Autonegotiation CISCO Port

Imagine you want to set up a meeting with a potential employer in Japan while living in Alaska. You have several communication options like Skype, Vonage, FaceTime, and a cell phone. Your employer also has Skype, an international cell phone, and a landline. You both agree to use Skype for the meeting. This process is similar to autonegotiation in networking.

Autonegotiation is a method used in Ethernet connections where two devices communicate to agree on transmission settings, such as speed, duplex mode, and flow control. The connected devices send messages to each other to share their capabilities and then select the best performance option that both can support. This process happens at the physical layer, which is the first layer of the OSI model.

With autonegotiation, devices can choose different transmission rates and duplex modes, including half-duplex (where data can flow in both directions but not at the same time) and full-duplex (where data can flow in both directions simultaneously). Higher speeds and full-duplex are preferred whenever possible. If one device does not support autonegotiation, the device that does will select a speed that matches the other device, but it will default to half-duplex since full-duplex cannot be assumed. Standards for 1000BASE-T, 1000BASE-TX, and 10GBASE-T require that autonegotiation be enabled.

Example of Configuring a Router

Here’s an example of how to set a router for full-duplex operation at a speed of 100 Mbps:

Terminal Console output
R2(config-if)#int f0/0           
R2(config-if)#no shut           
R2(config-if)#duplex ?
auto Enable AUTO duplex configuration
full Force full duplex operation
half Force half-duplex operation           
R2(config-if)#duplex full           
R2(config-if)#speed ?           
10  Force 10 Mbps operation           
100  Force 100 Mbps operation           
auto Enable AUTO speed configuration           
R2(config-if)#speed 100           
R2(config-if)#do sh int f0/0           
FastEthernet0/0 is up, line protocol is up           
Hardware is Gt96k FE, address is c402.484c.0000 (bia c402.484c.0000)           
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,           
reliability 255/255, txload 1/255, rxload 1/255           
Encapsulation ARPA, loopback not set           
Keepalive set (10 sec)           
Full-duplex, 100Mb/s, 100BaseTX/FX           

Example of Autonegotiation on Another Router

Now, let’s see how to set up autonegotiation on another router, which negotiates to half-duplex and 10 Mbps:

Terminal Console output
R1(config-if)#int f0/0           
R1(config-if)#duplex auto           
R1(config-if)#speed auto           
*Mar 1 00:08:55.523: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up           
*Mar 1 00:08:59.967: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up           
R1(config-if)#do sh int f0/0           
FastEthernet0/0 is up, line protocol is up           
Hardware is Gt96k FE, address is c401.4f4c.0000 (bia c401.4f4c.0000)           
MTU 1500 bytes, BW 10000 Kbit/sec, DLY 1000 usec,           
reliability 255/255, txload 1/255, rxload 1/255           
Encapsulation ARPA, loopback not set           
Keepalive set (10 sec)           
Half-duplex, 10Mb/s, 100BaseTX/FX           

Important Note

In both examples, it’s crucial that the routers are set to autonegotiation, and that both duplex and speed settings match for the routers to successfully negotiate to full-duplex and 100 Mbps.

Remove Windows Infection

Fixing Malware Damage on Windows Devices

If your Windows device gets infected with malware, you might need to use more than one program to get rid of it. Sometimes, malware can mess up Windows settings, causing various problems.

One helpful tool is the Windows Repair tool from Tweaking.com. It makes it easy to fix issues caused by malware or other problems. Before you start fixing things, it will ask you to choose options like running Malware Bytes to check for malware, using Chkdsk to find disk errors, creating a system restore point, and running System File Checker to fix any wrong system files.

If you want to fix things yourself, you can find guides online that show you how to repair a malware-damaged PC.

What if your computer is so infected that it won’t even start in Safe Mode? Some antivirus companies, like AVG and Kaspersky, offer files you can download to create a bootable CD or USB drive. This drive can scan your computer for malware and help remove it.

You can get the AVG Rescue CD from their website, and Kaspersky Rescue Disk 10 is also available online.

After using these tools to remove serious infections, restart your computer and use a program like the Windows Repair tool to get everything back to normal.

Android Virus test

Android devices are more likely to get malware compared to iOS devices. Many apps in the Google Play Store can have malware, even though Google has made improvements to find these harmful apps. Luckily, there are many good security and anti-malware apps available in the Google Play Store.

These apps usually have features like blocking dangerous websites, scanning your device for malware, boosting performance, and protecting against theft. For example, the AVG AntiVirus FREE app can find harmful apps, like the Wallpaper Dragonball app, and suggest that you uninstall it if it’s causing problems.

Another app, Clean Sweep, helps make your device run better by getting rid of junk files and unused programs. It also scans for malware. For instance, it can automatically find a test file that checks for viruses and suggest that you remove it.

Using these apps can help keep your Android device safe and running smoothly.

Prevent and Remove Malware on iOS Devices

Even though Apple iOS devices are not easily affected by malware that targets Windows computers, it’s still important to keep your devices safe from common threats. Since iOS devices can share information with Windows and Mac computers, an unprotected iOS device could be used to launch attacks.

There are anti-malware apps for iOS that offer helpful features. For example, some apps can scan email attachments for viruses, protect you from websites that track your online activities or have malware, and help back up your contacts or find a lost device. You can find these apps in the iOS App Store.

