• Main Menu
  • Networking

    • Routing

      Routing

      Routing is the process of moving packets through an internetwork, such as the Internet. Routing actually consists of two separate, but related, tasks: Defining paths for the transmission of packets through an internetwork. Forwarding packets based upon the defined paths. Routing takes place in IP networks, based on IP routing tables and its entries. The

    • Single Sign-On

      Single Sign-On

      Single Sign-On is a concept that allows an end-user to access multiple, related but independent, software applications using a single account. That is, an end-user logs into his/her account only once and then access multiple applications without needing to login again. Single Sign-On is often abbreviated SSO. One the same line, Single Sign-Off is a

    • Tunneling

      Tunneling

      Tunneling is a way in which data is transferred between two networks securely. All the data being transferred is fragmented into smaller packets or frames and then passed through the tunnel. This process is different from a normal data transfer between nodes. Every frame passing through the tunnel will be encrypted with an additional layer

    • Coaxial Cable

      Coaxial Cable

      Coaxial cable, also called coax, is used to transmit radio frequency (RF) signals. It has low emission losses and provides protection from electromagnetic interference, allowing signals with low power to be transmitted over longer distances. Coaxial cable is comprised of an inner core, insulator, shield, and outer cover. It is called coaxial because these sections

    • What Are the Effects of Computer Hacking?

      What Are the Effects of Computer Hacking?

      Hacking as a Destructive Tool The common stance on hacking with the average person is that it is morally wrong. There have been several instances where hacking has proven to have caused problems. Hacking can create a variety of damages to people, groups and systems of broad spectrum. Negative Hacking Interactions: Identity Theft – Some hackers can

    • Analog Telephone Adapter

      Analog Telephone Adapter

      An Analog Telephone Adapter (ATA), also known as the Analog Telephony Adapter, is an electronic device used to enable one or more analog telephones or facsimile machines for Voice over Internet Protocol (VoIP) calls and faxes. An Analog Telephone Adapter basically creates a physical connection by use of telephone and Internet cables between a conventional

    • DHCP Reservation

      DHCP Reservation

      A DHCP reservation is a permanent IP address assignment. It is a specific IP address within a DHCP scope that is permanently reserved for leased use to a specific DHCP client. Users can configure a DHCP reservation in their DHCP server when they need to reserve a permanent IP address assignment. Reservations are used for

    • Routing Software

      Routing Software

      Most networks currently run on hardware-based routers from vendors like Cisco, Foundry, and Juniper. Computing power has advanced to the point where this is not necessary. General purpose computing platforms can replace these expensive dedicated hardware routers. These software routing platforms usually run on some version of free or inexpensive Unix. These are a few

    • How to Login to a SMC Router

      How to Login to a SMC Router

      SMC is a popular brand of wireless routers, but unlike most routers, SMC routers don’t have a universal username and passwords to access its configuration menu. The username and password varies depending on the model. If you want to gain access to your SMC router you can check your manual to see its default username,

    • How to Build a USB WiFi Antenna

      How to Build a USB WiFi Antenna

      A USB WiFi antenna is a device that provides a computer with access to the Internet when in range of a WiFi access point. It also refers to a USB-based wireless adapter that also provides a computer with Internet access but connects to specific wireless routers rather than public WiFi access points. USB WiFi antennas

    119 queries in 0.606 seconds.