Where can I find the article/information on re-use of old computers?
Yes. This is a great idea and you can find details right here.
Where can I find the article/information on re-use of old computers? Read More »
From the list below choose one of our FAQs topics, then select an FAQ to read. If you have a question which is not in this section, please contact us.
This information is PUBLIC.
Yes. This is a great idea and you can find details right here.
Where can I find the article/information on re-use of old computers? Read More »
Great question received just before the holidays. The security of software is paramount, especially in any communications systems (routers, switches, servers). We are all fimiliar with “patch Tuesdays” as efforts to thwart security holes in software are a constant. Surprisingly, few Computer Science majors include skills on secure coding. Furthermore, policies and procedures to ensure
Where can I find information on writing secure code? Read More »
Check out these additional IPv6 Resources: Our IPv6 overview course at Udemy Our IPv6 Custom Profiles for Wireshark Our IPv6 classes at the Online School Hi, and sorry for the delay in responding! It IS a broad question, and I have hesitated to respond, my mind flooded with the numerous issues that a broad question
What is the status of IPv6? (updated for Jan 2023) Read More »
Part of the answer is in your question: it is a protocol, and it stands for Locator/ID Separation Protocol. The use of LISP is targeted at deployment of virtual systems, and the movement/management of those systems/resources (such as Virtual Machines) across networks to other places such as other data centers. LISP really answers the question
What is the LISP protocol? Read More »
It is not possible to give a one sentence answer to this great question. But I will answer it and provide a great video to watch that explain the implications of it – take a deep breath: In a nut shell, Software Defined Networking, or SDN, is a network manager defined and network manager controlled
What is Software Defined Networking? Read More »
Great questions! I think the best way to answer the question is to describe what each one is. I will start with Cisco ONE. Cisco ONE ONE stands for “Open Network Environment”. The idea is to allow programmability of the network and the network elements. This allows for consistency across both physical and virtual network
What is Cisco ONE and Cisco OnePK? Read More »
On April 18th 2018 Microsoft published (for the first time ever?) a complete command line reference. It is a 248 page PDF document. You can download it here. Here is my quick list of commands you can run from the Windows Command Line: (START> RUN> CMD) ADDUSERS Add or list users to/from a CSV file
What commands can you run from the Windows Start> Run> CMD? Read More »
This is a very common question. First, we must warn of the difference between theoretical speed and actual speed. You have probably heard this a million times, but there are so many factors that can affect wireless throughput. I won’t go into them here so I can stay on the subject. 802.11n is a three-spatial-stream
What are the wireless speeds for 802.11n 802.11ac and 802.11ad? Read More »
We have met many people who are considering virtualization of servers in a number of different scenarios. Some of these folks are just getting started with virtualization, which can be a big change in light of shrinking budgets and limited supporting infrastructure such as shared storage. Some folks have already done some virtualization and are
Should everything be “Virtualized”? Read More »
Check out these additional IPv6 Resources: Our IPv6 overview course at Udemy Our IPv6 Custom Profiles for Wireshark Our IPv6 classes at the Online School A great question I was asked in class was: “If Neighbor Discovery processes have replaced ARP in ICMPv6, how do you look at the equivalent of the ARP cache?” Great
Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines Read More »
This is a common question I get asked at many of my classes. The short answer is that I really can’t keep track of it all – I don’t think anyone can. But here is how I track what I can: First – I often read the technical sections of the following news sites: cnn.com
How do you stay on top of technical news and the Internet? Read More »
This is a great question. First, you have probably learned that you can use Ubuntu’s APPLICATIONS > INTERNET> TERMINAL SERVER CLIENT program to remote desktop to Windows machines. Going the other way is a bit more challenging. You need to have two things in place: 1. You must enable remote desktop connections in Ubuntu. You
How do you Remote Desktop from Windows to Ubuntu? Read More »
Ah – a common problem. Wireshark has installed and does not see any of the computer interfaces so you can do captures. The answer to your problem is simple! You need to give the Wireshark application root priviledges. Ubuntu Solution In Ubuntu, the best way to fix this (and any other application that needs root
How do I get Linux/Ubuntu to show interfaces in Wireshark? Read More »
The answer is easy – go to https://netscionline.com Registration is completely free – and you get access to the Reference Library and any of our free courses. Other courses are paid via paypal, or your company will provide you access information. To register for any of our courses, click here to find a course in the
How do I get to the Online School? Read More »
The answer is – possibly – yes, unless you have explicit permission to access the network (such as a free WiFi hotspot at the airport or town square). Many states have criminal laws that prohibit accessing any computer or network without the owner’s permission. For example, in Texas, the statute is Penal Code section 33.02,
Could I be breaking the law if I connect to an unsecured wireless network? Read More »