Oluwatomiwa Oguntubiogtb1.hashnode.dev·Apr 29, 2024Networks, Security and The Cloud: A PrimerThe Internet is one of the most revolutionary pieces of technology man has had access to and has being the primary driver of growth since it's creation. However, it has also enabled nefarious actors to have access to greater and greater tools while i...Discussnetwork
NwkDDLnekwokdoodle.com·Apr 22, 2024Palo Alto to Cisco Site-to-Site IPSec VPN: Connecting Branch LANsDo you want to connect your branch LANs through an IPSec VPN tunnel using Palo Alto Next-Generation Firewall and Cisco Router? You are now currently in the right place! Today I am going to show you a way to do it. Before moving to the tutorial, I rec...Discussipsec-lan-to-lan
Meghna Malviyameghna29.hashnode.dev·Apr 20, 2024The OSI Model And TCP/IP ModelWHAT IS OSI MODEL – The OSI version become the primary widespread version for community communications, followed via way of means of all essential telecommunication organizations and computer systems within side the early 1980s. The customers of a la...Discusstech
Mohamed Hegazih0kaz.hashnode.dev·Apr 14, 2024Chapter 0: Attacking Network Protocols Book Introductionبسم الله الرحمن الرحيم , اللهم صلي و سلم و بارك علي سيدنا محمد صلي الله عليه وسلم About Book: About the Author: James Forshaw is a renowned computer security researcher at Google Project Zero Book on amazon: Attacking Network Protocols: A Hacker’s ...Discuss·27 readspenetration testing
Zerihun Shiferawzerihun-shiferaw.hashnode.dev·Apr 14, 2024Everything's better with a pretty diagramDNS resolution that the request hitting server IP on the appropriate port that the traffic is encrypted that the traffic goes through a firewall that the request is distributed via a load balancer that the web server answers the request by servi...Discuss#DNS Resolution
Priyanka Sadampriyanka1218.hashnode.dev·Mar 28, 2024Building a Resilient VPC for Production Environments using AWS: A Step-by-Step GuideIntroduction In this project, we will walk through the process of creating a Virtual Private Cloud (VPC) optimized for production environments. We'll focus on enhancing resiliency by deploying servers across two availability zones using auto-scaling ...Discuss·2 likesnetwork security
Jay Tillublogs.jaytillu.in·Mar 21, 2024What are Subnets in Networking?Have you ever felt overwhelmed by the sheer number of people in your apartment building? Imagine if everyone tried to use the same elevator or squeeze into the laundry room at once. Networks can face a similar challenge, especially large ones. That's...DiscussNetworkingsubnet
Jiyajiyajha.hashnode.dev·Mar 20, 2024Unleashing Network Horizons: Charting the Path of Software-Defined Networking Amidst Technological RenaissanceUsing software-based controllers or application programming interfaces (APIs) to connect with underlying hardware infrastructure and manage traffic on a network, software-defined networking, or SDN, is a networking technique. This approach is distinc...DiscussSDN
Jay Tillublogs.jaytillu.in·Mar 19, 2024What is Security Zones in Networking?In networking, security zones refer to segregated areas within a network that have specific security policies and controls applied to them based on the level of risk and sensitivity of the resources they contain. Security zones are a fundamental aspe...DiscussNetworkingcyber security
Jay Tillublogs.jaytillu.in·Mar 18, 2024What is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussNetworking#cybersecurity