Editorials All posts
10 Coolest Gadgets Your Cat Will Love
These gadgets aren’t for you human, they’re for your cat. Of course, since your cat ...
10 Ways a “Dumb” Phone is Better Than a Smartphone
When we shop for a mobile phone these days most of us will probably look ...
10 Ways Facebook Subtly Changes Your Behavior
Facebook continues to be the most popular social network, and has basically become as ubiquitous ...
Networking All posts
Tunneling
Tunneling is a way in which data is transferred between two networks securely. All the ...
Electronics All posts
Ka Band
The Ka band uplink uses frequencies between 27.5GHz and 31Ghz and the downlink uses frequencies ...
IT Management All posts
Application Service Provider
An Application Service Provider or ASP provides “applications” as a service – specifically, software and ...
Mobile Telephony All posts
TIMSI
A TIMSI, or Temporary International Mobile Subscriber Identity, number is a random number that is ...
Microsoft Windows All posts
Group Policy Terminology and Concepts
What is Group Policy Group Policy is an Active Directory feature that provides the means ...
Wireless Networks All posts
How Does Wireless Networking Work?
Wireless networking has grown from only being a tool employed by academia and Fortune 500 ...
802.11b
802.11b is the standard that is popularly used for high speed wireless networks. The standard ...
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is an interim standard by the WiFi Alliance to comply with ...
Passwords All posts
Cisco Router Default Passwords
Cisco routers are routers that Cisco, a leading provider in network devices, produces. Cisco has ...
How to Find Stored Passwords on a Computer
There are a large number of websites and programs that prompt end users to save ...
How to Decrypt Cisco Passwords
If ‘service password-encryption’ is not configured on the Cisco device, simply read the plain text ...



















