fortypoundhead.com

Browsing Networking

Displaying page 1 of 25 | Prev | Next

"Duplicate Name Exists" Errors in Windows

After starting up a Microsoft Windows computer connected to a local network, you may see the error message "Duplicate name exists." What does this error message signify, and how can you resolve it?

Posted:2008-01-31, 1870 views

A little about VOIP

VOIP is an advanced technology that is used as one the modes of telecommunication. It has created its own space in the world of telecommunication. The main factor responsible for the functioning of the VOIP system is the broadband internet connection which has become a matter of concern for the customers as there is no proper coverage of network.

Posted:2007-06-05, 1840 views

An ISDN Issue

ISDN has been a much-maligned telecommunications service. Saddled with secondary meanings of "I Still Don't Need it", and "I Still Don't Know", ISDN may be regaining some respect.

Posted:2008-03-01, 1717 views

Application Layer Details

The application layer is the seventh level of the seven-layer OSI model. It interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer.

Posted:2008-04-10, 3983 views

ARP

Display and modify the IP-to-Physical address translation tables used by address resolution protocol. A host's MAC address can be checked using IPCONFIG.

Posted:2012-03-31, 1122 views

Authentication Defined

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.

Posted:2007-07-10, 1850 views

Auto Logon to a Windows Machine

Windows NT includes a feature that allows you to automatically logon to the machine and network, bypassing the Winlogon dialog box.

Posted:2007-05-03, 1773 views

Automatic Hidden Shares

When networking has been installed on a Windows NT machine, it will automatically create hidden shares to the local disk drives. The shares are normally accessed via \\server\c$ and \\server\d$ depending on the drive letter. It is possible to disable the sharing at run-time, but this tweak will stop the automatic sharing altogether.

Posted:2007-06-20, 1693 views

Displaying page 1 of 25 | Prev | Next




Recent Forum Posts

Advanced search added
dwirch posted on September 23, 2017 at about 13:44 in Site News

Job Spammer: Gaurav Mehta - AgreeYa Solutions
dwirch posted on September 22, 2017 at about 10:35 in Spammers

Job Spammer: Prutha Siri - Javelin Systems
dwirch posted on September 10, 2017 at about 6:15 in Spammers

New security implemented
dwirch posted on September 7, 2017 at about 7:16 in Site News

Malicious IP Checker Companion Tool
dwirch posted on August 12, 2017 at about 20:24 in Site News

Job Spammer: Steve Adams
dwirch posted on August 8, 2017 at about 7:44 in Spammers