Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | network

Content Distribution Networks (CDNs)

This post lists some of the main Content Distribution Networks (CDNs). List of Content Distribution Networks (CDNs) List of Content Distributions Networks (CDNs): Cloudflare Akamai Amazon CloudFront CacheFly Lumen CDN   Cloudflare https://www.cloudflare.com/ Akamai https://www.akamai.com/ Amazon CloudFront https://aws.amazon.com/cloudfront/ CacheFly https://www.cachefly.com/ Lumen CDN https://www.lumen.com/en-us/edge-computing/cdn.html CDN service was originally offered by Level 3 Communications. Level 3 Communications […]

Comments { 0 }

Anonymity Networks

This post lists some anonymity networks: Tor / Onionland FreeNet I2P   External references “Anonymity Networks. Don’t use one, use all them!“; Chi Square

Comments { 0 }

List of VPN Protocols

This post summarizes the most common VPN (Virtual Private Network) protocols: PPTP L2TP SSH OpenVPN IPsec External references “CISSP 9th Edition”, Chapter 12

Comments { 0 }

Difference between Wi-Fi Range Extender and Mesh Network

What is a Wi-Fi Range Extender? A Wi-Fi range extender, also know as a Wi-Fi Booster or Wi-Fi repeater, is a device with two Wi-Fi radios that connects to a network while it rebroadcast what it receives. What is a Wi-Fi Mesh Network? A Wi-Fi mesh network, also know as mesh Wi-Fi system, is a […]

Comments { 0 }

IPv6

IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Address An IPv6 uses 128 bits. While IPV4 is represented by decimal numbers, IPv6 uses hexadecimal numbers. There are 8 blocks of hexadecimal numbers, representing each one 16 bits. Each block is separated using colons (:). Example of IPv6 […]

Comments { 0 }

How to set your Wireless Adapter to Monitor Mode in Linux

Wireless network interface controllers (WNIC’s) can operate in different modes: Managed mode: the only packets that are received in the computer are the one directed to it. Promiscuous mode: it is a listening mode that exists for both wired and wireless adapters. Monitor mode: a listening mode that only exists for wireless adapters. When we […]

Comments { 0 }

How to find the Devices on your Network with nmap

First of all, you need to know your IP and the network range where it belongs to. It is important to perform scanning that you understand the meaning of IPv4 addresses. You can check this post explaining about it. Open a terminal and type the following command to get your IP: ifconfig First, locate what […]

Comments { 0 }

IPv4

IPv4 Address An IPv4 address represent a single device in an IP network. IPv4 addresses consist of 32 bits. Example: 11000110001100110110010000000000 These 32 bits are usually divided in 4 octets, and separated with a dot. Example: 11000110.00110011.01100100.00000000 In order to become more familiar for human, they are usually represented using decimal notation. Example: 198.51.100.0   […]

Comments { 0 }

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) is an internet protocol of the OSI Application layer 7. It collects and organizes information about managed devices on IP networks and modifies that information to change device behavior. It is widely used for network management and network monitoring. It provides information about network resources such as cable modems, routers, […]

Comments { 0 }

NetBIOS

Network Basic Input/Output System (NetBIOS) is a protocol of OSI session layer 5. It provides a NetBIOS name to each computer, in addition to the already existing IP address from OSI network layer 3. Nowadays, NetBIOS runs over TCP/IP. The NetBIOS Suffix, alternately called the NetBIOS End Character (endchar), is the 16th character of a […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional