to get focus security system. 

 Nepal Telecom last few years ago dozen of the attack the anonymous hacker group has claimed to have breach the Nepal Telecom ADSL server, and have gained access to user's Wi-Fi SSID and password more than 43700 router is vulnerability found NTC's server was hacked last months, a group called Anonymous opnep gained access to all the details of NTC user that include username, citizenship name, father's name as well as other private information which you have to fill up during new SIM card registration.
The Fort iGATE firewall feature consolidated security platforms deliver unmatched performance and protection while simplifying your network. Fortinet offers models to satisfy any deployment requirement from the FortiGate-30 series for small offices to the FortiGate-5000 series for very large enterprises, service providers and carriers.
Fort iGATE platforms combine the FortiOS security operating system with Forti AISIC processors and latest-generation CPUs to other hardware to provide a comprehensive, high-performance security. Each Fort iGATE includes the widest range of security and networking functions on the market, including:

Firewall, VPN, and Traffic shaping
Intrusion Prevention (IPS)
Integrated wireless controller
Application Control
IPv6 Support
Data Leak Prevention
Secure WI-FI
Web Filtering
VoIP Support
Layer 2/3 routing
WAN Optimization & Web Caching
 This example describes how to improve the reliability of a network connection using two ISPs. The example includes the configuration of equal cost multi-path load balancing, which efficiently distributes sessions to both Internet connections without overloading either connection
Create a security policy for the primary interface connecting to the ISPs and the internal network. Create a security policy for each interface connecting to the ISPs and the internal network

How to know RJ-45 jack color codes Female port clamping network tips

How to know RJ-45 jack color codes Female port clamping network tips

Network router and switch are female port diagram may be the four cable working our network note this one, another cable not using ports. Registered Jack 45 (RJ45) is a standard type of physical connector for network cables. 
(RJ45) connectors are most commonly seen with Ethernet cables and networks. Modern Ethernet cables feature small plastic plugs on each end that are inserted into the( RJ45) jacks of Ethernet devices
Layout the (RJ-45) format console port male pin out showing down below tables:

Request to Send
Ready Out
Data Out
Data in
Carrier Detect
Clear to Send

The table's string-Through cable and crossover cable show down below:
 (RJ-45) jack male color codes two tables and Figure example network tester device:

String- Through cable
Crossover Cable
1. White/Orange
1. White/Green
2. Orange
2. Green
3. White/Green
3. White/Orange
4. Blue
4. Blue
5. White/Blue
5. White/Blue
6. Green
6. Orange
7. White/Brown
7. White/Brown
8. Brown
8. Brown

Second step crossover cable & Straight-Through Cable to the tables down below this topology to the network stranded networking straight-Through cable and Crossover Cable 

Straight-Through Cable

Crossover Cable
Switch + Router

Switch + Switch
Switch + PC

Switch + Hub
Switch + Server

Hub + Hub
Hub + PC

Router + Router
Hub + Server

Router + PC
Hub + Router


When I check network tester RJ-45 & RJ-11 remote and master tips its easy find out fault to the wire Straight-Through LED light indication diagram down below

Maximum length 10/100/1000BASE-T, the maximum allowed length of a CAT-6 cable is100 meters or 328 feet. This consists of 90 meters (300 ft) of solid "horizontal" cabling between the patch panel and the wall jack, plus 10 meters (33 ft) of stranded patch cable between each jack and the attached device
Maximum length a CAT-5 cable can have is 100 meters. In the case you require a cable longer than 100 meters, you need to install a simple repeater I.E. a hub, or a switch, which will allow you to extend the total length.

How to remove KMSpico Malware from your computer

How to remove KMSpico Malware from your computer?

KMSPico Description (Malware)

KMSPico is any malicious computer program created by cyber hacker to hack into a computer through misleading users. It spread by some form of social engineering, alike e-mail attachment, bundled with third party application or lurks inside PC through sharing data in open network. Do lots of malicious activities into targeted as:

Although KMSPico malware is not destructive itself, the majority of websites which provide its download link are untrustworthy and seek to spread malware. However, there is nothing more to expect from sites that present an illegal program.

That is not a commendable behavior; however, cyber criminals aim to exploit users who seek to obtain paid software for free. Therefore, they infect most requested computer programs with harmful components, such as Trojans or worms, or less-harmful threats like adware. It was noticed that KMSPico virus frequently promotes adware programs, and that is why some security researchers name this dangerous program as KMSPico adware

Normally, the network administrators would contact KMS servers through the Remote Procedure Call and then activate the desired services. The KMSpico creators offer to replace the existing key with a new volume license key and activate the services without having to connect to this KMS server.

Bring modification into Windows registry.
Help Spammers via opening system backdoor etc.
KMSPico Intrusion Methods
As malicious attachment via Spam emails.
By drive-by download.
Sharing data in open network.
Visits to infected websites, torrents.
Clicks to suspicious ads, offers and text-links.
Other social engineering scam etc.
Harmful Impacts of KMSPico  
Crashing the computer or device
Spreading other malware across the network.
Use computer as part of a botnet.
Able to format disks, destroying all contents.
Degraded PC performance and internet speed.
Opens backdoor of cyber crook to access PC.
Spy you’re online activates to record information.

Step By step guide to remove Trojan so hold shift key while choosing option. Restart the windows system. After the system reboot a blue screen papers, now choose troubleshoot option.

Now click on advanced option next from available options of advance option menu, go for startup setting. Now list will appear title restart to change windows options, click on restart button at bottom right corner. 
Take help keys form F1 to F9 you select your desired option of startup settings, once advanced boot options appear go to the safe mode with networking. Press enter key when open safe mode interface then kill malicious KMSPico processes from task manager press Ctrl+ Alt + Del keys together on your keyboard. Now in the processes tab look for any suspicious running process and click on it. Further click end task terminate the malicious process.

Next step clean malicious registry entries made by KMSPico Trojan and tap and hold windows + R keys together search suspicious entries related related with KMSPico. Right click on it > select delete option from there, once startup appear press F6 key to choose safe Mode along with command prompt option.
It is the easiest and fastest way to clean your computer from threats and potentially unwanted programs. In case you just want to remove KMSPico, delete the following files and folders from your computer:
§  AutoPico.exe
§  Service_KMS.exe
§  unins000.exe
§  KMSELDI.exe
§  UninsHs.exe
§  tap-windows-9.21.0.exe

You can also perform Clean Boot. You need to turn off all the startup programs that may be the reason why the program won’t uninstall.
  • Press Windows + R;
  • In the Run window type msconfig;
  • Choose Services section;
  • Find Hide all Microsoft services line, tick the box;
  • The click Disable all;
  • Return back to General section;
  • Find the line Selective startup and untick the box Load startup items;
  • Select Apply, then OK;
  • Reboot your PC;
  • Remove KMSpico from Control Panel.

Nepal Telecom running a SIM card today is 12 hours every day to give everyone a 500 bonus

Nepal Telecom running a SIM card today is 12 hours every day to give everyone a 500 bonus

