• Main Menu
  • Networking

    • Public DNS Servers

      Public DNS Servers

      DNS (Domain Name System) servers are designed to allow networked devices such as computers, phones, and other servers to look up address records in DNS tables. The majority of DNS servers are configured to provide service to the organizations or people that own or pay service fees for the hardware. There are a number of

    • 802.11i

      802.11i

      The 802.11i wireless standard was released by the IEEE on June of 2004 and implements improved encryption for wireless networks than realized on past standards released. Commonly referred to as the WPA2 implementation, the 802.11i implementation requires newer encryption standards than seen with the WEP implementation by requiring TKIP (Temporal Key Integrity Protocol) and AES

    • Understanding the IPX-SPX Protocol

      Understanding the IPX-SPX Protocol

      IPX/SPX is a protocol suite that is implemented on many corporate internetworks. IPX/SPX was developed to operate in Novell Netware in LAN environment. But today, the IPX/SPX is also used in Microsoft NT, Microsoft XP and Lotus Notes environment along with Vista. IPX/SPX on Cisco IOS The Cisco IOS also provides a wide range of

    • RG-11

      RG-11

      Coaxial cables are necessary for rooftop antennas and dish antennas in order to provide crystal-clear sound and audio input. RG-11 bands typically have 75-ohm wires made of copper. Polyethylene dielectric makes sure that there is minimal loss of picture and sound while the antenna receives audio or video feeds. Most users of the RG-11 have

    • traceroute

      traceroute

      traceroute is a command which is used to trace the route of a packet through a TCP/IP network. traceroute is a Unix command. Under Microsoft Windows, the traceroute command has been renamed `tracert`. Unix `traceroute` and Microsoft Windows `tracert` are designed to accomplish the same task, but differ in the way they display output, in

    • Understanding Ethernet Networking

      Understanding Ethernet Networking

      Ethernet refers to the family of Local Area Network implementation that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet Connection The Ethernet protocol provides for a verity of cabling options, one of which is a specification

    • MMS (Multimedia Messaging Service)

      MMS (Multimedia Messaging Service)

      Multimedia Messaging Service (MMS) is an upgraded version of the SMS (Short Messaging Service) through which users can send and receive multimedia messages such as texts, pictures, video clips, audio clips, etc. with any compatible cell phone. It is an advanced messaging service that lets users send multiple media in one single message to one

    • Netopia Default Password

      Netopia Default Password

      Netopia is a popular broadband product company that produces Internet routers and other WiFi devices. Motorola acquired the company in 2007 and made partnerships with wireless providers around the world. Such providers include AT&T, Swisscom, and NextGen Tel in Norway. Unlike other router brands, Netopia’s default password is the 6 digit serial number located on

    • Bluetooth DUN

      Bluetooth DUN

      Bluetooth dial-up networking (DUN) is a wireless Internet technology that refers to connecting to the Internet with a Bluetooth enabled cell phone as a modem. Bluetooth DUN offers a low band alternative where there are no local hotspots to provide high speed wireless Internet access. Bluetooth is a wireless protocol that allows wireless communication to

    • VoIP Security

      VoIP Security

      Any technology that involves transfer of data or information is prone to compromised security. It happens with telephones, cell phones, email and Internet transactions. Because VoIP (Voice Over Internet Protocol) has the Internet as its mode of transference it’s possible to have your Internet-based called intercepted. To make matters worse, there are techno-troublemakers who are

    178 queries in 0.567 seconds.