Thursday, October 30, 2008

Router Commands Overview

Router Commands Overview

In this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.

There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage.
You will find here some basic terminology of a router.

Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.

First of all you should remember the keyboard shortcuts of a router.

Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
SHIFT-CTRL-6 – Break

Configuring the Router

You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server

General Commands

Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
clear counters - clear interface counters

Privileged Mode commands of a router


Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password

Router Processes & Statistics

By these command you can see the statistics and different processes of the router.
sh processes - shows active processes running on router
sh process cpu - shows cpu statistics
sh mem - shows memory statistics
sh flash - describes the flash memory and displays the size of files and the amount of free flash memory
sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers
sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines

IP Commands

Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0

Other IP Commands:


sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol

CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):

sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface

IPX Commands

Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A

Other Commands:

sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets

Routing Protocols

RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out

WAN Configurations Commands

Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.

PPP Configuration

Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface

Frame-Relay Configuration


One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info

Miscellaneous Commands

In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)

configure a network

How to Configure a Network

In this section you will learn how to configure a network, peer to peer, client server, workstation, server, basic data communication.

Peer to Peer network model

Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.

Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.

Computer Name IP Address Subnet Mask Workgroup

PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwork
Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.

For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.

In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.


If a computer fails to work then all other computers work normally in peer to peer network.
Client/Server Network Model

In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.

If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.

When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.

Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.

Configuration Steps

1. Choose a unique name for each client computer
2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.

Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\ComputerName\SharedDriveLetter.

Network configurations steps can be implemented by right clicking the My Computer>Properties>

For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.

