-
802.11a
Apr 6, 2011 · 2 min read · CCENT CCNA Cisco cisco computers General ICND1 IEEE 802.11a-1999 ISM band networking Orthogonal Frequency Division Multiplexing technology Wi-Fi wireless Wireless network ·Continuing the discussion about wireless standards we talked about the 802.11 – Legacy standard (See the post 802.11 – Legacy) Today's post will be talking about the IEEE 802.11a standard. On Monday I talked about the Basic Wireless Concepts (See the post Basic Wireless Concepts) in that post I mentioned the wireless …
Read More -
Understanding UDP
Forever ago I talked about TCP (Understanding TCP) and I said that in that post that UDP would be another day, well this is the day where we get to understand UDP, which stands for User Datagram Protocol. UDP is the total opposite of the TCP communication. UDP in short sends information or data without notifying the …
Read More -
Common Network Attacks
Network attacks have always been around but they are getting more advanced every day. These attacks are also easy to set up and use. In the past these types of attacks would have to be pulled off by someone who really knew about computers and to know what they are doing. That's a true hacker, now there are programs …
Read More -
How a Router Routes
Mar 16, 2011 · 5 min read · ARP CCENT CCNA Cisco cisco computers ICND1 ICND2 Internet Protocol IP address MAC address networking Protocols router Subnetwork technology tutorial Tutorials ·This tutorial will be going over the basic information of how a router routes IP packets. Routers are used in the OSI layer three or the network layer. These routers have IP addresses and forward IP packets to the proper destination. This guide is somewhat basic and is assuming you have some information of how IP …
Read More -
Cracking WEP
Mar 14, 2011 · 3 min read · Aircrack-ng backtrack computers Linux MAC address Network security networking operating systems security Software software tutorial Tutorials Wi-Fi Wired Equivalent Privacy wireless ·BackTrack is Linux network security audit tool for security professionals. This tool is used for testing and penetrating networks. That being said** This tutorial is for educational use only. This is meant only to teach that WEP is an insecure option, and is recommend to use a harder encryption. Using this tutorial on …
Read More