Every network-enabled device has 2 types of addresses, logical (IP addresses) and physical (MAC addresses). An IP address (Internet Protocol address) is the address that is assigned to your device by the network. It uses Internet Protocol for communication. These IP addresses can change. The IP address is […]
There are multiple ways one can protect their wireless network. First, choosing which form of wireless network is necessary. WPA2 (Wi-Fi Protection Access 2) is the most secure and is an upgrade over WPA. Before WPA, WEP was a less secure option. WPA2 should […]
A perimeter network, also called a DMZ, is the area that is between the Internet and an intranet that hosts the Internet which is accessible from servers. Perimeter networks provide protection for the Internet-facing servers and separate the servers from the internal network. In perimeter networks, […]
You must be logged in to post a comment.