• Main Menu
  • Networking

    • How to Use Ping to Test a Network

      How to Use Ping to Test a Network

      The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack

    • Wireless Mesh Network

      Wireless Mesh Network

      A wireless mesh network relies on radio signals to allow several devices within a coverage area to communicate with each other. Wireless mesh networks are often used in conjunction with other networks in order to give users reliability and stability. This is because wireless mesh networks communicate with each other through any device within the

    • Cat 5

      Cat 5

      Cat 5, short for Category 5, is the current accepted industry standard for network and telephone wiring. Cat 5 is an unshielded twisted pair type cable exclusively designed for high signal integrity. The cable consists of four pairs of 24-guage twisted copper pairs terminating in an RJ-45 jack. If a wire is certified as Category

    • 127.0.0.1 – What Are its Uses and Why is it Important?

      127.0.0.1 – What Are its Uses and Why is it Important?

      127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the

    • What is a Zeroconf?

      What is a Zeroconf?

      Zeroconf (zero configuration networking) refers to several protocols and techniques that are used together to create an IP (Internet Protocol) network with no special configuration servers or manual operator intervention. These networks allow novices to connect computers, network devices, scanners, and printers to create a functioning network without requiring manual configuration. Zeroconf does not require

    • UDP (User Datagram Protocol)

      UDP (User Datagram Protocol)

      User Datagram Protocol or UDP is part of the Internet Protocol suite. By using UDP, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally implemented, but unlike TCP, it does not guarantee reliability or correct data

    • How to Change an IP Address

      How to Change an IP Address

      The IP address is a logical address assigned to a network card in order to establish communication over the network and identify the computer over it. Network administrators usually assign IP addresses based on certain rules and regulations. Reasons to Change an IP Address Even if someone is part of a small network routed through

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • Free Firewall Software

      Free Firewall Software

      Free firewalls have become very common and represent an excellent alternative to commercial firewall packages. Most of these firewalls run under some form of Linux, FreeBSD, or OpenBSD. Many of these free firewalls are front-ends for the lower-level firewall packages which ship with these operating systems, such as pf (Packet Filter), ipf (IPFilter), ipfw (IPFirewall),

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    177 queries in 0.615 seconds.