• Main Menu
  • Networking

    • How to Become a VoIP Reseller

      How to Become a VoIP Reseller

      If you are serious about reselling Voice over Internet Protocol (VoIP) services, there are some questions you will need to ask yourself first. Here are some simple guidelines to help you determine if and how you should pursue your goal of becoming a VoIP reseller. Know the Service If you really want to be a

    • What is the SMB Protocol?

      What is the SMB Protocol?

      The Server Message Block (SMB) protocol is designed to support file sharing, serial ports, printers, and other communications interfaces such as mail slots and named pipes established between two or more computers. The protocol can be used on top of the TCP/IP or other network protocols such as NetBEUI on the Internet. SMB primarily allows

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    • TCP Sequence Prediction Attack

      TCP Sequence Prediction Attack

      A TCP sequence prediction attack is an attempt to hijack an existing TCP session by injecting packets which pretend to come from one computer involved in the TCP session. The TCP Sequence Prediction Attack TCP is a reliable connection-oriented layer 4 (Transport Layer) protocol. Packet transfer between hosts is accomplished by the layers below layer

    • Default Passwords for Belkin Routers

      Default Passwords for Belkin Routers

      By default, all Belkin routers’ default username and password is admin (username) while “blank” (leave it blank) for the password. You need to properly connect the router to your modem and PC before you can access the router using a web browser (IE, Firefox, Chrome, etc.).  To access the router’s GUI, all you need to

    • 802.11b

      802.11b

      802.11b is the standard that is popularly used for high speed wireless networks. The standard is set by IEEE (Institute of Electrical and Electronics Engineers) and uses a 2.4 gigahertz radio frequency. There are several standards that are in use today for wireless communication from one computer device to another; however 802.11b is cost effective,

    • Wireless Networks

      Wireless Networks

      Wireless networks are those computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network. Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features

    • How to Find an SSID Number

      How to Find an SSID Number

      Over the past decade, wireless network use has grown from just something done in computer science departments at universities to something done in the home, restaurants, and just about anywhere. SSID (Service Set Identifier) is the term that describes the wireless network name. It distinguishes between networks that may be in range of a device

    • How to Block an IP Address

      How to Block an IP Address

      An IP address is the numeric label or sequence of numbers that is assigned to a computer or device used on the Internet or a local area network. It is a means of identification and determining the user's address online. When an IP address is blocked, network connections to or from that address are not

    • ISAKMP

      ISAKMP

      ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in a internet environment. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). ISAKMP typically utilizes IKE

    networking
    467 queries in 0.559 seconds.