• Main Menu
  • Networking

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • DSL Splitter

      DSL Splitter

      A DSL splitter, like a DSL filter, is a device used to prevent interference problems. It filters the low frequencies of the telephone line from the high-frequency ADSL line. However, the installation of a DSL splitter requires the help of a technician to split the main telephone cable into 2 lines unlike a DSL filter

    • What Are the Effects of Computer Hacking?

      What Are the Effects of Computer Hacking?

      Hacking as a Destructive Tool The common stance on hacking with the average person is that it is morally wrong. There have been several instances where hacking has proven to have caused problems. Hacking can create a variety of damages to people, groups and systems of broad spectrum. Negative Hacking Interactions: Identity Theft – Some hackers can

    • Cantenna

      Cantenna

      A Cantenna is a waveguide antenna that is directional in nature, and is used to better detect or broaden a wireless network’s range. The original Cantenna was a 50 ohm resistive load that amateur radio enthusiasts used. It is a simple product that can be created with an empty Pringles can (and more recently, wider

    • MPLS (Multi Protocol Label Switching)

      MPLS (Multi Protocol Label Switching)

      MPLS stands for Multi Protocol Label Switching. The MPLS is often referred to as the layer in between the Data Link and Network layers because of where it operates. The MPLS serves as a method to forward packets of data easily by using labels. What are the Data Link and Network layers? In the seven-layer

    • UDP (User Datagram Protocol)

      UDP (User Datagram Protocol)

      User Datagram Protocol or UDP is part of the Internet Protocol suite. By using UDP, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally implemented, but unlike TCP, it does not guarantee reliability or correct data

    • Network Layer

      Network Layer

      The Network Layer is located at the 3rd position in the seven layer OSI model. It offers serviceable and practical ways of transmitting variable length data series from a source to a destination through one or more networks, while preserving the class of service and error handling tasks. The Network Layer is accountable for source

    • What is a Zeroconf?

      What is a Zeroconf?

      Zeroconf (zero configuration networking) refers to several protocols and techniques that are used together to create an IP (Internet Protocol) network with no special configuration servers or manual operator intervention. These networks allow novices to connect computers, network devices, scanners, and printers to create a functioning network without requiring manual configuration. Zeroconf does not require

    • Internet Backbone

      Internet Backbone

      In 2005, the one billionth Internet user logged on to the World Wide Web. Hundreds of thousands of new users log in for the first time each week. It is estimated that the 2 billion user mark will be reached in less than 10 years from now. There is no question that the World Wide

    • Access Control

      Access Control

      Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works,

    122 queries in 0.368 seconds.