-
Common Network Attacks
Network attacks have always been around but they are getting more advanced every day. These attacks are also easy to set up and use. In the past these types of attacks would have to be pulled off by someone who really knew about computers and to know what they are doing. That's a true hacker, now there are programs …
Read More -
How a Router Routes
Mar 16, 2011 · 5 min read · ARP CCENT CCNA Cisco cisco computers ICND1 ICND2 Internet Protocol IP address MAC address networking Protocols router Subnetwork technology tutorial Tutorials ·This tutorial will be going over the basic information of how a router routes IP packets. Routers are used in the OSI layer three or the network layer. These routers have IP addresses and forward IP packets to the proper destination. This guide is somewhat basic and is assuming you have some information of how IP …
Read More -
Telecommuting Services
Mar 11, 2011 · 4 min read · Advanced Encryption Standard CCENT CCNA Cisco cisco Encryption General ICND1 ICND2 Internet Internet service provider networking Security security Software software technology Virtual private network ·This post is going to talk about the major technologies that make Teleworking or also called telecommuting possible. This is when an employee performs his or her job away from the office, usually from their home office. By doing this it allows personal convenience, less travel to and from the workplace. At an …
Read More -
Crossover or Straight through?
Mar 10, 2011 · 3 min read · Cable CCENT CCNA Cisco Crossover cable Ethernet Ethernet crossover cable ICND1 ICND2 Internet networking Pin RJ45 router technology tutorial Tutorials ·The EIA/TIA puts the standards in UTP cable, and when cabling a network there are two standards. T568A and T568B these standards are important when deciding to put a crossover cable or straight through cable This tutorial is going to be talking about when and where to apply these different standards. We are going to be …
Read More -
Cisco IDS vs. IPS
There are tons of network attacks out there. Using a firewall helps but does look for signature based attacks. Access Control Lists are like firewalls and only look at the protocols like HTTP, FTP POP, etc. Cisco has developed some tools that will help network administrators combat the issue; IDS, (Intrusion Detection …
Read More