An intranet is basically a private web based network. It uses all of the technology of the internet but is safe and protected behind a firewall that keeps unauthorized personnel out. Companies have been using them for years as a method of streamlining their internal communications....
Web Servers and Firewall Zones
Web and FTP Servers
Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic.
However some...
Valuing Network Certifications – Is ...
Valuing Network Certifications – Is The Time, Money And Effort Worth The Bother?
There are many ways to get any of the large number of network certifications now available. There’s not only software certification like those offered from Oracle, Java, Microsoft, etc. but...
Theres no mystery in the IP address!
The Computer is a very complicated device we use for our every day comfort and the importance of some of its numerical aspects is sometimes neglected. For example: a different number is given to each computer when its user goes online or when it is part of a network. This number is the IP...
The Simplest Way to Get Online Passive Income
Based on my research, this seems to be the basic principle that website owners have been following to get passive income online:
* Get many people to come to your website
* Get them to click on your Adsense links
Sounds simple enough. Get people into your website from Google...
The Pleasures of a Wireless Media Router
With everything becoming available wireless these days a great innovation is the wireless media router. What is a wireless media router? Its a router that allows the transmission of signals from the router to anywhere in the house that has a receiver.
Wireless routers are becoming more...
TCP/IP architecture model
1. Network interface(Data link) layer
2. Network layer
3. Transport layer
4. Application layer
Network interface layer
The lowest layer of the TCP/IP model. Its task is to provide access to the transmission physical medium and it differs according to the...
Six Largest Mistakes Made when Hiring a ...
Cabling of data and voice systems is often ignored by many companies until the last minute just before relocation or new building takes place. Many information systems professionals view it as a low priority or something that just takes away from their budget for real network components such as...
Setting Up and Securing Your Wireless Network
There are more and more individuals opting to work from home than ever before. The advantages to this are many including avoiding the morning and evening rush hours, being able to spend time with your kids and significant other, and doing everything on your own time. Though the pitfalls are...
Router – Transmitting Packets
In a previous article we discussed the basics of what a router did. We’re now going to get into a more detailed, and yes technical, explanation of how packets are transmitted as well as a few other tech specs of how routers work. So put on your learning caps because you’re in for a...
Router – Tracing Your Packets
Few people will really care about the path that your packet takes when sending a message, but if you’re one of those high tech egg heads then this article may be of great interest to you. It can become very addictive so proceed with caution.
If you’re using a Microsoft...
Router – Denial Of Service Attacks
Routers are not perfect. For that matter, nothing is. So if somebody wants to give a router more than it can handle there is a way to do this. We’re going to take a look at what are called denial of service attacks.
A router can only handle so much information coming into it at...