VNC Basics Virtual Network Computing, or "VNC," is software used to connect remotely to a computer system. This allows a user to see and control one computer from multiple locations. Because this control is transmitted over the Internet, the computer can be viewed from anywhere in the world.
VNC software is fairly uncomplicated and easy to use. Many operating systems, including Microsoft Windows, already...
This tutorial explains how to remove linux operating system safely from your Dual boot systems(i.e. windows and linux both are installed on that computer).
Linux operating systems are pretty good. and because they are free and eaisly available we always want to try a new one. But at the sametime we dont want give up our favorite windows operating systems. so we choose to have a dual boot system where we can switch to any of the OS easily. But when we want to remove Linux OS and return to window we come across a problem...

An Overview Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. With the advent of this technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. Cloud computing is a practical approach to experience direct cost benefits and it has the...
You can use a wireless network (WLAN) to share Internet access, files, printers, game consoles, and other devices among all the computers in your home. After you’ve completed the initial wireless router setup and added your computers and devices to the network, you can use your home network to surf the web or to play online games—whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set...
If you plan to have a wireless network, you should set it up so that only people you choose can access it. Here are a few options for wireless network security.
Wi‑Fi Protected Access (WPA)
WPA encrypts information, and it also checks to make sure that the network security key has not been modified. WPA also authenticates users to help ensure that only authorized people can access the network. There are two...
Having Internet access at home is convenient, but wouldn't it feel good to relax on the couch while you check your bank account balance or shop online? At the same time, your daughter could research that book report on her computer while using the same wireless network connection that you're using. When you set up a wireless home network, it's all possible—and it's a lot easier than you might think.
What is a wireless home network?A...

CCNA INTRO: Introduction to Cisco Networking Technologies Study Guide: Exam 640-821
Publisher: Sybex | ISBN: 0470068507 | edition 2006 | PDF | 509 pages | 15,5 mb
From bestselling author Todd Lammle comes the most up-to-date book on CCNA exam 640-821, the first exam in Cisco's popular two-exam Cisco Certified Network Associate (CCNA) certification track. Understand networking for the small or home office market, prepare for the exam,...
IPv6 is the next generation protocol for Internet networking. IPv6 expands on the current Internet Protocol standard known as IPv4. Compared to IPv4, IPv6 offers better addressing, security and other features to support large worldwide networks.
In IPv6, IP addresses change from the current 32-bit standard and dotted decimal notation to a new 128-bit address system. IPv6 addresses remain backward compatible with IPv4 addresses. For example, the IPv4 address "192.168.100.32" may appear in IPv6 notation as "0000:0000:0000:0000:0000:0000:C0A8:6420"...
An IP address is a logical address for a network adapter. The IP address uniquely identifies computers on a TCP/IP network.
An IP address can be private - for use on a local area network (LAN) - or public - for use on the Internet or other wide area network (WAN). IP addresses can be determined statically (assigned to a computer by a system administrator) or dynamically (assigned by another device on the network on demand).
Two IP addressing standards are in use today. The IPv4 standard is most familar to people and supported...
FTP allows you to transfer files between two computers on the Internet. FTP is a simple network protocol based on Internet Protocol and also a term used when referring to the process of copying files when using FTP technology.
To transfer files with FTP, you use a program often called the "client." The FTP client program initiates a connection to a remote computer running FTP "server" software. After the connection is established, the client can choose to send and/or receive copies of files, singly or in groups.
To connect...
An FTP server is a required software application on networks that wish to support file sharing using the File Transfer Protocol. This page lists the best FTP servers available for the Windows operating system. Evaluation versions of each of these FTP server software products can be downloaded from the vendors' sites.1. WS_FTP ServerWS_FTP Server is the choice for high-end needs. Though it costs more than competitors' FTP servers, it is extremely robust and full-featured. WS_FTP Server supports 128-bit SSL encryption, nice...
A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet.
Network servers typically are configured with additional processing, memory and storage capacity to handle the load of servicing clients. Common types of network servers include:
Web servers
Proxy servers
FTP servers
Online game servers
Numerous systems use this client / server networking model including Web sites and email services. An alternative model, peer-to-peer networking...
How does Proxy Server Works ?
This is the First Question that arises in our mind when we use the Proxy Servers for Surfing the Internet without revealing our Identity to Others. Here all these mindboggling questions are answered with easy to understand examples.
The exchange of information in Internet is made by the “client - server” model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends...
There are two ways to configure an ADSL modem for broadband connection. One in PPPoE (Point to Point Protocol over Ethernet) and the another is Bridge mode.
1.PPPoE Mode
In this mode the modem works as router and the PPPoE session terminates on WAN port of router. The PPPoE client is in built in the modem and allocated by BRAS server gets assigned to WAN port of modem. The Internal network has to use the private IP and for Internet...
There are many applications that claim to help network administrators to trace, diagnose and resolve network related issue.
However, I strongly believe that knowing your basics is always the key to success. Therefore, knowledge of performing simple tasks such as checking the latency of your connection and tracing a route is essential for network professionals.
In this article I will tell you how to trace network related information...