Using these tools can help keep your iOS device secure and your information safe.

Preventing and Removing Malware on Windows Devices

As mentioned earlier, modern web browsers have some tools to help fight against malware. However, you need extra protection for the following threats:

  • Real-time protection against malware that comes from the web, email, or USB drives.
  • Malware scanning to find and remove infections that slip past real-time protection.
  • Spyware scanning to detect and eliminate privacy threats, like tracking cookies and apps.

Start by using a good anti-malware program that offers real-time protection and regularly scans your computer for malware. For example, Windows 8 and 8.1 come with Windows Defender, which provides both real-time and scanning protection. If you want to use other anti-malware programs with Windows 8/8.1 or Windows RT, you can check the Windows Compatibility website for compatible options.

For older versions of Windows, you can find links to commercial products (some of which are free) on the Microsoft website.

To enhance your protection, consider installing an additional anti-malware scanner that works alongside your main protection. Malwarebytes is a popular choice that is free, quick to set up, and well-respected in the industry. It can help find problems even after other programs have scanned your system.

To tackle spyware, like tracking cookies or apps, you should also get an antispyware app that can work with your real-time protection. SUPERAntiSpyware is another good option that has a free version and is highly rated. It can help find and remove tracking cookies from your system.

Free vs. Paid Anti-Malware and Anti-Spyware Apps

There are many good free anti-malware and anti-spyware apps available, so you might wonder why you should pay for protection. Paid versions of these apps usually offer extra features, such as phone support, automatic updates, real-time protection, and scheduled scans. If you choose to use free apps, you’ll need to remember to keep them updated and scan your system regularly.

Got Malware? What It Is and What It Does

Are you getting lots of annoying pop-up ads? Has your web browser changed your home page without asking? Is your once-fast computer now really slow? Or can’t your browser connect to the Internet? These issues might be caused by malware.

Malware, short for malicious software, is a type of software that can slow down your computer, steal your information without you knowing, and make it hard for you to access your data and the Internet.

Here are some common types of malware:

  • Virus: A program that spreads to other files when you run it.
  • Trojan Horse: Malware that pretends to be helpful, like a video player or antivirus software, but is actually harmful.
  • Worm: A type of malware that can spread itself automatically through a network.
  • Fake Security Software: This pretends to find viruses on your computer and asks you to pay to remove them, even though there’s nothing wrong.
  • Ransomware: This malware locks your files and demands payment to unlock them, often with a deadline to pay.
  • Rootkit: Malware that hides itself in your operating system to avoid being detected.
  • Keylogger: This records everything you type, including passwords and sensitive information.
  • Spyware: Malware that collects your information and sends it to other websites.
  • Adware: This shows pop-up ads that can slow down your computer.
  • Browser Helper Objects (BHOs): These change how your browser works, like adding toolbars or changing your home page.

Some legitimate programs might do similar things, like asking if you want to install a toolbar. The difference is that malware makes changes without your permission. It operates in the background. To keep your computer running well and your information safe, it’s important to understand malware and how to deal with it.

How Malware Attacks

Through Your Browser:

If you use the Internet often, your web browser can be a way for malware to get onto your device. For example, you might see a website that claims to upgrade your video player or one that pretends to scan your computer for viruses. If you accept these offers, you could end up installing malware.

Through Email:

Emails that look like they’re from banks or other companies can also spread malware. They often try to get you to click on a link that leads to a harmful file or a fake website. This is called “phishing.”

Through Phone Calls:

Some scammers call you pretending to be from a tech company like Microsoft. They might say there are problems with your computer and guide you to install software that gives them access to your device. If you get such a call, just hang up.

Through USB Drives:

Malware can also spread through USB drives or flash memory. If your computer is set to automatically run files when you connect a USB device, any malware on it could infect your system right away.

How to Protect Yourself from Malware

To keep malware from causing problems, you need to take steps to protect yourself:

  • Be Careful with Emails and Online Scams: Don’t click on suspicious links or attachments.
  • Use Browser Protection: Enable features that warn you about unsafe websites.
  • Install Anti-Malware Software: Use programs that protect against malware.
  • Scan Regularly: Check your computer for malware often.
  • Fix Any Damage: If malware does get through, take steps to repair the damage.

Avoiding Scams

Scams are tricks designed to take your money or information. To avoid being scammed, think carefully about the links and information you see. Here are some tips:

  • Spot Fake Websites: Look for differences between real and fake sites.
  • Check Links Before Clicking: Hover over links to see where they lead.
  • Be Wary of Zip Files: These can hide malware, so don’t open them unless you’re sure they’re safe.
  • Log In Directly: Instead of clicking links in emails, type the website address into your browser.

Signs of Fake Websites

Fake websites often look like real ones, using similar colors and designs. If a login page doesn’t have security features, it might be fake. Always check the URL before entering any information.

Use Your Browser’s Protection

Modern browsers have built-in features to help protect you from malware. For example, Internet Explorer has SmartScreen technology that warns you about phishing attempts and blocks harmful downloads. Firefox and Google Chrome also have protections against malware.

Don’t Rely on Just Your Browser

While having a browser that fights malware is helpful, it’s not enough on its own. You should also use anti-malware software for extra protection. Make sure you have multiple layers of security to keep your devices safe from malware.