Surfing the cyber industrial complex

My Latest Posts


  • Internet Protocol, IP Addressing and Binary
    Networked computers use a logical addressing scheme called IP, or Internet Protocol, to identify themselves on a network. IP addresses are 32 bit values that can be rewritten and reused as long as they are unique. They can be designated by the local network. This is in contrast to burned in MAC addresses which, while… Read more: Internet Protocol, IP Addressing and Binary
  • TCP and UDP
    Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are the two most common Layer 4 protocols. TCP is connection oriented. Data is sent bidirectionally once a connection is established. TCP uses sequencing to make sure segments are proccessed in the correct order and are not missed. TCP is reliable and sender and receiver create… Read more: TCP and UDP
  • I, Twitterbot
    Twitterbots are automated programs that tweet (post text messages) on the social media site Twitter. They can autonomously respond to questions or statements directed toward them, they can search out certain keywords or phrases and send an unsolicited response, or they can be set to generate spontaneous tweets at specified intervals. They can also like… Read more: I, Twitterbot
  • Network Architectures
    When networks are connected linearly (aka daisy chained), they can cause spanning tree loops and have single points of failure that can sever connections and take down the entire network. Networks should be structured in a way that minimizes these failures. Two Tier Architecture aka Distribution Model The two tier model is the best way… Read more: Network Architectures
  • Cisco IOS Commands
    Cisco pioneered friendly command line interfaces. Don’t be afraid to hit enter. Configuration Modes Think of modes as different rooms with different command options available in them. Certain commands are available in several modes but higher level commands are exclusive to higher modes. User Mode – Basic access. Indicated by > symbol. User mode is… Read more: Cisco IOS Commands
  • Connecting and Configuring Cisco IOS Devices
    The first connection of a network device is the console connection. Console connections, aka out-of-band connections aka local management connections are used to help get the device ready to connect to the network. Often you can connect your work station or laptop directly into the device using a serialized port on the work station and… Read more: Connecting and Configuring Cisco IOS Devices
  • Cisco OSI Introduction
    OSI Model The Open Systems Interconnection (OSI) is used to describe network communication and how different network components work together. The TCP/IP model is the preferred network protocol stack. OSI is the preferred reference model for study because it is better at illustrating how networking is structured. The OSI model has 7 Layers: Physical, Data… Read more: Cisco OSI Introduction
Design a site like this with WordPress.com
Get started