
SSH Encryption Analysis
Eric Ilmberger CNT52 Network Fundamentals I did a little more research on symmetrical and asymmetrical encryption because it wasn't described well in testout. Symmetrical encryption uses a shared key that when entered allows the user to read the data. Symmetrical keys are used in SSH to secure the entire connection to prevent password snooping. Asymmetrical encryption uses two different keys, a private key and a public key. Either key can be used to encrypt data but the opp

China is making a Massive switch to IPv6
Eric Ilmberger CNT 52 As China hosts the largest population on the planet, it only makes sense that they would need more IP addresses to cater to all those people. “’China is the world’s largest number of internet users, but there are only 0.45 IPv4 addresses per person’” According to the Washington Post, America has 5 IP addresses per person. This puts china at a massive disadvantage when it comes to networking infrastructure. The new plan they are adopting will push to have

Extend Wi-Fi Range
For many years people have been using aluminum foil to help enhance and extend the range of their Wi-Fi networks. The question we may have is well how well would it perform? Will it make a significant or noticeable difference? What do you think? Here are a few videos that may shed some light on these old techniques submitted by student Mohamad Malikzada. Boost WiFi Signal range through walls and get better Internet connection using aluminum foil disk How much can Aluminum

Spoofing Fully Qualified Domain Names
Spoofing Fully Qualified Domain Names How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a flaw/feature that allows for the spoofing of fully qualified domain names. Learn how a Puny code vulnerability can be used by hackers to redirect unsuspecting browsers to malicious or spoofed sites. #PunyCode #DNS #DomainName #FQDN #Cybersecurity #Vulnerability #TipsandTricks #Network #Network #NetworkTrafficAnalysis #CNT52

Wireshark v. OmniPeak
A common tool for monitoring network traffic that is taught in classes is Wireshark. In part, because it is freely available. However, there are a number of other tools that can be used to capture and analyze network traffic. When compared with other tools you will often find them to be easier to use and more visually useful. OmniPeak with the Savvius devices can help you do protocol and network traffic analyzation. This series of videos will do a comparison of the two p

WPA2 Vulnerability
WPA2 Encryption used to secure wireless networks has been broken. Website explaining the crack https://www.krackattacks.com/. Thanks to Nathan Bahr, Vic Reynov, Erik Gallagher and Chris Knight for sending me the information. StartFragmentKRACK Attacks: Bypassing WPA2 against Android and Linux EndFragment Flaw in WPA2 Security, UniFi Is Rolling New Firmware, & Things You Should Know About KrackAttack More Newsweek, “Krack Wi-Fi Hack: Google, Apple and Microsoft Scramble to F

Microsoft Ignite 2017 Keynote
Satya Nadella, CEO Microsoft, oversees all aspects of Microsoft business and leadership--from cloud and mobile development to digital and IoT implementation. His strategic vision leads innovation through transforming company culture, empowering employees, and helping customers digitally transform by optimizing business operations with data intelligence.EndFragment Video of the Keynote. #Events #Microsoft #Cloud #IoT #Leadership #Values #Vision #DataIntelligence #ITManagement

TCP/IP v4 Intro
Introduction to TCP/IP v 4 and Subnet Masking. This is foundational knowledge needed for any computer networking career. Here is a brief introduction by Eli the Computer Guy. This video is from The Networking Doctors #Communication #Network #Network #CNT52 #CNT #TCPIP #IP

Visio Admins Best Friend
Visio is a Microsoft Office application that helps users create charts, diagrams, timelines, and illustrations. Most Network or system admins find it useful to help document network infrastructure, websites, databases and other IT systems. You can visually represent them in a diagram with Visio. They are extras and add on to help you create great diagrams. Microsoft website training for Visio Introduction Network Diagrams #Visio #Office #Training #Network #CNT #Network #CN

Introduction to Wireshark
Wireshark is a network packet capture and analyzer. It is simple and powerful tool for analyzing network traffic. Here is a series of 8 videos that introduce the basics of wireshark. You can download it at https://www.wireshark.org/ Follow the link for the full playlist. https://www.youtube.com/playlist?list=PL6gx4Cwl9DGBI2ZFuyZOl5Q7sptR7PwYN #Network #Packet #surveillance #TCPIP #CNT52 #Cybersecurity