What are the advantages of wiring workplace vs wireless?

What are the advantages of wiring workplace vs wireless?

In computing technology, the term “wired” is used to differentiate between wireless connections and those that involve cable. A wired setup uses physical cables to transfer data between connected PCs. In a small wired network, a single router may be used to connect all the computers. Larger networks often involve multiple routers or switches that connect to each other. On of these devices typically connects to a cable modem such as T1 line or other type of Internet connection that provides Internet access to all devices connected to the network. Nowadays, most of big enterprises choose wire connection over the wireless. There are many reasons why these corporations decide to implement a wire internet. Below we will be studying some of the main advantages of the wire connection. Cost: Since companies are always trying to save money and generate more revenue, cost is one of the main reasons wire connection is an option. Cables, switches are not expensive. Wire connection is cheaper than the wireless. In another hand, Ethernet consume less power . Using Ethernet improve laptops battery life.  Reliability: Wire connection is known to be very reliable. Therefore, reliability is one of the reason why some companies choose to implement the wire Internet. Ethernet, cables, switches are reliable because manufacturers have improved their technology over several decades. Speed and Bandwidth is very high with the wire connection.  We are talking about up to 100 Mbps. Nowadays most IT professionals choose fiber optic cables for less attenuation and electromagnetic interference (EMI) Security: Wire connection is very handy if you have sensitive data that you want to secure using some software...

What are the differences between Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets?

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets. Adware is a form of malware that helps online advertisers make sales by placing banners on webpages. This software gathers information from you based off your browsing habits. A third party company usually makes a deal with a business to help advertise. The third party company places tracking software on your computer, this allows them to monitor what you search. A Virus will affect your entire computer. A virus can be spread to other computers via file sharing or email. “All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.” (Quinstreet Enterprise). Worms are like viruses, but they are self-replicating. Worms take advantage of holes in the security features of an applications or other software. Worms are usually spread through email and instant messaging. Worms can use up a computers resources, which could cause the computer to shut down or crash. Spyware is a form of tracking software. Spyware is installed usually without your knowledge. Spyware collects; passwords,...

The Different Types of Malware

Virus A virus is a self replicating nasty. It runs when a user launches something that is infected. It infects your computer by taking over your computer’s functions.  A virus will either destroy data or search for personal information, such as credit card numbers, passwords, and other sensitive information. Your personal information will be sent to another computer. A virus can also relay spam email or pornography on your computer. Worm Worms are often viruses, or are used to deliver viruses. Worms do not require any user interaction to be activated. A worm will copy itself and launch itself, then look for security holes to spread through. You can get worms from emails, and worms will search through your email’s address book. The worm will send a copy of itself to others in your address book, using your email to make it seem like it’s you. Trojan Trojan is a type of malware disguised as a file or program using code to conceal in what seems like something normal. It is not self-replicating, but it can often download other things or provide a back door. The trojan may have an actual function, but it has bad intentions. If you have a trojan on your computer, it can delete your data, compromise the security of your computer,  and relay spam email or pornography like a virus. Spyware Spyware is a type of malware that is installed on your computer to spy on the activity on your computer, collect keystrokes, and data harvest. It will also target you with advertising malicious software to download to your computer. The software will spy...

How to wire your house with Cat6 cable? Which equipment use to create a wired network?

Although nowadays wireless is being considered simpler , a lot of people still don’t trust it due to multimedia sharing, bandwidth on a home network, and paranoia about wireless security.  If you are feeling the same way, you may want to use a hard wired solution for home networking. Having a wired network at home allows you to have a private, high-speed network for internet access, file sharing, media streaming, online gaming, IP security cameras, and much more. Therefore, here’s a step-by-step guide to wiring your home with Cat5e or Cat6 ethernet cable. Step 1: Initial Considerations and Planning (decide what it is your want) Which room(s) do I want wired? How many ports do I want in each location? What is a good location for distribution? . What path should the cables take? (How should they be laid out around your home) This is probably the most difficult consideration. What network speed do I need? (This depends on what you plan to do with your internet connection. Gaming? Media downloading etc…)This will mainly play a part in what kind of switch to get.   Step 2: Required Tools and Materials (and Costs) The cost of tools and materials can vary, based on your needs and what you already have. Tools Ethernet crimping tool (only if you’re putting plug on the ends). Cost: $13 on Amazon. Drill (primarily for drilling through wall top plates, but makes screwing faster too). Cost: varies Paddle bit or hole saw (size will vary by how many cables you’re running). Cost: usually around $20. Pointed hand saw (this makes it easy to cut holes...

The different types of malware and what they do

Greetings, Welcome to another information article here on the MATC IT Support website. For this article, I will be talking about the different types of computer ailments (or malware) that are out there, such as viruses, spyware, worms and others. I’m sure everyone has experienced one of these different “illnesses” during your time using a computer. Some of these ailments might not be too bad, but most can be downright nasty. They can either change or delete files, make you go to websites you don’t wish to go to, or just plain make your computer not work at all. While these all can be nasty, what is the difference between one or the other? Such as what makes a Trojan a Trojan? We will start off with viruses: Virus A virus is a malware program that replicates by inserting copies of itself into other computer programs, data files, or boot sector of the hard drive. Computer virus are often spread through email with attachments or instant messaging. Be very careful about opening any attachments or links sent by someone you don’t know. One of the most famous viruses was the “Melissa” virus back in March of 1999. It spread through Word documents that were sent through email. When someone clicked and opened the Word document, it would infect the host computer, along with sending the same exact email (and virus) to multiple people from the host computer’s address book. Worms A worm is a stand-alone malware program that replicates itself in order to spread to other computers. Worms usually use a network to spread themselves, looking for a security...