Most of us had connected to a WiFi network with our laptop, tablet or smartphone, and to join that network we had to select a network name and supply a password. Supplying a password implies (better) security, but there are different methods and protocols that are used in wireless networks to ensure security, some being … Read more Difference between WEP, WPA, WPA2, WPA3, WPS WiFi Security
FTP, SFTP, FTPS and TFTP are protocols that are used to transfer files over a network. FTP FTP stands for File Transfer Protocol. This is a standard protocol that is used to transfer files between computers and servers over a network, such as the Internet. In a nutshell, FTP is the language that computers use … Read more What are FTP, SFTP, FTPS & TFTP and their differences
Port forwarding allows computers over the Internet to connect to a specific computer or service within a private network. It’s basically making your computer accessible over the Internet, even though you’re behind a router. For example, let’s say a friend of yours at their home wants to remotely control your computer at your home using … Read more What is Port Forwarding
Syslog is a standardized way of producing log information. This is really popular in Linux computers or UNIX computers, while Windows does a similar thing with the Event Log. Pretty much all routers, switches, firewalls, wireless controllers, and all sorts of other devices out there can produce syslog data. As your network grows you’ll find … Read more What is syslog
SMTP is similar to a mailman. The mailman picks up the mail from your mailbox at your home, finds the correct route and then delivers it to the destination mailbox.
Learn the main differences between the two email protocols commonly used today, POP3 and IMAP.
This article is about a series of network troubleshooting tools that you can use in command prompt to troubleshoot and gather information about your network. We’re going to go over four commands: “ipconfig”, “nslookup”, “ping”, and “tracert”. ipconfig The “ipconfig” displays the current information about your network such as your your IP and MAC address, … Read more Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP commands
HTTP stands for Hypertext Transfer Protocol and this is probably the most widely used protocol in the world today. HTTP is the protocol that is used for viewing web pages on the Internet. When you type in a web address, like google.com, you’ll notice that HTTP is automatically added at the beginning of the web … Read more HTTP, HTTPS, SSL and TLS Explained
We’re going to talk about the difference between a hub, a switch and a router. All three of these devices are similar, but there is a difference in the way they handle data. Hub The purpose of a hub is to connect all of your network devices together on an internal network. It’s a device … Read more Difference between Hub, Switch, & Router Explained
We can use iSCSI to create a Storage Area Network (SAN). iSCSI is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection. This allows IP-connected hosts to access a Storage Area Network (SAN). Traditional Storage Area Networks are based on Fiber Channel. Fiber Channel SANs are very fast … Read more What is iSCSI