Cipher (37)

Cipher

Public Key Infrastructure (PKI) Fundamentals

Public Key Infrastructure can be daunting for many administrators - knowing how to issue certificates is one thing but understanding what they actually contain is another thing entirely. Previously, data was encrypted with a key and to decrypt it, the same key was used again,…

Continue reading...
Cipher

Transport Protocols: TCP vs UDP

Almost all network traffic uses one of two transport protocols - TCP or UDP. These protocols are the base that most modern applications are built upon. Each protocol achieves the same thing - it gets data from A to B - but they do so…

Continue reading...
Cipher

Securing Company Data on Personal Phones

Protecting organisational data no longer stops on the devices handed out - most users sign in on their phones to check emails and files on the go. In some respects, this is a good thing. It saves the company money because they don’t need to…

Continue reading...
Cipher

DHCP Fundamentals

DHCP is one of the fundamental services of networks. Without it, users would need to assign their own IP address, or administrators would need to do it for them. Either way would be an administrative nightmare. IP conflicts would be commonplace. Even home networks would…

Continue reading...
Cipher

VPN Prevention on an Enterprise Network

Virtual Private Networks have become ubiquitous in the last year or so as governments start implementing restrictions on social media and other online content. If rumours are to be believed, they will soon come for VPNs themselves! I’m not convinced every user understands that using…

Continue reading...