[2003-07-31] Windows 2000 ICS, NAT, and IAS
A service first provided by Microsoft in its Windows 98 operating system, Internet Connection sharing is meant to allow a single Internet connection to be shared amongst multiple computers on a small network with minimal configuration. In Windows 2000, ICS is implemented via the actual sharing of a network interface, which has a ‘real' IP address, either via a dial-up or fixed network connection. It is important to remember that ICS (which is available in both Windows 2000 Professional and Server) is mainly meant as a solution for small and home offices, and not larger enterprise environments.

[2003-07-25] What is A+ Certification?
A+ certification is a vendor-neutral certification that certifies the competency of service professionals in the computer industry. It is for anyone who wants an internationally recognized credential as a competent computer service professional.

[2003-07-25] Introduction to VLANs
I'm always amazed how people get themselves all tied in a knot when the topic of VLANs comes up. At the most basic level, a VLAN is nothing more than a broadcast domain. The only difference between a traditional broadcast domain and one defined by a VLAN is that traditionally a broadcast domain has been seen as a distinct physical entity whose boundaries consist of a router. In fact, VLANs are very similar - their boundaries are also defined by a routing device, just like any broadcast domain. However, a VLAN is a logical construct, meaning that hosts are not necessarily groups within the physical confines of a traditional broadcast domain.

[2003-07-22] How to Connect Two PC via SLIP Using A Null-Modem Cable on Linux
In this article we'll describe how to connect two PC via SLIP protocol using a null-modem cable. After this procedure, the two PCs will be connected and the IP protocol will be available for interworking, so using IP applications (e.g. telnet, ftp, ping) will be possible.

[2003-07-07] Authenticating by Public Key (OpenSSH)
SSH is a protocol for secure, remote logins and file copying; and OpenSSH, provided with most Linux distributions, is its most popular implementation. This recipe, selected from Chapter 6 on "Protecting Outgoing Network Connections," shows you how to use public-key authentication to prove your identity to a remote OpenSSH server, a technique more secure than using login passwords.


Send me relevant info on
products and services.