The network category covers a huge plethora of topics; from the OSI 7 model, IP and CIDR formats, down to scanning host machines, port scanning and denial of service attacks. Where possible I’ve also tagged networking categorised articles into various protocols, such as the main Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Equally some articles will be tagged for which layer of the Open Systems Interconnection 7 model they belong to; application, presentation, session, transport, network, data link or physical.

What is a UDP Flood Attack (DoS)

by Paul Joyce

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targets; now we’re talking about UDP which doesn’t work on the 3 way handshake of TCP. One benefit of […]

Tags: , , , ,

How to do Port Scanning with Nmap

by Paul Joyce

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system administrators should know about this tool, its very helpful in debugging certain networking problems. It is however predominantly […]

Tags: , , , , , ,

How to remember the OSI 7 model in order

by Paul Joyce

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model are found in matters hugely; needless to say you in certain IT roles you cant afford to forget where the data link layer occurs, or which layer comes before another, etc. Remembering the correct order […]

Tags: , ,

What is a TCP SYN Flood Attack (DoS)

by Paul Joyce

Today we’re looking at a specific type of DoS attack; the SYN flood denial of service attack. Although this type of attack can just as equally be performed as a DDoS attack, the examples we’ll use are for a standard single-source denial of service. A SYN-flood attack works by consuming resources on the targets machine […]

Tags: , , , ,

Explaining Denial of Service Attacks

by Paul Joyce

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Tags: , , , , ,

Information on Layers of the OSI-7 Model

by Paul Joyce

What is the OSI-7 model? The Open-System Intercommunication model describes how the network communication layers are distinct and separate from one another. There are a few different network layer models, however this article only talks about the OSI-7 model. The OSI-7 model breaks the communication layers as follows (The physical layer is called the bottom […]

Tags: , , ,

Shared Hosting > Leverage Browser Caching

by Paul Joyce

We all know that faster websites are better websites. Not necessarily better quality, as the Internet is full of drivel, but Google and Bing love fast websites. If you can serve fast content, they’ve openly admitted you’ll do better in their search rankings. Better ranking means more readers/subscribers/buyers/moneys. It’s meant an improvement for this WordPress […]

Tags: , , ,

Raspberry Pi Day3: Configuring and connecting securely and remotely with SSH

by Paul Joyce

The other day I managed to mount the Raspberry Pi OS image onto an SD card and the Pi had its first taste of life. Now I’m going to attempt to set-up remote secure connections to the Pi so I can do away with the keyboard, mouse and monitor attached to the experimental hobby PC. […]

Tags: , , , ,

Cant enter Linux Wireless Password

by Paul Joyce

Okay so a nice short article on something that was causing me a lot of grief! I came home from work and for some reason unknown to me, over the course of the day my laptop had lost the WPA (WiFi Protected Access) code to connect securely with my home wireless network. Okay a little […]

Tags: , , , , ,

FTP Connection failure with EAI_NONAME error

by Paul Joyce

While trying to use FileZilla FTP client the other day, I copied in a clients details to the configuration panel, hit connect and was shown the following error: Status: Resolving address of XYZ Status: Connection attempt failed with “EAI_NONAME – Neither nodename nor servname provided, or not known”. Error: Could not connect to server Now […]

Tags: , , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+