Soluții

Cum să vezi calea completă a unui folder de rețea mapat

Dacă folosiți foldere de rețea mapate, probabil ca v-ați întâlnit cu situația în care v-a fost trimisă o cale ce conține numele drive-ului mapat, spre exemplu “Z:\Nume Folder”, pe care nu il puteți accesa, primind mesajul că nu găsește calea respectivă.

Pentru a evita aceasta problema, trebuie sa trimiteți calea reală către resursa respectivă, iar pentru a o afla, puteți folosi una dintre metodele enumerate mai jos.

1. Deschideți comand prompt, prin apăsarea combinației de taste Windows key+R, si tastați cmd. Apoi, tastați comanda net use, care vă va afișa calea completă către toate locațiile mapate. Dacă folosiți aceasta metodă, trebuie sa completați  manual calea pentru a ajunge la fișierul/folderul dorit.

 

 

 

 

2.Dacă folosiți Microsoft Outlook, deschideți o fereastră pentru crearea unui mail nou, țineți click dreapta apăsat pe share-ul respectiv și trageți către fereastra din Outlook deschisa anterior. Va apărea un meniu, din care selectați opțiunea Create Hyperlink Here. Aceasta metodă vă va afișa cu succes calea completă către fișierul/folderul dorit.

 

 

[mai mult...]

Microsoft Excel 2016 crashes after opening certain documents

If you’re working with large excel files, or with ones that use Macros, you might have ran across  this issue, where the program crashes after opening those files.

Usually, in order to start troubleshooting these issues,you should check Microsoft Event Viewer for logs reffering to that application.The most common event I’ve run into is Event 1000, reffering to VBE7.dll.

 

 

 

 

 

 

 

 

To fix this problem, you must have administrator rights on that device, since you need modify the registry.

First,press Windows Key+R and type regedit in order to open the Registry Editor.

Copy the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\VBA\7.1\Common in the address field at the top of the editor window and create a new DWORD entry(for me it worked with 32 bit entry, while using a 64 bit Office) named CompileOnDemand with the 0 value.Now go to Computer\HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Options and add another DWORD entry ForceVBALoadFromSource with the value 1.

 

 

 

 

[mai mult...]

Cum se instalează și se utilizează extensiile în noul Microsoft Edge

Microsoft Edge Logo

Noul browser Microsoft Edge, bazat pe proiectul Chromium utilizat de Google Chrome, aduce o experiență de navigare mai bună pe computerele Windows 10. O caracteristică unică este posibilitatea de a utiliza extensii atât din Microsoft cât și din Chrome Web Store. Iată cum să le instalați și să le utilizați.

Va trebui să descărcați noul browser Microsoft Edge și să îl instalați înainte de a începe.

[mai mult...]

How iOS 13 Will Unlock NFC’s Potential

NFC has long been held back by Apple not supporting it—only Android did. Now that both major smartphone platforms will soon support NFC, the technology can reach its full potential. From keyless locks to digital IDs, the future is here.

Three NFC tags on a paper strip.

Apple Pay has always used NFC for contactless payments. If you’ve ever paid for something using your iPhone or Apple Watch, you’ve used NFC.

NFC stands for Near Field Communications, and it’s a set of standards that allow devices to communicate through radio waves when they’re in close proximity. Emphasis on the close, as the devices need to be 4 inches apart or less.

With NFC, you can accomplish a variety of tasks, whether it be sharing data, mobile payments, or tag reading and writing.

NFC isn’t a new technology by any means, but comprehensive support is something we’ve never seen. Android phones have longed enjoyed full NFC support, along with Blackberrys and Windows Phone. But adopting NFC doesn’t guarantee the success of a mobile platform.

But for all the mobile devices that do have NFC, one significant outlier existed: iPhones. While the Android phone with NFC hardware (the Nexus S) released in 2010, it took until 2014 to see an iPhone with NFC hardware (the iPhone 6). And in the beginning, it was locked down to solely payment processing.

That’s been changing over time, and with iOS 13, an iPhone going back to the iPhone 7 will have its NFC potential unlocked. App developers can read and write to NFC tags, read chipped passports and ID cards, unlock NFC-enabled doors, and more.

Use Your iPhone to Unlock Doors

One of the promises of NFC is added convenience to your life. With expanded support in iOS 13, you could not only leave your wallet at home but maybe even your house keys, too.

