Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Archive | Networks RSS feed for this section

How to connect a Windows 10 computer to the Internet through an Android Bluetooth Hotspot

This post explains how to activate bluetooth tethering from an Android device and then connect a Windows 10/11 computer to it. Steps on how to connect a Windows 10 computer to the Internet through an Android Bluetooth Hotspot The main steps are: Activate bluetooth tethering on your Android device Pair your Windows 10 device bluetooth […]

Comments { 0 }

Content Distribution Networks (CDNs)

This post lists some of the main Content Distribution Networks (CDNs). List of Content Distribution Networks (CDNs) List of Content Distributions Networks (CDNs): Cloudflare Akamai Amazon CloudFront CacheFly Lumen CDN   Cloudflare https://www.cloudflare.com/ Akamai https://www.akamai.com/ Amazon CloudFront https://aws.amazon.com/cloudfront/ CacheFly https://www.cachefly.com/ Lumen CDN https://www.lumen.com/en-us/edge-computing/cdn.html CDN service was originally offered by Level 3 Communications. Level 3 Communications […]

Comments { 0 }

Anonymity Networks

This post lists some anonymity networks: Tor / Onionland FreeNet I2P   External references “Anonymity Networks. Don’t use one, use all them!“; Chi Square

Comments { 0 }

List of VPN Protocols

This post summarizes the most common VPN (Virtual Private Network) protocols. VPN protocol VPN (Virtual Private Network) protocols: PPTP L2TP SSH OpenVPN IPsec SSTP IKEv2 PPTP Point to Point Tunneling Protocol (PPTP). L2TP Layer Two Tunneling Protocol (L2TP) is an extension of PPTP. SSH You can use Secure Shell (SSH) to set a VPN over […]

Comments { 0 }

How to crack WPA2

Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2, its vulnerabilities, how to strengthen a WPA2 network and how to crack it. What is […]

Comments { 0 }

How to check which Devices are connected to a Network

Do you thing an outsider is using your network?   How to see which Devices are connected to a Network Method 1: Check it from router For this method, you need to have access to the router, and know its credentials. Then, you need to find out your internal router address while in your network. […]

Comments { 0 }

Internet Connection Types

This is a non-extensive list of internet connection types: Dynamic IP PPPoE Static IP L2TP PPTP DS-Lite

Comments { 0 }

Difference between Wi-Fi Range Extender and Mesh Network

What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a Wi-Fi Mesh Network? A Wi-Fi mesh network, also know as mesh Wi-Fi system, is a […]

Comments { 0 }

Free VPN

This post summarizes some Virtual Private Network (VPN) services that are available for free. List of free VPN services List of free VPN services: Linux Fu VPN VPN Gate Tor HideMyAss hide.me Whoer.net Free Web Proxy SwitchVPN VyprVPN Linux Fu VPN https://hackaday.com/2020/11/23/linux-fu-vpn-for-free-with-ssh/ VPN Gate https://www.vpngate.net/ Tor https://www.torproject.org HideMyAss https://www.hidemyass.com hide.me https://hide.me/en/proxy Whoer.net Free Web Proxy […]

Comments { 0 }

Self-signed Certificates

Self-signed certificates are widely used for testing purposes. In self-signed certificates, user creates a pair of public and private keys using a certificate creation tool and signs the document with the public key. The receiver requests the sender for the private key to verify the certificate. However, the certificate verification rarely occurs due to necessity […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional