Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ’sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our coursesour course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.  You can also join our Slack channel here!

Find and Display All Your Wi-Fi Passwords in Windows

If you have been to one of my Wireshark of Wi-Fi classes then you know I often criticize Microsoft Windows for some of its – well – inexplicable approaches to usage and security.  Here is yet another example.  Let’s say someone has a Rubber Ducky of some Arduino device that they want to plug into

Read More »

Troubleshooting The Internet Using Ping (a.k.a. ICMP)

In this article, I wanted to provide a guide to using ping – ICMP Echo – to troubleshoot your network.  Most people use ping on their platform to test if they can reach a given destination.  Just open up a terminal (Linux or MAC OSx) or command line (Windows: Start> Run> cmd) and enter the

Read More »

BGP Autonomous System (AS) Numbers

In a recent class I was asked for some details on BGP Autonomous System (AS or ASN) Numbers.  I thought I would document and provide a more complete answer here for others to learn from as well. What is the AS Number? Let’s begin with a definition.  An Autonomous System Number (AS number or simply

Read More »

Leveraging the Linux Logger

In this article I want to visit a “not used enough” Linux tool called logger.  As with managing any system, you want to accurately annotate historical events and adding entries into the system log file is a great way to accomplish this.  You can view the system log file with this command: awalding@aw-vb:~$ cat /var/log/syslog

Read More »

Linux Security Focused Commands We All Need to Use

Too many people shrug off Linux for fears of security with a free and open source operating system, even today.  For those of us who know that Linux is no less or more secure than any other operating system, we must be sensitive to this and we must be well versed in Linux commands that

Read More »

Did you learn something?
Did I save you time? 

Buy me a coffeeBuy me a coffee!

Up-coming Training

Scroll to Top