Networking

How to Estimate Bandwidth Requirements for a Business Site or Network

by File in: Networking

Businesses use many devices that require an Internet connection, including computers, printers, and VoIP phones. But how much bandwidth do they need? This article will help businesses estimate bandwidth requirements for their business network. It will cover: What Is Bandwidth and Why Does it Matter? How Much Network Bandwidth Do You Need? Bandwidth Measuring Tools […]

How Firefox’s Enhanced Tracking Protection Stops Websites From Spying On You

by File in: Networking

For years, websites have been tracking our cookies and spying on our online habits. Isn’t about time we return the favor? No, not spy on the entities spying on us, but learn which websites are trying to peer into our digital lives. Well, now you can by using Firefox’s enhanced tracking protection. But before we […]

Accessing Local Files and Folders on Remote Desktop Session

by File in: Networking

The Remote Desktop Connection (RDC) feature of Windows allows you to remotely view and control remote Windows desktops. Sharing resources between your local and remote PC can be tricky, but it is possible to share your local files and folders over a remote desktop session using RDC or other remote desktop tools like TightVNC. If […]

How to Fix “Cannot renew IP address” in Windows

by File in: Networking

A ‘cannot renew IP address’ error on your Windows PC is due to an IP conflict with another device, issues with your Windows network settings, or a problem with your network adapter or router. If you get a ‘cannot renew IP address’ error in Windows, there are a few steps you can try to troubleshoot […]

How to Find Open and Blocked TCP/UDP Ports

by File in: Networking

There’s a good chance you’ve happened upon this article because an application you’re trying to run is complaining about a “port” being blocked or you’ve read about how leaving certain “ports” open on your network can be a security problem.  Either way, by the end of this piece you’ll not only know what these ports […]

How to Troubleshoot WiFi (Wireless) Printers

by File in: Featured Posts, Networking

Few things are more frustrating than when you want to print a document, and your wireless printer is in an error state, or gives you the silent treatment. Perhaps you’ve tried to connect your WiFi printer to the network in your home, but the problems persist, leaving your printer stubbornly off the grid. Ideally, a […]

What Is Localhost and How Can You Use It?

by File in: Networking

The localhost – also referred to as ‘the loopback address’ – is used to establish an IP connection or call, to your own computer or machine. The loopback address is typically used in the context of networking and provides a computer the capability to validate the IP stack. Anyone with a background or interest in […]

USB Cable Types Explained – Versions, Ports, Speeds, and Power

by File in: Networking

No one in their right mind could argue that the advent of USB was a bad thing. Before we first got the now-iconic USB port, the world was filled with clunky, disparate connection standards.  The typical PC from the early 90s sported LPT, Serial, PS2, SCSI and MIDI ports. To name but a few! Now […]

Can Connect to Wireless Router, but not to the Internet?

by File in: Networking

It’s hard to imagine that just two decades ago, only about one percent of the world’s population was online. Today, more than 4.3 billion people are actively using the internet, which is more than half of the global population. That’s how important having an internet connection is. A few things can be quite frustrating as […]

How To Whitelist Specific Devices On Your Home Network To Stop Hackers

by File in: Networking

The way a home network usually works is that anyone with your network passphrase can connect to your home network. However, it’s possible to add another layer of security where only specific devices are allowed to connect. This is called MAC address filtering. Keep in mind however that Mac address filtering isn’t a single security […]