Tag: networking

Ask a question

Join Now or Sign In to ask a question.
delia25
2 days ago

I understand that using unsecured public WiFi is a security risk, and if I’m not using a VPN, someone can “eavesdrop” on my activity. What I don’t know is...

2 Answers |
delia25
3 days ago

We have a Fortinet Fortigate device in one of our branch offices that suffered a power outage in a storm. I was able to rejigger the...

2 Answers |
PaxProSe
1 week ago

One of my friends has her small business’s wireless network secured with WEP encryption. I’ve suggested that she should change to WPA/WPA2 and advised her...

3 Answers |
TheCount
1 week ago

Some new routers tout their inclusion of “beamforming.” How much does this really improve the range of a wireless router? Is it just a catchy tagline (“...

RomanZ
1 week ago

I'm looking for an easy way to check the security on my network to make sure that we've got all the ports we don't need shut down. Is...

Tags: network, security, test |
5 Answers |
rcook12
3 weeks ago

One of the things that Apple added with iOS 7 was “wireless mesh networking.” How does this work, and what makes use of the feature?

penelope
3 weeks ago

I'm reading through an earlier question posted here and now am wondering if there's a way to tell if my company is monitoring my...

Tags: privacy |
7 Answers |
dthomas
3 weeks ago

I have a friend who can't remember her WiFi password and didn't write it down anywhere. I have it stored on my Android phone (Galaxy S2...

TravisT
4 weeks ago

When setting up a home network, is it worth the extra effort to assign static IP addresses to everything, or is DHCP the way to go?

Tags: DHCP, home network |
2 Answers |
PaxProSe
4 weeks ago

Does anyone have a good guide on how to recover the network key on a Linksys Wireless G Router?

2 Answers |
Users of Google Glass will get to meet and compare their techie headgear this weekend at a spot where appearance is everything.
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
A Space X Falcon rocket lifted off Friday afternoon for the International Space Station (ISS) from the Cape Canaveral Air Station in Florida.
Advanced Micro Devices doesn't want its chips in low-priced tablets, and is eager to avoid a battle with Intel or ARM, whose chips have driven tablet prices down to under US$100.
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy.
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

White Papers & Webcasts

See more White Papers | Webcasts