Setup a wireless Network-Things to avoid

1. Do not name your SSID your last name or first name

2. Do not have your pass phrase your last name of first name

3. Don’t leave your wireless channel at six, change it to 2 or 11

4. Don’t leave your wireless network open enable some sort of encryption

5. Place your wireless router in the middle of your home not next to a wall

6. Don’t place your wireless router next to large heavy objects Continue reading “Setup a wireless Network-Things to avoid”

How to access remotely your internal network

Remotely Accessing your internal network and data is sometimes mandatory and can be used for a variety of reasons. Maybe you are outsourcing some of your business to an external partner, maybe you require external technical support, or you may have employees on the road or tele-workers that require access to internal data and resources in your company. In any case, you must take measures to protect your data and network, but still keep the operation of your remote access service as functional as possible.

In this article I describe the most popular methods and technologies available to use in order to enable your company users to access internal data from outside your company. Continue reading “How to access remotely your internal network”

The Base of TCP/IP Networking

A few years ago there was a big hype about “being online”. Everyone had to be online and there wasn’t one day where you didn’t have to be afraid that you missed the coolest and newest technology. This was just the TCP/IP layer and it was already well known for over 20 years back then.

So what is this TCP/IP thing? What good does it do for you and has this been the latest thing or will it even get better? This article is trying to touch some of the aspects of the TCP/IP layer, higher level protocols based on it and give a brief outlook on what is next. Continue reading “The Base of TCP/IP Networking”