Skip to content

Networking Basics: Learn How Networks Work

Three Steps to Solid Home Network Security

Home Network Safety: Keep Hackers Out!

As convenient as a home wireless network is, it also opens up the possibility of somebody attacking your network and stealing your online information. If that is the case, some wifi safety tips could help. In other words, a crafty hacker living or even driving nearby can steal private information…if you haven’t taken the proper…

[Read More]

What Are Network Devices… and What Do They Do?

When you sit down to get something done on your computer, you may not realize it but you’re relying on more than your Internet browser to get information, go shopping or send emails. You’re also relying on having an IP address that recognizes your computer, as well as a reliable network that you’re connected to—and…

[Read More]
What is Network Address Translation (NAT)?

What is Network Address Translation?

The definition of Network Address Translation Network Address Translation (NAT) is a service that is used in routers. Its purpose is to translate a set of IP addresses to another set of IP addresses.  If you are viewing this article on the internet on the WIMIA website, there’s a very good chance that you are…

[Read More]
Man-in-the-Middle Attacks explained, defined

Man-in-the-Middle Attack: When Hackers Eavesdrop on Your Connection.

Not all hackers are after attention. Some just want money. You might think, and hope, that being aware of all the latest scams and tricks that are on the Internet will keep the online thieves away. After all, if you’re smart AND you know what to look for, you won’t fall for somewhat obvious scams…

[Read More]

What is a MAC Address: How to Find and Identify

Whether you work in a wired network office or a wireless one, one thing is common for both environments: It takes network software and hardware (cables, routers, etc.) to transfer data from your computer to another, or from a computer thousands of miles away to yours. In the end, to get the data you want…

[Read More]
A man using a computer in a workplace

What Is Localhost?

If you’re not a network administrator and/or you don’t run a help desk, do you need to know what localhost means? The answer is no. If you want to impress the IT people who come to fix your computer or get your network working again, you may want to know what localhost is. If you’re…

[Read More]

You’ve Never Seen a Hotspot Like This—Citywide Wi-Fi Hits the Streets of NYC

You know how frustrating it can be looking for wireless networks when you’re on the go. If you’re trying to get online using a laptop, you can’t get anything done until you’re connected. And if you’re using a smartphone or tablet, you’ll be burning up your data plan until you can connect to a free…

[Read More]

What is a Link-Local IP Address?

A link-local address is a network address that is valid only for communication within the local network segment or the link that a device is connected to. These addresses are not routable, meaning they cannot be used to communicate with devices outside the local network. Link-local addresses are used primarily for automatic address configuration, neighbor…

[Read More]

What is a Computer Hostname?

A name is a label that is used to distinguish one thing from another. A person’s name, for instance, comprises a set of alphabetic characters that allows a person to be individually addressed. Computers are also named to differentiate one machine from another and to allow for such activities as network communication. Computers have always…

[Read More]
Get More from Your Home Wireless Network

Get More from Your Home Wireless Network

Not too many years ago, a home could function normally with just one computer with a direct connection to a modem and the Internet. Not anymore. Today a family of five can easily have a desktop computer, a few laptops, a couple of tablets and several smartphones. And everyone wants to be online to check…

[Read More]
How Internet Firewalls Actually Work

How Firewalls Work

For as long as there are computers connected to the Internet, there will be hackers trying to make life miserable for everyone. That’s why firewalls were created for computer users: to block a hacker’s attempts to break into our computers and computer networks, either at work or at home. A firewall is a protective system…

[Read More]

Understanding Firewalls: Types and Functionality

A firewall is a security device that can be a software program or a dedicated network appliance. The main purpose of a firewall is to separate a secure area from a less secure area and to control communications between the two. Firewalls can perform a variety of other functions, but are chiefly responsible for controlling…

[Read More]
Evil Twin Wi-Fi. A hacker

Evil Twin Wi-Fi Hotspots: What Are They and How Can You Protect Yourself?

Public Wi-Fi is great. It’s convenient, and it’s free — it always feels good when you can save a few megabytes of your mobile data. But do you ever stop and think for a moment before connecting to a public Wi-Fi network? The emergence of evil twin Wi-Fi hotspots indicates that you should. Evil twin…

[Read More]
Dynamic and Static IP Address Differences

Dynamic vs. Static IP Address: Understanding the Differences

When you sign up with an Internet Service Provider (ISP), you will either end up with a static IP address or a dynamic IP address. What’s the difference between the two? Haven’t you ever marveled at how the internet knows how to get information directly to your computer? It’s not magic: your IP address is…

[Read More]
Overview of Dynamic Host Configuration Protocol (DHCP) for Beginners

What Is DHCP and How Does It Work?

Every time you use your computer or smartphone to go online, dynamic host configuration protocol (DHCP) is working in the background. While you probably will not have to configure your DHCP settings unless you’re a network administrator, it’s still good to know what DHCP is and how it works. In this guide to DHCP, we’ll…

[Read More]
What is DD-WRT?

What is DD-WRT?

DD-WRT is a Linux-based firmware project developed to enhance the performance and features of wireless Internet routers. Launched in 2005, DD-WRT is one of the most popular alternative router firmwares due to its longevity of existence and support for a large array of devices. As of now, DD-WRT has builds for leading routers from top…

[Read More]

Data Packets Explained: A Comprehensive Guide

When you send an email, read a news story on your computer or shop online, you’re sending information and getting information digitally, or electronically. It make look like you’re sending a whole photo of your new poodle to Aunt Jane and Uncle Louie across country, but it’s actually a collection of electronic data, in small…

[Read More]

What You Need to Know About Ports

Most people look at a computer and see it as a machine that you operate with a keyboard and mouse and that connects to a monitor and printer. What most of us overlook is that the computer is the brains of the outfit and the other parts—the printer, modem, keyboard, etc.—are simply connected to the…

[Read More]

How Do I Change My MAC Address? A Step-by-Step Guide

Although physical MAC (Media Access Control) addresses are permanent by design, several mechanisms allow modification, or “spoofing”, of the MAC address that is reported by the operating system. This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, or to ensure interoperability. Some internet service providers bind their service to…

[Read More]

What is a Cable/DSL Modem? All You Need to Know

First of all, you need to understand what a broadband connection is and how it works. According to Dictionary.com, broadband is “a high-speed, high-capacity transmission medium that can carry signals from multiple independent network carriers. This is done on a single coaxial or fiber-optic cable by establishing different bandwidth channels. Broadband technology can support a…

[Read More]
VPN Protocols Explained

VPN Protocols: A Complete Guide to Different Types

You don’t have to worry about VPN protocols if you’re researching VPNs for basic safety and security. The default protocol should work perfectly fine for you.

[Read More]