Network Security

Network Security

What are the common mistakes by network administrators during network data backup and restoration?

What are the tips to overcome such problems and avoid a big disaster because the data is the most valued asset in any business and its security and confidentiality is very important to run a successful business? 

  • 936 views
  • 1 answers
  • 0 votes

I recently had a wireless router installed for my home network. I didn't know much of its security configuration as the DSL provider technicians did the whole installation and they only asked me to give a shared key 'passphrase'.

I shared the key with my family but for sometime my Internet speed wasn't that good as before and there are some other unknown MAC addresses that keep popping up on the Client Table without anyone I know is on the network.
 
Is there anyway to limit the access on my router beside the pre-shared key? My router is a PROLiNK Hurricane 5301G.
  • 27662 views
  • 2 answers
  • 7 votes

I recently bought a Linksys 4 Port Wireless Router and I would like to know how to configure its mac filtering settings to be able to setup a more secure wireless network and to limit the devices connected to my network?

  • 1890 views
  • 4 answers
  • 0 votes

I have built a small home network via cable, 1 server and 3 users. Whenever I share some folder and give access rights to other users, it displays an error message, “Access Denied”.

I’ve discovered that if I share a folder on any drive other than C, it works fine but some folders shared on C do not give access rights, even though rights are granted upon sharing.

Please tell me why is it so?

  • 1026 views
  • 1 answers
  • 0 votes

What are the most common problems with a networking system and how can they be resolved?

  • 1023 views
  • 3 answers
  • 0 votes

I have more than 40 computers connected to the network on my dormitory house. We used unmanageable switch to connect all of computers.

We have planned to upgrade using router. We think about using mikrotik or juniper router. What are pros and cons of each?

  • 2731 views
  • 1 answers
  • 0 votes

Hi folks,

please allow me to post my problem here in Microsoft Office Groove File Sharing. An error message appeared on my screen and informed me about some compatibility issue. See the screen shot I pasted, below.

Microsoft Office Groove

Groove File Sharing workspaces are not supported on 64 bit operating system.

This problem all started when I shifted to Windows 7 Pro 64bits. Earlier with 32bits there was no problem. I also saw somebody using Microsoft Office Groove File Sharing on a Windows 7 Pro 64bits.

  • 1794 views
  • 1 answers
  • 0 votes

Hi All,

How to find a remote IP (Internet Protocol)?

Thank you.

  • 901 views
  • 2 answers
  • 0 votes

My router is Linksys and I want to know which is better to use – 64-bit wep or 128-bit wep.

I really don't get the difference, if they are compromised its still the same problem.

  • 875 views
  • 1 answers
  • 0 votes

Hi,

My Name is RobertGart, an instructor in Computers. I managed the networking side of our school and I used IPCOP software for our Firewall.

One of the features I configured, is the DHCP server and it works fine. Our admin wants me to block unwanted sites in our network and I know that IPCOP is capable of blocking sites. IPCOP has various add on's. Although, it's a great firewall, it seems to me that these add on's should be incorporated into the basic IPCOP package.

Can anybody help me what add on's are needed for blocking site? and how to configure it?

Thanks.

  • 6453 views
  • 3 answers
  • 1 votes

Latest Articles

Top 7 Tech Features That Make Online Games Addictive (In A Good Way)

Online games have evolved far beyond simple entertainment. Today’s most engaging platforms keep players coming back through carefully designed features that enhance immersion, reward progress, and create a sense of community. These tech-driven elements...

Tiny Systems That Make Apps Stick

When people say “make it more engaging,” they often mean “add more stuff.” I think the opposite is true. The products that hook us do it with a handful of tiny systems arranged with...

Free cloud mining is coming! RICH Miner launches mobile mining, everyone can earn cryptocurrencies

RICH Miner officially launches a new mobile cloud mining application, subverting the traditional mining model! No need to buy mining machines, no technical experience required, just a mobile phone, global users can start the...

Latest Blogs

Top 10 New Laptop Entrants That Shook The Public

The finest laptops are powerful enough to do your daily tasks, comfortable enough to use all day, and power-efficient enough to ensure you don't run out of battery power unexpectedly. Of course, all these...

10 Facts About The Dark Web

Before getting into knowing the facts, let’s have a brief about the Dark Web. The dark web is the data of the World Wide Web that is accessible only through special software, combinations, or...

Top 10 Latest Steam Cleaner Machines

While looking for a chemical-free way to clear and purify both durable and low grounds in your home, a steam cleaner is an excellent solution. With a spurt of superheated steam, this cleaning equipment...

Latest Tips

Top 10 Internet Monitoring Software

Internet monitoring software keeps a log of all internet activities. You can install this type of software on your computer remotely or by the administrator. An operating console controls this software. This type of...

Top 10 Best Partition Manager Software

A Hard Disk Drive is usually partitioned into various smaller drives for optimization. A partition manager helps make this process easier and more efficient. Here, let’s discuss the top 10 best partition manager software. 1....

Top 10 Best Online Music Production Software

Music production is the initial stage of any song. Music production can be done either in studios or at home using an online music production software. Here, let’s discuss the top 10 best online...