• Main Menu
  • Networking

    • Application Layer

      Application Layer

      The application layer of a software is a protocol that is used for communication between a software and the network layers that it uses. The application layer allows a computer’s network to interpret requests made by the program and allows the program to interpret data from the network. Likewise, the application layer ensures that both

    • 192.168.2.1 – What Are its Uses and Why is it Important?

      192.168.2.1 – What Are its Uses and Why is it Important?

      192.168.2.1 is a private IP address commonly used by the SMC and Belkin router manufacturers for device setup and troubleshooting. SMC and Belkin specialize in manufacturing home networking equipment that competes with Netgear, D-Link, and Linksys brands in the marketplace. The Internet Assigned Numbers Authority (IANA) does not grant exclusive use of the IP address

    • Port Forwarding

      Port Forwarding

      Port forwarding, also known as tunneling, is basically forwarding a network port from one node to the other. This forwarding technique allows an outside user to access a certain port (in a LAN) through a NAT (network address translation) enabled router. Advantages of Port Forwarding Port forwarding basically allows an outside computer to connect to

    • Distance Vector Routing Protocol

      Distance Vector Routing Protocol

      Routing Protocols Whenever different networks connect with each other to communicate and to share the data and resources, it is called internetworking. For internetworking, routers must be used on each network or at backbone to route the packets. To route a packet, a router needs to know: Destination Addresses Sources it can learn from Possible

    • Wireless Access Point

      Wireless Access Point

      Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to wireless networks, via standards such as Wi-Fi, Bluetooth and so on. The WAP device typically connects to a wired network, and acts as a communication interface between the wireless devices and wired devices on the network. The WAP device enables

    • Broadcast Domain

      Broadcast Domain

      A broadcast domain is a logical part of a network (a network segment) in which any network equipment can transmit data directly to other equipment or device without going through a routing device (assuming the devices share the same subnet and use the same gateway; also, they must be in the same VLAN). A more

    • Cisco Router Commands

      Cisco Router Commands

      Cisco Router IOS Cisco routers are manageable devices, which means that they have the Cisco IOS software for network and internetwork management. The Cisco’s IOS software delivers network services and enabled networked applications. The Cisco IOS is the CLI based software with which Cisco IOS commands can be executed. Cisco Commands There are more than

    • TCP Sequence Prediction Attack

      TCP Sequence Prediction Attack

      A TCP sequence prediction attack is an attempt to hijack an existing TCP session by injecting packets which pretend to come from one computer involved in the TCP session. The TCP Sequence Prediction Attack TCP is a reliable connection-oriented layer 4 (Transport Layer) protocol. Packet transfer between hosts is accomplished by the layers below layer

    • How to Find a LinkSys Router IP

      How to Find a LinkSys Router IP

      Linksys is the home networking division of Cisco, Incorporated and has significant penetration in the U.S. home networking market. A common question that arises for consumers who are new to home or small business networking is determining how to find a Linksys router IP address on a new or legacy network. When shipped from the

    • Wi-Fi Software Tools

      Wi-Fi Software Tools

      A wide variety of Wi-Fi software tools are available. These tools for Wi-Fi perform functions such as: Wireless network discovery Wireless network mapping Wireless network traffic analysis Wireless network RF signal strength monitoring Wireless network encryption cracking Wireless network custom frame generation Dictionary or brute force attacks against wireless networks Denial of Service (DoS) attacks

    178 queries in 1.236 seconds.