Articles in: Home / Computers / Networks


Display by: Title | Popularity | Newest | Oldest


1). Computer Networking Fundamentals  By : Susan Jan
Computer network is an integral part of our daily lives, with the most important reason being that of communication.

2). Creating a Fool Proof Data Archive System with a Magnetic Tape Library  By : Christine Harrell
Most businesses have laws and regulations for how long specific data must be stored, but still many companies donít have a tape drive, tape libraries, secondary storage or any plan for archiving data.

3). Cisco CCNP / BSCI Certification Exam: Five OSPF Details You Must Know  By : Chris Bryant
When it comes to the BSCI exam, you have to master a great many details to pass! Learn about five vital but overlooked OSPF details from Chris Bryant, CCIE #12933.

4). Network Training for Successful Network and System Management  By : James Hunt
Big companies often have a large network that they need to manage and maintain. This type of system management requires staff that has a computer technical education as well as network training...

5). What is a Virtual Private Network?  By : James Hunt
A Virtual Private Network, or VPN, is a way of using the Internet to provide remote users with secure access to their network. Data is scrambled as itís sent through the Internet ensuring privacy...

6). Cisco Certification: The Importance Of Building Your Own Practice Lab  By : Chris Bryant
CCNA and CCNP candidates often hear that they need hands-on experience to excel on the exams. Chris Bryant, CCIE #12933, tells you why and how to get started building your own home lab.

7). Cisco CCNA Exam Tutorial: The Best Time To Schedule Your Exam  By : Chris Bryant
Thereís one time and one time only to schedule your exam. Learn when that is from Chris Bryant, CCIE #12933.

8). Router - Transmitting Packets  By : Michael Russell
In a previous article we discussed the basics of what a router did. We're now going to get into a more detailed, and yes technical, explanation of how packets are transmitted as well as a few other tech specs of how routers work. So put on your learning caps because you're in for a real mind bender. Internet data, whether it be in the...

9). The Pleasures of a Wireless Media Router  By : Sezer Bozkurt
With everything becoming available wireless these days a great innovation is the wireless media router. What is a wireless media router? Itís a router that allows the transmission of signals from the router to anywhere in the house that has a receiver. Wireless routers are becoming more and more popular. They have many uses, one of whi...

10). Reasons to Start a Wireless Network  By : Lee Asher
As far as I'm concerned, wireless networks would have to rank as one of the best inventions in history. They really are the best thing since sliced bread. I mean, really, bread is easy enough to cut yourself, but have you ever tried to wire up a network? Its a lot of hard yakka as many would say. WiFi is the wireless way to handle netw...

11). Router - Denial Of Service Attacks  By : Michael Russell
Routers are not perfect. For that matter, nothing is. So if somebody wants to give a router more than it can handle there is a way to do this. We're going to take a look at what are called denial of service attacks. A router can only handle so much information coming into it at one time. Every machine has its limits and routers are no...

12). Peltier Associates Breaking and Fixing Wireless Security  By : Kelly King
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily...

13). It's 12 Noon, Do You Know Who's Using Your Network?  By : Jason Frovich
The idea of reading email while lounging by the pool, text or instant messaging while doing the laundry, or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all. Unfortunately, many, or even most, wireless units don't come with security features already functioning. This may not seem like a big issue to someo...

14). Link Load Balancing - Take a Load Off Annie  By : Johnny Mayer
Link Load Balancing evens out critical resources on data networks with unpredictable requests issued to a server. For example, a web site with heavy traffic may employ two, three or more servers in a link load balancing program. The link load balancing routines enable a network to ďjuggleĒ more traffic that otherwise possible If one server i...

15). How To Secure Your Wireless Network  By : George Williams
People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great? Well, there is something you should realize. Working from home while using a wireless local area network...

16). Six Largest Mistakes Made when Hiring a Cabling Contractor  By : Robert Deupree
Cabling of data and voice systems is often ignored by many companies until the last minute just before relocation or new building takes place. Many information systems professionals view it as a low priority or something that just takes away from their budget for real network components such as servers or software. However having a state of the art...

17). Computer Consulting Profit Secrets  By : Joshua Feinberg
Do you own or manage a computer consulting company? Are you having trouble growing your computer consulting company's profits? If so, then you must learn how to focus on your computer consulting firm's profit and bottom line. In this article, we'll look at 7 profit secrets and strategies you can use in your computer consu...

18). Crime Fighting Computer Systems and Databases  By : Sam Vaknin
As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far beh...

19). Setting Up and Securing Your Wireless Network  By : Faye Spencer
There are more and more individuals opting to work from home than ever before. The advantages to this are many including avoiding the morning and evening rush hours, being able to spend time with your kids and significant other, and doing everything on your own time. Though the pitfalls are many, the one that I will be focusing on in this article i...

20). Cabling your home for computer network - still a requirement?  By : cabling-design.com
Cabling your home for computer network - still a requirement? With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Letís take ...

21). Overcoming Small Business Networks Sales Objections  By : Joshua Feinberg
Do you need help overcoming sales objections? Do you sell computer networks, or other IT-related products and services to small businesses? This article provides tips and hints so you can be overcoming the most common sales objections heard when selling networks to small business prospects, customers, and clients. ...

22). Does The Google Desktop Really Put Your Privacy In Jeopardy?  By : Rob Sullivan1
There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application. The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share fi...

23). How a Computer Consulting Business Can Help Your Company  By : Joshua Feinberg
While many small companies only call in a local computer consulting business when something computer-related breaks, there's a lot to be gained by forging a proactive, long-term relationship with a local computer consulting business in your area. Consider Getting Advice from a Computer Consulting Business If you need to ge...

24). Fiber Optics In The Real World  By : James Croydon
Optic fibers are used widely in the medical field for diagnosing and treating a variety of ailments. Because optic fibers can be made extremely thin and made into flexible strands, they can be used for insertion into blood vessels, lungs and other parts of the body. Optic fibers have been enabling physicians to look and work inside the body through...

25). Finding Your MAC Address On Wired And Wireless Network Cards  By : Darren Miller
The Answer To The Media Access Control Question ---------------------------- Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main reason Iíve received so many questions about Ethernet cards and MAC ad...

26). Wireless Home Security Camera  By : Sezer Bozkurt
Home security is an important issue for any person. A personís home is their castle and they want to feel safe and secure. There are several security measures that can be implemented to ensure security such as alarms but one that ensures peace of mind is a wireless home security camera package. Whatís need in the package is a camera to...

27). Wireless Networks: How Do They Work?  By : Ron King
Wireless networks use radio waves instead of wires to transmit data between computers. Here's how: The Binary Code: 1s and 0s It's well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of ...

28). Web Servers and Firewall Zones  By : Chris Weight
Web and FTP Servers Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic. However some services such as web or FTP servers require inc...

29). Networking With Fiber Cables  By : James Croydon
Fiber cables form one of the most important parts of the networking industry today. Fiber cables are composed of one or more transparent optical fibers enclosed in a protective covering and strength members. Fiber cables are used to transmit data by the mode of light. Various types of fiber cables available are multimode duplex fiber cables, single...

30). Personal Wireless with Bluetooth  By : Joe Byrne
If you already have a wireless network for your computers, you may be very interested in what's coming next. Would you like it if your PDA, your mobile phone, your mp3 player and almost everything else you connect to your computer could be wireless too? It's already a reality... Personal Area Network. Using wireless networ...

Browse Pages: 1 [2]

 


 
2006-2008 RedSofts.com - Privacy Policy