• Main Menu
  • Networking

    • IP Address Spoofing

      IP Address Spoofing

      IP address spoofing denotes the action of generating IP packets with fake source IP addresses in order to impersonate other systems or to protect the identity of the sender. Spoofing can also refer to forging or using fake headers on emails or netnews to – again – protect the identity of the sender and to

    • Extranet

      Extranet

      In the modern world of information and light-speed communications, data must be accessible from anywhere. This very issue is why nearly all businesses have created vast networks of computers throughout their offices. These same companies have an extensive web presence to reach their customers all over the world. A problem then arises, however, when a

    • How to Access Wireless Router Settings

      How to Access Wireless Router Settings

      What is a Wireless Router? A wireless router is a device that wirelessly connects multiple computers and devices to the Internet. Wireless routers’ design and capabilities vary and they drastically range in price, but are used for the same function. Wireless routers are usually very easy to setup and many provide the user with built-in

    • ISDN BRI

      ISDN BRI

      ISDN BRI (Basic Rate Interface) is a standard Integrated Services Digital Network (ISDN) service meant for residential and small scale business Internet connections. There is another type of ISDN configuration called the Primary Rate Interface (PRI) that is designed to provide higher bandwidth. The BRI configuration defined in the physical layer standard I.430 produced by

    • WiBro

      WiBro

      South Korea developed the WiBro (Wireless Broadband) technology in order to provide a high speed Internet solution for local consumers. The technology is based on the 802.16e standard which is more commonly known as the WiMAX standard in other countries. At the time of this writing, the capacity of the WiBro connections available in South

    • MAC Addresses (Media Access Control)

      MAC Addresses (Media Access Control)

      A MAC address is an address that exists on Layer 2 of the OSI Model. Layer 2 of the OSI model is the Data Link Layer. The Data Link Layer consists of two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a network node

    • Cisco VPN Error 412

      Cisco VPN Error 412

      The CISCO VPN Client is a popular software application that allows end-users to connect a computer to a VPN (virtual private network). Once connected, the client computer can leverage the resources of the remote network in a secure environment as if connected directly to the local network. Unfortunately, a common error that can arise for

    • How fast is ADSL Speed?

      How fast is ADSL Speed?

      ADSL (Asymmetric Digital Subscriber Line) options are available in many locations. The speeds will vary for the service in many ways depending on several factors. The reason why it is called an Asymmetric Digital Subscriber Line is simple, as the speed for downloads will be significantly faster than the upload speed. This is because consumer DSL services are

    • Default Passwords for Belkin Routers

      Default Passwords for Belkin Routers

      By default, all Belkin routers’ default username and password is admin (username) while “blank” (leave it blank) for the password. You need to properly connect the router to your modem and PC before you can access the router using a web browser (IE, Firefox, Chrome, etc.).  To access the router’s GUI, all you need to

    • What Port Number is XXX on?

      What Port Number is XXX on?

      The way that most services work under TCP/IP is that the server is configured to use a well known port number and the client connects from a random high port. Most of these well known ports are port numbers below 1,024. High ports are ports 1,024 or above. In the old days, ports below 1,024

    180 queries in 0.902 seconds.