Similar Articles |
|
PC World July 2001 Scott Spanbauer |
Double Up With Internet Connection Sharing Share an Internet connection between two PCs, simple blog updates... |
PC Magazine May 4, 2005 Craig Ellison |
Dealing with Dynamic IP Addresses For some applications, a changing IP address just won't do. Dynamic DNS solves the problem. |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
Popular Mechanics March 2008 Joel Johnson |
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. |
Linux Journal January 19, 2006 Dean Wilson |
An Introduction to DHCP Confused about what DHCP offers and how you can take advantage of it on your Linux system? Here are some tips and pointers. |
PC World July 2006 Scott Spanbauer |
Find the Name Behind a Malicious IP Address Use a command-line program to decode IP addresses... Create shortcuts to Web sites... Add a Firefox shortcut for find.pcworld.com... Clean up Google cookies... |
Home Toys August 2004 John Schubert |
Routers Versus Switches The simple solution is to determine if the customer is using an ISP without running any servers. If so, the installation will be easy, and the customer can be sold a router. If the customer needs more ports than are available on a single router, use switches. |
IEEE Spectrum June 2006 Nicolas Boillot |
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
InternetNews November 19, 2007 Andy Patrizio |
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. |
InternetNews April 13, 2007 Sean Michael Kerner |
Microsoft Confirms DNS Attacks Microsoft issues advisory and workaround to combat vulnerability in Windows Server DNS Service. |
InternetNews May 25, 2005 |
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC Magazine January 12, 2005 Craig Ellison |
Making a Webcam Visible My office contains multiple computers networked together with a wired LAN. We have installed a "Networked Home Security Camera" that uses its own IP address. Any computer within the network can see what the camera sees. |
PC Magazine July 1, 2003 Leon Erlanger |
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? |
PC Magazine March 16, 2004 Jay Munro |
Routing Your Web Site Visitors How to use multiple domain names for your website while producing a customized display for each. |
PC World March 2005 Scott Spanbauer |
Paranoia: The Best Defense Against E-Mail Attacks Criminals may attempt to spread a virus to your computer or hijack your bank account using deceptive e-mails. You can learn to spot e-mail cons by using a handful of investigative techniques and a boatload of common sense. |
Linux Journal April 1, 2002 Alan Zeichick |
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... |
PC Magazine April 19, 2006 |
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. |
PC World January 2005 Kirk Steers |
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... |
Macworld February 2001 J.W. Davis |
WatchGuard SOHO Security Appliance Offers Pricey Protection for Small Networks... |
IEEE Spectrum October 2008 David Schneider |
Fresh Phish How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites |
PC World January 2001 Alan Stafford |
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... |
InternetNews January 15, 2009 Richard Adhikari |
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC Magazine November 16, 2005 Matthew D. Sarrel |
Authentic E-Mail SMTP authentication holds promise, but it's not yet a real spam-stopping solution. |
PC Magazine November 28, 2007 Larry Seltzer |
Router Tricks for Parents A technological solution to kids goofing off? Not so fast. |
The Motley Fool September 1, 2011 Tim Beyers |
Does Google Want Akamai Dead? The search king teams with upstarts to add speed to the Internet. |
Home Toys August 2002 Bob Hetherington |
Compaq iPAQ CP-2W Connection Point and Wireless Network The CP-2W Connection point allows you to build a home network consisting of up to 4 ethernet and multiple 802.11 wireless computers all connected to a common internet port. Set-up was a snap. |
Information Today March 12, 2001 Wallace Koehler |
Recent Trends Result in a New Status for VeriSign On March 1, VeriSign, Inc. announced an agreement with the Internet Corporation for Assigned Names and Numbers that will redefine VeriSign's role as an Internet registrar and registry... |
InternetNews March 23, 2004 Jim Wagner |
.Mobi's Case For Mobile Domains Industry consortium explains plan to push a mobile-centric domain extension apart from .com and .net. |
RootPrompt.org May 29, 2000 Reto Haeni |
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). |
Bio-IT World April 16, 2004 Bill Van Etten |
Zero Chances to Go Wrong Zeroconf is an Internet Engineering Task Force working group chartered to automate the configuration and discovery of computers, devices, and services on IP networks. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
PC Magazine September 12, 2007 Neil J. Rubenking |
Automate Network Configuration Changes I have a laptop and often need Internet access from multiple offices. Is there a way to store multiple configurations/IP addresses to eliminate having to remember and reenter the IP address? |
InternetNews June 22, 2004 Ryan Naraine |
Buffer Overflows in ISC's DHCP Users at risk of denial-of-service or code execution attacks. |
InternetNews October 15, 2007 Stuart J. Johnston |
Appliance to Simplify Network Address Management Infoblox aims to simplify DNS and DHCP management on Microsoft networks with a new standalone network appliance. |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal March 1, 2007 Sean Walberg |
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. |
PC Magazine August 31, 2005 John C. Dvorak |
Knowing Too Much Information about your IP address and Internet use can be collected easily these days. The possibility that this mode of information collection will expand beyond the Internet is more likely sooner than later. |
InternetNews May 3, 2004 Colin C. Haley |
AT&T All Out for MPLS-Based IP-VPN The carrier introduces a new VPN service to sign up companies and government agencies for its IP services. |
PC Magazine April 20, 2004 Sebastian Rupley |
New Spam-Busting Schemes Yahoo! and Microsoft push authentication methods. |
Reason July 2003 Jesse Walker |
The Big Block Last year Pennsylvania passed a bill to crack down on child pornography online. The cause was uncontroversial, but the law's approach -- requiring Internet Service Providers to block Web sites based on their Internet Protocol addresses -- drew immediate criticism from the technology community. |
T.H.E. Journal March 2005 Dan Young |
VoIP in a Campus Environment VoIP telephony increases efficiency and lowers costs for businesses. It is also a recruiting tool in higher education. |
PC Magazine March 16, 2009 Rist & Griffith |
Home Networking in 5 Easy Steps Building a new home network doesn't have to be tough if you follow our five easy steps. |
PC World January 24, 2001 Cameron Crouch |
Are Hackers Hounding Microsoft? Software giant's sites fall in domain name snafu, but cause of crash remains undetermined... |