The OSI Model | Fundamentals

When you encounter complex technologies, you need to simplify the process by breaking it down into simple, isolated processes and actions. This is done by using a network model. Practice is important but without a guideline/roadmap you might get stuck or come up with a solution that is not the most optimal one.  

(more…)

0 Comments

802.1X Security | Part 2

Most companies do not have an extra security layer when a client computer connects to the wired network. When connecting to a network, the client computer receives an IP from a DHCP (Domain Host Configuration Protocol: the “IP generator”). At this point, a client computer is not identified or authenticated on a wired network and attacks based on the hacker’s knowledge can be launched.  

(more…)

0 Comments

802.1X Security | Part 1

As part of the global trending increase in cloud data consumption, Gartner predicts that by 2023 80% of enterprises will also adopt two or more cloud-based security services. In this category, enterprises have shifted from using on-premises Active Directories to cloud-delivered Active Directories.

(more…)

0 Comments

Local Area Networks | Part 1

When I was a kid, once in a while I joined a local “LAN Party”. A LAN party is an event where people get together with computers or compatible game consoles, where a Local Area Network (LAN) connection is established between the devices. The main purpose of these LAN parties is to play multiplayer video games together.

(more…)

0 Comments