Skip to content

Networking Basics: Learn How Networks Work

What are PPP and PPPoE? Definition, Usage, and Importance

Point To Point Protocol (PPP) and Point To Point Protocol over Ethernet (PPPoE) are network protocols that allow data communication between two network entities or points. Throughout the documentation for both protocols, points are referred to as nodes, computers, or hosts. The protocols are similar in design with a major difference – PPPoE is encapsulated…

[Read More]

Top Facts About Port Scanning You Need to Know

Each individual computer runs on multiple ports. For instance, when a person opens his or her email, the computer’s server will open a port through which new mail will be downloaded through a connection to the email server. Certain ports on an individual’s personal computer are open continually, making them a target for any potential…

[Read More]

What is a Port? Understanding Its Functions and Importance

To the uninitiated or the otherwise-gifted computer user, technical geek-speak can be rather frustrating and aggravating. When instructions are filled with such things as “port,” “TCP,” “UDP,” and other acronyms or technical terminology, the user feels more isolated and rarely finds a solution or comprehension. Fortunately, comprehension is just moments away. Port Picture a bay…

[Read More]

What is Port Forwarding? Definition and Functions

Port forwarding, or tunneling, is the behind-the-scenes process of intercepting data traffic headed for a computer’s IP/port combination and redirecting it to a different IP and/or port. A program that’s running on the destination computer (host) usually causes the redirection, but sometimes it can also be an intermediate hardware component, such as a router, proxy…

[Read More]
Network technology icons overlaid on a cityscape to suggest connectivity

Ping Tool: Test Network Connectivity & Speed

Having an internet connection has become a basic necessity for modern life, but it’s not always enough in itself. For some of us, we need to not only be connected but to have a fast connection.  Think about how frustrated you get when there’s lag while you’re trying to work, stream a video, or play…

[Read More]
WAN IP Address. LAN IP Address. What

Difference LAN & WAN: Explaining Network Types

What do you mean I have two IP addresses? One day, as you’re poking around your computer’s networking preferences or maybe hooking up a new router, you might suddenly become aware of an interesting bit of information. There are two different IP addresses involved with you’re getting online and connected to the world. There’s the…

[Read More]
The VPN Internet Kill Switch explained

What Is a VPN Kill Switch and How it Protects Your Privacy?

Without a reliable VPN Kill Switch, you could be caught with your digital pants down.  A Virtual Private Network (VPN) is essential for anyone who uses the Internet because it addresses the top three online concerns: security, privacy and anonymity. Along those lines, a VPN kill switch is a feature you want you on your…

[Read More]
Technology network connection

What is a Gateway and What Does it Do?

A network gateway is a node in a computer network that provides a key stopping point for data that is traveling to or from other networks.  Thanks to gateways, we are able to communicate online by sending data back and forth. Without a gateway, the internet would not be of any use to us! Additionally,…

[Read More]

Your Definitive Guide to Using Proxy Servers (Proxies)

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…

[Read More]
What Makes a Network Unsecure?

Unsecured Network Risks: How to Stay Safe Online

What are the risks involved if I use one? An unsecured network most often refers to a free Wi-Fi (wireless) network, like at a coffeehouse or retail store. It means there’s no special login or screening process to get on the network, which means you and anyone else can use it. What that means to…

[Read More]

What Is a Traceroute?

For most of us, phone calls and Internet connections seem to happen instantaneously. It feels as if our computer has a direct line to our favorite websites. Web pages load so fast that it seems that we must have a direct connection to any computer, even one across the country. But we don’t. Not since…

[Read More]

TCP/IP Simplified

As we all know, computers are a combination of hardware (computers, monitors, and modems/routers) and software applications or programs (word processing, spreadsheet/accounting programs, etc.). The same goes for networking: Both hardware and software are involved—and the heart of the networking software, which is built into your computer, is TCP/IP…the international standardized guidelines for network communications.…

[Read More]

What is a TCP/IP Packet and How Does It Work?

