Blog Archives

Crypto Hypno: Cryptography basics (Part 1 of 5)

Crypto Hypno

Today we’re going to look into how we can make it safer to send traffic on networks.  By embracing encryption we can protect the data that devices use to communicate with each other.  So let me start by saying cryptography is an

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

How to destroy a router with DHCP Starvation

DHCP

Today I’m going to show you something dangerous. Really dangerous.

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

DHCP

DHCP

DHCP is like Costco and Walt Disney.  Almost everyone has heard of it!  We all know that DHCP is the magic that dishes out IP addresses to our computers.  And we know that DHCP just works.  But how does it

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: ,

Networking 400: Secret TCP three-way handshakes

TCP secret three-way handshakes

So we all know that IP addresses allow us to communicate across the network by telling us source and destination layer 3 addresses.  But that’s just one bitty part of network communication. If you’ve been following my blog you know IP addresses

Posted in Google Chrome, Internet Explorer 10, Internet Explorer 11, Internet Explorer 9, Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mozilla Firefox, Opera, Safari, Samsung Galaxy S4, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

How to setup an 5520 ASA 5.2 in GNS 3 version 1.3

Image credit aliimg.com

Would it be nice if you could console into a virtual ASA 5520 running ASA 8.4.2?  You could setup NAT, site-to-site VPNs with virtual hosts and go crazy with firewall rules.  The answer is yes, you can and I’m about

Posted in Hardware, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 8, Windows 8.1 Tagged with: , ,