• Main Menu
  • Networking

    • RG-8

      RG-8

      RG-8 is a 50-ohm coaxial cable that is used for radio transmission (for instance in amateur radio or CB). Recently, they have become an integral part of computer networks, as they can increase connectivity. One of the first things that someone will notice about RG-8 cables is that they are huge when compared to other

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • How to Setup a Network

      How to Setup a Network

      A network is an interconnection of multiple computers, peripherals and network devices. Networks are commonly created at homes and offices to share resources (like printers, scanners, files, media, and Internet connection), communicate, or play multi-player games. A network is created with two or more computers, networking devices and some cabling. Before you begin to setup

    • 802.11b

      802.11b

      802.11b is the standard that is popularly used for high speed wireless networks. The standard is set by IEEE (Institute of Electrical and Electronics Engineers) and uses a 2.4 gigahertz radio frequency. There are several standards that are in use today for wireless communication from one computer device to another; however 802.11b is cost effective,

    • How to Increase a WiFi Signal

      How to Increase a WiFi Signal

      The first thing you can try to increase a WiFi signal is to move the laptop computer or mobile device closer to the source of the network that is being accessed. If you have control over the router of the network, you can increase the wireless signal by placing the router on a high area

    • What is a Dial-Up Connection?

      What is a Dial-Up Connection?

      A dial-up connection is any connection that is connected through a regular phone line. When that phone line is connected to a modem and then configured to dial a specific number, a user can access the Internet. It is the slowest form of Internet connection, but that is a result of also being the most

    • Subscriber Connectors (SCs)

      Subscriber Connectors (SCs)

      The Subscriber Connector (SC) is a fiber optic connector with a push-pull latching mechanism that provides quick insertion and removal while ensuring a positive connection. The SC is also available in a duplex configuration. It has a benefit in keyed duplex capability to support send/receive channels. This connector is commonly used for most modern network

    • Where you can get VoIP Training?

      Where you can get VoIP Training?

      Voice over Internet Protocol (VoIP) is a relatively new technology, because of which individual businesses will need someone who is well versed in the intricacies of VoIP. Companies are often willing to invest in training their IT administrators in VoIP because of the sure returns. But, where do you go to obtain a training course

    • The OSI Model – What It Is; Why It Matters; Why It Doesn’t Matter.

      The OSI Model – What It Is; Why It Matters; Why It Doesn’t Matter.

      The OSI Model was created based on recommendations from the International Organization for Standardization (ISO) in 1980, which started expanding on the DoD model in the late 1970s. The current standard was published in 1996. The official title for the model is the ISO OSI (Open Systems Interconnection) Reference Model since it describes or relates

    • IP Address Spoofing

      IP Address Spoofing

      IP address spoofing denotes the action of generating IP packets with fake source IP addresses in order to impersonate other systems or to protect the identity of the sender. Spoofing can also refer to forging or using fake headers on emails or netnews to – again – protect the identity of the sender and to

    } 117 queries in 0.285 seconds.