SSH Encryption Analysis
Eric Ilmberger CNT52 Network Fundamentals I did a little more research on symmetrical and asymmetrical encryption because it wasn't...
China is making a Massive switch to IPv6
Eric Ilmberger CNT 52 As China hosts the largest population on the planet, it only makes sense that they would need more IP addresses to...
Extend Wi-Fi Range
For many years people have been using aluminum foil to help enhance and extend the range of their Wi-Fi networks. The question we may...
Spoofing Fully Qualified Domain Names
Spoofing Fully Qualified Domain Names How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a...
Wireshark v. OmniPeak
A common tool for monitoring network traffic that is taught in classes is Wireshark. In part, because it is freely available. However,...
WPA2 Vulnerability
WPA2 Encryption used to secure wireless networks has been broken. Website explaining the crack https://www.krackattacks.com/. Thanks to...
TCP/IP v4 Intro
Introduction to TCP/IP v 4 and Subnet Masking. This is foundational knowledge needed for any computer networking career. Here is a brief...
Visio Admins Best Friend
Visio is a Microsoft Office application that helps users create charts, diagrams, timelines, and illustrations. Most Network or system...
Introduction to Wireshark
Wireshark is a network packet capture and analyzer. It is simple and powerful tool for analyzing network traffic. Here is a series of 8...
Faster Internet with Bonding
Bonding Internet connections is not the same as network load balancing or failover connections. Here is a tech tip from LinusTechTips on...