Wireless: Determine if Computer Has 5GHz Network Band Capability

To Determine 5 GHz Network Band Capability: Check on Windows: 1. Search “cmd” in the Start Menu. 2. Type “netsh wlan show drivers” in the Command Prompt & Press Enter. 3. Look for the “Radio types supported” section. Determining Factor: If the network adapter supports network mode 802.11ac: The computer supports both 2.4 GHz and 5GHz – your […]

Read More

SonicWALL Password Recovery and Settings Backup

If your having problems trying to login to a Sonic wall. This is how you can reset your sonicwall and restore access. STEP 1: Boot your appliance into safe mode.  This is done by pressing and holding the reset button with a ‘magical resetting tool’ (a.k.a. a paperclip) for about 6 seconds. If you are […]

Read More

WHAT IS POWER OVER ETHERNET

Power over Ethernet is the generic term for network cables carrying both LAN signal and electrical power to a device. The technology, known as POE, is often found in devices that require both a power (electricity) and wired Ethernet (LAN) connection. POE can be added to a network by using a POE Network switch and […]

Read More

Autosensing Network Adapters

Network adapters that support both traditional and Fast Ethernet choose the speed at which they run through a procedure called autosensing. Autosensing is a feature of so-called “10/100/1000” Ethernet hubs, switches, and NIC’s (Network Interface Card). Autosensing involves probing the capability of the network using low-level signalling techniques to select compatible Ethernet speeds. Autosensing was […]

Read More

How do I repair TCP/IP Stack

At times it is necessary to repair TCP/IP stack because the links between the layers may become broken. When you try pinging an address, you get a response but still cannot connect to your network or the internet. Start > All Programs > Accessories and right click on “Command Prompt”, select “Run as Administrator” to […]

Read More

Understanding Windows 7 File/Share Permissions

The Windows Operating systems use SIDs to represent all security principles. SIDs are just variable length strings of alphanumeric characters that represent machines, users and groups. SIDs are added to ACLs(Access Control Lists) every time you grant a user or group permission to a file or folder. Behind the scene SIDs are stored the same […]

Read More

What is Port Forwarding?

Port forwarding, or tunneling, is the behind-the-scenes process of intercepting data traffic headed for a computer’s IP/port combination and redirecting it to a different IP and/or port. A program that’s running on the destination computer (host) usually causes the redirection, but sometimes it can also be an intermediate hardware component, such as a router, proxy […]

Read More

What is VPN?

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network. A VPN […]

Read More

What is Network Address Translation?

Network Address Translation (NAT) is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. […]

Read More

What is DHCP?

As long as you’re learning about your IP address, you should learn a little about something called DHCP—which stands for Dynamic Host Configuration Protocol. Why bother? Because it has a direct impact on millions of IP addresses, most likely including yours. DHCP is at the heart of assigning you (and everyone) their IP address. The […]

Read More