Nachiket Patelplasmorix.hashnode.dev·Dec 15, 2024Wi-Fi Hacking: Deauthentication AttackDisclaimer: This blog is intended solely for educational and ethical purposes. The information provided here is aimed at raising awareness about cybersecurity threats and promoting the importance of securing wireless networks. All activities were con...30 readsDeauthentication Attack
Vedanand Royved07.hashnode.dev·Dec 14, 2024OSI Model and Network Security1. Physical Layer Threats: Eavesdropping: Someone secretly listens in or intercepts the data being transmitted. Tampering: Physically damaging or accessing network equipment like cables or routers. Interference: Signals get disturbed by external e...5 likesOSI Model
Aboelhamd Abdellatifaboelhmd.com·Dec 11, 2024The Rise of Fileless Cyber Attacks: What You Need to KnowIn the ever-evolving world of cybersecurity, one type of attack has gained notoriety for its ability to evade traditional defenses: fileless attacks. These stealthy incursions have shifted the paradigm of cyber threats by exploiting legitimate tools ...#FilelessAttacks
Adekunle Fatundecore-architectural-components-of-azure.hashnode.dev·Dec 11, 2024How to attach DDoS to VNETBefore we discuss the topic, let us delve into creating a DDoS protection plan. What is an Azure DDoS protection plan? An Azure DDoS Protection Plan is a service that guards against Distributed Denial of Service (DDoS) assaults on your Azure services...virtual-network
Md Shahed Fardousblog.shahedfardous.com·Dec 6, 2024Essential Networking Terminology: A Practical Guide with Real-World ExamplesHave you ever wondered how your Netflix stream reaches your TV, or how your email finds its way to the correct recipient? Understanding basic networking terminology is the key to unlocking these mysteries. In this guide, we'll break down essential ne...Networkingnetworking
Md Shahed Fardousblog.shahedfardous.com·Dec 4, 2024Beginner's Guide to Networking: What Is It and It's UsesNetworking is the backbone of today’s digital world, enabling communication, data sharing, and collaboration across devices and systems. Whether you're a tech enthusiast or just starting your journey, understanding networking fundamentals is crucial ...Networkinglan vs wan
Divya Sharmavpntunnel.hashnode.dev·Dec 2, 2024Step-by-Step Guide to Creating a VPN Tunnel Using PythonIntroduction Virtual Private Networks (VPNs) are super important for keeping your communication safe over public networks. In this guide, we'll explore the details of VPN tunneling using Python and Linux's TUN/TAP interfaces. This hands-on lab activi...3 likes·35 readsvpn
Elinathan Olotuelinathan.hashnode.dev·Nov 22, 2024Create site-to-site connectivity from on-premises to Azure Cloud using Azure VPN.In this article, I will demonstrate how to connect on-premises infrastructure to Azure cloud via VPN and using the BGP routing protocol of choice. BGP is an optional feature for Azure Route-Based VPN gateways. It allows you to add new sites as new ne...Azure
Laksh Sharmajourney-of-modulation-techniques.hashnode.dev·Nov 17, 2024Introduction to Modulation Techniques in Computer NetworksWhat is Modulation? Modulation is a fundamental concept in telecommunications that enables the transfer of data over different types of media, such as cables or airwaves. In simple terms, modulation is the process of altering certain properties of a ...140 likes·209 readsModulation Techniques in Computer Networks
Fizza Jatniwalafizzajatni.hashnode.dev·Nov 13, 2024UDP vs. TCP: Key Differences and When to Use Each ProtocolIn networking, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two fundamental protocols that determine how data travels between devices. Both protocols serve different purposes and cater to distinct needs, making them essent...network security