Windows.  Viruses.  Notebooks.  Internet.  office.  Utilities.  Drivers

Before you write "nothing works for me", try to find out what specifically does not work for you.

If you decide to leave a message on the forum / VKontakte, please note that the message is not considered an official appeal to the technical support service, the contacts of the TP service are on the main page of the site.

Please read at least a few posts on the topic before posting. last page- it is possible that this problem has already been solved or it is already being solved!

Diagnostic commands:

*Performed in a previously opened "command line" window. (Start -> All Programs -> Accessories -> Command Prompt)
For Windows Vista/7: Win+R ===> cmd ===> Enter
For Windows NT/2000/XP/VISTA: "Start" - "Run" - "cmd"
For Windows 95/98: "Start" - "Run" - "command".

Copying text: right-click on this window - "edit" - "select" and "edit" - "copy".

ipconfig /all
nslookup
ping [host address (for example, ya.ru) ] [-n 20]
pathping [host address]
tracert [host address]

ipconfig /all shows network interface settings.
Everything that is indicated there must be checked with the user's memo (if the memo is old, then check with the data that was issued technical support). See the website for how to set up the connection.

ping [-t] shows the response time from the specified host. Large delays can indirectly serve as an indicator of a slow resource (a busy channel, weak resource hardware, and similar problems). The [-t] key is used to execute the command before the user interrupts it by pressing "Ctrl+C". By default, without this key, ping will only run four times, which is not always enough.

pathping Shows the response time and the number of missing packets along the route to the host.

tracert
For graphic display problems, you can download the PingPlotter program from the local network

nslookup
Check DNS work.

Check algorithm: Error " Network cable not connected"

1. Check cable connection in network card
2. Check the integrity of the cable up to the shield.
3. Call Tech. support.

The network cable is connected, but there are no incoming packets.

1. Check the cable connection in the network card (you can remove and insert the cable into the socket).
2. Disable all firewalls (firewalls), if you have them.
3. Ping the gateway (take the address from the connection settings or from the connection details in the control panel).
4. Call Tech. support.

The network cable is connected, there are incoming packets, but do not go to the internal services:

1. Disable all firewalls (firewalls), if you have them.
2. Check DNS operation (nslookup).
3. Check connection with these servers (ping)
4. Check connection with central servers. (ping online.vo, ping 192.168.0.250, ping your_gateway_address)
5. Check browser settings
5.1. Internet Explorer-> "Tools" menu -> "Internet Options" -> "Connection" -> "Network Settings" -> check if the checkbox "use a proxy server" is disabled
6. Call Tech. support.

DNS check:

The nslookup server command should return the ip address of that server. For example, the command "nslookup vo47.ru" should return the address "193.106.108.68"

Diagnostic Commands

TeamPurposeLaunch FormatExample
ipconfig Shows network interface settings ipconfig /all
netstat Shows the route table netstat -nr
nslookup Refers to the DNS server (if not specified, it is taken from Windows settings) to resolve a computer's DNS name to its IP address, or vice versa nslookup DNS-name_or_IP-address DNS-server_IP-address nslookup vo47.ru
nslookup ya.ru 193.106.108.67
ping Checks the connection with another computer and the speed of the response. It is not a tool for measuring connection speed.
ping DNS-name_or_IP-address ping www.vo47.ru
ping 193.106.108.97
tracert Same as ping, but with information output for all intermediate nodes tracert -d DNS-name_or_IP-address tracert -d cs47.ru
pathping Same as tracert, but with more detail and loss percentage pathping DNS-name_or_IP-address pathping vk.com

To control the main network equipment, be it Ethernet, Bluetooth, Wi-Fi, Mobile Internet or other types of connections, you can also use "Network" - "Network and Sharing Center public access". You can access it in two ways: by entering the name in the charms search field or by right-clicking on the network icon on the desktop.

To view installed on your computer, network equipment click on the "Change adapter settings" link in the left pane.

The window that opens contains all the network connections available on your computer.

Right-clicking on a connection will allow you to perform various actions, they are also available in the toolbar at the top of the window:

  • Disable the connection so that it is saved in the network settings, but access to it is denied.
  • Connect and disconnect from the network.
  • Check network status, useful if you are having trouble connecting.
  • Diagnose connection problems or malfunctions. This is an automatic troubleshooter that resets the connection to its default state.
  • Check connection properties. Here you can change the network adapter settings. Use your computer to share with other computers, turning it into a mobile hotspot, or enable/disable specific features that may be causing problems, such as IPv6.
  • There is no option to delete a connection, change the auto-connect feature, or change the password settings. To delete a connection, select it and press the Delete (Del) key on your keyboard.

