• Main Menu
  • Networking

    • How to Setup a Belkin Router

      How to Setup a Belkin Router

      To begin setting up your Belkin router, you will need: PC or laptop. Cable or DSL modem (one that has a functional Internet connection when plugged directly into your PC or laptop.) Ethernet network cable(s). Verify The Connection To begin, connect your cable or DSL modem directly to your PC or laptop using an Ethernet

    • TKIP (Temporal Key Integrity Protocol)

      TKIP (Temporal Key Integrity Protocol)

      TKIP (Temporal Key Integrity Protocol) is part of a draft standard from the IEEE 802.11i working group. TKIP utilizes the RC4 stream cipher with 128-bit keys for encryption and 64-bit keys for authentication. TKIP is an enhancement to WEP (Wired Equivalent Privacy) security. TKIP enhances WEP by adding a per-packet key mixing function to de-correlate

    • SNMP (Simple Network Management Protocol)

      SNMP (Simple Network Management Protocol)

      Network management systems use SNMP (Simple Network Management Protocol) to communicate with network elements. For this to work, the network element must be equipped with an SNMP agent. Most professional grade network hardware comes with an SNMP agent built in. These agents must be enabled and configured to communicate with the network management system. Operating

    • How to Get Free VoIP

      How to Get Free VoIP

      Free VoIP calls are never completely free of cost. Often, the goal is not to achieve completely free calls to all destinations, but to use the VoIP operator that suits one’s needs best. Keeping that in mind, one will learn that most VoIP companies let users talk for free in their own network, but will

    • Bluetooth

      Bluetooth

      Bluetooth is a specification for short distance wireless communication between two devices. Bluetooth Specifications Fixed/Mobile Mobile Circuit/Packet Both Max Bandwidth 1Mb Range 10 meters Frequency 2.40GHz-2.483.5Ghz (U.S. and Europe) or 2.472Ghz-2.497Ghz (Japan) Host Network None Definer Bluetooth SIG Bluetooth technology is named after Harald Bluetooth, a Danish king who managed to consolidate Denmark and a

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • The OSI Model – What It Is; Why It Matters; Why It Doesn’t Matter.

      The OSI Model – What It Is; Why It Matters; Why It Doesn’t Matter.

      The OSI Model was created based on recommendations from the International Organization for Standardization (ISO) in 1980, which started expanding on the DoD model in the late 1970s. The current standard was published in 1996. The official title for the model is the ISO OSI (Open Systems Interconnection) Reference Model since it describes or relates

    • How to Setup a Linksys Router

      How to Setup a Linksys Router

      One of the most popular router brands on the market is the Linksys router. Despite this popularity; however, end-users are commonly challenged to setup the device in the home, office, or other locations. There are a number of types of Linksys routers on the market to include the WRT54G, WRT610n, and the Linksys e4200 which

    • What is PCAP?

      What is PCAP?

      PCAP (Packet Capture) is a protocol for wireless Internet communication that allows a computer or device to receive incoming radio signals from another device and convert those signals into usable information. It allows a wireless device to convert information into radio signals in order to transfer them to another device. PCAP runs in the background

    119 queries in 0.253 seconds.