Cyber Security and Network Administration

Cipher

VPN Prevention on an Enterprise Network

Virtual Private Networks have become ubiquitous in the last year or so as governments start implementing restrictions on social media and other online content. If rumours are to be believed, they will soon come for VPNs themselves! I’m not convinced every user understands that using…

Continue reading...
Cipher

A Practical Guide to IPv6

IPv6 has been around for decades now. The reasons for it are well known; IPv4 simply does not have enough address space to accommodate the modern internet. A quick recap - an IPv4 address is 32 bits, which equates to roughly 4.3 billion unique addresses.

Continue reading...
Cipher

Wireshark Display Filters

This is a list of Wireless display filters for various functions. I am adding to it all the time. Filter for most standards and protocols just with the name, for example: Wireshark supports thousands of standard names. DNS Description Filter Query dns.qry.name contains google QoS…

Continue reading...
Cipher

Routing Protocols

Routing is the key to moving data between networks in the most efficient way. For it to be successful, routers need to know how to get to multiple destinations, so they can send a packet down the correct path. If you think of a data…

Continue reading...
Cipher

Spanning Tree Protocol (STP)

Redundancy is the key to a happy life. Never put all your eggs in one basket, relying on a single piece of equipment to keep users online. This includes network cables and switches. If all the traffic has to get back to the core of…

Continue reading...