Attention. Windows 8.1 only allows you to choose the state of the network or Internet connection. Sometimes it's easier to delete the connection and re-establish it on restart.

If you are managing a network at home or at work, you should have a complete understanding of security and network management, including knowing who will be using the network.

Of course, a router that allows multiple master and guest SSID connections costs a lot of money, especially for small businesses. But its benefits are clear, you don't have to worry about visitors accidentally accessing your computers, files stored on them, or shared storage in your work environment.

Many high-end routers offer this functionality, and it's hard to recommend a better one in the workplace. Such a router is also useful at home, especially if you use a shared network storage, such as a NAS drive connected to your router or a hard drive USB disk on which you save backups and private files.

The main thing is to always make sure that the router has two passwords: one for administration through the interface and another for Wi-Fi. These passwords must always be different. If you have a router that supports multiple SSIDs, each must have its own unique password. This - The best way ensure, as far as possible, that you have superior security on your network.

Clue. To create secure password, make sure it is at least 12 characters long and includes a mixture of uppercase and lowercase letters, numbers, and symbols. You can also use some numbers and symbols to replace letters, such as "5" instead of "D", "1" instead of "A" and so on.

Protecting Wi-Fi networks.

When you create your Wi-Fi network, you may be faced with the question - what type of security to use. You can select WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, or WPA2-Enterprise. Since they are all a combination of letters and numbers, it would be nice to know what each one really means. It is tempting to choose a basic type of encryption such as WEP because it allows the use of short, easy-to-remember passwords. But a short password is not secure. The higher the encryption level, the more complex the default password requirements.

Suffice it to say that WEP, WPA, and WPA2 are far from secure, especially in the business environment, and quite tough for experienced and determined hackers. Although, if your router does not offer additional options security, such as AES encryption or a RADIUS authentication server - you will never be completely protected.

Each new one added to the network wifi type secure encryption and authentication makes the password longer with more stringent requirements. The simplest is entered into the computer only once; but the more complex one requires constant input.

What do you have in your network? How important are your files and documents? Are you really a target for a hacker? Most enthusiasts and IT professionals have the same types of files on their networks as any consumer, but they also have business files. However, only if you store particularly sensitive data on your network (for example, you work in a high-tech industry or for a government agency), you are a likely target for a hacker. Although past years have shown that the theft of government data is much more likely from the inside than from the outside.

Even if you will never be a target for a hacker, it is still better to use a balanced setting. For home users, WPA2 encryption is recommended. The minimum password length is slightly longer than easy to remember, but security professionals always recommend having long passwords. And after all, no one bothers you to write down your password on a piece of paper, it is unlikely that someone will physically break into your building to gain access to your WiFi networks. And WEP and WPA just don't provide enough security.

Manage data usage in mobile broadband.

If you use your computer on a mobile broadband connection (3G/4G), you probably want to make sure you don't exceed your usage limits.

Windows 8.1 can help you control and limit your data usage by showing it in the network connection bar. When you connect to a mobile broadband network, Windows shows the amount of data used so far. If you are on a monthly contract with a set amount of data, the counter can be reset each month by clicking Reset.

However, you will need to enable this feature for each network (you can also do this for Wi-Fi networks):

  1. Open PC Settings.
  2. Click on Network settings.
  3. Click on the name of the network for which you want to display data usage.
  4. In the Data Usage section, toggle the radio button under "Display my data usage in a list of networks" and optionally check to have Windows 8.1 treat this network as a metered connection. This setting prevents Windows and your applications from sending and receiving too much data, which saves you from excessive bandwidth costs.

The tiles window allows you to define the maximum amount of data that live tiles can use in a month. Once this limit is reached, live tiles on mobile broadband will no longer be updated.

For comfortable work on the Internet, the speed and stability of the network connection is important.

Sometimes there are problems with the network connection - as a result, files take a long time to download or web pages do not load. To find out why the problem occurred, check network connection.

Run built-in diagnostics

Check network access using the Windows Troubleshooter and Wireless Diagnostics for macOS. Select operating system:

  • Windows 10
  • Windows 7
  • macOS

Run the network troubleshooter:

    Click Start → Control Panel→ Network and Internet → Network and Sharing CenterTroubleshootingInternet connections.

    Follow the instructions on the screen.

Use the program "Wireless Diagnostics".

For more information, see Analyze your wireless network environment on the service website. Apple support.

