1). Computer Networking Fundamentals By : Susan Jan
Computer network is an integral part of our daily lives, with the most important reason being that of communication.
2). Creating a Fool Proof Data Archive System with a Magnetic Tape Library By : Christine Harrell
Most businesses have laws and regulations for how long specific data must be stored, but still many companies don’t have a tape drive, tape libraries, secondary storage or any plan for archiving data.
3). Cisco CCNP / BSCI Certification Exam: Five OSPF Details You Must Know By : Chris Bryant
When it comes to the BSCI exam, you have to master a great many details to pass! Learn about five vital but overlooked OSPF details from Chris Bryant, CCIE #12933.
4). What is a Virtual Private Network? By : James Hunt
A Virtual Private Network, or VPN, is a way of using the Internet to provide remote users with secure access to their network. Data is scrambled as it’s sent through the Internet ensuring privacy...
5). Cisco Certification: The Importance Of Building Your Own Practice Lab By : Chris Bryant
CCNA and CCNP candidates often hear that they need hands-on experience to excel on the exams. Chris Bryant, CCIE #12933, tells you why and how to get started building your own home lab.
6). Cisco CCNA Exam Tutorial: The Best Time To Schedule Your Exam By : Chris Bryant
There’s one time and one time only to schedule your exam. Learn when that is from Chris Bryant, CCIE #12933.
7). Network Training for Successful Network and System Management By : James Hunt
Big companies often have a large network that they need to manage and maintain. This type of system management requires staff that has a computer technical education as well as network training...
8). Finding Your MAC Address On Wired And Wireless Network Cards By : Darren Miller
The Answer To The Media Access Control Question
Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason I’ve received so many questions about Ethernet cards and MAC ad...
9). What Is An Intranet? Definition and Uses... By : Intranet Guy
An intranet is basically a private web based network. It uses all of the technology of the internet but is safe and protected behind a firewall that keeps unauthorized personnel out. Companies have been using them for years as a method of streamlining their internal communications.
Because a web browser can run on any type of computer...
10). Router - Denial Of Service Attacks By : Michael Russell
Routers are not perfect. For that matter, nothing is. So if somebody wants to give a router more than it can handle there is a way to do this. We're going to take a look at what are called denial of service attacks.
A router can only handle so much information coming into it at one time. Every machine has its limits and routers are no...
11). Router - Tracing Your Packets By : Michael Russell
Few people will really care about the path that your packet takes when sending a message, but if you're one of those high tech egg heads then this article may be of great interest to you. It can become very addictive so proceed with caution.
If you're using a Microsoft Windows based operation system, then it's very easy to trace the r...
12). Wireless Installation Checklist By : Lee Asher
Buyer Beware - Ignorance can be a financial waste and a lot of hassals. Before you buy any wireless equipment, you need to be sure about what you're doing. There's nothing worse than having everything there and finding that it doesn't work in your house, or with your computers, or over the distances you need. Here's a handy checklist of the things ...
13). How Do Wireless Networks Work? By : John Maxim
Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.
Ones and Zeros.
I'm sure you know that computers transmit data digitally, using binary: ones and zeros. ...
14). Crime Fighting Computer Systems and Databases By : Sam Vaknin
As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far beh...
15). Reasons to Start a Wireless Network By : Lee Asher
As far as I'm concerned, wireless networks would have to rank as one of the best inventions in history. They really are the best thing since sliced bread. I mean, really, bread is easy enough to cut yourself, but have you ever tried to wire up a network? Its a lot of hard yakka as many would say.
WiFi is the wireless way to handle netw...
16). Router - Transmitting Packets By : Michael Russell
In a previous article we discussed the basics of what a router did. We're now going to get into a more detailed, and yes technical, explanation of how packets are transmitted as well as a few other tech specs of how routers work. So put on your learning caps because you're in for a real mind bender.
Internet data, whether it be in the...
17). Web Servers and Firewall Zones By : Chris Weight
Web and FTP Servers
Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic.
However some services such as web or FTP servers require inc...
18). Does The Google Desktop Really Put Your Privacy In Jeopardy? By : Rob Sullivan1
There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application.
The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share fi...
19). Wireless Networks: How Do They Work? By : Ron King
Wireless networks use radio waves instead of wires to transmit data between computers. Here's how:
The Binary Code: 1s and 0s
It's well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of ...
20). Cabling your home for computer network - still a requirement? By : cabling-design.com
Cabling your home for computer network - still a requirement?
With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Let’s take ...
21). There’s no mystery in the IP address! By : Gamit Ana
The Computer is a very complicated device we use for our every day comfort and the importance of some of its numerical aspects is sometimes neglected. For example: a different number is given to each computer when its user goes online or when it is part of a network. This number is the IP address and knowing about it is like knowing where you live…...
22). Protect Your Network From Identity Theft Now! By : George Williams
It is deniable that our works and lives are more convenient and easier when using wireless. We can work anywhere and that is why wireless networks are becoming so popular. Especially if you have broadband Internet access, a wireless router can give you instant communication with the world.
Imagine you are sitting by the pool and enjoyi...
23). Networking With Fiber Cables By : James Croydon
Fiber cables form one of the most important parts of the networking industry today. Fiber cables are composed of one or more transparent optical fibers enclosed in a protective covering and strength members. Fiber cables are used to transmit data by the mode of light. Various types of fiber cables available are multimode duplex fiber cables, single...
24). Computer Consulting Profit Secrets By : Joshua Feinberg
Do you own or manage a computer consulting company? Are you having trouble growing your computer consulting company's profits?
If so, then you must learn how to focus on your computer consulting firm's profit and bottom line.
In this article, we'll look at 7 profit secrets and strategies you can use in your computer consu...
25). Fiber Optics In The Real World By : James Croydon
Optic fibers are used widely in the medical field for diagnosing and treating a variety of ailments. Because optic fibers can be made extremely thin and made into flexible strands, they can be used for insertion into blood vessels, lungs and other parts of the body. Optic fibers have been enabling physicians to look and work inside the body through...
26). IT Networks: How to Argue for a Bigger Budget By : Joel Walsh, freelance writer
IT network managers have to fight the "if it ain't broke don't fix it" mindset to win resources. With computer networks, that mindset is dangerously complacent. IT networks will keep pumping data until they die or let in hackers. Here are some winning arguments against "if it ain't broke…"
IT Network Maintenance: Better Analogies
27). Intranet Implementation: The Advantages Of A Web-Based Solution By : -JD
The traditional approach to implementing an intranet is to purchase a software package, modify it for your needs, and install it on your system.
Over the past few years, another option has grown in popularity – the implementation of a web-based solution.
As you consider the choice between installed software and a web-based...
28). The Pleasures of a Wireless Media Router By : Sezer Bozkurt
With everything becoming available wireless these days a great innovation is the wireless media router. What is a wireless media router? It’s a router that allows the transmission of signals from the router to anywhere in the house that has a receiver.
Wireless routers are becoming more and more popular. They have many uses, one of whi...
29). Link Load Balancing - Take a Load Off Annie By : Johnny Mayer
Link Load Balancing evens out critical resources on data networks with unpredictable requests issued to a server. For example, a web site with heavy traffic may employ two, three or more servers in a link load balancing program. The link load balancing routines enable a network to “juggle” more traffic that otherwise possible If one server i...
30). Personal Wireless with Bluetooth By : Joe Byrne
If you already have a wireless network for your computers, you may be very interested in what's coming next. Would you like it if your PDA, your mobile phone, your mp3 player and almost everything else you connect to your computer could be wireless too? It's already a reality...
Personal Area Network.
Using wireless networ...
Browse Pages: 1