Advert

N Connectors

Last edited by . Total of no comments in the discussion.

The Type "N" connector, commonly known as the N connector, is used to join coaxial cables using a threaded RF connector. It was one of the first connectors to be capable of carrying microwave-frequency signals. Invented by Paul Neill of Bell Labs in the 1940s, the connector is named after him. Design Details These connectors were devised to carry signals that could reach 1 GHz in certain military applications. The Type N connector that is commonly used today can easily handle up to 11 GHz. However, that was just the Read More

Share on:

Where you can get VoIP Training?

Last edited by . Total of 1 comment in the discussion.

Voice over Internet Protocol (VoIP) is a relatively new technology, because of which individual businesses will need someone who is well versed in the intricacies of VoIP. Companies are often willing to invest in training their IT administrators in VoIP because of the sure returns. But, where do you go to obtain a training course that delineates all the necessary concepts and details you need? There are various options available for those wanting to get themselves trained in VoIP technology. The primary means of training are through self-study coupled with Read More

Share on:

Honeypot

Last edited by . Total of 4 comments in the discussion.

A honeypot is a trap that's used to identify, avert and, to some extent, neutralize attempts to hijack information systems and networks. It is usually made up of a single computer or a network site that disguises itself as a normal computer or network. It can also morph to look like an unused IP address, a file or a record. It tempts hackers by pretending to contain data that cyber criminals often deem important. It can deceive the hacker into thinking that it is an open proxy. A honeypot is Read More

Share on:

Belkin Router Default Password

Last edited by . Total of 2 comments in the discussion.

Belkin is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Belkin also produces a number of other wireless access devices and USB based modem cards and markets a number of data plans for some of the largest Internet Service Providers. Belkin Router Default Password As with any other router, all Belkin routers include a built-in control panel that allows users to change the router’s configuration settings, enable the router to work with other devices, and setup network security. To access this control panel, Read More

Share on:

VLAN Hopping

Last edited by . Total of no comments in the discussion.

VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1q or ISL). The Dynamic Trunking Protocol is utilized for negotiating trunking on links between devices and the type of trunking encapsulation to be used. Types of VLAN Hopping Switch Read More

Share on:

Understanding the Cisco Three-Layer Hierarchical Model

Last edited by . Total of 1 comment in the discussion.

Understanding the Cisco Three-Layer Hierarchical Model Hierachical network design helps us to make networks more reliable and predictable. Level by level design help to understand networking factions easily like, we can use tools like access lists at specific level and can avoid them from others. Cisco layer model consist of the following three layers. The Core layer The Distribution layer The Access layer Each layer plays a role and specific responsibilities are assigned to these three logical layers. These layers are same like the network layers of OSI reference model. Read More

Share on:

EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

Last edited by . Total of 1 comment in the discussion.

EAP, LEAP, PEAP, and TTLS are competing protocols for securely transporting authentication data. EAP EAP (Extensible Authentication Protocol), defined in RFC 2284 — PPP Extensible Authentication Protocol (EAP), is the original 802.11 standard. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a proprietary protocol which was developed by Cisco. Cisco is phasing out LEAP in favor of PEAP. EAP-TLS EAP-TLS (Extensible Authentication Protocol – Transport Layer Security) was created by Microsoft and accepted by the IETF as RFC 2716: PPP EAP TLS Authentication Protocol.. PEAP PEAP (Protected Extensible Authentication Protocol) is Read More

Share on:

How to Set Up Skype

Last edited by . Total of 37 comments in the discussion.

Voice over Internet Protocol or VoIP is now recognized as one of the most popular methods of communicating over the Internet. Skype is one of the most popular programs for PC to PC calling with VoIP. To use Skype, it has to be installed on the computer. To download Skype go to the Get Skype page and click the download button, and then click ‘Download Skype’ under Skype Free to begin download. A window will open asking what to do with the file called SkypeSetup.exe. Click ‘Run’ to download and Read More

Share on: