• Main Menu
  • Networking

    • 802.11g

      802.11g

      802.11g is one of the standards used for high speed wireless networks, commonly known as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in June of 2003 and uses a 2.4 to 2.5 gigahertz radio frequency to send and receive data from one device to another. There are several

    • ICMP (Internet Control Message Protocol)

      ICMP (Internet Control Message Protocol)

      ICMP is the Internet Control Message Protocol. ICMP is a complementary protocol to IP (Internet Protocol). Like IP, ICMP resides on the Network Layer of the OSI Model. ICMP is designed for sending control and test messages across IP networks. Unlike the Transport Layer protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) which

    • Ethernet Splitter

      Ethernet Splitter

      An Ethernet splitter can split a single Internet connection so that two or more computers can connect to the Internet simultaneously. It can also create additional connections for other computers on a network, which can reduce the overall amount of cabling required to setup a network. Unfortunately, Ethernet splitters cannot resolve the network collision issues

    • 192.168.1.1 – What Are its Uses and Why is it Important?

      192.168.1.1 – What Are its Uses and Why is it Important?

      The 192.168.1.1 IP address is a default commonly used by Linksys routers. Linksys is now a division of Cisco, Incorporated and makes a large number of the broadband routers used throughout the world. The address is not exclusive to Linksys, but most other major router manufacturers use different default addresses for configuration of home or

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • Access Control

      Access Control

      Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works,

    • Attenuation

      Attenuation

      Attenuation is a reduction in signal strength over distance. Attenuation is a common problem of telecommunication cables that causes a decrease in data speeds on longer cables. Attenuation is also known as “loss” and can be countered by data repeaters and amplifiers. While attenuation is a problem for long cables, short cables do not usually

    • 192.168.1.245

      192.168.1.245

      Cisco is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Cisco products are sold worldwide to millions of consumers for both residential and commercial purposes. Cisco also markets a number of data plans for some of the largest Internet Service Providers in the world. What is 192.168.1.245? 192.168.1.245

    • How to Get Free VoIP

      How to Get Free VoIP

      Free VoIP calls are never completely free of cost. Often, the goal is not to achieve completely free calls to all destinations, but to use the VoIP operator that suits one’s needs best. Keeping that in mind, one will learn that most VoIP companies let users talk for free in their own network, but will

    • 802.11i

      802.11i

      The 802.11i wireless standard was released by the IEEE on June of 2004 and implements improved encryption for wireless networks than realized on past standards released. Commonly referred to as the WPA2 implementation, the 802.11i implementation requires newer encryption standards than seen with the WEP implementation by requiring TKIP (Temporal Key Integrity Protocol) and AES

    networking
    465 queries in 0.469 seconds.