Archive Page 31
How To Get More Networking Equipment For Your Dollar
0 Comments Published April 20th, 2006 in the following Categories:Network Hardware
by Alex Lakatos
If your computer network keeps expanding and the associated networking equipment costs keep increasing, you might want to consider buying equipment in the secondary market. This is a place where you can purchase used or unused brand name equipment; such as, servers, routers, LAN switches and more at substantial savings. Savings of 50-70% of list price are not unusual.
Continue reading ‘How To Get More Networking Equipment For Your Dollar’
- Wireless Alphabet Soup: What’s the Difference Anyway?
- How Do Wireless Networks Work?
- The Future of Wireless Networking
- Learn the lingo of wireless / computer networking
Computer and Mobile phone content is merging… Get in on it…
0 Comments Published April 19th, 2006 in the following Categories:Big Picture
by Tim Normanas
Advances in mobile phone technology is now moving faster then any other market. Computers may be getting faster, but they have reached there potential - it will be along time before we see something completely different on a computer again.
Mobile Phones however, are still along way from what they can be used for. With each new mobile release, new features are added. Third Generation (3G) mobiles are giving people the ability to access a range of content; videos, games, ringtones, themes - but until now, there has been a wall around where people can access their media.
Continue reading ‘Computer and Mobile phone content is merging… Get in on it…’
- VoIP and Emergency 911
- How to configure a free VPN solution in your home
- Free VOIP Services: Not Necessarily Free
- Advanced Wireless Networking
Securing Your Computer System
0 Comments Published April 18th, 2006 in the following Categories:Network Security
by Michael Perry
Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Below are a few easy, cost-effective steps you can take to make your computer more secure.
Continue reading ‘Securing Your Computer System’
