• Main Menu
  • Networking

    • How to Disable the Netgear Router Firewall

      How to Disable the Netgear Router Firewall

      In most cases, disabling the firewall on a Netgear router is a really bad idea. In fact, it is such a bad idea that Netgear does not even make a button in their GUI that does this. Nevertheless, users can effectively disable a Netgear router firewall just by adding a rule or two to the

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • Cisco Network Management

      Cisco Network Management

      Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are

    • Ethernet Splitter

      Ethernet Splitter

      An Ethernet splitter can split a single Internet connection so that two or more computers can connect to the Internet simultaneously. It can also create additional connections for other computers on a network, which can reduce the overall amount of cabling required to setup a network. Unfortunately, Ethernet splitters cannot resolve the network collision issues

    • 2wire Default Password

      2wire Default Password

      The 2wire Ethernet client wirelessly connects electronic devices that are not equipped with wireless cards or adapters to a home network. Once configured on a Windows computer, a 2wire card can be used on any device that has an Ethernet connection (e.g. an Xbox 360). A common problem is determining what the 2wire default password

    • WPA (Wi-Fi Protected Access)

      WPA (Wi-Fi Protected Access)

      WPA (Wi-Fi Protected Access) is an interim standard by the WiFi Alliance to comply with the security protocol designed for wireless security. WPA will most likely be rolled into an eventual IEEE 802.11i standard. This protocol was an outcome of numerous severe flaws researchers had discovered in the preceding wireless security system called Wired Equivalent

    • WAP (Wireless Application Protocol)

      WAP (Wireless Application Protocol)

      Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such

    • Understanding Frame Relay

      Understanding Frame Relay

      Frame Relay is a protocol for transmitting data over a wide area network (WAN). It was designed to use across ISDN interfaces but it is now used over an assortment of other network interfaces. Once one becomes a master of frame relay design and configuration, it is much easier to obtain a strong understanding of

    • CSMA/CD

      CSMA/CD

      CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used in Ethernet networks to ensure that only one network node is transmitting on the network wire at any one time. Carrier Sense means that every Ethernet device listens to the Ethernet wire before it attempts to transmit. If the Ethernet device senses that

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    networking
    446 queries in 0.699 seconds.