Sitemap


Total: 21 Artikel

  • Here's how to secure data from hacker attacksHere's how to secure data from hacker attacks
    Hacker is a person or group of people trying to find security holes in the data to be accessed. hackers themselves intend to steal user data so that hackers can get our accounts and data. It is very dangerous if hackers get our data because they will control our account…
  • Definition of Bandwidth in Computer NetworksDefinition of Bandwidth in Computer Networks
    What is bandwidth? If we are new to computers, sometimes we will not know this problem, and people ask why the internet can be slow or maybe the internet connection there is slow and so on. The answer is because of bandwidth. Bandwidth is a measure of consumption of com…
  • Definition, Architecture, and Functions of Each TCP/IP Layer in a Computer NetworkDefinition, Architecture, and Functions of Each TCP/IP Layer in a Computer Network
    TCP/IP or Transmission Control Protocol/Internet Protocol is software in a computer network that is in the system because it allows one computer to another computer to transfer data or information within the network/band.In computer networks, there are 2 types of networ…
  • Hybrid Topology Strengths and WeaknessesHybrid Topology Strengths and Weaknesses
    Every technological development will certainly have its own impact so of course, every technological development has advantages or advantages so that the technology is able to make performance more efficient.But of course, every technological development has its advanta…
  • Excess Linux to build a networkExcess Linux to build a network
    Linux since the beginning of its development has tended to move towards the server and network. In its development, Linux has provided support for network computers both in terms of protocol, hardware, and transmission media. The following are some of the advantages of …
  • Tricks to speed up downloads in chromeTricks to speed up downloads in chrome
    As the most popular web browser for laptops and PCs, Google Chrome is constantly evolving to create the latest and greatest features. Features that users frequently use are anonymous cards, cross-device synchronization, spell checking, URL auto-completion, and so on.Wit…
  • LAN and WAN the same?LAN and WAN the same?
    Difference between LAN and WAN Networks-There are several types of computer networks, but the most popular are the internet, LAN, and WAN. Most common people may already know the internet, but what about LAN and WAN networks? Even though it is included in the category o…
  • Get to know NAT on Mikrotik and how to configure itGet to know NAT on Mikrotik and how to configure it
    Exactly what is NAT??  Network Address Translation (NAT) is the process by which a network device, usually a firewall, assigns a public address to a computer (or group of computers) on a local network. The main use of NAT is to limit the number of public IP address…
  • How to Properly Configure a Network With a MikrotikHow to Properly Configure a Network With a Mikrotik
       MikroTik RouterOS™ is an operating system and software that can be used to turn computers into reliable network routers, including features made for IP networks and wireless networks, suitable for use by ISPs and hotspot providers. For Mikrotik installation…
  • History of Mikrotik in NetworksHistory of Mikrotik in Networks
    For developing countries, Mikrotik solutions are very helpful for ISPs or small companies that want to join the Internet. Even though there are many mini router devices similar to NAT available, in some conditions the use of computers and Mikrotik software is the best s…