Kathmandu, Dec. 6 - Nepal Telecom has provided various types of 'Winter Offers' for the winter season. The aforementioned statement has been made from Friday till it has been held till 21st. The Company has also provided data streaming packages with various types of data packages and bonuses. Data streaming packages can be used to watch TV via YouTube and Watch time apps.
1. Winter all time data packs can be used on the JESM prepaid & postpaid and Sydney prepaid and postpaid mobile.
25 MB Data Stripping Pack has been provided as a bonus for 25 hours for consuming 24 hours for consuming three hours and one consecutive day for 12 days under the event of Al-Qaeda's data. In the same way, 150 MB data stripping pack has been provided as a bonus for 150 megawatts and to be consumed for 3 days for 14 days for consumption of 14 days.
500 MB stripping packs have been provided as a bonus for consuming 500 MB data and 5 days for the purpose of consuming a maximum of 120 hours in 120 rupees. To take this pack, you must send SMS in WIN25MB, WIN150MB or WIN500MB by 1415.
2. Winter Night Data Packs can be used on the Geos map Prepaid & postpaid and prepaid and postpaid mobile phone data pack. This pack can only be used just before 6:00 pm at 6pm. Data stripping packs provided as bonuses can also be used at this time.
120 MB Data Strengthening Pack has been provided as a bonus for consuming 120 MB data and one day for consuming three days under Win Night Pack.
Similarly, 700 MB data streaming packages have been provided as bonuses for consuming 700 MB data and 3 days for consuming up to 60 days. 1600 to be available for 120 days in 120 rupees
1600 MB Data Strengthening Pack has been provided as a bonus for consuming MB data and up to 7 days. To send this pack, you must send WN120MB, WN700MB or WN1600MB to SMS in 1415.
3. Winter Facebook, Instagram Packaging JSM prepaid / postpaid and prepaid / postpaid mobile on-line Facebook and Instagram data packet can be used.
Within Facebook, Instagram data packs, 50 MB data streaming packages have been provided for consuming 50 MB data and one day for one day for three hours in three rupees for three days.
Likewise, 275 MB data streaming pack has been provided as a bonus for 274 MB data and one day to consume it for four hours for four hours in four days.
600 MB data stripping pack has been provided as a bonus, which can be used to consume 600 MB data and 5 days for the purpose of consuming four hours a day in 120 rupees.
To take this pack, you must send SMS in W15, WF275MB or WF600MB by writing 1415.
4. SMS packs can be used on SMS Pack JISM prepaid / postpaid and Sydneya prepaid postpaid mobile phone. Under this pack, 50 SMSs and 50 bonus SMSs have been made available for consuming up to 10 days for 5 days. In this way, 100 sms can be made in 10 rupees. SMS should be sent by SMS100 to send SMS to 1415.

Network Technician Job description

Network Technician Job description

As network technician is becoming more and more important in our daily lives, there is a growing demand for skilled professionals (also known as Network technicians) who can offer quality technical support. Networking troubleshoot in technicians fill this need, and while their specific responsibilities can vary from position to position, their duties often include

Designing and installing well-functioning computer networks, connections and cabling.

• Performing troubleshooting to system failures and identify bottlenecks to ensure long term efficiency of network.
• Testing and configuring software and maintain and repair hardware and peripheral devices.
• Evaluate network performance and find ways of improvement.
• Organize and schedule upgrades and maintenance without deterring others from completing their own work.
• Do regular data backups to protect the organizations information.
• Provide technical direction to co-workers on computer and network usage and offer comprehensive advice and instructions.

Job Description
Responsible for cabling and termination of RJ45, RJ11 and various other wiring disciplines... The position includes the testing and troubleshooting of wiring problems. 
Installations Router, Hub, Switch, LAN, WLAN, Router and device configurations Transmit and Receive A568A- 568B Standard terminations and Crossover cable categories Cate -5 A cable, TA/EIA-568 Cat-5 B cabling


• Responsible for running new cabling in new or existing buildings.
• Climbing towers for installation and maintenance outdoor wireless connection
• Termination and testing of new cabling.
• Responsible for testing and troubleshooting of cables.
• Setting up new telecommunications frames.
• Knowledgeable in structured cabling and other advanced technologies
• Experience for installation and alignment for outdoor wireless
• Communicates effectively and appropriately when dealing with other departments and/or personnel at levels up to BOD.
• Demonstrates the initiative and creativity for self-development within and outside of the company.

Troubleshooting a Cat 6 (or Cat 5) Network connection from the Network Switch to the Data Outlet and/or Computer can sometimes be very frustrating even for an experienced professional. In most cases, the trouble is typically found in the connection wiring and hardware. But don't let that throw you off, when you are troubleshooting you must exhaust all possibilities. Knowing the points will make you a better troubleshooter. 