Computer Hardware

PC Hardware Troubleshooting Techniques
Here you will learn about computer hardware troubleshooting techniques, cable testers, software diagnostic routines, POST cards, error diagnostic methods. Computer hardware is the physical part of a computer and it is frequently changed as compared to the software. Most computer hardware is inside the computer and cannot be seen by normal users. There are a large number of the computer hardware devices including Hard disk, CD-Rom, RAM, Motherboard, Monitor, printer, peripheral devices and other devices. One of the first steps in the troubleshooting is to sort out the hardware and software problems. You can use the event viewer utility in the Windows operating systems to identify the nature and cause of the hardware or software problem. Also you can identify the hardware problems by identifying the initial start up beeps.
Errors that occur before the initial beep shows that there is some kind of hardware problem exists in the system. At the POST stage, only the BIOS of the system and basic hardware is active and operating system does not starts to initialize at this stage until a final beep occurs. If a computer produces an error (“The system has detected Unstable RAM”) or a beep code appears, this means that system and found a problem with the devices and system RAM should be changed. Additionally, if the system starts up process reaches the point where CMOS configuration information is displayed on the screen this means that there is no problem detected with the basic hardware of the system. After this point, the system starts to load the device drivers and operating system.
You can categorize the system configurations errors and components failure errors. Sometimes configurations or setup problems occur when a new hardware is installed and used in the system for the first time. These problems occur due to the mismatches of the CMOS memory information and component's configuration information. It is usually advisable to access the system CMOS when the system is first time prepared, when it is necessary to replace the CMOS battery and when a new device such as hard disk, CD-Rom, RAM, Video adapter etc added to the system. In most of the computers, the BIOS use plug and play techniques to detect most of the devices. These components provide system resources to the newly added device. When you are installing a new devices or software, you may notice some configuration errors.
If you face the configuration errors, you should see the installation manual that comes with the new computer device. If you cannot confirm configuration problems and the device is not working properly, this means that there must be some defect in the hardware. The symptoms and errors can be divided into the three parts such as boot up problems, configurations problems and operational problems. First of all system’s configurations settings are checked. The error messages that occur during or after the end of the POST are reported so it is important to observe that where the problem is actually occurred.
Configuration Error Messages Meanings
Press F1 to continue Invalid configuration
CMOS time and date not set CMOS battery error
CMOS memory size mismatches System configuration and setup failure
CMOS system option not set CMOS battery failure or CMOS checksum
After the beep tones occur during the startup process, the system now looks and loads the operating system. The errors that occur between the beeps and initializing the operating system can be categorized into the following categories.
• Hardware failure ( due to the physical problem with the booting drive)
• General Failure Error Reading Drive x
• Bad or Missing Command Interpreter
• Non system Disk or Disk Error
• Bad File Allocation Table
• Corrupted or missing operating system files
• Corrupted or missing boot files
The configuration or boot up problems can be occurred to the hardware or operational function’s failure and if the configuration is correct and these error appears this means there is some problems in the hardware and boot up problems are normally linked with the operating system.
PC Hardware Troubleshooting Tools
Due to the low cost of the some of the hardware components, it’s usually not advisable to repair the IC level problems of the components, instead they should be replaced. The repair cost of the component will most likely be high as compared to the actual cost of the component. There are some very excellent hardware problem detection tools that are very helpful in identifying and isolating the problems. These tools included Multi meter, Cable Tester, POST card and software diagnostic disk.
Software Diagnostics Routines
Many disk based diagnostic methods can check the system and identify the problems by running the number of tests on the different areas of the system hardware. These tests produce the visual reports and error messages to identify the nature of the problem. The most common software troubleshooting routines check the computer’s memory, keyboard, monitor, system processor, and hard disk’s speed. If the system CPU, hard disk and system clock is working properly, then you will be able to localize the problem by targeting the other points in the system. If the diagnostic tools/routines identify a number of defective software/hardware then you should replace one defective unit a time.
Troubleshooting with Multimeter
Testing tools can help in isolating the hardware or software problems and digital multimeter is a most important tool for the electronic troubleshooting. Digital Multimeter and other electronic test instruments are available in analog and digital form and these instruments can be used to measure the electrical values of the voltage, current in miliamperes and resistance in ohms. These devices are known as Volt-ohm-milimeters (VOMs) for the analog signals and digital millimeters (DMMs) for the digital types. You can also check the transistors, capacitors, motor windings and diodes with the digital multimeter. In computer troubleshooting, most of the tests of the digital multimeter are to check the DC readings.
Troubleshooting with Cable Testers
The most common hardware related compute networking problem is the bad cabling and RJ-45 connectors. There are a number of devices, designed for testing the network communication cabling. These devices include continuity tester, time domain reflectometer and cabling testers. Data cabling testers are designed to perform a number of different types of tests on the UTP/STP and coaxial cables. The master end of the cable tester is attached to one end of the cable and the load unit of the cable tester is attached to the other end of the cable. The master unit sends the signals through the cable and reads them from the load unit. When testing the cables, these devices normally detect the problems such as crossed-over wiring, broken wires, short connections and the cable connections that are improperly impaired.
Troubleshooting with POST Cards
A POST card is a diagnostic and troubleshooting device that is plugged into the expansion slots and tests the operation of the system as it boots up. These cards can be as direct memory access or they can be complex as ROM BIOS diagnostic tools that perform the advance level diagnostic tests. POST cards are generally used when the computer systems appear to be dead or the system is unable to read from the floppy or hard disk. The POST routines generally report two types of errors fatal and non fatal.
The fatal error stops and system and when the POST card observes non fatal errors, they should be read very carefully because the error code, which is indicated must be coordinated with the timing of the error message or beep code produced by the BIOS routines. Normally POST cards come with the LEDs (light-emitting diodes that produces code error signals and they identify any kind of problem.

Tuesday, October 28, 2008

worms removal methods

Email Worms

These worms spread through infected email messages which may contain an attachment or a link of an infected website.

Instant Messaging Worms

These worms spread via instant messaging applications by sending links of infected websites to the entire contact list.

Internet Worms

Internet worm tries to gain access to any vulnerable machine either by scanning the Internet and/or using the local operating system.

IRC Worms

These worms spread through chat channels, sending infected files or links to infected websites.

File-sharing Networks Worms


These worms place a copy of themselves in a shared folder under a harmless name and thus the infected files spread P2P network.

Computer Worms


Computer Worms


A sub-class of a virus, a computer worm is a self replicating computer program that uses a network connection to spread from computer to computer extremely quickly, without the help of any executable host file or any person.

A computer worm therefore:

  • Runs Independently
  • Travels across network connections
  • Has the capability to reproduce itself on your system

What worms can do?

With its ability to replicate itself rapidly, a computer worm overloads the system memory, causing slowdowns in data transmission due to massive bandwidth consumption.

If designed to do so worms can also carry a payload which can create a 'backdoor' on your computer thereby allowing evil minded users to control your computers remotely.

Antispyware review

A Spyware therefore:
  • Attaches itself to your operating system surreptitiously
  • In a way takes control over your interaction with your machine.

What Spywares can do?

As the name suggests spywares primarily intrude on your privacy, intercept personal information like usernames and passwords, fill your hard drive with useless gunk and mark you as a target for enterprising advertisers.

These programs can perform any task they are designed to do. From collecting your personal information to installing additional software to redirecting Web browser activity to even changing your firewall, Internet and other computer settings, spywares can virtually monitor everything that you do on your computer.

Sometimes associated with identity thefts and frauds, these infectious programs can also generate endless pop-up ads, resulting in slow connection speeds.

How your computer contracts Spywares

Spywares get onto your machine by exploiting security flaws or system vulnerabilities or simply by deceiving you.
Following are some of the methods how these malicious infections find way to your computer.

Piggybacking

Spywares can install themselves on your computer when you install a piece of desirable software without noticing that you are getting more than the file-sharing application you wanted.

Drive-by download

Drive-by downloads happen without slightest of your knowledge when you visit a web site, view an email message or just click an innocuous looking deceptive pop up window.

The malicious codes can also download themselves by exploiting Web browsing, email client or operating system bugs or flaws even without your intervention.

Browser add-ons

Browser add-ons are software bundles that allow the user to add enhancements to your Web browser. Sometimes they also include elements of spyware. Nastier add-ons are considered browser hijackers that persistently stick to your machine and take a lot of efforts to cleanse.

Sometimes spywares pose themselves as spyware removal software and as you install them on your machine they start installing additional spyware.

Type of spywares

Trojan horse

Named after the Trojan horse, which delivered soldiers into the city of Troy, Trojan horse or Trojans are malicious computer programs that pretend to perform a desirable function but in fact perform some other malicious functions. A Trojan horse program is largely a delivery vehicle designed to infect your machine.


A Trojan horse therefore

• Appears to be a useful program to entice you
• Does not have the ability to reproduce itself as in case of computer viruses or worms

What Trojans can do?

Trojans can simply annoy you by changing your desktop or adding silly icons or they can wreak havoc by deleting files and destroying information on your machine.

They can also create a backdoor on your computer for malicious users, enabling them to access your system thereby compromising on your confidential as well as personal information.

Trojans can also perform other malicious functions they are designed to perform.

Spywares


Spywares

Spywares are computer programs that sneak into your machine, hide in the background and affect your interaction with your computer while making unwanted changes to your user experience without your knowledge.

While the term spyware reflects about those types of software that secretly monitors the user's behavior by keeping itself hidden from the owner of Computer, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information like Internet surfing habit, sites that have been visited, and can also interfere with user control of the computer in many ways, like installing additional software, redirecting Web browsers , accessing third party websites blindly that will cause more harmful viruses and diverting advertising revenue to a others websites.

Spywares can also change computer settings, resulting in slow connection speeds, different home pages other then you choose, and loss of Internet speed or other programs being non functiona

Virus removal methods

Boot viruses.

These viruses infect boot records in hard disks by copying it elsewhere on the disk or overwriting it. When the computer loads the operating system through infected boot records the viruses also load into the memory.

Program viruses

These viruses infect executable program files and when these files are executed or loaded in memory, the viruses start making copies of itself and infecting other files on the disk.

Multipartite viruses

Having the characteristics of both the boot and program viruses, these viruses infect multiple different targets. After infecting the program files they infect the boot records when the infected files are executed. As the infected boot records are loaded in memory the viruses start infecting other program files.

Stealth viruses

In a bid to avoid detection, these viruses adopt certain mechanism. They intercept the anti-virus software’s request to the operating system to read the file, thereby avoiding detection.

Polymorphic viruses

These viruses can encrypt their code in different ways so that it appears differently in each infection. They have no identical parts between different infections, which make it very difficult to detect them.

Metamorphic viruses

These viruses avoid detection by rewriting themselves completely each time they are to infect new executables.

Macro Viruses

These viruses infect the macros within a document or template. Some software applications allow macro programs to be embedded in documents. These viruses exploit this mechanism to spread.

Types of Viruses

Types of Viruses

Boot viruses. These viruses infect boot records in hard disks by copying it elsewhere on the disk or overwriting it. When the computer loads the operating system through infected boot records the viruses also load into the memory.

Program viruses: These viruses infect executable program files and when these files are executed or loaded in memory, the viruses start making copies of them and infecting other files on the disk.


Multipartite viruses: Having the characteristics of both the boot and program viruses, these viruses infect multiple different targets. After infecting the program files they infect the boot records when the infected files are executed. As the infected boot records are loaded in memory the viruses start infecting other program files.

Stealth viruses
In a bid to avoid detection, these viruses adopt certain mechanism. They intercept the anti-virus software’s request to the operating system to read the file, thereby avoiding detection.

Polymorphic viruses
These viruses can encrypt their code in different ways so that it appears differently in each infection. They have no identical parts between different infections, which make it very difficult to detect them.
Metamorphic viruses: These viruses avoid detection by rewriting themselves completely each time they are to infect new executables.


Macro Viruses
These viruses infect the macros within a document or template. Some software applications allow macro programs to be embedded in documents. These viruses exploit this mechanism to spread.

The scourges of Computing:

1. Computer Virus- A self-reproducing, self replicating infectious code.


• Boot Virus
• Program Virus
• Multipartite virus
• Stealth Virus
• Polymorphic Virus
• Metamorphic viruses
• Macro Virus


2. Worm - A self-reproducing program creating copies itself.

3. Spyware - monitors all your activities.

4. Trojan Horse- lures by posing to be something it’s not.

5. Blended Threat- bundles aspects of viruses, worms, Trojan horses and malicious codes into one threat.

6. Adware- places advertisements on your screen.

7. Page Hijacker- usurps control of your home page and resets it.

8. Toolbar- any toolbar that is installed through underhanded means.

9. Dialer/Modem Hijacker- disconnects users from their modem's usual Internet service provider and he is billed for another phone number.

10. Backdoor Trojans- a Trojan horse program that opens a back door and allows a remote attacker to have unauthorized access to your machine.

11. Logic Bombs- lies dormant until triggered by some event.

12. Virus Droppers- a program that, when run will attempt to install a regular virus onto your hard disk.

13. Phishing – luring, fraudulent proposals that exploit the internet as a communication channel to easily reach a large number of targets.

14. Spam- unsolicited electronic communication received by you.

15. Parasiteware - overwrites certain affiliate tracking links to sell products and to help fund websites.

16. Email Viruses/Worms- are malicious codes sent to you as an email note attachment.

17. Keyboard Logger – can record your PIN number when you log in to your online banking

Monday, October 27, 2008

Troubleshooting

Here i am submitting some troubleshooting tips to handle our computer

Here are five common-sense techniques and strategies to solve common computer hardware problems.

(1) Trial-and-error

Personal computers are highly modular by design. The most powerful trouble-shooting technique is to isolate the problem to a specific component by trial-and-error. Swap compatible components and see if the system still works. Try different peripherals on different machines and see if the same problem occurs. Make one change at a time.

(2) "It's the cable, s-----."

More than 70% of all computer problems are related to cabling and connections. Ensure all cables are connected firmly. IDE and floppy ribbon cables and power cables can often go loose. Ensure microprocessor, memory modules, and adapters such as video card and sound card are inserted correctly and didn't "pop-up" during transportation.

(3) Don't be frustrated!

Don't be afraid of computer problems. It is often the best opportunity to learn. Trouble-shooting is part of the fun of owning a computer. Imagine the satisfaction you could get by solving a problem yourself.

Of course the fun could ran out quickly once you are frustrated and have spent too much time on the same problem. If you feel frustrated, it's time to leave it for a while and go back with some new ideas or call someone who can help. Rule of thumb: You shouldn't spend more than three hours on the same problem at one time.

(4) Take notes!

Take notes of what you have done and all the error messages. You may need to use them later. For instance, when you see an unusual blue screen with an error message, copy the entire message onto a piece of paper. In many situations, that message may point to the right direction in getting the problem solved quickly.

(5) Take a look?

