• Main Menu
  • Networking

    • LDAP Security Issues

      LDAP Security Issues

      RFC 2829 – Authentication Methods for LDAP defines the basic threats to an LDAP directory service: Unauthorized access to data via data-fetching operations, Unauthorized access to reusable client authentication information by monitoring others' access, Unauthorized access to data by monitoring others' access, Unauthorized modification of data, Unauthorized modification of configuration, Unauthorized or excessive use of

    • What is an L2TP?

      What is an L2TP?

      L2TP (Layer Two Tunneling Protocol) defines an extension to PPTP (Point-to-Point Tunneling Protocol) that an ISP (Internet Service Provider) uses to allow a VPN (Virtual Private Network) to operate. L2TP combines L2F from Cisco Systems’ optimum features and PPTP from Microsoft into a single protocol. L2TP’s two primary components are the LNS (L2TP Network Server)

    • NAT (Network Address Translation)

      NAT (Network Address Translation)

      NAT (Network Address Translation) is a technique for preserving scarce Internet IP addresses. Why NAT? The current Internet uses IP addresses in the form xxx.xxx.xxx.xxx. A sample IP address might be 202.187.4.212. Because of the way these IP addresses are allocated, there started to be a shortage of available IP addresses. The current IP (Internet

    • Airborne Internet

      Airborne Internet

      Airborne Internet refers to installing a broadband network hub in an aircraft flying at 52,000 to 69,000 feet above sea level – high enough to be out of weather disturbances and way outside the flight envelope of commercial aircraft. The aircraft will provide Internet connection to places and establishments within its range. The Need for

    • RG-59

      RG-59

      The RG-59 cable is a type of coaxial cable that is used to generate low-power video connections. The cable works on two conductors that are based on a single common axis. It is also used for RF signal connections. The RG-59 cable conducts video and radio frequencies at an impedance of around 75 ohms. The

    • Tunneling

      Tunneling

      Tunneling is a way in which data is transferred between two networks securely. All the data being transferred is fragmented into smaller packets or frames and then passed through the tunnel. This process is different from a normal data transfer between nodes. Every frame passing through the tunnel will be encrypted with an additional layer

    • How to Get Free VoIP

      How to Get Free VoIP

      Free VoIP calls are never completely free of cost. Often, the goal is not to achieve completely free calls to all destinations, but to use the VoIP operator that suits one’s needs best. Keeping that in mind, one will learn that most VoIP companies let users talk for free in their own network, but will

    • SSID (Service Set IDentifier)

      SSID (Service Set IDentifier)

      The SSID (Service Set IDentifier) is a name that identifies a specific 802.11 wireless network. The name is set by the network administrator who configures the router. Some vendors refer to the SSID simply as the “network name.” The SSID is the name of the wireless network and should not be confused with the host

    • How to Replace Your Wireless Router Antenna

      How to Replace Your Wireless Router Antenna

      A wireless router is a computer networking device that routes data packets across another computer or across a wireless IP network. The wireless router comes with an 802.11 interface card and antenna. The wireless router antenna is generally what determines the signal strength of the wireless router. If your signal strength is weak, then you

    • Port Scanner

      Port Scanner

      A port scanner is a program which attempts to connect to a list or range of TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) ports on a list or range of IP addresses. Port scanners are used for network mapping and for network security assessments. The first decision to make when running a port

    179 queries in 0.636 seconds.