Monday, November 7, 2011

Networking Articles and Tips

Networking Articles and Tips


Hijacking

Posted: 06 Nov 2011 11:45 PM PST

HIJacker A hijacker is an attempt from a third party to take control of one’s web browser and use it for their own evil purposes. Some browser hijacks could be carried out to spread awareness of a specific website, but aren't actually harmful. In some cases, though, they can be malicious, and they can steal [...]


How to improve wireless network’s signal strength

Posted: 06 Nov 2011 11:45 PM PST

This article shows you how to get probably the most from your network, by improving the signal. To start of, obstacles like thick walls, appliances, microwaves can greatly reduce the range and effectiveness of wireles networks but this issue can be remedied to a degree by tying together multiple wireless access points (WAPs) or routers. [...]


Wake on LAN

Posted: 06 Nov 2011 11:45 PM PST

A WOL (wake on lan ) request is used by a pc as a means of connecting to a pc that’s shut down. The computer will send specially formatted messages towards the intended computer which is identified by its MAC address and IP address. This job is achieved as even though the target machine is [...]


No comments:

Post a Comment