Recently Updated Pages
Wifi Encryption Standards
lockdown! lockdown! this is a (maybe) drill! lockdown! lockdown! Wifi networks need to be configu...
Band Steering
yes we need to shut down three lanes of traffic to fix this pothole Many Wifi access points have ...
Infrastructure Network
i am tired of taking notes let me out of here Wireless Access Points are configured to use a MAC ...
Wireless Range and Signal Strength
signal jamming but instead it's wifi Wifi-enabled devices should have an indoor range of 100 feet...
Wireless Surveys
i need a map that dictates where all the ______ people are Range, interference, and signal streng...
IEEE 802.11a
the first wifi standard of all time i think Wireless radios are configured to use a frequency ban...
Network Security Zones
separate but NOT equal mwahahahaha Effective placement of security appliances depends on segmenti...
Content Filtering
im so tired i can't do this anymore i can't think Content filtering can apply Application layer f...
Device Hardening
the device needs to be rock hard Hardening is basically making any device secure against tamperin...
Network Access Control
you better be able to trust your network administrators (i.e. pay them well) Network Access Contr...
IEEE 802.1X
what if i just used a specific port and trusted everything on that 802.1X: Port-Based Network Acc...
Advanced VLAN Configuration
i need a superhighway that destroys all the poor neighborhoods but instead it's a network ok so s...
Access Control
license and registration please Access Control Systems govern how subjects and principals interac...
Authentication Providers
oh yes we all need government-issued digital IDs that compromise all forms of privacy and are pro...
Network Federation
what if people that aren't exactly employees need to access the company network This idea is call...
DHCP Snooping
i need a soviet grade wiretap for spying on the white house in the form of a trojan horse This wa...
Common Security Terminology
911 hehehehehehehehehe fnuuy CIA and FBI i mean VTR Confidentiality, Integrity, and Availability ...
Encryption
keys. lots of keys. you have the two big boys of encryption. Encryption Algorithm A function that...
VLAN Hopping Attacks
what am i a frog VLAN hopping is designed to send packets that escape the current VLAN. This is d...
MAC Flooding
i have the flipper zero to spam light changes at traffic lights While other on-path attacks like ...