Laksh Sharmajourney-of-modulation-techniques.hashnode.dev·Nov 17, 2024Introduction to Modulation Techniques in Computer NetworksWhat is Modulation? Modulation is a fundamental concept in telecommunications that enables the transfer of data over different types of media, such as cables or airwaves. In simple terms, modulation is the process of altering certain properties of a ...Discuss·140 likes·199 readsModulation Techniques in Computer Networks
Laksh Sharmajourney-of-modulation-techniques.hashnode.dev·Nov 17, 2024Introduction to Modulation Techniques in Computer NetworksWhat is Modulation? Modulation is a fundamental concept in telecommunications that enables the transfer of data over different types of media, such as cables or airwaves. In simple terms, modulation is the process of altering certain properties of a ...Discuss·140 likes·199 readsModulation Techniques in Computer Networks
Fizza Jatniwalafizzajatni.hashnode.dev·Nov 13, 2024UDP vs. TCP: Key Differences and When to Use Each ProtocolIn networking, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two fundamental protocols that determine how data travels between devices. Both protocols serve different purposes and cater to distinct needs, making them essent...Discussnetwork security
Mohammad Ariful Islamthe-arif-cipher.hashnode.dev·Nov 11, 2024Understanding Randomized MAC Addresses for Better PrivacyIn today’s hyper-connected world, privacy is more important than ever. Devices we carry and connect with other networks leave digital traces wherever we go, making our privacy increasingly elusive. One way that our privacy can be protected is by empl...Discuss·39 readsprivacy
J3bitokjebitok.hashnode.dev·Nov 6, 2024Introduction to Offensive Security: Network Security (TryHackMe)In this article, I will write a write-up for Network Security that covers Methodology and Practical Examples of Network Security. What type of firewall is Windows Defender Firewall? Host Firewall During which step of the Cyber Kill Chain does the a...Discussnetworking
Aboelhamd Abdellatifaboelhmd.com·Nov 6, 2024Beginner Cybersecurity Tools: A Practical Guide to Wireshark, Nmap, and MetasploitIntroduction In the world of cybersecurity, tools like Wireshark, Nmap, and Metasploit are essential starting points for anyone looking to understand networks and digital security. Whether you're a novice eager to explore network analysis, scanning, ...Discuss#CyberTools
Shivain Sharmashivain.hashnode.dev·Nov 3, 2024Key Strategies for Digital Privacy: A Guide to Zero Trust ArchitectureEver wondered how companies are locking down sensitive data and keeping hackers at bay in today’s digital age? That’s where Zero Trust Architecture (ZTA) comes in—a revolutionary approach that’s reshaping how organizations protect their networks. Ins...Discuss·3 likesdigital privacy
Ronald Bartelshubandspoke.amastelek.com·Nov 2, 2024🔒Key Components of a Self-Assessed Network Security Audit Checklist🛡️Here’s a comprehensive checklist to help guide businesses through a self-assessed network security audit. Each section covers critical areas of network security, from architecture to employee training, designed to address potential security gaps. 1....Discusscybersecurity
J3bitokjebitok.hashnode.dev·Oct 25, 2024Networking: Networking Secure Protocols (TryHackMe)In this article, I will write a write-up for Networking Core Protocols that covers how TLS, HTTPS, SMTPS, POP3S & IMAPS, SSH, SFTP & FTPS, and VPN can secure your network traffic. What is the protocol name that TLS upgraded and built upon? SSL Whic...Discuss·158 readsnetworking
J3bitokjebitok.hashnode.dev·Oct 25, 2024Networking: Networking Core Protocols (TryHackMe)In this article, I will write a write-up for Networking Core Protocols that covers DNS: Remembering Addresses, WHOIS, HTTP(S): Accessing the Web, FTP: Transferring Files, SMTP: Sending Email, POP§: Receiving Email and IAMP: Synchronizing Email. Whic...Discussnetworking
Abdulkader Alrezejipv6spot.hashnode.dev·Oct 24, 2024Captive Portal IPv6 SupportProject link on GitHub: https://github.com/abdulkader-alrezej/ipv6spot IPv6Spot a pioneering captive portal system designed exclusively for IPv6 networks. Developed by Abdulkader Alrezej, IPv6Spot addresses the critical need for effective network acc...Discussnetworking