• Main Menu
  • Networking

    • Frame vs Packet

      Frame vs Packet

      A packet and a frame are both packages of data moving through a network. A packet exists at Layer 3 of the OSI Model, whereas a frame exists at Layer 2 of the OSI Model. Layer 2 is the Data Link Layer. The best known Data Link Layer protocol is Ethernet. Layer 3 is the

    • SMS Shortcuts

      SMS Shortcuts

      SMS (Short Message Service) is a protocol for sending and receiving brief text messaging over digital cellular networks. Most people send SMS messages from the very small keypads on their mobile phones, and most people who receive SMS messages read them on the tiny screens of their mobile phones. Because of those considerations, and because

    • Broadband over Power Lines

      Broadband over Power Lines

      Broadband over Power Lines, or BPL, refers to the transmission (sending and receiving) of digital data through existing power cables and electricity distribution infrastructures. This can be viewed as a mere variation on using television cables; instead of using television cables, though, power transmission lines are going to be used. The Broadband over Power Lines

    • PPP Authentication Protocols

      PPP Authentication Protocols

      Windows Server 2003 and Windows XP support the following PPP authentication protocols: PAP or Password Authentication Protocol The oldest forms of authentication schemes used where the user credential are sent in plain text. This is not the securest form of passing authentication credentials as anybody can use a third party sniffer program and capture these

    • What is a TFTP Server?

      What is a TFTP Server?

      A Trivial File Transfer Protocol (TFTP) server is based on a simple Fire Transfer Protocol (FTP) that was first defined in 1980. TFTP books routers and other computers that do not have storage devices. It also transfers small files between two or more computer network hosts such as a transfer initiated on a remote X

    • WiMAX

      WiMAX

      WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group. Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • WAP (Wireless Application Protocol)

      WAP (Wireless Application Protocol)

      Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such

    • How to Perform a DNS Lookup

      How to Perform a DNS Lookup

      DNS, Domain Name System, is a complex hierarchical system which helps map Internet addresses with their respective machines over the World Wide Web. When a domain is created and hosted, a variety of information is linked with it. DNS Lookup is generally a process of digging out this related information for a specified domain name.

    • LDAP Security Issues

      LDAP Security Issues

      RFC 2829 – Authentication Methods for LDAP defines the basic threats to an LDAP directory service: Unauthorized access to data via data-fetching operations, Unauthorized access to reusable client authentication information by monitoring others' access, Unauthorized access to data by monitoring others' access, Unauthorized modification of data, Unauthorized modification of configuration, Unauthorized or excessive use of

    116 queries in 0.722 seconds.