Archive for March, 2006
Top 5 Reasons to Choose An Internet Filtering Appliance Over Software
0 Comments Published March 31st, 2006 in the following Categories:Network Security || Firewalls || Anti-Spyware Software || Anti-Virus Software
by Jennifer Fiocco
The need for organizations to monitor and control Internet usage in the workplace should be an accepted fact of doing business in a cyber-connected world. Statistics indicating that 30 to 40 percent of Internet use in the workplace is unrelated to work issues should come as no surprise. Neither should the report that […]
- How to Stop Spam in your Email
- How to choose (and remember) great passwords (Part I)
- How to share my laser jet printer with other computers
- What’s a Workgroup?
Wireless Security: 6 Ways to Stop and Catch Hackers and War Drivers
0 Comments Published March 30th, 2006 in the following Categories:Network Security || Network Hardware || Wireless Networking
by Eric Meyer
War drivers are in the business of finding wireless access points, documenting them and uploading their locations to the web. Why would someone do this, well for several reasons:
First they want free internet access. Next they could just be war driving as a hobby; finally they could be targeting your network for financial […]
- How to configure 2 way access to the “trusted” computers on your network
- It’s 12 Noon, Do You Know Who’s Using Your Network?
- Wireless Adapters: Installing, WPA2 and Advanced Features
- It’s Easy: Setting up a wireless network
It’s a Binary World - How computers count.
0 Comments Published March 29th, 2006 in the following Categories:Big Picture || Computer Addressing || History || How To...
by Tony Stockill
Many have cursed their computer for taking things too literally! It’s easy to blame the computer when something goes wrong.
You get to the checkout at the market, and the item you bought ‘on special’ comes up at the full price. The manager has to be called to fix it up, and what […]