Web Development Austin, SEO Austin, Austin Search Engine Marketing, Internet Marketing Austin, Web Design Austin, Roundrock Web Design, IT Support Central Texas, Social Media Central Texas

Category: Networking Page 3 of 7

Things To Check If Your Internet Is Blocked On Your PC

December 30, 2014

You might have witnessed times when you are suddenly unable to connect to the internet from your computer system. This could be due to several reasons which most people are unable to detect. Given here is a complete list of the common things to check when you witness internet connection not working on your PC.

Unplugged Network Cable Or WI-Fi Disabled

This is the most common reason why most people are unable to connect to the internet. The connection failure is not due to a problem in the network, but because of Wi-Fi adapter been shut off in the laptop. In home networks, the router might have been inadvertently unplugged by someone.

Rule Out Fake Alarms

Instead of problem in your network connection, there are chances that a particular website may be down. Hence, before assuming any conclusion, make sure you visit several popular websites rather than just a single one.

Avoid IP Address Clashes

If more than one computer is using the same IP address, the clash between them can also prevent the internet connection from working properly. To resolve this issue, you should renew the IP address of any of the computers having confilct. If your network has a static IP address, you can manually change it to any other number.

Check For Faults in Computer Firewall

Firewalls installed on many computers are intended to restrict unauthorized traffic to affect network processes.  Regrettably, due to an error, these software systems can sometimes also block valid internet users. Also, when more than one firewall is installed on the same computer, conflicts between them can also lead to erroneously block traffic. If you have recently updated or installed a computer firewall system, disable it temporarily to see if it has been causing the problem in internet connection.

Check If Wireless Signal Is In Range

If you are on a Wi-Fi network, the performance of the connection will be influenced by the distance between the wireless access point and computer system. Farther the Wi-Fi device, slower will be the internet speed. Determine the strength of your wireless connection to diagnose the problems in your internet.

Changes In Wireless Network Configuration

Wi-Fi networks usually require matching WEP or WPA security keys to connect. If a person changes the password or encryption key at the access point, all the devices will be unable to connect to internet. You can contact the network administrator to confirm if the pin has been changed recently.

If all the above things are working correctly, contact your internet service provider to check if there is an outage in your area. They can also guide you to troubleshoot the connection problem.

All You Need To Know About VPN

December 24, 2014

Virtual Private Network (VPN) is a private network that uses the public telecommunication system, usually the internet, to enable a secure network access within an organization. It aims at providing the entire organization with the same network capabilities, but at a much lesser cost. VPN is often used to extend intranets across the world in order to broadcast information to a wider audience. If a user wants to gain access to the network, he must go through an authentication protocol using a username and password.

Types of VPN

  • Dial-up VPN: This is a software based system developed over your existing internet connection. It involves creating a secure channel between the two remote points which allows the users to connect to the network. There is often little or no cost associated with this type of network set-up as you can easily use your existing software and equipment.
  • Site To Site VPN: This type of VPN can be used to connect several computers present in remote locations to a particular network. All the systems connected to the network can have an access to each other.
  • Client VPN: This is an encrypted connection from one remote device to a VPN router. Traffic is channeled from the device towards the router so that the user can access the inside information of the organization.
  • SSL VPN: This type of VPN works much similarly to the client VPN. The major difference lies in the fact that it does not require any preconfigured software to connect to the network. Rather, the web browser performs the function of VoIP software.

Security Tips For VPN

  • Install and constantly update firewalls to strengthen your VPN network.
  • An intrusion detection or prevention system is recommended to effectively monitor malicious attacks on the network.
  • Unmanaged or unsecured systems without any authentication should not be provided access to the network.
  • Remote network servers or computer systems should have anti-virus software installed to prevent any infections.
  • Network administrators should be provided proper training to follow best security measures during the installation and use of VPN.
  • Auditing and logging functions should be present to record any unauthorized attempts to access the network.
  • Guidelines and policies should be provided to the responsible parties to regulate their network use.
  • Unnecessary access to the intranet should be controlled and limited.

Following the above given security tips can help you have a safe and secure network connection in your organization.

Top 10 Network Security Threats

November 24, 2014

There are a number of security systems available that can help you protect your computer network from unauthorized access. However, there are a number of internal vulnerabilities, which are not commonly considered to be a threat, but have the potential to seriously infect your system.

Some of the common network security threats are:

  1. USB Drives: These are one of the most common means of infecting a network. USB drives are small, inexpensive devices that can be used to share data between computers. Once a system is connected with a USB drive, most operating systems allow automatic running of programs, even the malicious ones.
  2. Laptops and Netbooks: Laptops and Netbooks of people outside the company, if connected to company’s computer network can also transmit codes that can hamper the security of a network. These portable devices may also have many system codes running at the back end to search for and infect internal networks. These malicious programs can also provide an easy access to a company’s important information like salaries, phone numbers, addresses, medical records, employee passwords etc.
  3. Wireless Access Points: These provide immediate access to the network to any user within the network range. With security vulnerability in wireless access points, hackers can penetrate a computer system to get hold of confidential information. Most of the wireless AP protocols such as WPA and WPA2 are susceptible to attacks if strong passwords are not used.
  4. Miscellaneous USB Devices: Apart from USB drives, many other devices such as digital cameras, MP3 players, scanners, printers, fax machines etc. also pose a threat to the security of a network by transferring infected files from one system to another.
  5. Employees Borrowing Others’ Machines or Devices: Borrowing or sharing devices within the office can also cause an employee to inadvertently access restricted areas of the network. Thus, it is important that the passwords are strong and frequently changed.
  6. The Trojan Human: These are attackers who enter the websites in the camouflage of an employee or a contractor. These types of swindlers are capable of gaining access to the secure area of the network, including the server room.
  7. Optical Media: Just like the USB devices, optical media such as CDs or DVDs can also be used as a source of network infection. Once installed and run on a system, these portable storage devices can steal and disclose confidential data to other public networks.
  8. Lack of Employee Alertness: Besides the intimidations from digital technology, the capacity of human mind to store information also poses a major threat to a network’s security. Employees should be alert to note who is around them when they log on to their system or while reading confidential documents in public places.
  9. Smartphones: Today, phones are no less than mini-computers having the capacity to perform complex tasks. Hence, smartphones also pose the same security threat as a laptop, netbook or US devices.
  10. E-mail: Emails are commonly used to communicate, send and receive files within the business networks. However, this facility can often be misused for malicious purposes. Confidential messages can certainly be sent to any outside target and many viruses can be transferred through emails.

