Aboelhamd Abdellatifaboelhmd.com·Dec 11, 2024The Rise of Fileless Cyber Attacks: What You Need to KnowIn the ever-evolving world of cybersecurity, one type of attack has gained notoriety for its ability to evade traditional defenses: fileless attacks. These stealthy incursions have shifted the paradigm of cyber threats by exploiting legitimate tools ...Discuss#FilelessAttacks
Adekunle Fatundecore-architectural-components-of-azure.hashnode.dev·Dec 11, 2024How to attach DDoS to VNETBefore we discuss the topic, let us delve into creating a DDoS protection plan. What is an Azure DDoS protection plan? An Azure DDoS Protection Plan is a service that guards against Distributed Denial of Service (DDoS) assaults on your Azure services...Discussvirtual-network
Md Shahed Fardousblog.shahedfardous.com·Dec 6, 2024Essential Networking Terminology: A Practical Guide with Real-World ExamplesHave you ever wondered how your Netflix stream reaches your TV, or how your email finds its way to the correct recipient? Understanding basic networking terminology is the key to unlocking these mysteries. In this guide, we'll break down essential ne...DiscussNetworkingnetworking
Md Shahed Fardousblog.shahedfardous.com·Dec 4, 2024Beginner's Guide to Networking: What Is It and It's UsesNetworking is the backbone of today’s digital world, enabling communication, data sharing, and collaboration across devices and systems. Whether you're a tech enthusiast or just starting your journey, understanding networking fundamentals is crucial ...DiscussNetworkinglan vs wan
Divya Sharmavpntunnel.hashnode.dev·Dec 2, 2024Step-by-Step Guide to Creating a VPN Tunnel Using PythonIntroduction Virtual Private Networks (VPNs) are super important for keeping your communication safe over public networks. In this guide, we'll explore the details of VPN tunneling using Python and Linux's TUN/TAP interfaces. This hands-on lab activi...Kushagra Pandey and 1 other are discussing this2 people are discussing thisDiscuss·3 likes·27 readsvpn
Elinathan Olotuelinathan.hashnode.dev·Nov 22, 2024Create site-to-site connectivity from on-premises to Azure Cloud using Azure VPN.In this article, I will demonstrate how to connect on-premises infrastructure to Azure cloud via VPN and using the BGP routing protocol of choice. BGP is an optional feature for Azure Route-Based VPN gateways. It allows you to add new sites as new ne...DiscussAzure
Laksh Sharmajourney-of-modulation-techniques.hashnode.dev·Nov 17, 2024Introduction to Modulation Techniques in Computer NetworksWhat is Modulation? Modulation is a fundamental concept in telecommunications that enables the transfer of data over different types of media, such as cables or airwaves. In simple terms, modulation is the process of altering certain properties of a ...Discuss·140 likes·207 readsModulation Techniques in Computer Networks
Fizza Jatniwalafizzajatni.hashnode.dev·Nov 13, 2024UDP vs. TCP: Key Differences and When to Use Each ProtocolIn networking, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two fundamental protocols that determine how data travels between devices. Both protocols serve different purposes and cater to distinct needs, making them essent...Discussnetwork security
Mohammad Ariful Islamthe-arif-cipher.hashnode.dev·Nov 11, 2024Understanding Randomized MAC Addresses for Better PrivacyIn today’s hyper-connected world, privacy is more important than ever. Devices we carry and connect with other networks leave digital traces wherever we go, making our privacy increasingly elusive. One way that our privacy can be protected is by empl...Discuss·41 readsprivacy
J3bitokjebitok.hashnode.dev·Nov 6, 2024Introduction to Offensive Security: Network Security (TryHackMe)In this article, I will write a write-up for Network Security that covers Methodology and Practical Examples of Network Security. What type of firewall is Windows Defender Firewall? Host Firewall During which step of the Cyber Kill Chain does the a...Discussnetworking