BELNIS - IT & Networking Support company

Computer Peripheral equipment (also commonly referred to as input - output devices), is any equipment wired or wireless that might be used to give a computer or a set of computers on a computer network more functionality or capability.
By: Belnis Network
 
Sept. 25, 2010 - PRLog -- Computer Peripheral equipment (also commonly referred to as input - output devices), is any equipment wired or wireless that might be used to give a computer or a set of computers on a computer network more functionality or capability.

Strictly speaking, any device that is not strictly required for the computer to function is called peripheral equipment. As such even the keyboard or mouse is a peripheral device. Although termed “peripheral” computer peripheral equipment is necessary because without it, most computers would be virtually useless.

Most computer or computer hardware manuals label peripheral equipment as an “I/O device”. I/O (input/output) devices are connected to the computer via USB, serial, parallel, bluetooth, Infrared, radio or via Wifi. Examples of I/O devices include the mouse, digital camera, keyboard, scanner, joystick, monitor, printer, speakers etc.

Modern technology and wireless network configuration has made computer peripheral devices more functional and powerful. To facilitate easy networking, many of these peripheral devices no longer require wires; instead they receive and transmit data wirelessly. Thus you have wireless printers, mouse, keyboard, speakers etc. However, each wireless peripheral device represents a gateway through which any skilled hacker can gain entry and control of your computer network. Thus an unprotected computer or entire network can be led to believe it is receiving signals from (say) a wireless mouse, when in reality it could be receiving signals from a hacker sitting in a car across the street. All that is required is for the hacker to transmit at the right frequency and beat any protection that might exist within the receiver i.e. your computer or computer network. In fact, your computer or network does not even require having a wireless peripheral device attached. For the hacker, it is sufficient if your computer can receive wireless signals.

In case you are unaware, a large number of computer peripheral devices as well as desktop computers and laptops being sold today have built-in bluetooth capability. Let us therefore briefly examine how a bluetooth device works.

Basically, a bluetooth enabled device has a built-in adapter which contains a set of instructions or programs to enable it to communicate with other similarly enabled devices. When bluetooth enabled devices are switched on and brought within each other’s radio range, their link managers discover each other and automatically form or join a network. Most of these bluetooth devices (especially those manufactured by Logitech and Microsoft) rely on 27 MHz radio technology which unfortunately is not secure.

While it is great to have a work table that is not cluttered with numerous wires running back and forth between the computer and different peripheral devices, it is important to ensure your computer network is adequately protected against unwanted intrusion and the only way to be absolutely sure is by utilizing the services of your local competent IT & integration support services.

For more information, please call BEL Network Integration & Support, LLC (BELNIS) is one of the best network support consultants Virginia at (804) 796-2631. BELNIS has a 21-year track record for providing quality solutions to business establishments and government offices throughout Richmond & Tri-Cities area in the State of Virginia, USA.

Click Here For More Info :- http://www.belnis.com/
End
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share