Skip to content

The Learning Center

CIDR Conversion Table

What is CIDR Notation?

Classless inter-domain routing (CIDR) is a set of Internet Protocol (IP) standards that is used to create unique identifiers for networks and individual devices. The IP addresses allow particular information packets to be sent to specific computers. Shortly after the introduction of CIDR, technicians found it difficult to track and label IP addresses, so a…

[Read More]
Easy Steps to Make Your Google Chrome More Secure

Chrome Default Privacy Settings You Should Change Now

Your browser is a piece of software on your device that connects you to the Internet – which probably makes it the most important (unless you spend all day “geeking out” over numbers on spreadsheets). That’s why it’s important for your browser to able to stand up to the online vulnerabilities and security threats. In…

[Read More]
Watch Out for Charity Scams During Natural Disasters

Watch Out for Charity Scams During Natural Disasters

When natural disasters strike, it’s natural to feel concern for those caught in the midst of the disaster. Some people feel the need to give of their money, while others will even travel to the devastated area to help clean and rebuild. What you may not realize is that there are others in the world…

[Read More]

How do I change my MAC address?

Although physical MAC (Media Access Control) addresses are permanent by design, several mechanisms allow modification, or “spoofing”, of the MAC address that is reported by the operating system. This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, or to ensure interoperability. Some internet service providers bind their service to…

[Read More]

What Is a Content Delivery Network?

Content delivery networks use multiple servers in many geographic locations that improve deliveries of static and streaming content. Global content requests automatically get routed to the closest servers, speeding up page loads, maximizing bandwidth and providing identical content regardless of Internet- or site-traffic spikes. Depending on traffic and number of nodes, the network’s algorithms select…

[Read More]
8 Signs You Are Being Catfished

8 Signs You Are Being Catfished

What it means to be catfished and how to tell if you are a victim Chances are your grandparents met because they lived within a ten-mile radius of each other. If not, perhaps they went to the same college for a number of years. Regardless, proximity was key and the dating game was relatively safe.…

[Read More]
What Does CAPTCHA Mean?

What Does CAPTCHA Mean?

CAPTCHA: It’s a Way to Distinguish Machines from Men… and Women Completely Automated Public Turing test to tell Computers and Humans Apart is quite a mouthful to say isn’t it? So let’s stick with the acronym: CAPTCHA (pronounced “KAPT-chuh”). CAPTCHA, as the explanation of the acronym implies, determines whether an online request or submission is…

[Read More]

Buying Smart

Don’t Let Vendors Sell You Hacker-Friendly Technology Take these steps to be “security smart” when buying technology Before you invest in new technology, especially with a new vendor or manufacturer, you need to make sure you’re not inadvertently purchasing a problem just waiting to happen. This is especially important if the devices, gadgets and systems…

[Read More]