Have you ever scratched your head thinking of ways to extend your internet broadband access to additional rooms in your home? Or even how to put your XBOX or PS3 game console in your bedroom and still have it connected on your home network for playing online games? Fortunately there are solutions available that will […]
[Continue reading]Using Cisco Access Control List to block a subnet
Question: I have the following ClassB network 172.31.0.0/16 that I’m trying to create an access list for. I’d like to allow 172.31.240.0/24 but deny all else, so I’m looking the best way to accomplish this with 2 acl lines. Answer: The best way to accomplish the above is to explicitly allow the subnet you want and then […]
[Continue reading]Public and Private IP addresses explained. What is NAT.
Any networked device (computer, server, printer, router etc), needs an IP address to communicate either on the Internet or on its local area network (LAN). Especially for internet communication, this IP address has to be unique, in order to avoid address conflicts. The IP address that is used by a device to communicate on the […]
[Continue reading]How to configure static IP address on a Windows Computer
By default, the network interface card setting for a windows computer is configured to receive a dynamic IP address from a DHCP server. However, it is sometimes necessary to assign a static IP address to your Home Network Computer or to a server on your Local Area Network. Assigning a static IP to your Home […]
[Continue reading]Cisco Home Security IP Surveillance Camera
Cisco has recently entered the Physical Security market with video surveillance and access control solutions that integrate web-based software with video broadcast hardware for various physical security implementations.
[Continue reading]Top 5 Web Security Tools
Web applications are everywhere in our Internet era. Web servers suffer the most security attacks from all applications. I believe that having a routine schedule for testing the web servers and web applications for security weaknesses is an essential step to protect the security of the whole organization. I suggest the following Web Vulnerability scanners for […]
[Continue reading]What is DHCP – Simple Description
DHCP Stands for Dynamic Host Configuration Protocol. It is one of the most useful protocols used to enable IP communication between Networked devices (Computers, Servers, Routers, etc). As we know, in order for two networked devices to communicate, it is absolutely necessary that they have an IP address assigned on their Network Interface Card (NIC). A […]
[Continue reading]Hello eFax, Goodbye Fax machine – Send a fax from your email
Green technologies are on the rise. Indeed, if we want to save our planet, “Green” habits have to be adopted everywhere, from technology to everyday life. Saving on paper and ink resources is a huge step towards cost savings for any company, but also is a huge improvement for the environment. There are several internet […]
[Continue reading]Home Security Monitoring with Skype and Security WebCam
Skype is a revolutionary software for making free (or cheap) VoIP calls through the Internet to almost anywhere in the world. The integration of Video functionality in Skype enables us to use the application as Video Security / Surveilance solution for our home. There are other options for cheap remote security monitoring, as described in my post […]
[Continue reading]Networking Technologies on the Rise
According to Gartner analysis, the following networking and telecommunication technologies are emerging and are expected to be adopted in the mainstream market within 5 to 10 years. LTE-A: Long Term Evolution Advanced for mobile networks is a technology that will increase mobile data rates to 1Gbps (Downlink) and 500 Mbps (Uplink). The maturity of this technology is […]
[Continue reading]- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 19
- Next Page »