• Main Menu
  • Networking

    • How to Change a MAC Address

      How to Change a MAC Address

      Every Ethernet card had a factory assigned MAC address burned into it when it was made. At times, users may want to change this MAC address to one of their choice. One of the main reasons for doing this is to get around access control lists(s) on a specific router or server, either by hiding

    • Network Cable is Unplugged

      Network Cable is Unplugged

      When an error message saying, “Network cable is unplugged” is displayed, it generally means that the computer can detect that there is an ASDL and/or Cable Connection pre-configured on the computer, but an Ethernet cable and/or a cable that is supposed to be plugged into the modem is unplugged. In the case that all of

    • 9 to 25 Pin Serial Adapter Pinout

      9 to 25 Pin Serial Adapter Pinout

      This adapter will enable you to connect a 25 pin male serial cable to a 9 pin female serial connector on your computer. 9 pin female connector 25 pin male connector 9-Pin to 25-Pin Adapter Pinout Signal 9-Pin 25-Pin Carrier Detect 1 8 Receive Data 2 3 Transmit Data 3 2 Data Terminal Ready 4

    • What is MiFi?

      What is MiFi?

      MiFi stands for “My Wi-Fi” or “Mobile Wi-Fi”, and represents a line of relatively small wireless routers developed by Novatel Wireless, which turn a mobile broadband internet connection into a Wi-Fi hotspot. These hotspots support up to 5 Wi-Fi enabled devices within a range of 10 meters. This means that any Wi-Fi enabled device, from

    • ISAKMP

      ISAKMP

      ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in a internet environment. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). ISAKMP typically utilizes IKE

    • Two Factor Authentication

      Two Factor Authentication

      Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords

    • VoIP (Voice over Internet Protocol)

      VoIP (Voice over Internet Protocol)

      VoIP (Voice over IP) includes communication protocols, technologies and techniques of transmission used for multimedia sessions and voice communication via IP networks. Other terms used synonymously with ‘Voice over IP’ include broadband phone, voice over broadband and Internet telephony.  How Does VoIP Work? VoIP calls require media channel setup, analog voice signal digitalization, encoding, packeting

    • Extranet

      Extranet

      In the modern world of information and light-speed communications, data must be accessible from anywhere. This very issue is why nearly all businesses have created vast networks of computers throughout their offices. These same companies have an extensive web presence to reach their customers all over the world. A problem then arises, however, when a

    • Wireless Routers

      Wireless Routers

      A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in a home or office. Travelers definitely come across wireless networks at most international airports. A wireless router, which is responsible for sending information from one computer

    • What is a Dial-Up Connection?

      What is a Dial-Up Connection?

      A dial-up connection is any connection that is connected through a regular phone line. When that phone line is connected to a modem and then configured to dial a specific number, a user can access the Internet. It is the slowest form of Internet connection, but that is a result of also being the most

    networking
    450 queries in 0.510 seconds.