Blog

Certification :: How I Prepare for Cisco Certifications

Over the last few months I’ve received many question about certifications, two of which were; How do I prepare for certification exams and what material do I use? Instead of replying to everybody on an individual basis, I have dedicated…

Kali Linux :: CAM Table Overflow Attack Demonstration

As part of my on-going studying for the CCNA Security 210 – 260 certification I have been exploring different types of network attacks, one of which is CAM table overflow attacks. In this article I would like to share what…

Cisco :: MD5 Password Cracking with Kali Linux

In this article, I would like to highlight the importance of using complex passwords when hashed with the MD5 128-bit algorithm. I will demonstrate the cracking of MD5 salted passwords using Kali Linux and a password cracking tool, John the…

Cloud Based Protection With Immunet

We all have traditional anti-virus solutions installed on our computers to protect from harmful viruses these days. These traditional anti-virus solutions are installed on your computer along with virus definitions (signatures) and require updating regularly to ensure you are protected…

Can RansomFree Protect You Against Ransomware?

  According to ZDNet, the cost of Ransomware hit $1 billion in 2016. Businesses and unsuspecting users were hit with popular ransomware such as Locky and Crylocker and found themselves locked out of their own systems. Many of those affected by…