Use network utilities

Get network diagnostic information using the Ping, PathPing/Traceroute, and Telnet utilities. Select operating system:

  • Windows 10
  • Windows 7
  • macOS

Ping

PathPing

telnet

First install the Telnet client:

Other utilities

Run the utility:

Ping

Using the Ping utility, you can check the quality of the network connection. The utility determines the delay between a request to the server and the response, as well as the loss of data packets. The shorter the round-trip time and the number of lost packets, the faster the web page will open or the movie will load.

To check network connection:

PathPing

Using the PathPing utility, you can determine on which intermediate network node data packets are delayed or lost.

To check intermediate hosts:

telnet

You can use the Telnet utility to check if the computer has permission to connect to the server.

First enable the Telnet client. For this:

Now you can check server access:

Other utilities

Choose a utility depending on the purpose:

    Ipconfig - find out IP address, subnet mask and others network settings;

    Getmac - view network connections, network adapters and their physical addresses;

    Tracert - get the chain of nodes through which the IP packet passes.

Run the utility:

    Go to the start menu and type in search line command line or cmd.exe . Launch the application.

    In the window that opens, enter:

    • ipconfig/all - for Ipconfig;

      getmac/v - for Getmac;

      tracert<адрес сайта>- for Tracert.

    Press Enter .

    To copy information anywhere open window right-click and select Select All. Then press Enter .

    The copied text can be pasted (Ctrl + V ) into text file or a letter.

I already wrote about what it is and how to check under what address the outside world sees you. However, often this information is not enough to understand what address is assigned to your network card, as well as to diagnose connection problems. Here is a list of commands that can be used. (you can also read about visual customization on my website)

First you need to open command line. This is done as follows: press the start button, select the "run" item.

Alternative way - you need to press the Win key (between Ctrl and Alt) and R at the same time, this method also works on Vista

A window appears in which you need to enter cmd and click OK

The same command line appears.

In it, you can type and "enter" commands by pressing Enter. The results can be copied - if you click right button you can select the desired piece, then you need to click the right mouse button again.

ping command

The first team to get to know is ping A that checks the availability of the given address. Enter command ping 127.0.0.1. You should get something like this (if the command is not ping does not work, then perhaps the instruction to fix the error cmd no command will help solve the problem):

C:\Documents and Settings\Administrator>ping 127.0.0.1

Packet exchange from 127.0.0.1 to 32 bytes:

Response from 127.0.0.1: number of bytes=32 time

Response from 127.0.0.1: number of bytes=32 time

Response from 127.0.0.1: number of bytes=32 time

Ping stats for 127.0.0.1:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

C:\Documents and Settings\Administrator>

As we can see, 4 packets were sent to the address 127.0.0.1, and they all reached the goal. What was this address and why was I sure that the packets would reach? The answer is simple - the packets were not sent anywhere, but remained on your computer. This address is specific and is used for loopback - packets that do not go anywhere outside. Great, we can now "ping" the address of this site: 212.193.236.38

C:\Documents and Settings\Administrator>ping 212.193.236.38

Packet exchange from 212.193.236.38 to 32 bytes:

Response from 212.193.236.38: number of bytes=32 time=3ms TTL=55

Response from 212.193.236.38: number of bytes=32 time=3ms TTL=55

Response from 212.193.236.38: number of bytes=32 time=3ms TTL=55

Ping stats for 212.193.236.38:

Packets: sent = 4, received = 4, lost = 0 (0% loss),

Approximate round-trip time in ms:

Minimum = 3ms, Maximum = 3ms, Average = 3ms

C:\Documents and Settings\Administrator>

You can notice only one difference - the packets did not reach instantly, but in 3 milliseconds. I hope you didn't have any delay in the delivery of packages either, and most importantly, you didn't see lines like

Timed out request.

The appearance of such lines means that some of the packets are lost. This indicates problems on the line or not on the server you are accessing.

ipconfig command

The next important command is ipconfig. Enter it. I got it like this:

Ethernet to Ethernet adapter:

C:\Documents and Settings\Administrator>

IN this case the address turned out to be 192.168.17.139. You can also ping this address (you ping your own) - packets should reach instantly. The default gateway is the address to which a computer sends packets when it cannot find a suitable address on its network. So, in my case, all packets except packets to 192.168.17.* will be sent to 192.168.17.240, and that computer should already decide what to do with them and where to forward them next. Note: the local network, that is, those addresses to which packets are not sent to the gateway are determined using a mask - a zero in the last place and 255 in all the previous ones just means that the last number in the IP address can be arbitrary.