It's OK to open a computer case and take a look inside. There is only 5V and 12V DC voltage supplied to the components outside the power supply. Those who have never seen the inside of a computer are often amazed by how simple it looks. Of course, still always power down and unplug the power cord first.


Troubleshooting Tips for New Monitors

Here are some basic trouble shooting tips for new monitors:
  1. The picture does not appear

    • Check to make sure the signal cable is firmly connected in the socket.
    • Check to see if the computer system's power is ON.
    • Check that the Brightness Control is at the appropriate position, not at the minimum.
  2. The Screen is not synchronized

    • Check to make sure the signal cable is firmly connected in the socket.
    • Check that the output level matches the input level of your computer.
    • Make sure the signal timing of the computer system is within the specification of the monitor.
  3. The position of the screen is not in the center

    • Adjust the H-Size, H-Phase or V-Size, V-Center controls.
    • Check if the signal timing of the computer system is within the specification of the monitor.
  4. The screen is too bright or too dark

    • Check if the Brightness or contrast control is at the appropriate position, not at the maximum or minimum.
    • Check if the specified voltage is applied
    • Check if the signal timing of the computer system is within the specification of the monitor.
    • Especially, check the horizontal frequency.
  5. The screen is shaking

    • Move all objects that emit a magnetic field, such as a motor or transformer, away from the monitor.
    • Check if the specified voltage is applied.
    • Check if the signal timing of the computer system is within the specification of the monitor

      How to partition and format your hard disk by using the Windows XP Setup program



      Important If you follow these steps on a hard disk that is not empty, all the data on that hard disk is permanently deleted. We recommend that you back up your hard disk before you follow these steps.

      To partition and format your hard disk by using the Windows XP Setup program:

      1. Insert the Windows XP CD-ROM into your CD-ROM drive or DVD-ROM drive, or insert the first Windows XP Setup disk into the floppy disk drive, and then restart the computer.

      Note To start your computer from the Windows XP CD-ROM (or from the startup disk), your computer must be configured to start from the CD-ROM drive, the DVD-ROM drive, or the floppy disk drive. In some cases, you may have to modify your computer's BIOS settings to set this configuration. For information about how to configure your computer to start from the CD-ROM drive, the DVD-ROM drive, or the floppy disk drive, see the documentation that is included with your computer, or contact the computer manufacturer.

      2. If you are starting the computer from the Windows XP CD-ROM, select any options that are required to start the computer from the CD-ROM drive if you are prompted to do this.

      Note If your hard disk controller requires a third-party original equipment manufacturer (OEM) driver, press F6 to specify the driver.

      For additional information about how to use F6 to supply a third-party OEM device driver while the Windows Setup program is running, click the following article number to view the article in the Microsoft Knowledge Base:

      314859 Limited OEM driver support is available with F6 during Windows XP Setup If you are starting from the Windows XP Setup disks, insert each of the additional disks when you are prompted, and then press ENTER to continue after you insert each disk.

      3. At the Welcome to Setup page, press ENTER.

      4. Press F8 to accept the Windows XP Licensing Agreement.

      5. If an existing Windows XP installation is detected, you are prompted to repair it. To bypass the repair, press ESC.

      6. All the existing partitions and the unpartitioned spaces are listed for each physical hard disk. Use the ARROW keys to select the partition or the unpartitioned space where you want to create a new partition. Press D to delete an existing partition, or press C to create a new partition by using unpartitioned space. If you press D to delete an existing partition, you must then press L (or press ENTER, and then press L if it is the System partition) to confirm that you want to delete the partition. Repeat this step for each of the existing partitions that you want to use for the new partition. When all the partitions are deleted, select the remaining unpartitioned space, and then press C to create the new partition.

      Note If you want to create a partition where one or more partitions already exist, you must first delete the existing partition or partitions, and then create the new partition.

      7. Type the size in megabytes (MB) that you want to use for the new partition, and then press ENTER, or just press ENTER to create the partition with the maximum size.

      8. Repeat Steps 4 and 5 to create additional partitions if you want them.

      9. If you want to install Windows XP, use the ARROW keys to select the partition where you want to install Windows XP, and then press ENTER. If you do not want to format the partition and install Windows XP, press F3 two times to quit the Windows Setup program, and then do not follow the remaining steps. In this case, you must use a different utility to format the partition.

      10. Select the format option that you want to use for the partition, and then press ENTER. You have the following options:



      The option to leave the current file system intact is not available if the selected partition is a new partition. The FAT file system option is not available if the selected partition is more than 32 gigabytes (GB). If the partition is larger than 2 GB, the Windows Setup program uses the FAT32 file system (you must press ENTER to confirm). If the partition is smaller than 2 GB, the Windows Setup program uses the FAT16 file system.
  • Basic Troubleshooting Tips after Installing a New Hard Drive


  • Based on Seagate IDE hard drives.

    If you have installed your drive and it does not function properly, perform the following basic checks:

    Warning: Always turn off the computer before changing jumpers or unplugging cables and cards. Wear a ground strap or use other antistatic precautions while working on your computer or handling your drive.

    • Verify compatibility. Verify that the host adapter and drive are appropriately matched to each other and to your computer. Refer to the relevant documentation for details.
    • Check all cards. Verify that all cards are seated in their slots on the motherboard and secured with mounting screws.
    • Check all connectors and cables. Make sure all ribbon and power cables are securely connected. Ribbon cables are easily damaged, especially at the connector. Try a new cable that you know is good. Make sure no connector pins are bent. Verify that pin 1 on the interface cable is aligned with pin 1 on the drive and host adapter (see Figure 2 on page 6).
    • Verify jumper settings. Review the instructions in this guide and in your host adapter installation guide. Make sure all appropriate jumpers are installed or removed as necessary.
    • Check your power-supply specifications. Each time you add a new device to your computer, make sure your cornputer's internal power supply can support the total power demand. If necessary, consult your dealer for a new power supply.
    • Verify the drive-type settings in the system setup program. The drive-type settings in the system BIOS must not exceed the physical specifications of your drive. Also, the settings must not exceed the limitations set by the operating system and BIOS.
    • Check for viruses. Before you use someone else's diskette in your system for the first time, scan the diskette for viruses.

    Additional Troubleshooting Tips

    If you have performed the preceding basic checks but the problem persists, follow these guidelines for troubleshooting specific cases:
  • After you install your new drive, your computer will not boot, and no error message appears on the screen.


  • Check your computer manual or BIOS manufacturer to determine whether your BIOS supports drives that have more than 4,092 cylinders. If your system has this limitation, use the following procedure to configure your computer:

    1. Turn off your computer, open the case, and remove your new drive.

      CAUTION: To avoid electrostatic discharge damage to your computer or hard drive, make sure you are well grounded before touching the drive, cable, connector or jumpers.

    2. Move the jumper on the alternate-capacity jumper, as shown in Figure 6. This causes the drive to appear to your BIOS as having a 2.1-Gbyte capacity (4,092 cylinders, 16 heads, 63 sectors per track). You may need third-party partitioning software, such as Disk Manager, to achieve full capacity of the drive.
    3. Remount your drive in the computer and replace the computer cover.
    4. Insert a bootable system diskette into drive A and turn on the computer. It should boot from drive A and automatically detect the new drive as a 2.1 -Gbyte drive.
    5. Insert your DiscWizard diskette into drive A and type A:XDM. Then press ENTER. This runs the Disk Manager program.
    6. Follow the Disk Manager instructions to install the dynamic drive overlay and to partition and format your new drive to its full capacity.
    7. After Disk Manager is done, reboot your system. You should see the Disk Manager banner and be able to access the full capacity of your new drive.

  • The screen remains blank when you power up the system.

  • If the steps listed above do not remedy this problem, try the following:
    • Make sure the monitor is plugged in and turned on.
    • Check all cards.
    • Make sure the video card is seated in its slot and secured with mounting screws.
    • Turn off the computer and remove the drive host adapter. If the screen turns on after you reboot, the host adapter may be incompatible or defective. If so, see your dealer.

