-
Common Network Hardening techniques
Here are some common network hardening techniques network professionals use: Network Hardening Techniques
-
Network-based attacks and their typical targets
Here are three examples of network-based attacks and their typical targets: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks On-Path or Man-in-the-Middle (MiTM) Attacks DNS-Based Attacks
-
Outdated Wireless Security Standards to Avoid
Importance of Strong Wireless Security The sources stress that organizations and individuals should prioritize strong wireless security practices, including using robust security protocols and staying informed about potential vulnerabilities. They recommend WPA2 or, preferably, WPA3, the latest standard, as these offer the strongest protection for wireless networks.
-
Types of cyberattacks and threats that target wireless networks
Here are some types of cyberattacks and threats that target wireless networks, based on the sources provided: The sources provide examples of tools like Aircrack-ng that cybersecurity professionals use to detect rogue access points, monitor for deauthentication attacks, and perform wireless security assessments. [2, 10] They also highlight the importance of implementing security best practices…
-
Cryptography
Cryptography is the art and science of hiding data in plain sight. It is also the art and science of stealing data hidden in plain sight. There are at least three players. The first is the one who has the original data, which is presumed to have high value to others. This data is presumed…
-
Tuning Up – Mac OSX using Terminal
I’m writing a short primer or how to, on cleaning up and a tune up for Mac OSX using the Terminal. Most of these can be accomplished by using Finder or some type of all-in-one application but I prefer to use Terminal and do everything in one shot, plus it saves time. These commands below…
-
Domain Name System Name Service
Domain Name Service is a database of host names and addresses distributed across thousands of servers, DNS protocols enable a user to submit a database query to a local server and receive a response that may have been obtained from a remote server. DNS also provides information that is needed to route electronic mail to…
-
Routing Information Protocol
RIP (Routing Information Protocol) is derived from the Xerox Network Systems (XNS) routing protocol. RIP was in widespread use for several years before being standardized in RFC 1058. A second version was proposed in 1993 and improved in 1994. RIP computes routes using a simple distance vector routing algorithm. Every hop in the network is assigned a…
-
Running out of RAM on Yosemite: Reset Disk Permissions and your mac’s PRAM
If you notice that you’re running out of RAM on OSX Yosimite… First, open you Activity Monitor, click the [Memory] tab and sort by “Memory” If WindowServer is hogging your RAM then resetting you mac’s PRAM might fix things. Reset your mac’s PRAM: -Close all open apps -Press CMD + Option + ESC (***) -Put…
-
CCNA Review Part1: Describe the Purpose and Functions of Various Network Devices
Understand the differences between a hub, a bridge, a switch, and a router. Hubs create one collision domain and one broadcast domain. Bridges break up collision domains but create one large broadcast domain. They use hardware addresses to filter the network. Switches are really just multi-port bridges with more intelligence. They break up collision domains…