• Main Menu
  • Networking

    • 192.168.1.1 – What Are its Uses and Why is it Important?

      192.168.1.1 – What Are its Uses and Why is it Important?

      The 192.168.1.1 IP address is a default commonly used by Linksys routers. Linksys is now a division of Cisco, Incorporated and makes a large number of the broadband routers used throughout the world. The address is not exclusive to Linksys, but most other major router manufacturers use different default addresses for configuration of home or

    • Understanding Data Encapsulation

      Understanding Data Encapsulation

      The sending and receiving of data from a source device to the destination device is possible with the help of networking protocols when data encapsulation is used. The data is encapsulated with protocol information at each OSI reference model layer when a host transmits data to another device across a network. Each layer communicates with

    • How to Replace Your Wireless Router Antenna

      How to Replace Your Wireless Router Antenna

      A wireless router is a computer networking device that routes data packets across another computer or across a wireless IP network. The wireless router comes with an 802.11 interface card and antenna. The wireless router antenna is generally what determines the signal strength of the wireless router. If your signal strength is weak, then you

    • File Sharing

      File Sharing

      A common practice in modern society is the use of file sharing programs and applications. These file sharing programs have been shrouded in controversy, scrutiny, and criticism since their inceptions. Despite that, however, file sharing programs are used by millions of people worldwide on a daily basis and that number is only growing. This article

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • Understanding Ethernet Networking

      Understanding Ethernet Networking

      Ethernet refers to the family of Local Area Network implementation that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet Connection The Ethernet protocol provides for a verity of cabling options, one of which is a specification

    • Ethernet Card

      Ethernet Card

      The system that helps connect a computer to an Ethernet network is called an Ethernet card. Another name for such a card is Network Interface Card (NIC). It can be inserted into one of the slots provided on the motherboard of the computer. Each of these cards has a unique identification number, known as the

    • CDMA-2000 1xRTT

      CDMA-2000 1xRTT

      CDMA-2000 1xRTT is a 3G wireless technology based on the CDMA platform. The 1x in 1xRTT refers to 1x the number of 1.25MHz channels. The RTT in 1xRTT stands for Radio Transmission Technology. The CDMA-2000 1xRTT protocol was developed by Qualcomm. CDMA-2000 1xRTT is a CDMA version of the IMT-2000 standard which was developed by

    • How to Disable the Netgear Router Firewall

      How to Disable the Netgear Router Firewall

      In most cases, disabling the firewall on a Netgear router is a really bad idea. In fact, it is such a bad idea that Netgear does not even make a button in their GUI that does this. Nevertheless, users can effectively disable a Netgear router firewall just by adding a rule or two to the

    • What is a QSIG?

      What is a QSIG?

      QSIG is a signaling protocol that is  based on ISDN. It communicates signals between private branch exchanges (PBXs) within a Private Integrated Services Network (PISN) using the application-level ROSE and connection-level Q9.31 protocols. QSIG uses ISDN as the physical link layer in the exchanges and is often used in enterprise voice or integrated service networks.

    networking
    168 queries in 0.433 seconds.