Some hotels, like Starwood, already have a similar function that relies on Bluetooth and your phone or Apple Watch to unlock your room, but the technology could just as easily use NFC instead (and does in many hotels). More and more business are using NFC cards to grant to access to offices or even protected areas of a workplace. Instead of remembering to attach your badge to your belt with a badge reel, pull out your phone and wave it over the sensor.

You can unlock some smart locks with NFC as well. If you installed an NFC lock in your home, you can forget about one more key you used to carry everywhere. Some apartment complexes are making a move to NFC key fobs as well, and if you have the option, carrying around just a phone will be more convenient.

Digital ID Cards for Your Phone

ReadID app showing a digitized passport on iPhone.

With iOS 13, iPhones will be able to scan NFC chipped IDs and store their details. With appropriate apps, you could then save a digital copy of your ID on your iPhone and pull it up when needed.

If you’ve ever used the Wallet app on iPhone, you’ll know why this is powerful and something to get excited over. Currently, you can digitize credit cards, debit cards, and even some rewards cards and store them in the Wallet app. But you still needed to carry your wallet or purse anyways, because you needed your ID. At that point, why not bring the physical cards and use them too?

But if you can store even your ID on a smartphone, then you can leave the wallet safe at home and have that less to carry.

We’ll have to wait on ID cards to catch up and support both NFC chips and digitization, but companies like RealID are already working on supporting iOS 13 with its passport digitization service.

But E.U residents of Great Britain will benefit even sooner with the release of iOS 13. The U.K. government created an EU Exit app that lets residents scan their passports and apply for to say in the U.K. after Brexit completes. But Apple didn’t support using NFC to scan the passport before. The only option was to Android, even if that meant borrowing a friend’s as the U.K. suggested. Now, Apple will support the feature, and an iOS EU Exit app is in the works.

 

Tagged Transactions Let You Ditch the Apps

A man looking at an iPhone while holding a Bird escooter

Right now, if you want to rent a scooter or bike from Lime or Bird, you first have to download an associated app. That’s not always feasible if you have low data caps, or the app exceeds the cellular download limit. A company can choose to support Apple Pay instead, but that requires a payment terminal, like that tap and pay credit card machines you see in stores.

With iOS 13, companies can strategically place NFC  stickers (for instance, on the scooter) and use those to arrange payment instead of download an app. The process should be faster overall since you won’t need to set up an account or wait for an app install. The change should benefit companies, too, as the ability to forgo an app download will likely spur impulse buys. The more barriers a company can remove, the more likely you’ll give a new service a try, even if just once.

Your iPhone Can Already Be a Transit Pass

Transport stations have been slowly switching to contactless methods for payment and check-in. Combined with Apple pay, you can easily pay for your rides ahead of time and scan through any check areas as needed. You can already do this in New York, Portland, Japan, Beijing, and Shanghai.

Combined with the upcoming digital ID and door unlock capabilities above, you could leave home, get on the subway, and unlock your office without the need for a wallet or keys. If the subway is too busy, catching a cab or renting a scooter with just an app, or soon the NFC tags above, is getting easier every day.

Shortcuts Speed Up Automations

Shortcuts app on iPhone

Siri Shortcuts let you automate sequences of actions, like dimming the screen and setting do not disturb, or texting three friends you are home after a long trip.

While convenient, you either have to speak to your iPhone or triggering it from an app. In iOS 13, you can create shortcuts that trigger when you tap your phone to an NFC tag.

Imagine for a moment you had two tags in your car. You could set one tag to open your preferred maps app, so you don’t have to hunt for it in your folders. The other tag could also open the maps app and insert your home address. While these ideas sound minor, they’re convenient, especially if you’re exhausted after a long day of travel.

You could also stick an NFC tag to your laptop that triggers your iPhone to turn on hotspot when tapped, thus skipping the hassle of digging through to the hotspot settings.

These scenarios aren’t just theory; we’ve used NFC tags and Android phone to accomplish the same goals.

The Two Major Smartphone Platforms Now Support NFC

An iPhone XR and Samsung S8 with NFC tags laying on top of them.
NFC sees use in many scenarios that Apple hasn’t yet explicitly promised to support, but could. Hotels and businesses have long used NFC chips and keyfobs to grant access to rooms or office. Instead out another card or fob, they could add a digital copy to your smartphone, giving one less item to worry about forgetting on the way out the door. Instead of pressing your card or fob to a reader, you would pull out your phone and scan that.

Other platforms like Android and Windows Phone have long championed NFC and its capabilities, and we can look to them for other potential features. Windows Phones used NFC to pair and share contact info and other data like photos. Rather than go through a complicated process of connecting via Bluetooth across two phones, you selected a photo or photos and then chose to send via NFC. Once you tapped the phones together, they paired and took care of the rest. Android has similar sharing capabilities called Android Beam that used NFC.

That same capability extends to business cards. Instead of carrying around dozens of business cards, you could create a digital card with your contact info and share it via NFC. It’s a dual-sided benefit, not only do you have less to carry (and buy) but you’ll know your contact details went into somebody’s phone and not the trash. Likewise, you can store tickets for events on your phone and use them via NFC; the venue would just need an NFC reader.

NFC can make Wi-Fi sharing less of a pain as well. By saving the relevant details to an NFC tag, your guests can connect to your network by just tapping it. No need to muddle through several SSID names, or write down your password. Any place that offers public Wi-Fi, like Hotels and restaurants, could also share Wi-Fi details on an NFC tag in central locations.

Some password managers, like Dashlane, let you add credit card info by tapping the card’s NFC chip (if it has one) to your phone. The information is pulled and stored securely in the password manager to make payment processing all the faster. The feature is Android only right now, but with iOS 13 that can change.

In some ways, what iPhone is doing now is something other platforms have tried to do for ages. But this is likely a case where everybody wins. Without all the major platforms on board, governments and companies lacked the incentive to embrace NFC fully. Much like Apple finally including QI wireless charging in its phone helped the wireless charging market reach a new level everyone can appreciate, adding more support for NFC may push it to a point where everybody embraces it, and so everyone wins.

[mai mult...]

How to See All Devices on Your Network With nmap on Linux

Ethernet cables plugged into a router
Think you know what’s connected to your home network? You might be surprised. Learn how to check using nmap on Linux, which will let you explore all the devices connected to your network.

You might think your home network is pretty simple, and there’s nothing to be learned from having a deeper look at it. You might be right, but the chances are you’ll learn something you didn’t know. With the proliferation of Internet of Things devices, mobile devices such as phones and tablets, and the smart home revolution—in addition to “normal” network devices such as broadband routers, laptops, and desktop computers—it might be an eye-opener.

If You Need To, Install nmap

We’re going to use the nmapcommand. Depending on what other software packages you have installed on your computer, nmap might be installed for you already.

If not, this is how to install it in Ubuntu.

sudo apt-get install nmap

sudo apt-get install nmap in a terminal window

This is how to install it on Fedora.

sudo dnf install nmap

sudo dnf install nmap in a terminal window

This is how to install it on Manjaro.

sudo pacman -Syu nmap

sudo pacman -Syu nmap in a terminal window

You can install it on other versions of Linux using the package manager for your Linux distributions.

Find Your IP Address

The first task is to discover what the IP address of your Linux computer is. There is a minimum and a maximum IP address your network can use. This is the scope or range of IP addresses for your network. We will need to provide IP addresses or a range of IP addresses to nmap, so we need to know what those values are.

Handily, Linux provides a command called ip and it has an option called addr (address). Type ip, a space, addr,  and press Enter.

ip addr

ip addr in a terminal window

In the bottom section of the output, you will find your ip address. It is preceded by the label “inet”.

output from ip address in a terminal window

The IP address of this computer is “192.168.4.25”. The “/24” means that there are three consecutive sets of eight 1’s in the subnet mask. (And 3 x 8 =24.)

In binary, the subnet mask is:

11111111.11111111.11111111.00000000

and in decimal, it is 255.255.255.0.

The subnet mask and the IP address are used to indicate which part of the IP address identifies the network, and which part identifies the device. This subnet mask informs the hardware that the first three numbers of the IP address will identify the network and the last part of the IP address identifies the individual devices. And because the largest number you can hold in an 8-bit binary number is 255, the IP address range for this network will be 192.168.4.0 through to 192.168.4.255.

All of that is encapsulated in the “/24”. Happily, nmap works with that notation, so we have what we need to start to use nmap.

Get Started with nmap

nmap is a network mapping tool. It works by sending various network messages to the IP addresses in the range we’re going to provide it with it. It can deduce a lot about the device it is probing by judging and interpreting the type of responses it gets.

Let’s kick off a simple scan with nmap. We’re going to use the -sn (scan no port) option. This tells nmap to not probe the ports on the devices for now. It will do a lightweight, quick scan.

Even so, it can take a little time for nmap to run. Of course, the more devices you have on the network, the longer it will take. It does all of its probing and reconnaissance work first and then presents its findings once the first phase is complete. Don’t be surprised when nothing visible happens for a minute or so.

The IP address we’re going to use is the one we obtained using the ip command earlier, but the final number is set to zero. That is the first possible IPAddress on this network. The “/24” tells nmap to scan the entire range of this network. The parameter “192.168.4.0/24” translates as “start at IP address 192.168.4.0 and work right through all IP addresses up to and including 192.168.4.255”.

Note we are using sudo.

sudo nmap -sn 192.168.4.0/24

sudo nmap -sn 192.168.4.0/24 in a terminal window

After a short wait, the output is written to the terminal window.

You can run this scan without using sudo, but using sudo ensures it can extract as much information as possible. Without sudo this scan would not return the manufacturer information, for example.

nmap output in a terminal window

The advantage of using the -sn option—as well as being a quick and lightweight scan—is it gives you a neat list of the live IP addresses. In other words, we have a list of the devices connected to the network, together with their IP address. And where possible, nmap has identified the manufacturer. That’s not bad for the first try.

Here’s the bottom of the list.

nmap output in a terminal window

We’ve established a list of the connected network devices, so we know how many of them there are. There are 15 devices switched on and connected to the network. We know the manufacturer for some of them. Or, as we shall see, we have what nmap has reported as the manufacturer, to the best of its ability.

When you look through your results, you will likely see devices that you recognize. There may well be some that you don’t. These are the ones we need to investigate further.

What some of these devices are is clear to me. Raspberry Pi Foundation is self-explanatory. The Amazon Technologies device will be my Echo Dot. The only Samsung device I have is a laser printer, so that narrows that one down. There’s a couple of devices listed as manufactured by Dell. Those are easy, that’s a PC and laptop. The Avaya device is a Voice Over IP phone that provides me with an extension on the telephone system at head office. It allows them to pester me at home more easily, so I’m well aware of that device.

But I’m still left with questions.

There are several devices with names that don’t mean anything to me all. Liteon technology and Elitegroup Computer systems, for example.

I have (way) more than one Raspberry PI. How many are connected to the network will always vary because they’re continually swapped in and out of duty as they get re-imaged and re-purposed. But definitely, there should be more than one showing up.

There are a couple of devices marked as Unknown. Obviously, they’ll need looking into.

Perform a Deeper Scan

If we remove the -sn option nmap will also try to probe the ports on the devices. Ports are numbered endpoints for network connections on devices. Consider an apartment block. All the apartments have the same street address (the equivalent of the IP address), but each apartment has its own number (the equivalent of the port).

Each program or service within a device has a port number. Network traffic is delivered to an IP address and a port, not just to an IP address. Some port numbers are preallocated, or reserved. They are always used to carry network traffic of a specific type. Port 22, for example, is reserved for SSH connections and port 80 is reserved for HTTP web traffic.

We are going to use nmap to scan the ports on each device and tells which ones are open.

nmap 192.168.4.0/24

nmap 192.168.4.0/24 in a terminal window

This time we’re getting a more detailed summary of each device. We’re told there are 13 active devices on the network. Wait a minute; we had 15 devices a moment ago.

The number of devices may well vary as you run these scans. It is likely due to mobile devices arriving and leaving the premises, or equipment being turned on and off. Also, be aware that when you switch on a device that has been powered off, it might not have the same IP address as it did the last time it was in use. it might, but it might not.

nmap output in a terminal window

There was a lot of output. Let’s do that again and capture it in a file.

nmap 192.168.4.0/24 > nmap-list.txt

nmap 192.168.4.0/24 > nmap-list.txt in a terminal window

And now we can list the file with less, and search through it if we wish.

less nmap-list.txt

less nmap-list.txt in a terminal window

As you scroll through the nmap report you’re looking for anything that you can’t explain or that seems unusual. When you review your list, make a note of the IP addresses of any devices that you wish to investigate further.

According to the list that we generated earlier, 192.168.4.10 is a Raspberry Pi. It will be running one Linux distribution or another. So what is using port 445? It is described as “microsoft-ds”. Microsoft, on a Pi running Linux? We’ll certainly be looking into that.

192.168.4.11 was tagged as “Unknown” in the earlier scan. It has a lot of ports open; we need to know what that is.

nmap output in a terminal window

192.168.4.18 was also identified as a Raspberry Pi. But that Pi and device 192.168.4.21 both have port 8888 open, which is described as being used by “sun-answerbook”. Sun AnswerBook is a many-years retired (elementary) documentation retrieval system. Needless to say, I don’t have that installed anywhere. That needs looking at.

nmap output in a terminal window

Device 192.168.4.22 was identified earlier as a Samsung printer, which is verified here by the tag that says “printer”. What caught my eye was the HTTP port 80 being present and open. This port is reserved for website traffic. Does my printer incorporate a website?

nmap results for a samsung printer in a terminal window

Device 192.168.4.31 is reportedly manufactured by a company called Elitegroup Computer Systems. I’ve never heard of them, and the device has a lot of ports open, so we’ll be looking into that.

The more ports a device has open, the more chances a cybercriminal has of getting into it—if it is exposed directly to the Internet that is. It’s like a house. The more doors and windows you have, the more potential points of entry a burglar has.

nmap output for an Intel NUC in a terminal window

We’ve Lined Up The Suspects; Let’s Make Them Talk

Device 192.168.4.10 is a Raspberry Pi that has port 445 open, which is described as “microsoft-ds.” A quick bit of Internet searching reveals that port 445 is usually associated with Samba. Samba is a free software implementation of Microsoft’s Server Message Block protocol (SMB). SMB is a means of sharing folders and files across a network.

This makes sense; I use that particular Pi as a sort of mini-Network Attached Storage device (NAS). It uses Samba so that I can connect to it from any computer on my network. Ok, that was easy. One down, several more to go.

Unknown Device With Many Open Ports

The device with IP Address 192.168.4.11 had an unknown manufacturer and a lot of ports open.

We can use nmap more aggressively to try to winkle more information out of the device. The -A (aggressive scan) option forces nmap to use operating system detection, version detection, script scanning, and traceroute detection.

The -T (timing template) option allows us to specify a value from 0 to 5. This sets one of the timing modes. The timing modes have great names: paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5). The lower the number, the less impact nmap will have on the bandwidth and other network users.

Note that we’re not providing nmap with an IP range. We’re focussing nmap on a single IP address, which is the IP address of the device in question.

sudo nmap -A -T4 192.168.4.11

sudo nmap -A -T4 192.168.4.11 in a terminal window

On the machine used to research this article, it took nine minutes for nmap to execute that command. Don’t be surprised if you have to wait a while before you see any output.

nmap output in a terminal window

Unfortunately, in this case, the output doesn’t give us the easy answers we’d hoped for.

One extra thing we have learned is that it is running a version of Linux. On my network that isn’t a great surprise, but this version of Linux is odd. It seems to be quite old. Linux is used within almost all of the Internet of Things devices, so that might be a clue.

Further down in the output nmap gave us the Media Access Control address (MAC address)  of the device.  This is a unique reference that is assigned to network interfaces.

The first three bytes of the MAC address is known as the Organizationally Unique Identifier (OUI). This can be used to identify the vendor or manufacturer of the network interface. If you happen to be a geek who has put together a database of 35,909 of them, that is.

ms lookup for mac address of Google device in a terminal window

My utility says it belongs to Google. With the earlier question about the peculiar version of Linux and the suspicion that it might be an Internet of Things device, this points the finger fairly and squarely at my Google Home mini smart speaker.

You can do the same sort of OUI lookup online, using the Wireshark Manufacturer Lookup page.

Wireshark MAC address lookup web page

Encouragingly, that matches my results.

One way to be certain about the id of a device is to perform a scan, turn the device off and scan again. The IP address that is now missing from the second set of results will be the device you just powered off.

Sun AnswerBook?

The next mystery was the “sun-answerbook” description for the Raspberry Pi with IP address 192.168.4.18. The same “sun-answerbook” description was showing up for the device at 192.168.4.21. Device 192.168.4.21 is a Linux desktop computer.

nmap makes its best guess at the use of a port from a list of known software associations. Of course, if any of these port associations are no longer applicable—perhaps the software is no longer in use and has gone end of life—you can get misleading port descriptions in your scan results. That was likely the case here, the Sun AnswerBook system dates back to the early 1990’s, and is nothing more than a distant memory—to those who’ve even heard of it.

So, if it isn’t some ancient Sun Microsystems software, so what could these two devices, the Raspberry Pi and the desktop, have in common?

Internet searches didn’t bring anything back that was useful. There were a lot of hits. It seems anything with a web interface that doesn’t want to use port 80 seems to opt for port 8888 as a fallback. So the next logical step was to try to connect to that port using a browser.

I used 192.168.4.18:8888 as an address in my browser. This is the format to specify an IP address and a port in a browser. Use a colon : to separate the IP address from the port number.

Resilio sync portal in a browser

A web site did indeed open up.

It is the admin portal for any devices that are running Resilio Sync.

I always use the command line, so I’d completely forgotten about this facility. So the Sun AnswerBook entry listing was a complete red herring, and the service behind port 8888 had been identified.

A Hidden Web Server

The next issue I’d recorded to take a look at was the HTTP port 80 on my printer. Again, I took the IP address from the nmap results and used it as an address in my browser. I didn’t need to provide the port; the browser would default to port 80.

Samsung printer embedded web server in a browser window

Lo and behold; my printer does have an embedded web server in it.

Now I can see the number of pages that have been through it, the level of toner, and other useful or interesting information.

Another Unknown Device

The device at 192.168.4.24 didn’t reveal anything to any of the nmap scans we’ve tried so far.

I added in the -Pn (no ping) option. This causes nmap to assume the target device is up and to proceed with the other scans. This can be useful for devices that don’t react as expected and confuse nmap into thinking they are off-line.

sudo nmap -A -T4 -Pn 192.168.4.24

sudo nmap -A -T4 -Pn 192.168.4.24 in a terminal window

This did retrieve a dump of information, but there was nothing that identified the device.

It was reported to be running a Linux kernel from Mandriva Linux. Mandriva Linux was a distribution that was discontinued back in 2011. It lives on with a new community supporting it, as OpenMandriva.

Another Internet of Things device, possibly? probably not—I only have two, and they’ve both been accounted for.

nmap output in a terminal window

A room by room walk-through and a physical device count gained me nothing. Let’s look up the MAC address.

MAC address lookup on Huawei phone

So, it turns out it was my mobile phone.

Remember that you can do these lookups online, using the Wireshark Manufacturer Lookup page.

Elitegroup Computer Systems

The last two questions I had were about the two devices with manufacturer names that I didn’t recognize, namely Liteon and Elitegroup Computer Systems.

Let’s change tack. Another command that is useful in pinning down the identity of the devices on your network is arp.  arp is used to work with the Address Resolution Protocol table in your Linux computer. It is used to translate from an IP address (or network name) to a MAC address.

If arp is not installed on your computer, you can install it like this.

On Ubuntu, use apt-get :

sudo apt-get install net-tools

sudo apt-get install net-tools in a terminal window

On Fedora use dnf :

sudo dnf install net-tools

sudo dnf install net-tools in a terminal window

On Manjaro use pacman :

sudo pacman -Syu net-tools

sudo pacman -Syu net-tools in a terminal window

To get a list of the devices and their network names—if they’ve been assigned one—just type arp and press Enter.

This is the output from my research machine:

arp output in a terminal window

The names in the first column are the machine names (also called hostnames or network names) that have been assigned to the devices. Some of them I have set (NostromoCloudbase, and Marineville, for example) and some have been set by the manufacturer (such as Vigor.router).

The output gives us two means of cross-referencing it with the output from nmap. Because the MAC addresses for the devices are listed, we can refer to the output from nmap to further identify the devices.

Also, because you can use a machine name with ping and because ping displays the underlying IP address, you can cross-reference machine names to IP addresses by using ping on each name in turn.

For example, let’s ping Nostromo.local and find out what its IP address is. Note that machine names are case-insensitive.

ping nostromo.local

ping nostromo.local in a terminal window

You must use Ctrl+C to stop ping.

ping output in a terminal window

The output shows us that its Ip address is 192.168.4.15. And that happens to be the device that showed up in the first nmap scan with Liteon as the manufacturer.

The Liteon company makes computer components that are used by a great many computer manufacturers. In this case, it is a Liteon Wi-Fi card inside an Asus laptop. So, as we noted earlier, the name of the manufacturer that is returned by nmap is just its best guess. How was nmap to know the Liteon Wi-Fi card was fitted to an Asus laptop?

And finally. The MAC address for the device manufactured by Elitegroup Computer Systems matches the one in the arp listing for the device I have named LibreELEC.local.

This is an Intel NUC, running the LibreELEC media player. So this NUC has a motherboard from the Elitegroup Computer Systems company.

And there we are, all mysteries solved.

All Accounted For

We have verified that there are no inexplicable devices on this network. You can use the techniques described here to investigate your network either. You may do this out of interest—to satisfy your inner geek—or to satisfy yourself that everything connected to your network has a right to be there.

Remember that connected devices come in all shapes and sizes. I spent some time going around in circles and trying to track down a strange device before realizing that it was, in fact, the smartwatch on my wrist.

[mai mult...]