DS - pythonds3 - 1. Introduction
DS - pythonds3 - 1. Introduction 1.5. Why Study Data Structures and Abstract Data Types? 1.8. Getting Started with Data 1.8.1. Built-in Atomic Data Types ...
DS - pythonds3 - 1. Introduction 1.5. Why Study Data Structures and Abstract Data Types? 1.8. Getting Started with Data 1.8.1. Built-in Atomic Data Types ...
Phishing (S+ 7th ch10) Vishing overview Vishing overview combine phishing with Voice over IP (VoIP) Although crank calls have been in existence since the invention o...
Phishing (S+ 7th ch10) Phishing 网络仿冒 overview Type of phishing Goals of phishing New Phishing Attacks soluti...
Pharming 网络嫁接 overview Pharming 网络嫁接 overview Similar in nature to e-mail phishing, pharming seeks to obtain personal information by domain spoofing. ...
[toc] book: security+ 7ch CISSP chap13 Control Types CompTIA lists the following control types in the objectives: TAP principle: Technical controls use technology. ...
[toc] Intrusion detection system (IDS) IDS basic software / hardware system detect signs of malicious activity on network or individual computer. IDS is designed to detect: threats...
[toc] IDSs and IPSs basic When attacker launches an attack against a network, intrusion detection system (IDS) and intrusion prevention system (IPS) technologies are often able to recogni...
[toc] IDS Evasion Techniques “A look at whisker’s anti-IDS tactics” by Rain Forest Puppy (https://www.apachesecurity.net/archive/whiskerids.html) “IDS Evasion Techniques and Tactics” by Kevi...
Calico calico basic Calico 优势 与 劣势 Calico架构 Calico 网络模式 BGP 边界网关协议 Calico BGP 概述 BGP两种模式 ...
[toc] Border Gateway Protocol (BGP) The goal of Inter-domain routing to find loop free path to the intended destination. concerned with reachability than optimality Finding path anywhe...
[toc] Basic Routing Processes From N+ Chapter 6 PC1 needs to send traffic to Server1: devices are on different networks. How packet from source IP address 192.168.1.2 g...
[toc] Autonomous System (AS) AS autonomous system 自治系統 a network under a single administrative control. Assumes the Internet is an arbitrarily interconnected set of AS’s. local ...
[toc] NetworkSec - Layer 3 - Router **each port 1 collision domain, 1 broadcast/port ** Router makes decisions based on logical network address (like IP address) has the capab...
[toc] NetworkSec - Layer 3 - Access control lists (ACLs) ACLs Access control lists (ACLs): rules implemented on a router / firewalls. Rules within an ACL provide rule-based ...
IP Internet Protocol (IP) Routing IP Packets The Structure of the Internet IP packet Header IPv4 Binary Numbering IPv4 Addressing ...