July 16, 2018

Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The centerpiece of these breaches, after months of forensic analysis, has been a lack of following IT industry accepted security best pract...

December 23, 2017

Eric Ilmberger

CNT52 Network Fundamentals

I did a little more research on symmetrical and asymmetrical encryption because it wasn't described well in testout.   Symmetrical encryption uses a shared key that when entered allows the user to read the data. Symmetrical keys...

December 21, 2017

Eric Ilmberger

CNT 52

As China hosts the largest population on the planet, it only makes sense that they would need more IP addresses to cater to all those people. “’China is the world’s largest number of internet users, but there are only 0.45 IPv4 addresses per person’...

November 15, 2017

For many years people have been using aluminum foil to help enhance and extend the range of their Wi-Fi networks.  The question we may have is well how well would it perform?  Will it make a significant or noticeable difference?  What do you think?  Here are a few vide...

November 2, 2017

Spoofing Fully Qualified Domain Names

How can you spoof a FQDN?  John Hohn covers the history of DNS and name registry to demonstrate a flaw/feature that allows for the spoofing of fully qualified domain names.  Learn how a Puny code vulnerability can be used by hackers...

October 26, 2017

A common tool for monitoring network traffic that is taught in classes is Wireshark.  In part, because it is freely available.  However, there are a number of other tools that can be used to capture and analyze network traffic.  When compared with other tools you will...

April 20, 2017

Introduction to TCP/IP v 4 and Subnet Masking. This is foundational knowledge needed for any computer networking career. 

Here is a brief introduction by Eli the Computer Guy.

This video is from The Networking Doctors

April 6, 2017

Wireshark is a network packet capture and analyzer.  It is simple and powerful tool for analyzing network traffic.  Here is a series of 8 videos that introduce the basics of wireshark.

You can download it at https://www.wireshark.org/

Follow the link for the full pl...

March 10, 2017

Bonding Internet connections is not the same as network load balancing or failover connections.  Here is a tech tip from LinusTechTips on how you can use bonding to increase your Internet speed at home.  This would work great for a small business as well.  Too bad ISPs...

March 9, 2017

Lowell Vanderpool has a great video that summaries LAN fiber optics. 

Colin Yao describes the different types of connectors used in fiber optics.

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare