• Main Menu
  • Networking

    • 9 to 25 Pin Serial Adapter Pinout

      9 to 25 Pin Serial Adapter Pinout

      This adapter will enable you to connect a 25 pin male serial cable to a 9 pin female serial connector on your computer. 9 pin female connector 25 pin male connector 9-Pin to 25-Pin Adapter Pinout Signal 9-Pin 25-Pin Carrier Detect 1 8 Receive Data 2 3 Transmit Data 3 2 Data Terminal Ready 4

    • What is the Netgear Router Default IP Address?

      What is the Netgear Router Default IP Address?

      Netgear is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Netgear products can be found in virtually every country and millions of consumers around the world use them for both residential and commercial purposes. Netgear Router Default IP Address As with any router, all Netgear routers include a

    • Denial of Service (DoS) Attacks

      Denial of Service (DoS) Attacks

      A Denial of Service (DoS) attack is one that attempts to prevent the victim from being able to use all or part of his/her network connection. A denial of service attack may target a user to prevent him/her from making outgoing connections on the network. It may also target an entire organization to either prevent

    • WiFi Antenna

      WiFi Antenna

      A WiFi antenna is a device that sends and or receives radio signals that computers and other electronic devices use to facilitate wireless communication with each other. While WiFi antennas have many uses, they are most commonly found in or on wireless routers. A wireless router is a device that creates a wireless computer network

    • What is a QSIG?

      What is a QSIG?

      QSIG is a signaling protocol that is  based on ISDN. It communicates signals between private branch exchanges (PBXs) within a Private Integrated Services Network (PISN) using the application-level ROSE and connection-level Q9.31 protocols. QSIG uses ISDN as the physical link layer in the exchanges and is often used in enterprise voice or integrated service networks.

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    • FQDN (Fully Qualified Domain Name)

      FQDN (Fully Qualified Domain Name)

      An FQDN, or Fully-Qualified Domain Name, is a domain name that specifies the exact location of a webpage. An example of an FQDN, would be “http://www.tech-faq.com/”, in which “com” is used to specify the root domain that Tech-FAQ is hosted on, “www” specifies the hostname, and “http” specifies the transfer protocol. While an FTP or

    • How to Access Wireless Router Settings

      How to Access Wireless Router Settings

      What is a Wireless Router? A wireless router is a device that wirelessly connects multiple computers and devices to the Internet. Wireless routers’ design and capabilities vary and they drastically range in price, but are used for the same function. Wireless routers are usually very easy to setup and many provide the user with built-in

    • Ethernet Switch

      Ethernet Switch

      A switch is something that is used to turn various electronic devices on or off. However, in computer networking, a switch is used to connect multiple computers with each other. Since it is an external device it becomes part of the hardware peripherals used in the operation of a computer system. This connection is done

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    networking
    161 queries in 0.274 seconds.