MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
July 2001
Scott Spanbauer
Double Up With Internet Connection Sharing Share an Internet connection between two PCs, simple blog updates... mark for My Articles similar articles
PC Magazine
May 4, 2005
Craig Ellison
Dealing with Dynamic IP Addresses For some applications, a changing IP address just won't do. Dynamic DNS solves the problem. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
Popular Mechanics
March 2008
Joel Johnson
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. mark for My Articles similar articles
Linux Journal
January 19, 2006
Dean Wilson
An Introduction to DHCP Confused about what DHCP offers and how you can take advantage of it on your Linux system? Here are some tips and pointers. mark for My Articles similar articles
PC World
July 2006
Scott Spanbauer
Find the Name Behind a Malicious IP Address Use a command-line program to decode IP addresses... Create shortcuts to Web sites... Add a Firefox shortcut for find.pcworld.com... Clean up Google cookies... mark for My Articles similar articles
Home Toys
August 2004
John Schubert
Routers Versus Switches The simple solution is to determine if the customer is using an ISP without running any servers. If so, the installation will be easy, and the customer can be sold a router. If the customer needs more ports than are available on a single router, use switches. mark for My Articles similar articles
IEEE Spectrum
June 2006
Nicolas Boillot
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. mark for My Articles similar articles
Scientific American
September 2006
Tom Leighton
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. mark for My Articles similar articles
InternetNews
November 19, 2007
Andy Patrizio
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. mark for My Articles similar articles
InternetNews
April 13, 2007
Sean Michael Kerner
Microsoft Confirms DNS Attacks Microsoft issues advisory and workaround to combat vulnerability in Windows Server DNS Service. mark for My Articles similar articles
InternetNews
May 25, 2005
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC Magazine
January 12, 2005
Craig Ellison
Making a Webcam Visible My office contains multiple computers networked together with a wired LAN. We have installed a "Networked Home Security Camera" that uses its own IP address. Any computer within the network can see what the camera sees. mark for My Articles similar articles
PC Magazine
July 1, 2003
Leon Erlanger
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? mark for My Articles similar articles
PC Magazine
March 16, 2004
Jay Munro
Routing Your Web Site Visitors How to use multiple domain names for your website while producing a customized display for each. mark for My Articles similar articles
PC World
March 2005
Scott Spanbauer
Paranoia: The Best Defense Against E-Mail Attacks Criminals may attempt to spread a virus to your computer or hijack your bank account using deceptive e-mails. You can learn to spot e-mail cons by using a handful of investigative techniques and a boatload of common sense. mark for My Articles similar articles
Linux Journal
April 1, 2002
Alan Zeichick
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... mark for My Articles similar articles
PC Magazine
April 19, 2006
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. mark for My Articles similar articles
PC World
January 2005
Kirk Steers
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... mark for My Articles similar articles
Macworld
February 2001
J.W. Davis
WatchGuard SOHO Security Appliance Offers Pricey Protection for Small Networks... mark for My Articles similar articles
IEEE Spectrum
October 2008
David Schneider
Fresh Phish How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites mark for My Articles similar articles
PC World
January 2001
Alan Stafford
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
PC Magazine
November 16, 2005
Matthew D. Sarrel
Authentic E-Mail SMTP authentication holds promise, but it's not yet a real spam-stopping solution. mark for My Articles similar articles
PC Magazine
November 28, 2007
Larry Seltzer
Router Tricks for Parents A technological solution to kids goofing off? Not so fast. mark for My Articles similar articles
The Motley Fool
September 1, 2011
Tim Beyers
Does Google Want Akamai Dead? The search king teams with upstarts to add speed to the Internet. mark for My Articles similar articles
Home Toys
August 2002
Bob Hetherington
Compaq iPAQ CP-2W Connection Point and Wireless Network The CP-2W Connection point allows you to build a home network consisting of up to 4 ethernet and multiple 802.11 wireless computers all connected to a common internet port. Set-up was a snap. mark for My Articles similar articles
Information Today
March 12, 2001
Wallace Koehler
Recent Trends Result in a New Status for VeriSign On March 1, VeriSign, Inc. announced an agreement with the Internet Corporation for Assigned Names and Numbers that will redefine VeriSign's role as an Internet registrar and registry... mark for My Articles similar articles
InternetNews
March 23, 2004
Jim Wagner
.Mobi's Case For Mobile Domains Industry consortium explains plan to push a mobile-centric domain extension apart from .com and .net. mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
Bio-IT World
April 16, 2004
Bill Van Etten
Zero Chances to Go Wrong Zeroconf is an Internet Engineering Task Force working group chartered to automate the configuration and discovery of computers, devices, and services on IP networks. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
PC Magazine
September 21, 2004
NAT Enough? A home router is not a complete security solution. mark for My Articles similar articles
PC Magazine
September 12, 2007
Neil J. Rubenking
Automate Network Configuration Changes I have a laptop and often need Internet access from multiple offices. Is there a way to store multiple configurations/IP addresses to eliminate having to remember and reenter the IP address? mark for My Articles similar articles
InternetNews
June 22, 2004
Ryan Naraine
Buffer Overflows in ISC's DHCP Users at risk of denial-of-service or code execution attacks. mark for My Articles similar articles
InternetNews
October 15, 2007
Stuart J. Johnston
Appliance to Simplify Network Address Management Infoblox aims to simplify DNS and DHCP management on Microsoft networks with a new standalone network appliance. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
March 1, 2007
Sean Walberg
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. mark for My Articles similar articles
PC Magazine
August 31, 2005
John C. Dvorak
Knowing Too Much Information about your IP address and Internet use can be collected easily these days. The possibility that this mode of information collection will expand beyond the Internet is more likely sooner than later. mark for My Articles similar articles
InternetNews
May 3, 2004
Colin C. Haley
AT&T All Out for MPLS-Based IP-VPN The carrier introduces a new VPN service to sign up companies and government agencies for its IP services. mark for My Articles similar articles
PC Magazine
April 20, 2004
Sebastian Rupley
New Spam-Busting Schemes Yahoo! and Microsoft push authentication methods. mark for My Articles similar articles
Reason
July 2003
Jesse Walker
The Big Block Last year Pennsylvania passed a bill to crack down on child pornography online. The cause was uncontroversial, but the law's approach -- requiring Internet Service Providers to block Web sites based on their Internet Protocol addresses -- drew immediate criticism from the technology community. mark for My Articles similar articles
T.H.E. Journal
March 2005
Dan Young
VoIP in a Campus Environment VoIP telephony increases efficiency and lowers costs for businesses. It is also a recruiting tool in higher education. mark for My Articles similar articles
PC Magazine
March 16, 2009
Rist & Griffith
Home Networking in 5 Easy Steps Building a new home network doesn't have to be tough if you follow our five easy steps. mark for My Articles similar articles
PC World
January 24, 2001
Cameron Crouch
Are Hackers Hounding Microsoft? Software giant's sites fall in domain name snafu, but cause of crash remains undetermined... mark for My Articles similar articles