One of the standard steps when looking for connection problems is to ping your gateway. If the packets do not reach it, then, apparently, the problem is somewhere nearby, for example, it is damaged or badly plugged in power cord. It is also worth knowing where the computer with your main gateway is physically located - at the provider, somewhere in the house, or maybe we can in your apartment. Note: some computers are configured not to respond to ping requests. Therefore, the absence of a ping is not a 100% guarantee that there is no connection with the address.

More information can be obtained from the command ipconfig /all. I managed:

C:\Documents and Settings\Administrator>ipconfig /all

Configuring IP for Windows

Computer name. . . . . . . . . : sander

Primary DNS suffix. . . . . . : MSHOME

Node type. . . . . . . . . . . . . : mixed

IP routing is enabled. . . . : No

WINS proxy is enabled. . . . . . . : No

DNS suffix lookup order. : MSHOME

Ethernet to Ethernet adapter:

The DNS suffix for this connection. . : srcc.msu.ru

Description. . . . . . . . . . . . : Broadcom 440x 10/100 Integrated Controller

Physical adress. . . . . . . . . : 00-16-D4-63-03-65

DHCP is enabled. . . . . . . . . . . : Yes

Auto tuning is enabled. . . . . : Yes

IP address. . . . . . . . . . . . : 192.168.17.139

Subnet mask. . . . . . . . . . : 255.255.255.0

Main gate. . . . . . . . . . : 192.168.17.240

DHCP server. . . . . . . . . . . : 192.168.17.240

DNS servers. . . . . . . . . . . : 212.192.244.2

212.192.244.3

C:\Documents and Settings\Administrator>

most useful information I highlighted in bold. gave me a dynamic address based on my MAC address or physical address. Mine are 212.192.244.2 and 212.192.244.3.

Other commands

Team tracert allows you to trace the path of packets from your computer to the target. Try, for example, to trace the path to this site: tracert site. The lines in the trace output are the points through which the packet passes along its path. The first point will be your gateway. Using the tracert command allows you to find the source of communication problems with an address. Packets sent by the tracert command have a TTL value - time to live - a positive integer. Each router on the path reduces this indicator by 1, if the TTL drops to zero, then the trace ends. By default, the initial TTL is 30, you can set another value with the option -h.

At first glance, it may seem that the computer, being connected to global network, uses only a few connections, but in fact there can be dozens of such connection points.

If you want to check it out for yourself, use special utility TCPView designed to monitor all existing connections in the system (connection monitoring) using the TCP and UDP protocols.

The TCPView utility is authored by well-known Windows security expert Mark Russinovich and is part of the Sysinternals Suite. It is free, despite the English interface is very easy to use and does not require installation.

When TCPView is started, it monitors connections and displays a list of all processes using TCP and UDP connections.

This displays the main parameters of each connection: process name, protocol, identifier, connection status, remote and local addresses.

The TCP and UDP protocols are the rules by which data is exchanged within the network. For example, the TCP protocol is very similar to how ordinary mail works.

Delivery of letters from the sender to the recipient and vice versa is possible only if the correct address is put on the envelope.

The same thing happens when data is transmitted over the TCP protocol. Any program that uses the Internet has a special identifier called a port number.

Many programs have standard rooms, for example, applications for transferring data via ftp are number 21, whoever had to work with will immediately understand what is at stake.

Connection monitoring

So, thanks to the TCPView utility, you can find out at any moment which application is using the Internet connection, who is connected to you and which ports are listening.

This will allow you to fully control the network activity of any program, including malware, because, especially Trojans, very often use the connection to transfer data.

If you find a suspicious connection, you can close it or completely end the process

With a live network connection, you may notice that some connection endpoint strings are constantly changing color, like a traffic light. This is done on purpose to make it easier for the user to track changes.

Thus, newly opened points will be marked in green, those whose status has suddenly changed in yellow, and closed connection points will be highlighted in red.

All information is updated every second, which, according to the developer, is the most optimal for monitoring connections, but you can change the update rate or even disable it by selecting from the menu view paragraph Update Speed.

By default, data by IP address and port number are displayed in alphabetic characters.

If this seems inconvenient to you, press Ctrl + R and the utility will immediately switch to the digital display mode. To view the full path to the process file, double-click on the selected line.

In the properties window that opens, you can view the full path, version executable file and, if necessary, terminate the process by clicking on the " End Process".

This operation, copying data ( Copy), as well as terminating the connection without deleting the process ( close connection) can be done from context menu TCPView invoked as usual by the right mouse button. Download the program from official website

If you notice an error, select a piece of text and press Ctrl + Enter
SHARE: