Newsletter
Store home > Search
Search results
 
Showing 41-50 of 122 results
< 1 ... 3 4 5 6 7 ... 13 >
...works and what kind of networking equipment to use with your extenders. • Think of your network as a river of data with a steady current of data moving smoothly down the channel. All your network users are like tiny tributaries branching off this r...
NAC • Network Access Control (NAC) is a method of ensuring that only known devices are allowed to connect to your network and that they meet your network’s requirements before they are granted access. • This is NAC at its most basic level. How...
Lockable patch cable applications • __________________________________ • __________________________________ • Health Care • Prevent patients and visitors from unplugging monitoring equipment in patient rooms. • Secure vital network connections...
Remote Access • Remote Management • Remote access refers to a temporary link—usually a phone connection—and does not include permanent LAN-to-LAN connections. These temporary links can be made over a number of different kinds of media includin...
FREE Tech Support • For help ordering products, • contact our FREE Tech Support •   • Practical IT Security solutions from Black Box • What dangers lurk? • Corporate networks are routinely attacked tens of thousands of times every day. Intellectua...
...desktop in “Dial- Up Networking” (with notebooks) using your integrated analogue modem to access your serial ports again while your Ethernet or VPN connection is down or not available. For greater security, you can either setup users and password...
VPN considerations • Things to consider about VPN connections • Who’s setting it up? • You can buy and set up VPN equipment by yourself. But some service providers have introduced VPN solutions that guarantee certain levels of service. They bo...
Types of Firewall • Types of Firewall • Packet filtering • Packet filtering or network layer (Layer 3) firewalls make decisions based on the source and destination addresses and ports in IP packets. This basic form of firewall protection is re...
Virtual LANs • Virtual LANs (VLANs) • True to their name, VLANs are literally “virtual“ LANs—mini subLANs that, once configured, can exist and function logically as single, secure network segments, even though they may be part of a much larger...
KVM over IP Switches •   • KVM extension has evolved from the simple operation of extending a keyboard-video-mouse workstation to control several CPUs to encompass much more. • From proprietary-based extension over copper or fibre cable, KVM exten...
< 1 ... 3 4 5 6 7 ... 13 >

 
Top Products