IP Address Calculator (the App) does not collect/send any personal data of any kind. All content created with the App are solely yours (the user). The App does not include or offer third-party products or services.
There is no doubt that information security is one of the main objectives of every organization that rely on an ICT infrastructure. For some organizations, the task of maintaining information security is assigned to dedicated teams not concerned with keeping […]
The IEEE 802.11 family of standards, marketed under the Wi-Fi brand, has continued to offer users increasingly higher data rates since the late 1990. Published in December 2013, the 802.11ac amendment brought substantial improvements in data rates over its predecessor, […]
This poster illustrates the main components in a unicast IPv6 address and some interesting facts about it. To help design your IPv6 addressing plan, make sure you download our IP Address Calculator.
Your organization’s firewall is the first line-of-defense against cyber-attacks and it is where the implementation of the access policies takes place. In a typical organization firewall policies are constantly changing to respond to various threats and adapt to changes in […]
Back in the eighties, John Gage of Sun Microsystems coined the phrase, “The network is the computer.” Today, the services made possible by the Internet and our use of them as individuals and organizations affirm John’s statement perhaps in ways […]
(this is the third post of the series “behind the wall”. Here are the first and second) The Internet is made of light. That is because the Internet’s backbone is mostly made of optical fibre links that guide light pulses […]
The Internet is a network of networks. Every machine that is connected to the Internet is part of a network. At home, you are likely connected to an Internet Service Provider (ISP). At work, your computer is part of the […]
It started when my cousin asked, “So what exactly DO you do for a living?” “Do you have a computer tethered by a data cable to the wall?” I responded. “Yes,” “Well my job is to build what goes on […]
Firewalls are the primary defense mechanisms against network security threats. A firewall is a system that can be positioned between any two networks to control the passage of data traffic in and out of these networks. Typically, the two networks […]