Wi-Fi networks are inherently insecure as compared to wired networks because of their broadcasting nature. Therefore the data over the network should be protected using encryption. As a measure towards enhancing the security, Wi-Fi routers are configured to encrypt incoming and outgoing data. Let’s have a look at encryption protocols for the same.
How to upgrade to OS X Mountain Lion?
Apple has launched a new operating system for its Mac personal computers. Called OS X Mountain Lion, it is fully integrated with social networking (Facebook and Twitter) features to iMac and Macbooks.
VoIP is voice transmission over a broadband Internet connection instead of a standard phone line.
Example : Vonage. Vonage converts your voice into data and sends it like an email.
WHOIS search/lookup provides domain name registration information such as owner of a domain name, an IP address, domain expiration date, domain created date, DNS, name server etc., WHOIS clients uses WHOIS protocol to connect to a WHOIS server and to perform lookups. By default WHOIS runs on TCP port 43.
Internet Tethering is a process of using mobile device to gain internet access on another device. For example you can connect your laptop or PDA to iphone to gain internet access via USB or Bluetooth, using mobile phone as a modem.
Basic idea is that you can hook your device (laptop) to the phone device, so your internet enabled phone can be used as a wireless modem.
Cloud computing relies on sharing hardware and software resources over a network rather than on local servers or personal devices.
Difference between Public vs. Private clouds
A public cloud is offered as a service via web applications/web services( usually over an Internet connection). Private cloud and internal cloud are deployed inside the firewall and managed by the user organization.