Posts

Showing posts from 2016

Difference Between IPv4 and IPv6

Image
The internet is a gigantic network of computers across the globe. Billions of devices communicate with each other on daily basis to send and receive data. For instance, when you access a website, you’re communicating with the server computer hosting the website. You send a request for the website and the server sends the relevant data to you. You just don’t bump into a random server and start requesting for website data. You type the website’s name in your web browser, which, then asks the DNS server to resolve the IP address of the server where the website is hosted. Then a connection is established with the server and a request for website data is made. The website then gets loaded on your web browser. Where does the IP addresses come from? These addresses, which look like 117.4.67.12, are the internet protocol addresses assigned to every device which connects to the internet. An IP address is the identity of a device on the internet. It is also useful in routing t

Vulnerabilities of Internet of Things

Image
Internet of Things (IoT) will be one of the most important technology in today’s and tomorrow’s world. With this key technology, there will be many areas that will affect from the internet of things. The benefits of Internet of Things will be more than expected. But how about the security? Beside the benefits of Internet of Things (IoT) , it will cause huge security vulnerabilities. Innocent refrigerator can be a backdoor for malicious network attacks of hackers. We can give a lot of real world examples to internet of things vulnerabilities. One for them is about a connected car control. In July 2015, a connected car hacked by hackers and controlled remotely. Hackers entered this connected cars network and control air conditioning, radio frequencies etc. How about they tried to control the root the car? These can cause very harmful usages and maybe because of such malicious attacks, people can die or badly affected. Another example had seemed in the oil pipeline c

Biggest Companies Work on Internet of Things (IoT)

Image
Internet of Things (IoT) is the future of the technology. So, many vendors and companies will get the piece of Internet of Things (IoT) cake. These companies are the companies that are currently the main companies in technology.  1. Amazon Web Services Amazon Web Services is a cloud company and with IoT, the cloud will be more important. So, Amazon Web Services auttomatically become a key player for Internet of Things. Amazon Web Services give the analyze chance to their customers. Amazon Web Services customers can also create their of IoT application. They have different platforms to built IoT applications. These are Amazon Kinesis, Amazon S3, Amazon Machine Learning, Amazon DynamoDB, Lambda. To learn more about Amazon Web Services on Internet of Things (IoT) check AWS IoT   2. ARM To learn more about ARM on Internet of Things (IoT) check ARM IoT 3. AT&T AT&T is a Telco which can be a key company in Internet of Things market. Other Tel

Extended Access Lists

DOS & DDOS ATTACKS

Image
INTRODUCTION How they are performed and why they attract so much attention ! We won't be getting into much detail as we are just trying to give everyone a better understanding of the problem. Denial of Service attacks Denial of Service (DoS) attacks can be a serious federal crime with penalties that include years of imprisonment and many countries have laws that attempt to protect against this. At the very least, offenders routinely lose their Internet Service Provider (ISP) accounts, get suspended if school resources are involved, etc. There are two types of DoS attacks: 1) Operating System attacks:Which target bugs in specific operating systems and can be fixed with patches. 2) Networking attacks: Which exploit inherent limitations of networking and may require firewall protection. Operating System Attacks These attacks exploit bugs in a specific operating system (OS), which is the basic software that your computer runs, such as Windows or Mac OS. In gen

BGP Loop Prevention & Next Hop Self

BGP Loop Prevention by NetProtocol Xpert on Scribd BGP Next Hop Self by NetProtocol Xpert on Scribd

why CISCO & what is CCIE?

Image
Why CISCO? There are so many companies available who produce various network devices such as router, switch, firewall etc. But Cisco devices are considered to be the best in the market in quality, security, troubleshooting point of view. More over Cisco’s training structure is the best in teaching as well as learning point of view. So if anyone has the knowledge about Cisco devices then he can cope up with any other device. What is CCIE ? The Cisco Certified Internetwork Expert (CCIE) certification is accepted worldwide as the most prestigious networking certification in the industry. CCIE is also known as Doctorate in Networking. Network Engineers holding an active Cisco CCIE certification are recognized for their expert network engineering skills and mastery of Cisco products and solutions. The CCIE community has established a reputation of leading the networking industry in deep technical  networking knowledge and are deployed into the most technically challenging netw