Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
i did not configure a fiber interface before and i wounder if there is any commands i should know about it before i start my nework? we are planning to extend our LAN and we going to use fiber connectivity between 2 switces Layer 2 . is it a normal configue like for gigabit interface ? ex :...
How do I connect my wireless broadband network (ISP) to LAN i.e. wireless LAN so I can use it for all my home PC/Laptop?
Can I use it to set up a small LAN Can I use it as a hub in a star network.