  • The system does not recognize the drive.
    • Check all cables.
    • Make sure the power supply is adequate for system needs.
    • Reboot the computer and listen to make sure the drive motor starts up. If the drive is very quiet, it may be difficult to hear its discs reach operating speed. If the drive motor does not start up, recheck all drive cables.
    • Verify that for each drive, a drive-type is listed in the system setup program.
    • Try rebooting your computer by pressing the CTRL, ALT and DELETE keys simultaneously. If the drive is recognized after you reboot the system, the computer BIOS test may be completing before the drive is ready.
      One solution is to slow the processor speed during startup. If your computer has a turbo switch, set it to slow speed before turning the computer on. If there is no turbo switch, you may be able to use keyboard commands; see your computer manual for details. After the computer is up and running, return the processor to the fast speed.
      Another solution is to warm-boot your computer after every power-on.
    • Check for I/O address conflicts. To isolate the conflict, verify that the drive and host adapter are compatible with your computer. Turn off the computer and remove all the peripheral adapter cards except for the video card and host adapter. If the computer recognizes the drive when you reboot the computer, turn off the computer. Reinstall the other peripheral cards, one at a time, until the conflict reoccurs. After you have isolated the source of the address conflict, you can resolve the conflict by changing the 1/0 address of the peripheral that appears to cause the conflict.
    • If Disk Manager has installed the DDO on your hard drive and you have booted directly from a diskette, the information in the boot record for the drive may not have been loaded. Make sure there is no diskette in drive A and reboot. If you want to boot from the diskette, follow the "Booting with a Diskette" instructions under "Advanced Disk Manager Options" on page 20.

  • The dealer partitioned and formatted the drive for you in the store, but the drive does not respond when you install it.
    • Reboot the computer and make sure the drive spins up.
    • Check all cables.
    • Make sure the power supply is adequate for system needs.
    • Make sure the DOS or Windows version the dealer used to partition and format the drive is the same version you have installed in your computer. If it isn't, see your dealer.
    • Verify the drive-type values in the system setup program. You must install the drive using the same drive-type values your dealer used to partition the drive.
    • Check for 1/0 address conflicts between peripheral cards.
    • Check for viruses.

  • The system hangs in FDISK or fails to create or save the partition record.
    • Check all cables.
    • Your setup system diskette may be corrupted. Try using a backup diskette.
    • Make the partitions smaller.
    • Change the interrupt jumper setting on the host adapter.
    • Some BIOS have a Track 0 protection feature that protects Track 0 from viruses. This may cause FDISK to hang the system. You must disable this feature in the system setup program before you can use FDISK. See your computer reference guide for assistance. Be sure to re-enable this important feature when FDISK is done.

  • The system error message, "Drive not Ready," appears.
    • Check all cable connections. Make sure pin 1 of the drive is connected to pin 1 of the hard-disc controller or host adapter.
    • Make sure the power supply is adequate for system needs.
    • Reboot the computer and make sure the drive spins up.

  • The FDISK error message, "No Fixed Disk Present," appears.
    • Make sure the power supply is adequate for system needs.
    • Verify the drive-type values in the system setup program.
    • Check for 1/0 address conflicts.

  • The drive does not format to full capacity.
    • Verify the drive-type values in the system setup program. One of the following problems may have occurred:
    • The values may be set with an incorrect translation characteristic.
    • You may have entered a parameter value that exceeds the physical capacity of the drive.
    • You entered a translation characteristic that does not take full advantage of the drive's capacity.
    • The drive's physical specifications exceed the translation limits imposed by the BIOS.

      CAUTION: If you change the drive-type values in the system setup program, you must partition and format the drive again. This erases data on the drive.

    • If you have partitioned the drive into individual logical drives, you may need to make the partitions smaller to access the full drive capacity.
    • If your computer supports LBA mode, you may need to enable LBA mode in the system setup program to access the full capacity of the drive. Refer to your computer's reference guide to find out how to enable LBA.
    • Your computer may not support drives that have more than 4,092 cylinders. Follow the instructions on page 25 for After you install your new drive, your computer will not boot, and no error message appears on the screen.

  • The DOS message "Disk Boot Failure," "Non-System Disk" or "No ROM Basic - SYSTEM HALTED" appears.
    • Reinstall the DOS system files using the DOS SYS utility.
    • Check all cables.
    • Use FDISK to verify that the primary partition is active.
    • Check for viruses.

  • The system error message, "HDD controller failure" appears.
  • Confirm the jumper settings on the drive.
  • Verify the drive-type settings in the system setup program