What is ping in computer terms and is higher or lower better?

In this article, we will delve deeper into the concept of ping in computing. We will discuss its importance, what influences ping time, and different ways to measure it. You will be an expert on ping once you’ve read this article. Understanding Ping and Its Significance Ping, derived from the term “Packet Internet Groper,” is … Read more

What is VLAN tagging and why does New Zealand use VLAN 10 for fibre?

VLAN tagging, also known as 802.1Q tagging, is a method used in networking to separate different types of traffic on a single network infrastructure. This technique allows for better organisation, security, and management of network traffic, while ensuring quality of service (QoS) for high-priority applications. In this article, we will discuss the basics of VLAN … Read more

How to bypass Windows UAC prompts without admin account?

Are you getting a UAC prompt, or User Access Control prompt, on your Windows computer when trying to install an application or add a driver for your new printer or USB device? If you’re an administrator you just put your login details into the box. The problem lies if you’re not an administrator, or have … Read more

What are the most common command prompts to use?

In this article, we will explore the fundamentals of command prompts to help you gain a better understanding of their purpose and usage. Command prompts are essential for users who need to interact with their computers’ operating systems using text-based commands. By understanding the basics, you’ll be better prepared to navigate and utilise command prompts … Read more

What is a DDoS attack and why do people initiate them?

What is a DDoS attack? You may have heard this term in the news or on social media, but what does it actually mean? And as a consumer or residential Internet user, should you be concerned? Fortunately the quick answer is no. DDoS attacks are targeted towards larger websites and organisations such as Microsoft or … Read more

What is the difference between WEP, WPA, WPA2 and WPA3 security?

In this introduction to wireless security protocols, we will discuss the importance of securing wireless networks and provide an overview of the different protocols available, including WEP, WPA, WPA2, and WPA3. As technology evolves and more devices become connected to the internet, it is crucial to protect our data and maintain the integrity of our … Read more