Sitemap
Total: 21 Artikel
Here's how to secure data from hacker attacks
Hacker is a person or group of people trying to find security holes in the data to be accessed. hackers themselves intend to steal user data so that hackers can get our accounts and data. It is very dangerous if hackers get our data because they will control our account…Definition of Bandwidth in Computer Networks
What is bandwidth? If we are new to computers, sometimes we will not know this problem, and people ask why the internet can be slow or maybe the internet connection there is slow and so on. The answer is because of bandwidth. Bandwidth is a measure of consumption of com…Definition, Architecture, and Functions of Each TCP/IP Layer in a Computer Network
TCP/IP or Transmission Control Protocol/Internet Protocol is software in a computer network that is in the system because it allows one computer to another computer to transfer data or information within the network/band.In computer networks, there are 2 types of networ…Hybrid Topology Strengths and Weaknesses
Every technological development will certainly have its own impact so of course, every technological development has advantages or advantages so that the technology is able to make performance more efficient.But of course, every technological development has its advanta…Excess Linux to build a network
Linux since the beginning of its development has tended to move towards the server and network. In its development, Linux has provided support for network computers both in terms of protocol, hardware, and transmission media. The following are some of the advantages of …Tricks to speed up downloads in chrome
As the most popular web browser for laptops and PCs, Google Chrome is constantly evolving to create the latest and greatest features. Features that users frequently use are anonymous cards, cross-device synchronization, spell checking, URL auto-completion, and so on.Wit…LAN and WAN the same?
Difference between LAN and WAN Networks-There are several types of computer networks, but the most popular are the internet, LAN, and WAN. Most common people may already know the internet, but what about LAN and WAN networks? Even though it is included in the category o…Get to know NAT on Mikrotik and how to configure it
Exactly what is NAT?? Network Address Translation (NAT) is the process by which a network device, usually a firewall, assigns a public address to a computer (or group of computers) on a local network. The main use of NAT is to limit the number of public IP address…How to Properly Configure a Network With a Mikrotik
MikroTik RouterOS™ is an operating system and software that can be used to turn computers into reliable network routers, including features made for IP networks and wireless networks, suitable for use by ISPs and hotspot providers. For Mikrotik installation…History of Mikrotik in Networks
For developing countries, Mikrotik solutions are very helpful for ISPs or small companies that want to join the Internet. Even though there are many mini router devices similar to NAT available, in some conditions the use of computers and Mikrotik software is the best s…