Make sure you keep a note of all these potential threats and take the necessary steps to prevent your internal network from getting infected.

Online Security Tips For Youngsters

September 10, 2014

Internet has provided various means for youngsters to connect, share, explore and socialize with other individuals instantly. Social networking and social media sharing have become an important part of their daily lives. This has not only provided them ability to interact instantly but has also made them vulnerable and easy target for cyber criminals and hackers. Here we have jotted few security tips for younger generation that will help them to be safe and enjoy the social buzz to the most.

  • Keep computer system updated: Software companies keep updating their products to address potential online threats. Therefore, computer systems should be regularly updated whenever updates are available or it should be configured to automatically update itself.
  • Enable Firewall: Firewall acts as a security layer between the computer and internet. It helps to keep hackers away from accessing personal information, stealing identity or destroying files from the computer.
  • Create strong passwords: Passwords for all online accounts should be strong enough and should contain letters, numbers and symbols. Users should also refrain from using same password on multiple sites.
  • Only use secure websites: While making online purchases, make sure the credit card credentials are processed through a secure connection, known as SSL (Secure Sockets Layer). For this you can check for https:// (“s” in end of http means the page is SSL protected) in the URL of the page. Also it is advisable not to use public computers for any kind of banking activities.
  • Securing Wi-Fi hotspots: Before using free Wi-Fi hotspots, users should verify that it is a secure connection. Using Virtual Private Networks provides a layer of security by routing data to a separate and secure network when using public connection.
  • Protect against malicious software: Software programs downloaded from unsecure websites are designed to track user’s login details, monitor online activity and transmit confidential information. Software programs should be downloaded only from safe and familiar websites. Anti-Spyware, Anti-Virus and other security software should be installed that detects the presence of bots and viruses in the computer system, thereby helping keep the computer system clean.
  • Be Social Media smart: Social networking sites let youngsters connect with friends, relatives or family members. However, friend requests should be filtered and only people who are known should be added into the inner circle. Also be selective in sharing information with Apps on social networks.
  • Not answering phishing mails: Chain mails claiming to be from a bank or individuals asking for bank details should never be answered.  These are spam mails and should be immediately deleted.

Online security is an important issue; therefore one must stay vigilant while using the internet. These preventive steps can help to keep information safe and also provide a sense of security while browsing the internet.

Different Types Of Networking Cables

March 25, 2014

Though wireless network technology has evolved many folds, still people use wired networks at home and offices. They use cables as a medium to transfer information and communicate through networked devices. These cables do look similar to a naive; however, they are quite different. You must know what kind of cable you need for your LAN and for this; you must understand different types of cable available in the market.

Coaxial Cables
The Coaxed cables or coax are copper cables, which are a standard for 10Mbps Ethernet cables. Cable companies used these cables to connect TV sets with antennas. Even the telephone companies use these cables. Two major types of coax cable, which were used in 1980s and 1990s, were thinnet (10BASE2 standard) or thicknet (10BASE5 standard). These cables are widely used in office Ethernet and LANs. The cable has an inner copper wire of varied thicknesses, which is surrounded by insulation and other shielding.

Twisted Pair Cables
Twisted pair cables are made of two copper wires, which are twisted together to reduce electromagnetic field. These wires are often wound together in pairs. Ethernet twisted pair cables have up to 8 wires wound together in pairs. These wires were introduced during 1990s, starting with 10Mbps (Category 3 or Cat-3), which later on evolved as 100Mbps (Category 5 or Cat-5) and soon became high-speed 10Gbps wires. Twisted pair cables are of two types, Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). Higher grade twisted pair is used in LANs as it is far cheaper than coaxial cable.

Fiber Optics
Fiber optic cables have made the dream of long distance calls, internet, and cable TV a reality. These cables transmit information through strands of glass and pulses of light. These cables can easily bend, as they are made of glass and are used in Wide Area Networks (WANs) where the communication traffic is high. Single mode and multimode are two types of fiber optics. Single mode fiber optics has higher bandwidth capacity; therefore, it is used in long-distance telecommunications networks. The local networks use multimode because they are cheaper.

USB Cables
USB cables have twisted pair wiring and are used to connect computer with peripheral devices such as mouse, keyboard, etc. They are not used for connecting a computer with another for networking. By using Dongles, an Ethernet cable can be easily connected to a USB port indirectly.

Crossover Cables
Crossover cables such as Null modem cables connect two similar devices, for example two PCs. It is constructed by crossing over the order of the wires so that it can connect two computers directly. It looks similar to regular Ethernet cable, so one needs to buy carefully.

We at Centex Technologies provide complete office computer networking solutions to our clients. For more information, call us at (855) 375-9654

© Copyright 2022 The Centex IT Guy. Developed by Centex Technologies
Entries (RSS) and Comments (RSS)