Distribution Networks Search Results

How To: Use SmartConnect with the F5 BIG-IP Edge Client

Watch how the F5 Networks BIG-IP Edge Client solution gets you connected automatically when you boot/start up your computer along with seeing the browser based version of the F5 BIG-IP Edge Gateway. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.

How To: Use the F5 Networks' BIG-IP Edge Client

Learn how to use the BIG-IP Edge Client and its Smart Connect, Location Awareness, Customization, Deployment features. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.

How To: Password protect your wireless network

Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...

How To: Find the standard error of the mean

In this video the tutor explains about the standard error of the mean. He starts explaining by drawing the diagram of a distribution and now he takes ten samples from the distribution and starts plotting them. He says that in theory if we do it infinite times then we can obtain the sampling distribution of the sampling mean. For the example he takes the number of samples as 10. Now depending on these values of n we can get different sampling distributions. Now he intends to find the mean of t...

How To: Set up folder access and map networks in Windows 7

Network mapping lets PC users organize multiple computers into a system that provides informational data access. This video tutorial shows how to set file sharing permissions and assign users designated privileges within a network. Establishing a network provides functionality within a workplace and facilitates virtual communication among users.

How To: Hack a network with Nessus 3

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. In this network security video tutorial, you'll learn how to hack a network using Nessus 3.

How To: Use authorization roles when using F5 applications

This clip discusses how authorization roles work and their role in the security of the latest release of the F5 Networks Management Pack suite. It also touches on the creation and use of user roles within Operations Manager console and how to apply the authorization tasks to those roles. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with F5 Networks Management Pack suite, you're sure to benefit fro...

How To: Secure DNS with DNSSEC in BIG-IP v10

In this tutorial, Peter Silva talks with F5's Sr. Field Systems Engineer, Michael Falkenrath about the new BIG-IP GTM v10.1 DNSSEC feature. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.

How To: Configure BIG-IP ASM L7 for DoS protection

See how to enable Layer 7 DoS and brute-force protection within DoS within BIG-IP ASM. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.

How To: Compile a kernel in a Debian-based Linux distribution

In this four-part video tutorial series, you'll learn how to compile a Linux kernel on a Debian-based system (e.g., Ubuntu). You'll learn two separate methods for kernel compilation, both (1) how to make the kernel into a Debian package, which can be handy if you're using a package manager and (2) how to install the kernel manually with make and make install. Take a look!

How To: Create frequency distributions with Excel pivot tables

If you use Microsoft Excel on a regular basis, odds are you work with numbers. Put those numbers to work. Statistical analysis allows you to find patterns, trends and probabilities within your data. In this MS Excel tutorial from everyone's favorite Excel guru, YouTube's ExcelsFun, the 15th installment in his "Excel Statistics" series of free video lessons, you'll learn how to use create a frequency distribution, relative frequency distribution, percent frequency distribution and pie chart wi...

How To: Hack into WEP encrypted wireless networks

Check out this video tutorial on how to hack into WEP encrypted wireless networks. The aim of this video is to show people how easy it is to crack a wireless network with WEP encryption. Seriously, if you know how to do it, even a little kid could if you showed them how. Now that you know this, you should upgrade to WPA! It is much harder and takes much longer to crack.

How To: Hack a weak WPA wireless network

This video tutorial presents instructions on hacking a weak Wi-Fi Protected Access, or WPA, wireless network. To follow along, and replicate this hack yourself, you'll need knowledge of the deauthentication, or DeAuth, process. For more information, and to get started hacking WPA networks for yourself, watch this hacking how-to.

How To: Construct a small sample size confidence interval using a t-distribution

Learn how to build small sample size confidence intervals using t-distributions. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps. With this installment from Internet pedagogical superstar Salman Khan's series of free math tutorials, you'll learn how to construct a small size sample confidence interval using t distribut...

How To: Use the Wubi installer for Ubuntu

This video describes basics about using Wubi installer for Ubuntu in Windows operating system.Wubi installer is usually used for Ubuntu family distribution installations.You can download Wubi installer from the Internet and then it will install all desired distribution automatically or you can run installer from CD or DVD.In this example Wubi is installed from Kubuntu live DVD.After inserting DVD into your computer's disk drive autoplay function offers to run Kubuntu installer. If you don't h...

How To: Set up a distribution list for your iPhone using Group Text

With the Group Text app, you can easily set up a distribution list so you can send out text messages to large numbers of people at once. You can also set up form templates, which are useful if you tend to send out a similar text message each time. This short tutorial shows you how to set up the distribution list, and how to get the most out of your Group Text. You can even set up multiple distribution lists for different topics or texts!

How To: Make your wireless network secure

In this tutorial, Brian teaches us how to make your wireless network secure. First, go to the start menu, then go to run and type in "cmd", then type in "iconfig /all". Now a new window will pop up and you will look for the default gateway. Find the IP address to log onto the routers you have. Now, type in your IP address into your address bar on your internet browser. You will be asked to log into your account with your password and user name, which you can find at the manufacturers website....

How To: Detect all computers connected to your wi-fi network

In this tutorial, we learn how to detect all computers connected to your Wi-Fi network. To begin, go to the website, http://msdn.microsoft.com/en-gb/netframework/aa569263.aspx. Once you are on this site, download and install the program. Once it's installed, open the program and then look for the MAC address. Once you find this, go back to the website and enter this into the MAC address line. After you do this, you will be able to see what computers are listed on your network. If you see any ...

How To: Detect hackers with netstat

Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.

How To: Distribute a film and avoid the pitfalls of contracts

FreshDV had the opportunity recently to speak with Jerome Courshon on the marketing and distribution of movies and films. Jerome offers a full course in the “Secrets of Distribution” . If you are a filmmaker of any kind you owe it to your crew, your cast and yourself to watch this segment. From contracts, residuals, and pitfalls to avoid Jerome covers the 101 basics of film distribution and helps prepare you for what you need to know once the ink dries on the DVDs. In Jerome’s words:

How To: Secure your wireless Internet connection

This video tutorial is in the Computers & Programming category where you will learn how to secure your wireless internet connection. If you don't secure your wireless internet connection you are allowing others to enter in to your network. Open the set up CD and first change the network name from the default name to anything that you like. For this go to step 3 of 'naming your network', type in your network name and click 'next'. Then you enable security on the network by choosing 'WPA2'. Nex...

Prev Page