Blog


What is WAP?

WAP stands for Wireless Application Protocol. This is a well-known and commonly used standardized protocol which defines how wireless communication can take place between mobile devices and a wireless network. This could include devices such as radio transceivers, cell phones, world wide web, newsgroup, instant messaging and any device that can be used for Internet access. Devices which are based on WAP can interoperate as technology advancement happens over time.

What is Wi-Fi?

A Wi-Fi (also known as WiFi) is a wireless network technology which allows WiFi enabled devices to communicate with each other, and also share the Internet without wired connectivity. Wi-Fi is based on 802.11 IEEE network standard which uses radio frequency signals to transmit data. The distance supported by Wi-Fi network depends on the type of Wi-Fi radio and antenna in use, and whether the environment is open or enclosed within walls and bricks. As the distance between the Wireless Access Point (WAP) and mobile device move farther away, the radio signal weakens and the transmission data rate slows down until the signal is not strong enough to be usable. The performance of Wi-Fi network also varies depending on the type of standard employed by the Wi-Fi devices, namely 802.11 (a), (b), (g), (n) and (ac).

RJ45 Cable Wiring: T-568-B Straight-through & Crossover RJ-45 cabling

RJ-45 conductor data cable contains 4 pairs of wires each consists of a solid colored wire and a strip of the same color. There are two wiring standards for RJ-45 wiring: T-568A and T-568B. Although there are 4 pairs of wires, 10BaseT/100BaseT Ethernet uses only 2 pairs: Orange and Green. The other two colors (blue and brown) may be used for a second Ethernet line or for phone connections. The two wiring standards are used to create a cross-over cable (T-568A on one end, and T-568B on the other end), or a straight-through cable (T-568B or T-568A on both ends).


Traffic Shaping, Bandwidth Shaping, Packet Shaping with Linux tc htb

Denial of service attacks are major nuisance for web hosts, and as a web host you'll have to take every measure to protect your resources from DoS attacks. Our APF, BFD, DDoS and RootKit article describes Linux utilities available to protect from DDoS attack, and also explains installation procedures. This article supplements above article by providing means to control traffic (bandwidth shaping) with Linux "tc" command so that no single machine can waste the entire network bandwidth.


Denial of Service (DoS) and DDoS Attacks

DoS attack, denial-of-service attack, is an explicit attempt to make a computer resource unavailable by either injecting a computer virus or flooding the network with useless traffic. In simple words, it is similar to thousands of people trying to enter a room from a single entrance, ultimately causing havoc. This not only disturbs the normal operations of the network but also results in poor performance and system breakdown due to overwhelming requests. A large-scale DDoS attack (ranges up to 400 GBps) can affect the internet connectivity of an entire geographical region. There are two types of DoS attacks: computer attack and network attack. Common forms of denial of services attacks are:

How do I change a web host without downtime?

Changing a web host is nuisance, but there is no reason to tolerate less then optimum service from your current web host if you're not happy with them. If you plan ahead, changing a web host may not be too bad and can be done without downtime or email disruptions. The most important thing to note is not to cancel your existing account until you're done. Even if you hate your current hosting provider, it's essential that you keep your account active until the transfer is complete. Cancelling the account ahead of time will make the transition difficult.

How do I find a good web host?

When searching for a reliable web host, consider factors like server uptime, loading speed, customer support, scalability, security features, and pricing. Ensure the host aligns with your website's needs, whether it's a personal blog or e-commerce site, and check for user reviews and recommendations to gauge their reputation.


What is IP Spoofing and how to avoid it?

IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in the IP header. IP spoofing involves solving the algorithm that is used to select the order sent values, and to modify them correctly.