• Main Menu
  • Networking

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • What is NetBEUI?

      What is NetBEUI?

      NetBEUI (NetBIOS Extended User Interface) is an extended version of NetBIOS, the primary software that allows individual computers to communicate within a given local area network. While NetBIOS itself is most often used to transfer pictures, documents, videos, or other files from one computer to another, NetBEUI is responsible for arranging the actual information in

    • What is a Rollover Cable?

      What is a Rollover Cable?

      A rollover cable is a network cable that connects a computer terminal to a network router’s console port. It is also referred to as a Cisco console cable and is normally flat and light blue so as to distinguish it from other network cable types. The pin-outs on one end of the cable are reversed

    • Fiber Optics

      Fiber Optics

      Fiber optic technology makes use of light to carry digital signals via optical cables. Fiber optic cables are very thin glass wires made from extremely pure optical glass. This technology is based on the concept of light reflection. In the case of fiber optics technology, light carrying digital signals is reflected inside the optical cable

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • ISDN BRI

      ISDN BRI

      ISDN BRI (Basic Rate Interface) is a standard Integrated Services Digital Network (ISDN) service meant for residential and small scale business Internet connections. There is another type of ISDN configuration called the Primary Rate Interface (PRI) that is designed to provide higher bandwidth. The BRI configuration defined in the physical layer standard I.430 produced by

    • LMDS (Local Multipoint Distribution Service)

      LMDS (Local Multipoint Distribution Service)

      LMDS (Local Multipoint Distribution Service) is a broadband wireless point-to-multipoint specification utilizing microwave communications. LMDS operates on FCC licensed frequencies. The FCC divided the United States into 493 BTA's (Basic Trading Areas) and auctioned the rights to transmit on the LMDS bands in each of those areas to LMDS service providers. Each BTA is licensed

    • DSL (Digital Subscriber Line)

      DSL (Digital Subscriber Line)

      Digital Subscriber Line or Digital Subscriber Loop (DSL) is a type of high-speed Internet technology that enables transmission of digital data via the wires of a telephone network. DSL does not interfere with the telephone line; the same line can be used for both Internet and regular telephone services. The download speed of DSL ranges

    • Fiber Optic Internet

      Fiber Optic Internet

        Everyday, data transfer rates are getting faster and faster as technology gets better and demands get higher. To keep up with these faster data transfer needs, fiber optic Internet access has been introduced to the public. Fiber optic Internet uses pulses of light to create an electromagnetic carrier wave that can be used to

    networking
    479 queries in 0.531 seconds.