Helping people with computers... one answer at a time.
Topics covering computer networking in general, wireless networking, home networking, networking basics and networking safety. Answers about connecting your computer to the internet and other computers.
A duplicate name existing on the network happens when two resources - usually computers - have been given the same name. We'll look at how to check, and where to fix it.
There are a few ways that you can copy files between two computers using a USB connection.
It's possible to network two computers with just a cable, but there are a few tricks involved to get things working properly.
The way packets get routed, it's unlikely that you would see any real benefit from that connection; and it's possible that could end up confusing things.
A MAC address can easily be traced for as far as it travels. The problem is a MAC address doesn't travel far enough to be useful.
It's possible to accidentally create a connection or a bridge between two networks. We'll look at how, and what you can do to avoid it.
Most computers come with ethernet these days, but if you have an older machine that doesn't, there are alternatives.
There are several barriers to connecting to your home computer from work. We will look at four ways to do so.
Connecting your office computer to your home computer isn't as far-fetched a scenario as it sounds.
A VPN, or Virtual Private Network, allows users to remotely access a particular computer.
Your machine can open TCP/IP connections to other machines, or it could be waiting for other machines to connect to it. Here's how to see what is happening.
Your IP address is the fundamental way of identifying your computer on the internet. Your IP address is available to any service you connect to.
Wireless internet in WiFi hotspots makes for a convenient connection. To connect to the wireless internet you need proximity and a little hardware.
Process Monitor is a powerful tool and it can be used to track down exactly what program on your machine is responsible for internet activity.
It's not at all uncommon for your network to be busy even if you're not. We'll look at why, and what you might do to investigate should you need to.
NAT is a fundamental technology used by routers allowing you to share internet connections and stay safe. I'll give a conceptual overview.
A VPN or Virtual Private Network is a fully encrypted and private internet connection via a VPN provider. I'll look at what protection it offers.
Every device on an TCP/IP network must have a unique IP address. IP addresses are assigned, either automatically by DHCP, or by manual configuration.
A shared connection to the internet is common, and provides an important level of security. But what if the machines you share with can't be trusted?
One common problem connecting with Remote Assistance typically involves a router 'getting in the way'.
Sharing your wireless internet access with a neighbor might seem like a friendly thing to do, but be aware that you are potentially putting your own computers at risk.
Standard VPNs certainly will be blocked, but there are some that are designed specifically to circumvent this kind of blocking, although they can only circumvent it for a short period of time.
Your internet connection is controlled by your ISP and the devices that your ISP provides, but there are some advantages from faster equipment.
There are ways to block URLs in IE, but doing so will block them from all other programs as well.
If a PC cannot find a network until rebooting, check the speed settings of the network card as well as the functionality of the card itself.
It's fine to turn off your router when gone, and equally fine to leave it on. There are advantages to both.
Bandwidth is a term you hear frequently but it can be confusing and it's easy to gloss over exactly what it means.
Proxy servers sit between you and your internet connection, often caching or filtering the content as it makes its way from server to you.
MAC and IP addresses are both key components to network, but they serve different purposes, and are visible in very different ways.
Hubs, switches, and routers are all computer networking devices with varying capabilities. Unfortunately, the terms are also often misused.
IntERnet and IntRAnet are two different things. I'll look at just what I think an intRAnet is, and what most people think it is.
Saved network connections should automatically reconnect the first time you try to use them. There should be no need to do anything special.
TCP/IP settings can be used to configure an assigned static IP address, override DNS settings, and more. I'll show you exactly where they are.
Home networks or other small LAN can stop working for various reasons, but there's a simple reason home networks stop working that's often overlooked.
'There is another user logged onto your computer' happens when another user is logged in. That can happen in a couple of ways - one obvious, one not.
Internet Explorer can automatically dial a connection if you use dial-up to connect to the internet. Having it automatically dial a connection can get in the way, though. Here's how to turn that off.
Network failures after standby are not uncommon in older machines. Fortunately, fixing network problems after standby is not difficult - usually.
The number of bytes transferred should be roughly the same regardless of your connection, right? We'll look at a couple of reasons that might not be true.
When enabled, the network icon in the system tray lights up when data is sent or received. If the network icon is constantly lit when you're not doing anything, there are several possibilities.
A router will not improve an internet connection speed, but it could be a necessary addition to your computer safety.
Zone Alarm is a popular firewall you install on your machine. If you also have a NAT router you may - or may not - need a firewall such as Zone Alarm.