In its simplest form, a packet is the basic unit of information in network transmission. Most networks use TCP/IP as the network protocol, or set of rules for communication between devices, and the rules of TCP/IP require information to be split into packets that contain both a segment of data to be transferred and the…

[Read More]
Is Cloudflare

A Few Good Reasons to Switch Your DNS Server

You should know that there are some things you can control—and that you likely don’t know about—that will affect your personal Internet experience for the better. One change to consider is whether to switch the default DNS service your Internet Service Provider (ISP) uses. Here’s what that means: DNS stands for “Domain Name System.” A…

[Read More]

What is a Subnet? A look at networks inside a network.

As you may know from other articles on this WhatIsMyIPAddress.com website, an IP address contains information that identifies the network a computer is connected to, as well as the computer (or “host”) itself. The IP address system provides a way of networking hardware to recognize the network as well as the host segments of an…

[Read More]
These 4 Things Make Your Network Security 4X Stronger

4 Things To Make Your Network Security Stronger

Be the champion and wrangle a promotion out of it. Companies are in the business of making money through selling products and services. But the way companies operate today primarily revolves around having a strong online presence and having networks and servers to run day-to-day operations. Even some of the biggest companies with massive IT…

[Read More]

What is SIP?

Though not too many people know about or use it, there is a hardware/software combination that lets you use the Internet to make phone calls. In fact, in many cases, you can make free voice calls anywhere in the world. That’s known as Internet telephony. And that’s where a special term comes into play—”SIP.” Short…

[Read More]

5 Network Security Steps Your Business Should Take

Every week, publications such as The Wall Street Journal and business sections of major city newspapers report the latest incidents of corporate hacking. As it turns out, the problem isn’t caused exclusively by a growing number of hackers armed with new tools and strategies. The companies being hacked make their own contributions to their security…

[Read More]
Router Security Flaws Put You at Risk. Here

Alert! Your Router Might Not Be Safe. And You Wouldn’t Even Know It.

About this article: A special report revealed that thousands of routers had security flaws, and router companies weren’t doing anything about it. A router manufacturer won’t do much to fix a flaw for older routers. Even if a fix is available, consumers often don’t know about it—or even know what steps to take. It might…

[Read More]

What’s the Difference Between a Router and a Modem?

They look alike, these two small pieces of plastic hardware that sit on the desks of most homes. With a quick glance, you might even think they’re two of a kind. Here’s why: They have plugs and jacks on the back that look exactly alike They’re about the same size and shape They both have…

[Read More]

Get Better Performance from Your Router

There are three kinds of Internet users: 1) those who are up to speed on the networking technology that connects us to the Internet and the world; 2) those who let their spouse, friends or neighbors set up and fix their home networks for them at home; and 3) the rest of us who are…

[Read More]
Hackers Took Over My Router and I Had NO Clue

Signs Your Router Has Been Hacked and What to Do Next

Hackers Took Over My Router and I Had NO Clue. Graphic artist was a victim of DNSChanger virus. Are you safe? We’re all aware that hackers can do something to our computers through a network virus. But did you know they can attack your router—the key to directing all your Internet activity? More than that,…

[Read More]
A Router Is Key to a Home Network

Router Types: Understanding How do They Work

Before we delve into the world of routers, you need to understand what a broadband connection is and how it works. According to Dictionary.com, broadband is “a high-speed, high-capacity transmission medium that can carry signals from multiple independent network carriers. This is done on a single coaxial or fiber-optic cable by establishing different bandwidth channels.…

[Read More]
Use a Proxy to Get Around Internet Blocks

Proxy Server Basics

Better question: Why would you use a proxy at all? The topic of proxies can get confusing fast, making it hard to figure out what they are, what they do and why anyone would use one. Just so you know, using a proxy revolves around you taking steps on your computer to help you either:…

[Read More]
Packet Sniffing. How the Bad Guys Spy On Your Data Online

Packet Sniffing. How Bad Guys Spy On Your Data

Hackers and others maybe utilizing “packet sniffing” to read your personal data You’ll often hear that you should be careful when using the Internet, because you never know who’s spying on us. Indeed, there are some Internet gurus out there (more than you might think) who are convinced that most Internet Service Providers (ISPs), the…

[Read More]