• Main Menu
  • Networking

    • Access Point

      Access Point

      As technology has advanced, devices have become more complex and integrated. Access points make a good example of such devices. These can be described as hardware that includes a modem, router, and other optional functions that are all compiled into one device. Access points are becoming more popular than modems or routers and they are

    • – What Are its Uses and Why is it Important? – What Are its Uses and Why is it Important? is a private IP address that is commonly used by Netgear and D-Link routers. The Netgear and D-Link brands are competitors to the Linksys division of Cisco, Incorporated and make a large number of the Internet routers used world-wide. The network address is not granted to the Netgear and D-Link companies exclusively; however, as

    • – What Are its Uses and Why is it Important? – What Are its Uses and Why is it Important? is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the

    • WiMAX


      WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group. Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and

    • Fiber Optic Internet

      Fiber Optic Internet

        Everyday, data transfer rates are getting faster and faster as technology gets better and demands get higher. To keep up with these faster data transfer needs, fiber optic Internet access has been introduced to the public. Fiber optic Internet uses pulses of light to create an electromagnetic carrier wave that can be used to

    • Airborne Internet

      Airborne Internet

      Airborne Internet refers to installing a broadband network hub in an aircraft flying at 52,000 to 69,000 feet above sea level – high enough to be out of weather disturbances and way outside the flight envelope of commercial aircraft. The aircraft will provide Internet connection to places and establishments within its range. The Need for

    • How to Use PuTTY

      How to Use PuTTY

      PuTTY is an open source terminal emulation program that accesses Telnet, SSH, and other TCP protocols and acts as a serial client for computers. The letters “TTY” in the name PuTTY represent the terminal application in the Unix and Linux Operating Systems (OSs) and is also short for teletype. The PuTTY application was first written

    • Wi-Fi Software Tools

      Wi-Fi Software Tools

      A wide variety of Wi-Fi software tools are available. These tools for Wi-Fi perform functions such as: Wireless network discovery Wireless network mapping Wireless network traffic analysis Wireless network RF signal strength monitoring Wireless network encryption cracking Wireless network custom frame generation Dictionary or brute force attacks against wireless networks Denial of Service (DoS) attacks

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • Wavelength Division Multiplexing

      Wavelength Division Multiplexing

      Wavelength Division Multiplexing (WDM) is a technology found in fiber optic communications. WDM uses a single fiber to transmit multiple optical signals. It does this by breaking up the signal into different frequencies or wavelengths of color. The various wavelengths indicate that different amounts of data are being transmitted simultaneously. This results in an increase

    427 queries in 0.574 seconds.