logo-background menu search youtube google search-start close email facebook twitter pinterest stumbleupon whatsapp amazon label-rectangle triangle-long down
?>

Page 6 of posts tagged "Computer Networks"

Someone Stealing Your Wifi? Find Out What They’re Looking At With These 3 Apps

Browsers

Someone Stealing Your Wifi? Find Out What They’re Looking At With These 3 Apps

If your Wifi is being hijacked by some dirty rotten thieves – I showed you how to check this before – what can you do to get your own back, or find out a little more about who is responsible? Or rather, if a hacker has gained access to your wifi network, what kind of nasty things could they do to you?

21-08-2011
Someone Stealing Your Wifi? Find Out What They’re Looking At With These 3 Apps
Become Really Paranoid By Monitoring Your Network’s Comings & Goings With WallWatcher & DD-WRT

Internet

Become Really Paranoid By Monitoring Your Network’s Comings & Goings With WallWatcher & DD-WRT

If you have access to your router, and it’s able to log activity, it’s relatively easy to watch everything that’s going on to try to find any untoward activity. Today I’d like to show you how to set that up on your DD-WRT router and some Windows-only software called WallWatcher. OSX users can also use it using a Parallels virtual machine.

12-08-2011
Become Really Paranoid By Monitoring Your Network’s Comings & Goings With WallWatcher & DD-WRT
Nmap – Wi-Fi Security Auditing Software to Check Your Home Network [Windows]

Windows

Nmap – Wi-Fi Security Auditing Software to Check Your Home Network [Windows]

When most people think of network security, they think of people sitting up in the computer rooms deep inside corporate headquarters, sifting through thousands of computer assets on networks stretching across the entire globe. Not many people consider monitoring a network as something that is really important in a home setting.

10-08-2011
Nmap – Wi-Fi Security Auditing Software to Check Your Home Network [Windows]
How To Restore Data Service To Your Smartphone [Android]

Android

How To Restore Data Service To Your Smartphone [Android]

Mobile data service is ubiquitous in most major cities, making it unlikely that an Android user will ever go without seeing the 3G or 4G logo lit up on their device. There are still many places however, that don’t have access to mobile data – and unexpected interference can also disrupt your connection.

09-08-2011
How To Restore Data Service To Your Smartphone [Android]
Use Your WiFi Connection Setup On All PCs With WiFi Network Backup Manager [Windows]

Windows

Use Your WiFi Connection Setup On All PCs With WiFi Network Backup Manager [Windows]

Having multiple wifi access points isn’t much of a hassle, because you can just configure all of them in your wireless network setup and then click to connect to whichever one you want. The hassle comes in when you switch to a new computer or if you switch computers often. You have to set up all of those Wi-Fi points again.

04-08-2011
Use Your WiFi Connection Setup On All PCs With WiFi Network Backup Manager [Windows]
Test Your Computer For Security Misconfigurations With Microsoft Baseline Security Analyzer

Windows

Test Your Computer For Security Misconfigurations With Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer (MBSA) is a free tool, designed for IT professionals of small and medium-sized businesses. Given its clear graphical user interface however, it also serves as a great security tool for personal use. MBSA analyzes the security setup of local and networked Windows computers and can identify common misconfigurations or missing updates.

28-06-2011
Test Your Computer For Security Misconfigurations With Microsoft Baseline Security Analyzer
BranchOut Business Networking Rivals LinkedIn [News]

Internet

BranchOut Business Networking Rivals LinkedIn [News]

The BranchOut application for Facebook is gaining popularity so quickly that it has become an instant rival for LinkedIn. The application has become an instant hit with job seekers and employers alike due to its simplicity and extensive networking capabilities. Users of BranchOut can sign up through Facebook in an instant.

28-06-2011
BranchOut Business Networking Rivals LinkedIn [News]
Giver – Still The Best Way to Send Files Across A Network [Linux]

Linux

Giver – Still The Best Way to Send Files Across A Network [Linux]

You know that, no matter what operating system you use, sharing files across a network can sometimes be a pain. Sadly, Linux isn’t always an exception in this category either, although for basic folder sharing some distributions make it easier. Having to set up a shared folder is even more painful when all you really want to do is send a file to a different computer, Giver still belongs to the list of top-notch programs.

25-06-2011
Giver – Still The Best Way to Send Files Across A Network [Linux]
Take a Look at James’ Home Setup [Show & Tell]

Web Culture

Take a Look at James’ Home Setup [Show & Tell]

Taking a break from our regular awesome software reviews and tutorials, I thought it’d be interesting if myself and some of the other staff writers here at MakeUseOf show you our own home setups – whether that be in the form of fantastic custom desks, complicated home media-streaming networks, or just the apps and services we make use of on a regular basis and our favourite software tools.

01-06-2011
Take a Look at James’ Home Setup [Show & Tell]
How To Combat WiFi Security Risks When Connecting To A Public Network

Internet

How To Combat WiFi Security Risks When Connecting To A Public Network

As many people now know, connecting to a public, unsecured wireless network can have serious risks. It’s known that doing this can provide an opening for all manner of data theft, particularly passwords and private information. Let’s have a look at the exact risks of public networks, and the solutions available to counter those risks.

24-05-2011
How To Combat WiFi Security Risks When Connecting To A Public Network
How To Use Your Dedicated Virtual Server As An Internet Proxy Using SSH Tunneling

Internet

How To Use Your Dedicated Virtual Server As An Internet Proxy Using SSH Tunneling

If you have your own virtual private server for hosting your website, you may not know you can also use it as a private proxy to get past various firewalls and internet blocks. Let me show you how you can set up a simple SSH proxy tunnel using your hosting account in Windows, Mac or Linux.

20-04-2011
How To Use Your Dedicated Virtual Server As An Internet Proxy Using SSH Tunneling