Difference between WEP, WPA, WPA2, WPA3, WPS WiFi Security

Most of us had connected to a WiFi network with our laptop, tablet or smartphone, and to join that network we had to select a network name and supply a password. Supplying a password implies (better) security, but there are different methods and protocols that are used in wireless networks to ensure security, some being … Read more

What are FTP, SFTP, FTPS & TFTP and their differences

FTP, SFTP, FTPS and TFTP are protocols that are used to transfer files over a network. FTP FTP stands for File Transfer Protocol. This is a standard protocol that is used to transfer files between computers and servers over a network, such as the Internet. In a nutshell, FTP is the language that computers use … Read more

What is Port Forwarding

Port forwarding allows computers over the Internet to connect to a specific computer or service within a private network. It’s basically making your computer accessible over the Internet, even though you’re behind a router. For example, let’s say a friend of yours at their home wants to remotely control your computer at your home using … Read more

What is syslog

Syslog is a standardized way of producing log information. This is really popular in Linux computers or UNIX computers, while Windows does a similar thing with the Event Log. Pretty much all routers, switches, firewalls, wireless controllers, and all sorts of other devices out there can produce syslog data. As your network grows you’ll find … Read more

What is SMTP – Simple Mail Transfer Protocol

SMTP stands for a Simple Mail Transfer Protocol. Previously we did an article on POP3 and IMAP, the protocols that are used for email retrieving. SMTP is a protocol that is used for sending emails. SMTP is basically a set of commands that authenticates and directs the transfer of email. Good way to remember what … Read more

Difference between POP3 and IMAP email protocol

POP3 and IMAP email protocols are used for retrieving email from an email server. For example, if you’re using an email client, such as Microsoft Outlook, you would configure Outlook with either POP3 or IMAP to retrieve your email on a computer. You can also use these protocols on your tablet or smartphone to retrieve … Read more

Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP commands

This article is about a series of network troubleshooting tools that you can use in command prompt to troubleshoot and gather information about your network. We’re going to go over four commands: “ipconfig”, “nslookup”, “ping”, and “tracert”. ipconfig The “ipconfig” displays the current information about your network such as your your IP and MAC address, … Read more

HTTP, HTTPS, SSL and TLS Explained

HTTP stands for Hypertext Transfer Protocol and this is probably the most widely used protocol in the world today. HTTP is the protocol that is used for viewing web pages on the Internet. When you type in a web address, like google.com, you’ll notice that HTTP is automatically added at the beginning of the web … Read more

Difference between Hub, Switch, & Router Explained

We’re going to talk about the difference between a hub, a switch and a router. All three of these devices are similar, but there is a difference in the way they handle data. Hub The purpose of a hub is to connect all of your network devices together on an internal network. It’s a device … Read more

What is iSCSI

We can use iSCSI to create a Storage Area Network (SAN). iSCSI is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection. This allows IP-connected hosts to access a Storage Area Network (SAN). Traditional Storage Area Networks are based on Fiber Channel. Fiber Channel SANs are very … Read more