• Main Menu
    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • How to Change a WEP Key

      How to Change a WEP Key

      A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the

    • Implementing Proxy Server

      Implementing Proxy Server

      Designing a Proxy Server Implementation Before you can design a Proxy Server implementation and install Proxy Server, you need to be knowledgeable on a number of concepts: IP routing concepts Firewalls concepts Packet filtering concepts Files and protocols utilized in Web applications To design a Proxy Server implementation, there are a number of factors that

    • What is FTIR Spectroscopy?

      What is FTIR Spectroscopy?

      FTIR spectroscopy (Fourier Transform Infrared Spectroscopy) is a technique that uses infrared light to observe properties of a solid, liquid, or gas. It is used in many different applications to measure the absorption, emission, and photo-conductivity of matter by shining a narrow beam of infrared light at the matter in various wavelengths and detecting how

    • How Do Zambonis Work?

      How Do Zambonis Work?

      In the world of ice hockey and ice skating, there is nothing more important than maintenance of the ice. Failure to properly take care of an ice rink could result in broken bones, property damage, or the loss of a game. In order to efficiently care for an ice rink, ice rink owners spend large

    • LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol) is a protocol for communications between LDAP servers and LDAP clients. LDAP servers store "directories" which are access by LDAP clients. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.

    • 802.1X

      802.1X

      802.1x is an IEEE standard that provides the definition for the encapsulation of EAP (Extensible Authentication Protocol) and is also known as EAPOL (EAP over LAN). The standard was first defined in 2001 and later clarified in 2004 to be used with other IEEE 802 working group defined technologies such as the 802.11 wireless standard.

    • ITIL Release Management

      ITIL Release Management

      When software and hardware goes through development and testing, the time comes for it to be released throughout the IT infrastructure or to other clients. This falls on the lap of the ITIL Release Management team. This team of individuals ensures that the licensure, tests and version-verified software and hardware is all up to date

    • What is an Isolation Transformer?

      What is an Isolation Transformer?

      An isolation transformer is made of two copper coils that are wound around each other and are each supplied by their own power source. While the term “isolation transformer” technically refers to any transformer, it is specifically a transformer that isolates a circuit from an alternating current. An isolation transformer does this by separating two

    • How to Add Ring Tones to my BlackBerry

      How to Add Ring Tones to my BlackBerry

      Owning a Blackberry enables its owners to do much more than they could ever accomplish with a basic cell phone. However, one of the most popular features that have carried over from basic cell phone to the BlackBerry is the ability to add ring tones. In earlier models adding ring tones to your Blackberry was

    174 queries in 0.617 seconds.