Skip to content
crmnuggets

CRMNUGGETS

Close Button
  • Home
  • CRM
    • SCRUM
    • ITIL 4
  • ABOUT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • PROJECT MANAGEMENT
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Free SEO Audit

Home

Understanding MAC Addresses And IP Addresses

MAC Addresses And IP Addresses: Highlighting The Facts

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:19 pm

In my previous article, I have talked much about how data travels across the network. In this article, I want to talk more about MAC addresses and IP Addresses. Follow me as we will look…

Read More
Understanding How Address Resolution Protocol Works

Address Resolution Protocol: How It Works

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:18 pm

If your network is using the IPv4 communications protocol, the Address Resolution Protocol, or ARP, is what you need to map IPv4 addresses to MAC addresses. This topic explains how ARP works. Every IP device…

Read More
Examining Transport Layer Characteristics In Networking

Examining Transport Layer Characteristics In Networking

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:16 pm

Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications running on different hosts. This may include services such as…

Read More
Discussing Transport Layer Session Establishment

Transport Layer Session Establishment: How It Is Done

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:14 pm

You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. In this topic, you will also learn about the TCP…

Read More
Understanding Dynamic Host Configuration Protocol

Understanding Dynamic Host Configuration Protocol

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:13 pm

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is referred to as dynamic addressing. The alternative to dynamic addressing…

Read More
The Truth About Domain Name Service

The Truth About Domain Name Service

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:11 pm

The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets. On the internet, these domain names are much easier for people to remember than…

Read More
Quotes on Marketing Automation To Help You Boost Your Business

Roles Of End Devices In The Network Process

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:10 pm

  The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication,…

Read More
Insight Into Packet Forwarding Decision Process

Insight Into Packet Forwarding Decision Process

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:09 pm

Now that the router has determined the best path for a packet based on the longest match, it must determine how to encapsulate the packet and forward it out to the correct egress interface. The…

Read More
8 General Security Practices For Home Networking

8 General Security Practices For Home Networking

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:24 pm

When it comes to general security breaches, home networks are the most susceptible to attacks. The reason is that home network users always have the mindset that they have nothing that the hacker will be…

Read More
Understanding IP PDU Details For IPV4 And IPV6

Understanding IP PDU Details For IPV4 And IPV6

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:24 pm

IP was designed as a Layer 3 connectionless protocol. It provides the necessary functions to deliver a packet from a source host to a destination host over an interconnected system of networks. The protocol was…

Read More
Highlighting Various Network Security Monitoring Tool

Highlighting Various Network Security Monitoring Tool

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:22 pm

  In this article, I want to look at common network security monitoring tools in cybersecurity. Follow me as we look at this together in this article. Common tools that are used for network security…

Read More
Analysing Network Security Topology In Cybersecurity

Analysing Network Security Topology In Cybersecurity

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:21 pm

“All networks are targets” is a common adage used to describe the current landscape of network security. Therefore, to mitigate threats, all networks must be secured and protected. This article will look at network security…

Read More
The Impact Of COVID-19 On Developing Countries

Analysing Denial Of Service Attack In Cybersecurity

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:20 pm

A Denial of Service (DoS) attack creates some sort of interruption of network services to users, devices, or applications. In this article, I want to discuss all that you need to know about the Denial…

Read More
Understanding Reconnaissance Attacks In Networking

Reconnaissance Attacks In Networking: How It Works

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:18 pm

  Reconnaissance is information gathering. It is analogous to a thief surveying a neighbourhood by going door-to-door pretending to sell something.   What the thief is actually doing is looking for vulnerable homes to break…

Read More
Understanding The Evolution Of Security Tools

Understanding The Evolution Of Security Tools

18 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 3:16 pm

Ethical hacking involves using many different types of tools to test the network and end devices. To validate the security of a network and its systems, many network penetration testing tools have been developed. However,…

Read More
Differences Between A Hacker And A Threat Actor

Differences Between A Hacker And A Threat Actor

18 August, 2022 Adeniyi Salau 0 Comments COMPUTER SECURITY 3:15 pm

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones, tablets, and more. In this…

Read More
Use Of Access Control List In Networking

Use Of Access Control List In Networking

18 August, 2022 Adeniyi Salau 0 Comments COMPUTER SECURITY 3:13 pm

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When configured, ACLs perform the following…

Read More
Differences Between Wireless And Wired LANs

Differences Between Wireless And Wired LANs

18 August, 2022 Adeniyi Salau 0 Comments COMPUTER SECURITY 1:38 pm

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN…

Read More
Guidelines For Ensuring Credit Card Safety

Guidelines For Ensuring Credit Card Safety

16 August, 2022 Adeniyi Salau 0 Comments CYBER SECURITY 6:07 pm

  In my previous article, I talked about how online shopping has made life easy for people making transactions online. Despite the fact that it is very easy to make transactions online using credit and…

Read More
Some Facts To Know Virtual LANs Generally

Some Facts To Know Virtual LANs Generally

1 August, 2022 Adeniyi Salau 0 Comments COMPUTER SECURITY 9:18 am

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to…

Read More

Posts pagination

Previous page Page 1 … Page 79 Page 80 Page 81 … Page 88 Next page

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

Search

HOST WITH REST OF MIND

truehost

HOST WITH REST OF MIND

truehost

Categories

  • AG Daily Devotional
  • Assemblies Of God Adult Manual
  • Assemblies of God Teen Manual
  • BAT CAMPAIGN
  • BUSINESS CONTINUITY MANAGEMENT
  • COMPUTER SECURITY
  • CRM
  • CRYPTOCURRENCY
  • CYBER SECURITY
  • DIGITAL MARKETING
  • FEATURED
  • ITIL 4
  • KEDI HEALTHCARE
  • MFM 70 DAYS FASTING
  • PRAYER PASSPORT
  • PROJECT MANAGEMENT
  • RCCG HOUSE FELLOWSHIP MANUAL
  • RCCG SOD
  • RCCG SUNDAY SCHOOL MANUAL
  • RCCG SUNDAY SCHOOL TEACHERS
  • SCRUM
  • SPONSORED POSTS
  • STC 30
  • Uncategorized
  • VIDEOS
  • YOUTUBE VIDEOS

SEO Enterprise WordPress Theme By Themespride