Most of us had connected to a WiFi network with our laptop, tablet or smartphone, and to join that network we had to select a network name and supply a password. Supplying a password implies (better) security, but there are different methods and protocols that are used in wireless networks to ensure security, some being … Read more Difference between WEP, WPA, WPA2, WPA3, WPS WiFi Security
FTP, SFTP, FTPS and TFTP are protocols that are used to transfer files over a network. FTP FTP stands for File Transfer Protocol. This is a standard protocol that is used to transfer files between computers and servers over a network, such as the Internet. In a nutshell, FTP is the language that computers use … Read more What are FTP, SFTP, FTPS & TFTP and their differences
Port forwarding allows computers over the Internet to connect to a specific computer or service within a private network. It’s basically making your computer accessible over the Internet, even though you’re behind a router. For example, let’s say a friend of yours at their home wants to remotely control your computer at your home using … Read more What is Port Forwarding
Syslog is a standardized way of producing log information. This is really popular in Linux computers or UNIX computers, while Windows does a similar thing with the Event Log. Pretty much all routers, switches, firewalls, wireless controllers, and all sorts of other devices out there can produce syslog data. As your network grows you’ll find … Read more What is syslog
SMTP is similar to a mailman. The mailman picks up the mail from your mailbox at your home, finds the correct route and then delivers it to the destination mailbox.
Learn the main differences between the two email protocols commonly used today, POP3 and IMAP.
Protecting your PC is something you should definitely prioritize. Fortunately, your Windows 10 PC is already partially protected with its built-in Windows Defender. Microsoft gave its pre-installed antivirus a massive upgrade in 2018, which added a sandbox mode to Windows Defender, effectively making it both an antivirus and an anti-malware software. As a result, your … Read more Securing Your PC: How to Choose an Antivirus Software For Windows 10
This article is about a series of network troubleshooting tools that you can use in command prompt to troubleshoot and gather information about your network. We’re going to go over four commands: “ipconfig”, “nslookup”, “ping”, and “tracert”. ipconfig The “ipconfig” displays the current information about your network such as your your IP and MAC address, … Read more Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP commands
If you work with computers, or hang around computers long enough, you might come across this term “kernel”. In this article we will see what the kernel is, why is it important and where did it come from. Thing that most people forget is all that computers are doing is following instructions, repeating one instruction … Read more What is a Kernel