While every major operating system has automated the connection process, there is still some ambiguity about what each type of encryption and authentication method will require from you. Find out what you need to know for each type of network so you don’t have to ask IT for help.
Wireless network connectivity is incredibly convenient, enabling quick network installation and configuration. Wireless networks also provide a convenient way for malicious attackers to gain access to your wireless network when the network is not properly secured.
WEP encryption is still the most popular encryption used on wireless access points. This makes knowing how to connect to a WEP encrypted network a fundamental computing skill. Find out how to get yourself connected using every major operating system.
Do you know what to do in case of a network attack? This article will help you become familiar with some common network attacks and the defense technologies and countermeasures available to deploy or use to defend either yourself or a company’s network.
Looking for a network monitoring software but don’t know what to choose? Try one of these four great solutions.
This article takes a brief look at passive vs. active network security attacks. It deals with the differences and gives examples of commonly used exploits. This article is not intended to be a tutorial on network attacks but only a discussion on the topic of network security.
As more computers enter our lives, it is not unusual for a household to have a minimum of two computers in the home. But with more computers there are more concerns about network security. In this article you’ll learn how to keep your home computer safe.
The anti-virus programs we recommend for Windows Small Business Server are the ones that provide ease of installation with both server and desktop clients. They’re excellent solutions for a small or medium business.
You can use DOS for more than just checking your IP address. This guide will show you how to change an FTP password from the command line.
Before you login any website from a wireless access point, you need to read this article. Learn the programs that hackers use to read your emails wirelessly and how you can protect yourself.