Demultiplexing and How It Works
In this article I will explain demultiplexing and how it works by walking through a .pcap file taken from the lab in the screenshot below. We will focus on the data…
0 Comments
03/01/2017
In this article I will explain demultiplexing and how it works by walking through a .pcap file taken from the lab in the screenshot below. We will focus on the data…
C.I.A: Important letters in the world of information security and you will find it in many books and articles when studying for certifications. So what is the CIA triad and…
Earlier this week I delivered a presentation about UTM's to businesses on the Isle of Man. This lightning presentation was aimed to give a brief overview of Unified Threat Management…
In this article I would like to explore DHCP requests so that we can understand what happens when a device sends a request to a DHCP server. Lets start by listing…