Skip to content
  • E-books
  • Computer
    • Hardware
    • Security
    • Security
  • Windows
    • Windows 7
      • Windows XP
      • Windows Vista
      • Windows 10
      • Windows 8
        • Windows Server 2008 R2
        • Windows Server 2012
  • Networking
  • Linux
  • Privacy Policy
    • Disclaimer
      • Cookie Policy
        • Contact Us
          • About Us
          • Terms and Conditions
            • Disclaimer
            • Terms Of Use
Utilize Windows
  • E-books
  • Computer
    • Hardware
    • Security
    • Security
  • Windows
    • Windows 7
      • Windows XP
      • Windows Vista
      • Windows 10
      • Windows 8
        • Windows Server 2008 R2
        • Windows Server 2012
  • Networking
  • Linux
  • Privacy Policy
    • Disclaimer
      • Cookie Policy
        • Contact Us
          • About Us
          • Terms and Conditions
            • Disclaimer
            • Terms Of Use

Computer

The Computer category is your go-to resource for everything related to computing technology. From essential hardware components to the latest software innovations, this category covers it all. Whether you’re a tech enthusiast or a professional, explore how computers continue to revolutionize our world.

Overview of Infrared (IrDA) and Bluetooth Standards

November 28, 2022December 3, 2011 by Husein Gradasevic

Before you start Objectives: Learn what is infrared wireless connection and its specifics, and what is Bluetooth and its specifics. Prerequisites: no …

Read more

Categories Computer, Networking

Wireless Security

November 28, 2022December 3, 2011 by Husein Gradasevic

Before you start Objectives: Learn about common authentication types and security implementations used in wireless networks today. Prerequisites: no prerequisites. Key terms: key, …

Read more

Categories Computer, Networking

Overview of 802.11 Wireless Standards

November 28, 2022December 3, 2011 by Husein Gradasevic
Utilizewindows

Before you start Objectives: Learn about different wireless standards and their specifics, including 802.11n. Prerequisites: no prerequisites. Key terms: 802.11n, channels, network, standards, …

Read more

Categories Computer, Networking

Introduction to Wireless Networking

November 28, 2022December 2, 2011 by Husein Gradasevic
Utilizewindows

Before you start Objectives: Learn the basics about frequencies, architecture, and media access method used in wireless networks. Prerequisites: you should know …

Read more

Categories Computer, Networking

Introduction to Virtual Private Network (VPN)

November 28, 2022December 2, 2011 by Husein Gradasevic

Before you start Objectives: Learn what is VPN, why do we use it, and which tunneling and authentication protocols are used …

Read more

Categories Computer, Networking

Introduction to Voice over IP (VoIP)

November 28, 2022December 2, 2011 by Husein Gradasevic

Before you start Objectives: Learn what is VoIP, why should we use it, and which protocols are associated with VoIP. Prerequisites: no …

Read more

Categories Computer, Networking

Internet Connection Sharing (ICS) on Windows Systems

November 28, 2022December 2, 2011 by Husein Gradasevic

Before you start Objectives: Learn what is ICS and when can we use it on our network. Prerequisites: no prerequisites. Key terms: ics, …

Read more

Categories Computer, Windows

What is Network Address Translation

November 28, 2022December 2, 2011 by Husein Gradasevic
Utilizewindows

Before you start Objectives: Learn what is Network Address Translation (NAT), what is Port Address Translation (PAT), and about different types …

Read more

Categories Computer, Networking

Overview of Different Routing Protocols

November 28, 2022December 2, 2011 by Husein Gradasevic

Before you start Objectives: Learn which different routing protocols can be used and what are their characteristics. Prerequisites: you must know which …

Read more

Categories Computer, Networking

Introduction to Routing Protocols

November 28, 2022December 2, 2011 by Husein Gradasevic
Utilizewindows

Before you start Objectives: learn what is routing protocol and which characteristics can a routing protocol have. Prerequisites: you have to know …

Read more

Categories Computer, Networking
Older posts
Newer posts
← Previous Page1 … Page23 Page24 Page25 … Page46 Next →

About Author

Husein
Husein Gradasevic

Recent Posts

  • SEO Poisoning Tactics That Bypass Traditional Cybersecurity Measures
  • How to Apply the Principle of Least Privilege to Service Accounts to Prevent Kerberoasting
  • Harnessing Trickle Chargers for Optimal Battery Health
  • How to Integrate Your Security Cameras with Cloud Storage for Remote Business Monitoring
  • Affordable Payroll Software Solutions for Small Business Owners

Contact us

Email: off@utilizewindows.com

Search Here

More

  • Terms Of Use
  • Cookie Policy
    • Opt-out preferences
  • Disclaimer
  • Privacy Policy
  • Sitemap
  • Contact Us
  • Terms and Conditions
© 2025 - Utilize Windows
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}