-
Configuring Port Security
Mar 31, 2011 · 3 min read · Access control Catalyst switch CCENT CCNA CCNA Security Cisco cisco Cisco IOS ICND1 ICND2 MAC address networking Port security router security software technology tutorial Tutorials ·Secure Today this tutorial is going to be talking about how to configure port security on a Cisco Catalyst switch. Port security is one of the first things you can do to keep your network secure from unauthorized access. Port security can restrict devices so only devices you allow are granted access to network …
Read More -
Collision Domains vs Broadcast Domains
Mar 30, 2011 · 5 min read · Broadcast domain Broadcast Domains CCENT CCNA Cisco cisco Collision Domains Data Communications ICND1 ICND2 Internet MAC address Network performance networking technology tutorial ·These different types of domains mean different things and when designing a LAN both of these domains can harm the performance of your network. If you are not aware of the difference between these two, this tutorial should help you out. If you have a small network at your home there is usually the router/modem that is …
Read More -
How a Router Routes
Mar 16, 2011 · 5 min read · ARP CCENT CCNA Cisco cisco computers ICND1 ICND2 Internet Protocol IP address MAC address networking Protocols router Subnetwork technology tutorial Tutorials ·This tutorial will be going over the basic information of how a router routes IP packets. Routers are used in the OSI layer three or the network layer. These routers have IP addresses and forward IP packets to the proper destination. This guide is somewhat basic and is assuming you have some information of how IP …
Read More -
Cracking WEP
Mar 14, 2011 · 3 min read · Aircrack-ng backtrack computers Linux MAC address Network security networking operating systems security Software software tutorial Tutorials Wi-Fi Wired Equivalent Privacy wireless ·BackTrack is Linux network security audit tool for security professionals. This tool is used for testing and penetrating networks. That being said** This tutorial is for educational use only. This is meant only to teach that WEP is an insecure option, and is recommend to use a harder encryption. Using this tutorial on …
Read More