• Main Menu
  • Networking

    • WiFi Signal Strength Meter

      WiFi Signal Strength Meter

      Windows and other operating systems have a WiFi signal strength meter, but this is usually basic software and does not really tell the user much about the wireless signal. Fortunately, there are many other programs that do the same thing, but show the user more details about the wireless connection. We will describe some of

    • Two Factor Authentication

      Two Factor Authentication

      Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords

    • Range Extender

      Range Extender

      A range extender is a device that can be placed between two connection points in order to bounce a wireless signal from one device to another. Range extenders work great for large offices and factories that need high-speed Internet throughout the premises without running cables or purchasing satellite Internet. Range extenders can be used with

    • Session Layer

      Session Layer

      The Session Layer is Layer 5 of the OSI (Open Systems Interconnection) Model of computer networking. The Session Layer is directly after the Transport Layer and before the Presentation Layer, allowing it to interact with applications as well as network components. The Session Layer is responsible for opening, maintaining, and closing all sessions between multiple

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    • Port 1723

      Port 1723

      Port 1723 is a network port that uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) in order to transfer data from an application on one machine to an application on another machine. Port 1723 is rarely manually used and background services within the applications that access it usually manage it. This type

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • How to Become a VoIP Reseller

      How to Become a VoIP Reseller

      If you are serious about reselling Voice over Internet Protocol (VoIP) services, there are some questions you will need to ask yourself first. Here are some simple guidelines to help you determine if and how you should pursue your goal of becoming a VoIP reseller. Know the Service If you really want to be a

    • Static Route

      Static Route

      A static route is one that a network administrator creates manually. The opposite of a static route is a dynamic route. Dynamic routes are created by routing protocols. Static routes have advantages and disadvantages when compared to dynamic routes. Advantages of Static Routes: Easy to configure No routing protocol overhead Disadvantages of Static Routes: Network

    • Access Control

      Access Control

      Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works,

    178 queries in 0.502 seconds.