The Most Common Types of Attacks on Computer Networks

Every organization in existence today owns multiple gadgets, laptops and desktop PCs, and it has become essential to develop a network between all such devices to allow for seamless data sharing.

Indeed, with the inception of technologies such as Google ChromeCast, MiraCast, and Wi-Fi direct, there is absolutely no gadget which you cannot wirelessly connect to all other devices. Of course, this amazing feat of science comes with a huge drawback; networks are prone to attacks from hackers, viruses, and bots, so you must steer clear from these. Continue reading


How to Retrieve Your Forgotten Wi-Fi Password

In order to protect your wireless internet connections from being tampered by unauthorized sources; one is required to input a WAP key, which is the password that is needed for securing wireless networks. In general, once you get your system hooked on to the Wi-Fi wireless router, one is asked to key in the security password or the WPA code. However once the code has been accepted, the password is automatically remembered by the system. So it is not needed to reenter the password once again. Continue reading

Broadcom's acquisition of Renesas

A Brief Outline of Broadcom’s Acquisition of Renesas

Broadcom Corporation, which is abbreviated as (NASDAQ: BRCM) is a global leader in semiconductor solutions both the field of wired and also wireless communication systems. Of late Broadcom Corporation has announced on 4th of Sept 2013 the agreement for the acquisition of LTE based assets from many affiliates belonging to the Japanese chip vendor Renesas Electronic Corporation.

This revolutionary state of the art acquisition is very likely to accelerate the availability of NASDAQ: BRCM’s very first multimodal carrier-validated dual core LTE SoC developed by Renesas Mobile early in the year of 2014. Continue reading

Home Wireless Network

Why You Should Secure Your Home Wireless Network

There are a lot of idle cyber junkies sitting out there – whose activity of fun denotes breaking into unsecured networks, hacking them and leave funny messages – slogans of victory, as if they have conquered an enemy fort. They get an exorbitant amount of high from such activities, its like online opium for them. With Internet ruling our lives in most phases of business and transactions, one has to protect their systems and gadgets from these online parasites. Therefore it is for these very reasons that online security is a big business. Hence setting up ones router’s security protocols, one could sleep better at night. It is like thwarting the online terrorists from having their way. The easy part is setting up ones wireless network or router, but the crus forms in locking it down. As such wireless networks are less secure than wired ones so one has to a bit extra careful to foil intruders. Continue reading


Brief history of Broadcom

Broadcom Corporation is an American based semiconductor company dealing only in the wireless and broadband communication industry. The company has headquarter in Irvine, headed by a professor-student pair named Henry Samueli and Henry T. Nicholas III who qualified from the University of California, Los Angelesin the year 1991. The company moved from Westwood, Californiaoffice to Irvine, California in the year 1995. Broadcom became a public company on the NASDAQ exchange ticker symbol- BRCMin 1998 and now employs around 11,750 people global in more than fifteen countries. Continue reading


Techie DIY Project: Make your own WiFi Extension Booster

In this modern world, WiFi internet has exponentially increased in home, work and schools. Wireless technology has made connecting to the internet more convenient than ever. If you’re like most people, your home network includes desktops, laptops, tablets and smart phones – all must be connected wireless through one router.

But the problems you might be facing are having limited range of your WiFi signal and there might be some deadspots in certain parts of the home. So what should you do if your wireless signal doesn’t reach every corner of your home? The answer is to make and implement your own WiFi booster. Continue reading


Our Top Recommended Free Wireless Network Monitoring Softwares

Almost everybody uses the internet these days and we are all basically connected to each other through the World Wide Web. Many companies have monitoring applications that manage and handle the network as well as monitor it for issues. Some administrators monitor their networks as a way to keep their security up and to know what is going on within it. Free wireless network monitoring software exists for those who want to manage their system and constantly check it without any cost. The following are highly recommended. Continue reading


Should You Set Up a Gigabit Home Network?

Explaining Gigabit Ethernet Networking

The term 1 GigE or GbE is used for describing a Gigabit Ethernet networking protocol. It is a technology which is used for transmitting Ethernet frames at a speed of 1 Gigabit per second. This can be more specifically described as 1,000,000,000 bits per second. The Gigabit Ethernet came into use in the year 1999. With the invention of 1 GigE, this faster Ethernet network slowly replaced the Fast Ethernet in wired networking due to its superior data transmission capabilities. Continue reading


4 Steps to make Wireless network invisible to others

Wherever you go, there is a pressing need to be connected to the Internet.  Whether you are subscribed to a data plan provider or if not, connected to a secure WIFI connection.  Why is this?  Because in this age, connectivity is everything, be it for business, school  or personal purposes.

The good thing with mobile devices that come out in the market is that these little devices come out powered with tethering capabilities, meaning, the user may simply turn on the device’s hotspot connection and instantly, the user becomes a provider of network connection to those within a certain vicinity. Continue reading