• Main Menu
  • Networking

    • FQDN (Fully Qualified Domain Name)

      FQDN (Fully Qualified Domain Name)

      An FQDN, or Fully-Qualified Domain Name, is a domain name that specifies the exact location of a webpage. An example of an FQDN, would be “https://www.tech-faq.com/”, in which “com” is used to specify the root domain that Tech-FAQ is hosted on, “www” specifies the hostname, and “http” specifies the transfer protocol. While an FTP or

    • What is a Smart Antenna?

      What is a Smart Antenna?

      A smart antenna is one that transmits or receives multiple radio frequencies at once. Smart antennas increase data transfer rates and reduce errors by handling several copies of the same information. Conventional antenna systems consist of one antenna that serves as a transmitter and one that serves as a receiver. This is starting to change,

    • ICMP (Internet Control Message Protocol)

      ICMP (Internet Control Message Protocol)

      ICMP is the Internet Control Message Protocol. ICMP is a complementary protocol to IP (Internet Protocol). Like IP, ICMP resides on the Network Layer of the OSI Model. ICMP is designed for sending control and test messages across IP networks. Unlike the Transport Layer protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) which

    • VLAN (Virtual Local Area Network)

      VLAN (Virtual Local Area Network)

      VLAN (Virtual Local Area Network) is a logical local area network (or LAN) that extends beyond a single traditional LAN to a group of LAN segments, given specific configurations. Since a VLAN is a logical entity, its creation and configuration is done completely in software. How is a VLAN Identified? Since a VLAN is a

    • What is Intersymbol Interference?

      What is Intersymbol Interference?

      Intersymbol interference is a signal distortion in telecommunication. One or more symbols can interfere with other symbols causing noise or a less reliable signal. The main causes of intersymbol interference are multipath propagation or non-linear frequency in channels. This has the effect of a blur or mixture of symbols, which can reduce signal clarity. If

    • LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol) is a protocol for communications between LDAP servers and LDAP clients. LDAP servers store "directories" which are access by LDAP clients. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • DSL Splitter

      DSL Splitter

      A DSL splitter, like a DSL filter, is a device used to prevent interference problems. It filters the low frequencies of the telephone line from the high-frequency ADSL line. However, the installation of a DSL splitter requires the help of a technician to split the main telephone cable into 2 lines unlike a DSL filter

    • What Are the Effects of Computer Hacking?

      What Are the Effects of Computer Hacking?

      Hacking as a Destructive Tool The common stance on hacking with the average person is that it is morally wrong. There have been several instances where hacking has proven to have caused problems. Hacking can create a variety of damages to people, groups and systems of broad spectrum. Negative Hacking Interactions: Identity Theft – Some hackers can

    114 queries in 0.851 seconds.