• Main Menu
  • Networking

    • How to Change a MAC Address

      How to Change a MAC Address

      Every Ethernet card had a factory assigned MAC address burned into it when it was made. At times, users may want to change this MAC address to one of their choice. One of the main reasons for doing this is to get around access control lists(s) on a specific router or server, either by hiding

    • PPP (Point-to-Point Protocol)

      PPP (Point-to-Point Protocol)

      PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although PPP is primarily used over dialup lines, variants such as PPoE (PPP over Ethernet) and PPoA (PPP over ATM) extend PPP to new data-link layer protocols. PPP was

    • Ethernet Hub

      Ethernet Hub

      For any two devices to be connected, they need a common place, or a hub, as it is called in the computer world. It basically connects multiple computers together. Most of the hubs available in the market today support Ethernet standards. This is why they are called Ethernet hubs, and are most commonly used in

    • What is VLSM?

      What is VLSM?

      VLSM (Variable Length Subnet Mask) is a technique that network administrators employ in order to use their IP subnet(s) in a more effective manner. By using VLSM, a long mask can be used on a network that has a few hosts and a short net mask on subnets that have a large number of hosts.

    • BOOTP

      BOOTP

      BOOTP is the Bootstrap Protocol. The BOOTP protocol is utilized by diskless workstations to gather configuration information from a network server. The information provided by the BOOTP protocol is: The IP address which should be utilized by the diskless workstation The IP address of a server which will provide an Operating System image for the

    • Enabling IP Routing

      Enabling IP Routing

      WAN connects different LANs with each other to communicate and to share data and resources. As a result, routers must be used on each network or at backbone to route the IP packets and IP routing should be enabled on the routers. Routers must learn the destinations that are not directly connected by building and

    • LC Connectors

      LC Connectors

      The LC connector is a small form factor fiber optic connector. The LC connector resembles a small SC connector. Lucent Technologies first developed the LC connector for TelCo environment uses. Hence, LC stands for Lucent Connectors. The LC connector has been standardized as FOCIS 10 (Fiber Optic Connector Intermateability Standards) in EIA/TIA-604-10. The LC connector

    • FTP Commands

      FTP Commands

      The usable FTP commands will differ from one FTP client to the next, but these are a set of fairly standard FTP commands as implemented in the FreeBSD FTP client. ! [command [args]] Invoke an interactive shell on the local machine. If there are arguments, the first is taken to be a command to execute

    • How to Setup a Belkin Router

      How to Setup a Belkin Router

      To begin setting up your Belkin router, you will need: PC or laptop. Cable or DSL modem (one that has a functional Internet connection when plugged directly into your PC or laptop.) Ethernet network cable(s). Verify The Connection To begin, connect your cable or DSL modem directly to your PC or laptop using an Ethernet

    • WPA (Wi-Fi Protected Access)

      WPA (Wi-Fi Protected Access)

      WPA (Wi-Fi Protected Access) is an interim standard by the WiFi Alliance to comply with the security protocol designed for wireless security. WPA will most likely be rolled into an eventual IEEE 802.11i standard. This protocol was an outcome of numerous severe flaws researchers had discovered in the preceding wireless security system called Wired Equivalent

    177 queries in 0.559 seconds.