Let's start from the Network Switch and name each
Network tool kits from are built to accommodate a range of cabling types, termination and connector systems. Whether you work on Ethernet networks, twisted-pair (10base-T) LANs, fiber optic networks or a combination of data and voice equipment, we have a kit for you

The Network Switch itself and its connection to data sources
The port on the front of the switch that you are connected to
The RJ-45 Jack on the front of the switch that corresponds to the port you are connected to
The Cat 6 (or Cat 5) patch cable going from the switch to the patch panel (See Note 1 below)
The RJ-45 Jack on the front of the Patch Panel
The rear 110 connection corresponding with the RJ-45 jack on the front of the Patch Panel
The Cat 6 (or Cat 5) cable going from the patch panel to the wall outlet
The RJ-45 Keystone jack at the wall outlet
The proper labeling of the correct Patch Panel Port on the Wall Outlet
The Cat 6 (or Cat 5) patch cable going from the Wall Outlet to the computer. (See Note 1 below)
The RJ-45 connector on the NIC Card
The NIC Card itself

The seating of the NIC Card into the internal connectors

How to remove shortcut Malware PC & Pen drive without any antivirus software

How to remove shortcut Malware PC & Pen drive without any antivirus software

Its 100 % prof without any type of anvirus software you, can remove shortcut infect malware your all windows system pc and laptop. So shortcut malware original “drdifnloyk MOS DW vbe VBS:BackDoor-AI [Trj]”

This type of infection spreads through removable media like USB key, SD cards, phones, GPS, tablets.Any USB device containing free disk space can be contaminated. drdifnloyk MOS DW vbe was detected by anti-Malware software for USB. The file was submitted to VirusTotal, a service that combines the detection of more than 40 antivirus engines. Result click here Virus Total

File name    File.vbs
File size       71.39 KB
Last analysis        2017-10-18 01:45:28 UTC
Community score -163

Basic Properties
MD5 78a0e123da2a2555f830cb880293c10d
SHA-1 8d5cdbafe9076cca3317913be55b02a26007325f
File Type Text
Magic ASCII text, with very long lines, with CRLF line terminators

Let remove drdifnloyk MOS DW.vbe first press start + r type “msconig” hit enter see first open System Configuration tab to the Startup then see
"wscript.exe //B "C:\User\HIMALA~1\AppData\Local\Temp\ drdifnloyk MOS DW.vbe”

Uncheck and disable then apply press ok again go to the boot option check “Safe boot” and restart system.
When restart the system safe boot open win+r type “regedit” hit enter check reg file
Find and like lnk,ini,vbs,exe delete this one of reg file delete when you find example like location

wscript.exe //B "C:\Users\win7\AppData\Local\Temp\ drdifnloyk MOS DW.vbe” delete this one reg file.
Goto press win+r run type example location C:\Users\win7\AppData\Local\Temp\ drdifnloyk MOS DW.vbe then delete this one and its hidden drdifnloyk MOS DW.vbe are you sytem.
Create one of same to same win+r type “Notepad” when you open notepad blank and save as drdifnloyk MOS DW.vbe desktop the file .vbe and replace the, location on my system example "C:\Users\win7\AppData\Local\Temp\ drdifnloyk MOS DW.vbe” restart windows then its clear shourtcut malware on your system.

How to remove shortcut malware on your flash drive and memory sd card 
Easiest Way to Remove SHORTCUT Virus Permanently from your Computer, Pen drive, Memory Card In this tips and tricks  is going to help you to recover your precious files that has converted into Shortcut Folder and as well as remove Shortcut Virus from your computer, pen drive, memory card, external hard disk and other flash drive devices without any software. Follow the instructions provided in Steps and Remove Shortcut Virus Permanently.

Go to Start and search form “cmd” right clicks on cmd and click on “Run as administrator:
Navigate to you pen drive/ flash drive by typing drive letter.
Type “del *.lnk “and hit Enter on your keyboard.
Now type “attrib -s -r -h *.* /s /d /l” and hit enter

Deferent type of command if when not working
attrib -s -h -r /s /d
attrib f:\*.* /d /s -h -r -s
attrib -h -s -r -a /s /d Drive-Name:*.*
Doesn’t work; attrib -h -r -s /s /d e:*.* change the e: to your device or flash drive letter.

Now replace the “Drive-Name” with your drive name. Let’s assume you want to remove the shortcut virus
From the drive C then your command
Will be attrib -h -s -r -a /s /d C:*.*

@echo off
attrib -h -s -r -a /s /d Drive-Name:*.*
attrib -h -s -r -a /s /d Drive-Name:*.*

@echo complete