The TCP/IP protocol suite has become a staple of today’s international society and global economy. Continually evolving standards provide a wide and flexible foundation on which an entire infrastructure of applications are built. Through these we can seek entertainment, conduct business, make financial transactions, deliver services, and much, much more. However, because TCP/IP continues to develop and grow in order to meet the changing needs of our communities, it might sometimes be hard to keep track of new functionality or identify new possibilities. For this reason, the TCP/IP Tutorial and Technical Overview provides not only an introduction to the TCP/IP protocol suite, but also serves as a reference for advanced users seeking to keep their TCP/IP skills aligned with current standards. It is our hope that both the novice and the expert will find useful information in this publication. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become the industry-standard …
Read More »Networking and Wi-Fi
How to Cheat at Securing Your Network
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling “How to Cheat…” series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. General Security Concepts: Access Control, Authentication, and Auditing See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. General Security Concepts: Attacks …
Read More »Tips for hot spot security
Comfortable? Enjoying your coffee at the corner café while watching the world go by? And so you should, it’s a lovely day outside. You’ve even got your notebook on the table, finishing some work; life is good. But what about the guy up the back? Think he’s also enjoying a large decaf while working out of the office? No, he’s actually enjoying himself looking at the websites you’re visiting and busily searching your notebook and taking everything he’s interested in. Public place vs. private property it may sound far-fetched, but this happens every day to people using unprotected public Wi-Fi networks. While the wireless network at your home or business is (hopefully always) protected by decent levels of encryption using WPA or WPA2 (Wi-Fi Protected Access) certified programs, many public Wi-Fi hot spots do not provide such basic security. But why is encryption so important? And is it difficult to organize? Keep it to …
Read More »What you need to know about Wi-Fi Router before you buy
Every broadband router destined for the home market has Wi-Fi capability, how to choose the right one
Read More »Turn your main electricity into a computer network using power-line
Creating network connection room to room via main electricity with the right equipment it is possible
Read More »How to set up and run a basic network
Did you know that by networking your PCs, you can easily share files, back up important data, and more
Read More »Spiceworks a free Network Monitor
A business doesn’t have to be large to benefit from asset management, but many of the available option are priced out of the reach of small businesses, Spicework is a free to low cost web based offering suite to business, Spiceworks is a free to low cost web based offering suite to businesses running one or two server and handful of network devices, this powerful online app creates an inventory of your network hardware and software then helps your manage it.
Read More »Expand Your Network with an Ethernet Switch
Most small office network start with a PC, router and ADSL modem, but when small single user network grows into a larger multiuser network, your Wi-Fi router can run out of free Ethernet ports to connect various PC’s, networkable printers, small business server and other essential hardware. An Ethernet switch is a simple box that sits between your router and your networked device to control traffic flow across your network, the device come in two basic types, unmanaged and managed, with the former, you merely plug in your device and get back to work, but manage switches provide advanced features that prioritize data, link port for improved performance and enforce security policies on your network. An appealing middle ground for small business is a manageable switch like Linksys SLM2008, which offers some of the robust trunk and data prioritization of a managed switch in a compact package with a web …
Read More »A guide to wireless guest access
Wireless guest access for smaller organizations People today expect Internet and e-mail access everywhere they go. Even if your business is quite small, it’s likely that your customers, vendors or partners could benefit from network access while they are your guests. Many small and medium-sized businesses (SMBs) assume that providing guest network access is complicated and costly and best left to the large enterprises. The benefits of guest access Regardless of the size or profile of your organization, interaction with people outside your business is crucial. So how do we define guest. Well, they can include customers, temporary workers and contractors, trainees, colleagues from a partner business, visiting consultants or faculty, members of joint development teams, conference or seminar participants, representatives of manufacturers or distributors, and vendors or suppliers who want to manage inventory or re-order parts while on-site.
Read More »