• Main Menu
  • Networking

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • How to Disable the Netgear Router Firewall

      How to Disable the Netgear Router Firewall

      In most cases, disabling the firewall on a Netgear router is a really bad idea. In fact, it is such a bad idea that Netgear does not even make a button in their GUI that does this. Nevertheless, users can effectively disable a Netgear router firewall just by adding a rule or two to the

    • Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model Hierachical network design helps us to make networks more reliable and predictable. Level by level design help to understand networking factions easily like, we can use tools like access lists at specific level and can avoid them from others. Cisco layer model consist of the following three layers. The

    • How Does Wireless Networking Work?

      How Does Wireless Networking Work?

      Wireless networking has grown from only being a tool employed by academia and Fortune 500 companies to being deployed in locations such as McDonald’s, Starbucks, and gas stations for free consumer use over the past decade. Consumers can install a wireless network in the home for minimal cost today, and many home theater set-top boxes

    • Cat 6

      Cat 6

      Cat 6 (Category 6) is a cable standard used mainly for Ethernet computer networking, security systems, and telephone services. Cat 6 cable is backward compatible with the Cat 5, Cat 5E, and Cat 3 cable standards. Category 6 cable is capable of transmitting voice and data up to 155 Mbps (mega bits per second), with

    • How to Block an IP Address

      How to Block an IP Address

      An IP address is the numeric label or sequence of numbers that is assigned to a computer or device used on the Internet or a local area network. It is a means of identification and determining the user's address online. When an IP address is blocked, network connections to or from that address are not

    • How Do ADSL Microfilters Work?

      How Do ADSL Microfilters Work?

      ADSL Internet Access Asynchronous Digital Subscriber Line (ADSL) is a broadband Internet option that is commonly available in many locations. Asynchronous only means that the download speeds and the upload speeds are different (with the upload speeds usually being significantly lower) and provides a fast option to browse the web. Internet access through ADSL requires one

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • Cisco VPN Error 412

      Cisco VPN Error 412

      The CISCO VPN Client is a popular software application that allows end-users to connect a computer to a VPN (virtual private network). Once connected, the client computer can leverage the resources of the remote network in a secure environment as if connected directly to the local network. Unfortunately, a common error that can arise for

    • VLAN (Virtual Local Area Network)

      VLAN (Virtual Local Area Network)

      VLAN (Virtual Local Area Network) is a logical local area network (or LAN) that extends beyond a single traditional LAN to a group of LAN segments, given specific configurations. Since a VLAN is a logical entity, its creation and configuration is done completely in software. How is a VLAN Identified? Since a VLAN is a

    networking
    428 queries in 0.602 seconds.