• Main Menu
  • Networking

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    • Differences Between ISDN and DSL

      Differences Between ISDN and DSL

      Definitions Integrated Services Digital Network (ISDN): ISDN is a digital transmission system, which is used to transmit voice and data through copper telephone wires. In other words, it's a circuit-switched data transmission system that is used for voice and data transmission over the wire. Digital Subscriber Line (DSL): DSL is also a digital transmission system

    • Transport Layer

      Transport Layer

      The transport layer is the fourth layer of the OSI Model and exists between the Session Layer and Network Layer. The transport layer is used to actually transfer data from one application to another and can be used to stream data from one device to another. The most popular transport layer, the Transmission Control Protocol,

    • Wi-Fi (802.11)

      Wi-Fi (802.11)

      WiFi 802.11 describes a number of radio frequencies that can be used for wireless Internet access. WiFi 802.11 is specifically designed and maintained for the use of wireless Internet and can be found in most residences and commercial buildings in the United States and abroad. WiFi 802.11, which is also known as IEEE 802.11, consists

    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer Ethernet provides services corresponding to Layers 1 and 2 of the OSI reference model, and IEEE 802.3 specifies the physical layer (Layer 1) and the channel-access portion of the Data Link (Layer 2). In addition, IEEE 802.3 does not define a logical link control protocol but does not specify

    • 2wire Default Password

      2wire Default Password

      The 2wire Ethernet client wirelessly connects electronic devices that are not equipped with wireless cards or adapters to a home network. Once configured on a Windows computer, a 2wire card can be used on any device that has an Ethernet connection (e.g. an Xbox 360). A common problem is determining what the 2wire default password

    • Spanning Tree Protocol

      Spanning Tree Protocol

      Redundant Topology A Local Area Network may consist of more than one segment. Each segment of the LAN connected through a separate physical device mostly switch. Switches use their uplink ports to connect different segments. The LAN administrator can connect the switches with each other through more than one uplink port using redundant topology. Redundant

    • How to Perform a DNS Lookup

      How to Perform a DNS Lookup

      DNS, Domain Name System, is a complex hierarchical system which helps map Internet addresses with their respective machines over the World Wide Web. When a domain is created and hosted, a variety of information is linked with it. DNS Lookup is generally a process of digging out this related information for a specified domain name.

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    175 queries in 0.568 seconds.