After all this time, networking computers remains out of the reach of the average user, and that’s really frustrating.
Network connectivity and configurations, protocols and problems, articles relating to how computers connect.
A home network allows you to share a single internet connection, as well as data and devices, between multiple devices. I’ll review the basics components of a home network and some steps to take as your network grows.
Mobile broadband is a popular internet connection alternative. As with any connection, it’s important to understand the security ramifications and tradeoffs.
Sometimes using a DNS service other than that provided by your ISP makes sense. I’ll show you how to make the change.
The DNS servers used on your computer are most likely specified by your ISP. I’ll look at how to tell which servers they are and why you might consider changing them.
When scanning for wireless connections, you may find several that are unknown, yet appear open and available. Using them is risky. Very risky.
If you connect without a password to an open Wi-Fi hotspot and can see anything at all, it’s not a secure connection.
A vulnerability has been discovered in a critical wireless security protocol. I’ll discuss whether you should worry and what steps you should take.
Many households have computers used for sensitive things sharing a network with less trustworthy users. Here’s one method for in-home protection.
A VPN, or Virtual Private Network, is a fully encrypted and private internet connection via a VPN provider. I’ll look at what protection it offers.
Even if you’re nowhere near a network you’ve connected to in the past, you can still recover the Wi-Fi password from Windows.
If you forget your network’s Wi-Fi password, but you’re still connected, Windows can remind you what it is.
Accidentally connecting to someone’s nearby wireless network can be a serious security risk. We’ll look at some steps to prevent it.
Minimally, web servers get your IP address when you visit. Whether or not that or other information can actually be used to identify you, specifically, depends on a lot of things.
Adding a wireless access point to extend your network’s range can be confusing. Many routers come with wireless capability, but you only need one router.
Your router is your first line of defense against malicious attacks from the internet. But do you have a secure router? I’ll review the important settings.
Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I’ll review how to stay safe.
An outbound firewall will alert you to suspicious connections. The biggest problem? If correct, it’s too late.
A MAC address and your IP address are both key components to networking, but they serve different purposes, and are visible in very different ways.
Windows Firewall will protect your machine from other computers that share
the “safe side” of the router.
Ping is one of the oldest diagnostic tools. It simply validates connectivity from point A to point B, and in doing so provides additional useful information.
Peer-to-peer file-sharing programs have a bad reputation because of the content they’re often used to download. But the technology is quite legal and useful for legitimate purposes.
A MAC address can easily be traced for as far as it travels. The problem is, a MAC address doesn’t travel far enough to be useful.
Wi-Fi Sense, a new feature in Windows 10, is designed to make connecting to wireless networks easier. You’ll probably want to turn off Wi-Fi Sense for privacy.
A subnet mask is a way of telling your computer or router what network addresses are local and which are remote.
When your computer can’t get an IP address any other way, it assigns itself a 169.254 IP address. It’s a sure sign of a problem.
Windows 7 and 8 have a useful utility to monitor network activity. You can use it to find out a lot about what your computer is doing online.
A firewall is a critical component of keeping your machine safe on the internet. There are two basic types, but which is right for you?
Using a password protected WPA2 hotspot is a minor inconvenience for a very significant level of additional security. I’ll explain…
While you cannot find the specific owner of an IP address, I’ll look at a few tools to see what IP-related information you can get.
Heartbleed did not affect all versions of open SSL. So first we should check if we even need to worry.
Without the proper security others will be able to access your computer and your files, and even watch what you do online. Fortunately, setting up basic security is easy.
Home networking can be very difficult. But I have a little trick that works easily for me.
Are you finding mysterious downloads coming into your computer? It may be nothing sinister. But on the other hand… we’d better check the source.
Even a cached version of a website could send information about you back to the original server. The thing is that we just don’t (and can’t) know.
With one exception, having an open port is not dangerous. But the way that ports work is interesting!
When you are connected to a wireless network, but cannot get to the internet, it’s because an IP address has not been assigned to you. So how do you fix that?
Some smart routers can act as a local DNS servers in an attempt to speed things up.
Hotels and other hotspot providers often insist that you agree to some terms of service before you can use their internet. The problem is that insistence can often interfere with the connection.
Finding out that you are on a blacklist can be a nightmare. So how do you get off of it?
It’s important to understand the terminology when it comes to masking an IP address. Depending on your security needs, some need to be done differently.
In this scenario, you’ll end up with two IP addresses, but the hub and router won’t each get one. I’ll explain.
Many things can interfere with a network speed test on your end. Make sure your speed test gives you the most accurate results by following these guidelines.
I have a rant about hotels that nickel and dime you on an internet connection. Fortunately, there might be something that you can do about it.
The communication path between two end points will be the slowest piece of the connection path. That will be the maximum speed that you can achieve on any network.
While getting someone’s name and address from their IP address is technically possible, it’s also typically difficult and requires involving law enforcement.
There are several ways websites can reasonably approximate your location and serve up ads specific to locale. We’ll look at each.
Without a doubt, having lots of tabs open can impact a computer’s speed. Whether or not it slows down the entire network will depend on exactly what all those tabs are doing.
The fact that your extender isn’t giving you access to set up security concerns me. I don’t believe it’s common and I’m really surprised it’s not there.
Trying to control children’s access to the internet has been a problem since computers first came into the home. A simple low-tech answer might be the best.