Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

WinModem Advantages and Disadvantages

Posted on 2010-11-15
2
Medium Priority
?
1,117 Views
Last Modified: 2012-06-21
A Winmodem has advantages and disadvantages. I am trying to figure out under what circumstances a Winmodem is a good choice and when it may not be such a good choice.
0
Comment
Question by:MissMelissDempsey
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 34142844
A windows Modem is cheap, because part of it's functionality is realized in the driver software.
If you want to use it under Linux you have to make sure that there is a driver available. See http://linmodems.technion.ac.il/

An old winmodem might not get a working driver for the latest windows OS.

Tolomir

0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 500 total points
ID: 34143236
As said by Tolomir... winmodems are commonly referred to as softmodems. They require special software and drivers that are normally only obtainable for microsoft PC's. They are unsupportable under Linux. winmodems do not comply with these standards and their interface details are not frequently disclosed by their vendors. If you are running Linux, so getting a hardware modem is a good option, that does not require special drivers, and state 'Linux' as a supported operating systems on the packaging.
http://www.linux.com/learn/docs/ldp/630-Modem-HOWTO
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question