Telecom Routers Switches (87)
Telecom Protocols (83)
Telecom Algorithms (10)
Voice Gateways (17)
VoIP IP Telephony (41)
Telecom Security (5)
Telecom Hardware (12)
WiFi Related (726)
Telecom General (169)
Telecom AllOther (14) My router accepts only 1/4" shank bits. Yet many of the bits that I would like to use have a 1/2" shank. Why are there not more 1/4" shank bits available?
1477I have a Wi-Fi network and would like to protect it from unauthorized access. It is better to use a RADIUS server that allows me to have 802.1x authentication and protection with WPA or WPA2 or use a Captive Portal that authenticates access via web login?
1 2522Why should not the user close the popup control window which appears after the authentication with the CaptivePortal?
1 2373Should an impostor capture the authenticator on the network and, without decrypting it, sends it as is to the captive gateway, could he or she obtain illegal access to the network?
1 2555If my wireless network doesn’t have a lot of traffic, is it okay to use WEP because the IVs required to crack the WEP key won’t be generated?
1 2773
Which method is used for Data transfer?
What is tdd and what are the frequencies it uses?
what is meant by the term 'ip spoofing'?
Is my data and e-mail secure at a wi-fi?
can anyone tell me what is Game testing online casino Slot machine any sample test cases or scenarios
How the B and D channels share the line?
What are TEIs?
Explain power management?
Is this WIC physically the same WIC that has been available on the Cisco 1700 series for some time?
How many types of spread spectrum techniques are used in cdma?
How users are connected to a public ISDN through an ISPBX?
When will the ADSL WIC be available?
Which transport layer protocols are used for VoIP audio and video payload?
What is dect?
What is routing protocols purposes?