To become a guest author contact at +91 95692 11851 (WhatsApp only)

Category: Networking

Digital Knowledge Hub

How to Control Multiple PCs With One Keyboard Using Synergy

If you use multiple Windows machines on your desk, you’re probably tired of swapping between keyboards and mice. There are hardware solutions—KVM switches, which use multiple inputs and outputs to share physical mice and keyboards. Synergy, a program that does the same thing over a network, is a more elegant solution, and it works with…
Read more

How to change JioFi device default password

Connect to your JioFi Open router settings(http://jiofi.local.html/) in browser. Log in (top right of the screen) using USERNAME: administrator – PASSWORD: administrator (These are the default username and passwords, Use your password if you changed it before. Hint: You probably didn’t) Now you will easily be able to find the option to change the device password. It will…
Read more

Differences Between the JioFi 2 and JioFi

Confused to decide which one to buy between the two? Differences Between the JioFi 2 and JioFi are as follows The revised variant sports a mere 512 MB LPDDR RAM in comparison to the decent 2 GB LPDDR2 RAM of its predecessor. ROM capacity has also been significantly downgraded in the new model. The original…
Read more

Make JioFi invisible to others but connected to yourself

The steps are easy. By making your WiFi connection invisible, you are actually protecting your wifi from hackers and unauthorized access, except they know device SSID. For This Login into Jiofi configuration Page Go to settings Tap WiFi Option Go to SSID Broadcast at the bottom Select Disable Option Your Jiofi device will reboot. Now…
Read more

The Infrastructure-as-a-Service (IaaS) Model

In the traditional hosted application model, the vendor provides the entire infrastructure for a customer to run his applications. Often, this entails housing dedicated hardware that is purchased or leased for that specific application. The IaaS model also provides the infrastructure to run the applications, but the cloud computing approach makes it possible to offer…
Read more

WannaCry Ransomeware

What is Ransomware? Ransomware is a form of malware that was made by its creators to cause problems on a PC which blocks access to information. The creators will essentially block files and demand money to give access to the information. How Does It Work? 1. the computer becomes infected, 2. contact is then made…
Read more

What is VMware Cloud

VMware Cloud The VMware Cloud (also called vCloud) mainly provides PaaS and can be used to create private, public, and hybrid clouds (NIST definition). If you are wondering about the small “v” in front of most VMware products, it stands for VMware, or more recently, just for virtual. It’s similar to the small “i’ in…
Read more

What is the meaning of 1s and 0s in subnetting

Subnetting is taking the original subnet mask and adding bits to it to create more networks. In other words, if you convert a subnet mask into binary form and add more 1s, you are subnetting that network. The more is that are present in the subnet mask means the more networks with a fewer number…
Read more

packet switching

VoIP and Packet Switching Technology

One of the reasons VoIP is so successful and advantageous is it uses packet switching technology rather than circuit switching technology to provide phone services. Most phone companies use circuit switching technology. Packet switching technology is different in that it allows multiple phone calls to occur within the same space a single phone call would…
Read more

Differences between Switched Networks and Routed Networks

Switched Network Switched network involves the use of a device that filters, forwards, or floods frames based on the destination address of each frame. Switches perform their routing functions at the layers 2 model of the OSI. Some switches process data at the Network Layer (layer 3), This types of switches are referred to as…
Read more

Differences between IP Addresses and Data Link Addresses

An IP address (abbreviation of Internet Protocol address) is an identifier assigned to each computer and other devices (e.g., printer, router, mobile device, etc.) connected to a TCP/IP network that is used to locate and identify the node in communications with other nodes on the network. In other words, the IP address is an address…
Read more

Remote Desktop Service – Advantages, Disadvantages and Its Monitoring

Remote desktop service is a technology enabling you to sit at a computer and connect to a remote computer (host computer) in a different location. In other words, you can get access to your office computer from your home desktop and can use all your files, applications, and network resources exactly as you use to…
Read more