Skip to main content

Home/ KSU-Networking/ Group items tagged AR

Rss Feed Group items tagged

Coby Tenpenny

Are smartphones and tablets turning us into sissies? - 0 views

  •  
    "I think increasingly what's happening is, partly as a result of the kinds of devices that are being manufactured and that people are buying, people are moving toward a more consumption-based Internet experience from a production-based experience."
anonymous

Study guide for test2 - 2 views

It was in color and much nicer...bummer :p

W. Brock Son

Operation Ghost Click DNS servers to shut down in March - 4 views

  •  
    I think that it is kind of creative how, as a temporary solution to the problem, they converted the rogue DNS servers to legitimate DNS servers. I wonder if they used the actual servers or just their address.
  • ...2 more comments...
  •  
    Good question Brock. Which scenario do you think would prove more difficult? Do you think you can dig into this story to find out the answer? Do you think you can find someone who knows the answer and can say?
  •  
    I do not know exactly how IP addresses are distributed, but I think that they are somewhat randomly assigned, so I think that it might be harder to reassign the IP address to a new server than to use the actual servers, but I may be wrong. I do want to dig into it more. I think that the answer could probably be found on the Internet as to who IP addresses are assigned, and I plan on looking there for such information. I think that maybe, if I do not find the answer to this myself, I could ask you, Troy Harding, Tim Bower, or a classmate.
  •  
    Hey Brock, you wrote this back in January. Do you know how IP addresses are distributed at this point in our class?
  •  
    I learned about DHCP as a method for dynamically assigning IP addresses to computers. However, I am not certain if the Internet uses them as well. I read some on the Internet about this, however.
Bill Genereux

Science confirms: Online trolls are horrible people (also, sadists!) | Ars Technica - 0 views

  •  
    "Trolls just want to have fun"
Tim Gabriel

Code Found In YouTube's Most Recent App Update All But Confirms Pay-To-View Channels Ar... - 0 views

  •  
    If I have to pay to view a channel on YouTube, this is going to be ridiculous.
seventhree

'Compact & durable': Scientists encode, retrieve 10,000 gigabytes stored on DNA molecul... - 1 views

  •  
    "Researchers at the University of Washington and Microsoft are developing one of the first complete storage systems to house digital data in DNA."
Joey Allen

Upgrade Your Home Network This Weekend - 0 views

  •  
    Here are some good tips on how to improve your home network.
Bradley Colson

The WOC: WAN Optimization in a Box - 3 views

"...In the "old" days the traffic that flowed over the LAN was relatively light and often text-based. But as network activity expands into data archiving, voice, and multimedia, the links between W...

started by Bradley Colson on 02 Apr 12 no follow-up yet
ashley schweitzberger

How to wire Ethernet Cables - 0 views

  •  
    How to wire your own ethernet cables and connectors. You can find bulk supplies of ethernet cable at many computer stores or most electrical or home centers. You want UTP (Unshielded Twisted Pair) ethernet cable of at least Category 5 (Cat 5).
  •  
    This article was extremely interesting, and it was really relevant to the CMST250 class, especially with the Lab02 being about Ethernet cables. It appears to me that the T568A and T568B could be used interchangeably since the same pins on the RJ45 connector are used for the same things, regardless of the fact that different wires are used within the cables. I wonder if that is the case; do you know, Ashley?
ashley schweitzberger

How stuff works - 1 views

  •  
    To all those who are completely new to this stuff!
  •  
    This article was extremely relevant for this class (as DNS servers are a part of Networking), and www.howstuffworks.com seems like a good website to obtain general information about various topics. Thank you for sharing this article.
  •  
    I think everyone in our class should read this. It's a great explanation.
Liza Rios

The moral of the Twitter-GoDaddy breach: People are the easiest thing to hack - 1 views

  •  
    We are very vulnerable..
Bill Genereux

Arches and the Internet : Digital Labor, Urban Space, and Materiality - 1 views

  • The way infrastructure is set up allows the public to believe just that:  it’s like nothing.
  • just goes to show how society has barely any idea of what makes up our infrastructure. 
  •  
    Yes, most people take the Internet for granted, but KSU Networking 1 students are getting a behind the scenes look
debbiesmiles

Shocked to learn how data brokers are watching you? - 0 views

  •  
    Very good video of "data brokers" selling YOUR information! A must see!
Bill Genereux

A Map of Every Device in the World That's Connected to the Internet - 0 views

  •  
    Where is the internet? This map might explain it better than any statistics could ever hope to: The red hot spots show where the most devices that can access the internet are located.
Cameron Ratliff

Apple in Big Business - 0 views

  •  
    This isn't necessarily network related but it shows that apple computers are becoming more popular with bigger businesses.
Rodney Gordon

IBM: All Your Smart Meters Are Belong to Us - 0 views

  •  
    I read this article due to the title. Not too much to do with networks but interesting just the same.
grandam97

Fake Cell Towers Allow the NSA and Police to Keep Track of You - 0 views

  •  
    The Internet is abuzz with reports of mysterious devices sprinkled across America-many of them on military bases-that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.
jckoenig

Military Companies Brace for Rules on Monitoring Hackers - 0 views

  •  
    Companies that do business with the Defense Department are bracing for new U.S. rules requiring them to report computer breaches to the Pentagon and give the government access to their networks to analyze the attacks. Groups representing the contractors are raising concern about the Pentagon rooting around their data, and say smaller companies may not even have the cybersecurity protections needed to comply.
1 - 20 of 80 Next › Last »
Showing 20 items per page