Wireless network and security
In these days almost every user uses wireless (Wi-Fi) networks to enable their laptops and other wireless devices to access the Internet. Wi-Fi networks generally include a wireless “router” connected to a broadband Internet service via a modem that is attached to the cable or telephone network. Sometimes the wireless router and the modem are integrated into one device.
While Wi-Fi networks provide many benefits like mobility, no wiring, an unprotected network can result in unauthorized use and potential harm unless certain steps are taken. In some cases, unauthorized users may be able to access your private information, view the content of transmissions, download unlawful content using your network or infect computers with viruses or spyware. Unauthorized users may also cause harm beyond your computer or network, such as sending spam, spyware or viruses to others and the activity can be traced back to your network. Furthermore they can install software on your network to gain access to password, banking data or other online accounts. They will collect (farm) your data and are able to steal your online identity.
Over the past decade we have seen an enormous increase in online traffic and attacks on business and personal networks. Hackers try to gain access to networks and computers to install spyware, malicious software, key loggers or rogue software to build bot networks. They use your computer and internet connection to attack other systems. In most cases you don’t even notice this since the software is running in the background on your computer.
Our mission is to get you the right solution for your home and business to make sure your data but more important your privacy is secured. This can be achieved by installing the right hardware and configure it correctly.
Category 6 cable, commonly referred to as Cat 6, is a standardized twisted pair cable for Gigabit Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards. Compared with Cat 5 and Cat 5e, Cat 6 features more stringent specifications for crosstalk and system noise. The cable standard provides performance of up to 250 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), 1000BASE-T/1000BASE-TX (Gigabit Ethernet), and 10GBASE-T (10-Gigabit Ethernet).
server backup info
Virtual Private Networks
A virtual private network (VPN) extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
VPNs can provide functionality, security and/or network management benefits to the user. But they can also lead to new issues, and some VPN services, especially "free" ones, can actually violate their users' privacy by logging their usage and making it available without their consent, or make money by selling the user's bandwidth to other users.
Some VPNs allow employees to securely access a corporate intranet while located outside the office. Some can securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users can use some VPNs to secure their wireless transactions, to circumvent geo-restrictions and censorship, and/or to connect to proxy servers for the purpose of protecting personal identity and location. But some Internet sites block access via known VPNs to prevent the circumvention of their geo-restrictions.
A VPN is created[by whom?] by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunnelling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.
Traditional VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains, so services such as Microsoft Windows NetBIOS may not be fully supported or work as they would on a local area network (LAN). Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunneling protocols, to overcome this limitation.