Networking Basics: Learn How Networks Work
Point To Point Protocol (PPP) and Point To Point Protocol over Ethernet (PPPoE) are network protocols that allow data communication between two network entities or points. Throughout the documentation for both protocols, points are referred to as nodes, computers, or hosts. The protocols are similar in design with a major difference – PPPoE is encapsulated…
[Read More]Each individual computer runs on multiple ports. For instance, when a person opens his or her email, the computer’s server will open a port through which new mail will be downloaded through a connection to the email server. Certain ports on an individual’s personal computer are open continually, making them a target for any potential…
[Read More]To the uninitiated or the otherwise-gifted computer user, technical geek-speak can be rather frustrating and aggravating. When instructions are filled with such things as “port,” “TCP,” “UDP,” and other acronyms or technical terminology, the user feels more isolated and rarely finds a solution or comprehension. Fortunately, comprehension is just moments away. Port Picture a bay…
[Read More]Port forwarding, or tunneling, is the behind-the-scenes process of intercepting data traffic headed for a computer’s IP/port combination and redirecting it to a different IP and/or port. A program that’s running on the destination computer (host) usually causes the redirection, but sometimes it can also be an intermediate hardware component, such as a router, proxy…
[Read More]Having an internet connection has become a basic necessity for modern life, but it’s not always enough in itself. For some of us, we need to not only be connected but to have a fast connection. Think about how frustrated you get when there’s lag while you’re trying to work, stream a video, or play…
[Read More]What do you mean I have two IP addresses? One day, as you’re poking around your computer’s networking preferences or maybe hooking up a new router, you might suddenly become aware of an interesting bit of information. There are two different IP addresses involved with you’re getting online and connected to the world. There’s the…
[Read More]Without a reliable VPN Kill Switch, you could be caught with your digital pants down. A Virtual Private Network (VPN) is essential for anyone who uses the Internet because it addresses the top three online concerns: security, privacy and anonymity. Along those lines, a VPN kill switch is a feature you want you on your…
[Read More]A network gateway is a node in a computer network that provides a key stopping point for data that is traveling to or from other networks. Thanks to gateways, we are able to communicate online by sending data back and forth. Without a gateway, the internet would not be of any use to us! Additionally,…
[Read More]Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…
[Read More]What are the risks involved if I use one? An unsecured network most often refers to a free Wi-Fi (wireless) network, like at a coffeehouse or retail store. It means there’s no special login or screening process to get on the network, which means you and anyone else can use it. What that means to…
[Read More]For most of us, phone calls and Internet connections seem to happen instantaneously. It feels as if our computer has a direct line to our favorite websites. Web pages load so fast that it seems that we must have a direct connection to any computer, even one across the country. But we don’t. Not since…
[Read More]As we all know, computers are a combination of hardware (computers, monitors, and modems/routers) and software applications or programs (word processing, spreadsheet/accounting programs, etc.). The same goes for networking: Both hardware and software are involved—and the heart of the networking software, which is built into your computer, is TCP/IP…the international standardized guidelines for network communications.…
[Read More]In its simplest form, a packet is the basic unit of information in network transmission. Most networks use TCP/IP as the network protocol, or set of rules for communication between devices, and the rules of TCP/IP require information to be split into packets that contain both a segment of data to be transferred and the…
[Read More]You should know that there are some things you can control—and that you likely don’t know about—that will affect your personal Internet experience for the better. One change to consider is whether to switch the default DNS service your Internet Service Provider (ISP) uses. Here’s what that means: DNS stands for “Domain Name System.” A…
[Read More]As you may know from other articles on this WhatIsMyIPAddress.com website, an IP address contains information that identifies the network a computer is connected to, as well as the computer (or “host”) itself. The IP address system provides a way of networking hardware to recognize the network as well as the host segments of an…
[Read More]Be the champion and wrangle a promotion out of it. Companies are in the business of making money through selling products and services. But the way companies operate today primarily revolves around having a strong online presence and having networks and servers to run day-to-day operations. Even some of the biggest companies with massive IT…
[Read More]Though not too many people know about or use it, there is a hardware/software combination that lets you use the Internet to make phone calls. In fact, in many cases, you can make free voice calls anywhere in the world. That’s known as Internet telephony. And that’s where a special term comes into play—”SIP.” Short…
[Read More]Every week, publications such as The Wall Street Journal and business sections of major city newspapers report the latest incidents of corporate hacking. As it turns out, the problem isn’t caused exclusively by a growing number of hackers armed with new tools and strategies. The companies being hacked make their own contributions to their security…
[Read More]About this article: A special report revealed that thousands of routers had security flaws, and router companies weren’t doing anything about it. A router manufacturer won’t do much to fix a flaw for older routers. Even if a fix is available, consumers often don’t know about it—or even know what steps to take. It might…
[Read More]They look alike, these two small pieces of plastic hardware that sit on the desks of most homes. With a quick glance, you might even think they’re two of a kind. Here’s why: They have plugs and jacks on the back that look exactly alike They’re about the same size and shape They both have…
[Read More]There are three kinds of Internet users: 1) those who are up to speed on the networking technology that connects us to the Internet and the world; 2) those who let their spouse, friends or neighbors set up and fix their home networks for them at home; and 3) the rest of us who are…
[Read More]Hackers Took Over My Router and I Had NO Clue. Graphic artist was a victim of DNSChanger virus. Are you safe? We’re all aware that hackers can do something to our computers through a network virus. But did you know they can attack your router—the key to directing all your Internet activity? More than that,…
[Read More]Before we delve into the world of routers, you need to understand what a broadband connection is and how it works. According to Dictionary.com, broadband is “a high-speed, high-capacity transmission medium that can carry signals from multiple independent network carriers. This is done on a single coaxial or fiber-optic cable by establishing different bandwidth channels.…
[Read More]Better question: Why would you use a proxy at all? The topic of proxies can get confusing fast, making it hard to figure out what they are, what they do and why anyone would use one. Just so you know, using a proxy revolves around you taking steps on your computer to help you either:…
[Read More]Hackers and others maybe utilizing “packet sniffing” to read your personal data You’ll often hear that you should be careful when using the Internet, because you never know who’s spying on us. Indeed, there are some Internet gurus out there (more than you might think) who are convinced that most Internet Service Providers (ISPs), the…
[Read More]- « Previous
- 1
- 2
- 3
- Next »