• Main Menu
  • Networking

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • FTP Commands

      FTP Commands

      The usable FTP commands will differ from one FTP client to the next, but these are a set of fairly standard FTP commands as implemented in the FreeBSD FTP client. ! [command [args]] Invoke an interactive shell on the local machine. If there are arguments, the first is taken to be a command to execute

    • What is the Function of SerDes?

      What is the Function of SerDes?

      SerDes (pronounced sir-dees) stands for Serializer/Deserializer. It is a set of blocks that is commonly found in high speed communications. SerDes’ general purpose is to compensate for limited input/output. The blocks can convert data between serial data and interfaces that are parallel in different directions. Functions of SerDes The generic function is made up of

    • How to Access a Linksys Router

      How to Access a Linksys Router

      Users can connect to a Linksys router manually by attaching an Ethernet cable from the router to a computer and typing 192.168.1.1 (the default IP address)  in the web browser. This kind of connection is used to setup a router for the first time or troubleshoot problems when a wireless connection is not available. By

    • Ethernet Cable

      Ethernet Cable

      This Ethernet cable can be used to connect a network interface card (NIC) to an Ethernet switch or hub. They transmit data using the Ethernet protocol. Ethernet cables have RJ-45 jacks on both ends, each with 8 pins (They look similar to telephone jacks, which use 4 pins or 6 pins). Equipment using an Ethernet

    • IP Address

      IP Address

      An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address.

    • How to Login to a SMC Router

      How to Login to a SMC Router

      SMC is a popular brand of wireless routers, but unlike most routers, SMC routers don’t have a universal username and passwords to access its configuration menu. The username and password varies depending on the model. If you want to gain access to your SMC router you can check your manual to see its default username,

    • Cisco VPN Error 412

      Cisco VPN Error 412

      The CISCO VPN Client is a popular software application that allows end-users to connect a computer to a VPN (virtual private network). Once connected, the client computer can leverage the resources of the remote network in a secure environment as if connected directly to the local network. Unfortunately, a common error that can arise for

    • ISDN BRI

      ISDN BRI

      ISDN BRI (Basic Rate Interface) is a standard Integrated Services Digital Network (ISDN) service meant for residential and small scale business Internet connections. There is another type of ISDN configuration called the Primary Rate Interface (PRI) that is designed to provide higher bandwidth. The BRI configuration defined in the physical layer standard I.430 produced by

    329 queries in 0.546 seconds.