Author name: Andrew Walding

My short bio can be viewed here: https://www.evernote.com/l/AKglxPOzlV9E7LHKvPsGzgs-SY3McII8E24

Recognizing WLAN Retransmissions is a Critical Skill

Retransmissions of frames in WLANs (Wireless Local Area Networks) can become problematic for several reasons, primarily due to the nature of the wireless medium. While retransmissions are a necessary part of ensuring data integrity in unreliable networks, they can cause inefficiencies and degrade network performance. I will get to the details below, but let’s start

Recognizing WLAN Retransmissions is a Critical Skill Read More »

Automatically Switch Configuration Profiles in Wireshark

As most of my readers, students, and clients know, I absolutely love Wireshark. I deeply am infatuated with Wireshark’s Profiles, more properly called configuration profiles. So much so that many years ago now, I set up the first Wireshark Profiles Repository. 100’s of thousands of downloads have resulted, and I hope I have helped the

Automatically Switch Configuration Profiles in Wireshark Read More »

What is, and how can you use hping3?

A CLEAR WORD OF CAUTION – ONLY USE THIS TOOL WHERE YOU HAVE PERMISSION. THIS ARTICLE IS OFFERRED FOR LEARNING PURPOSES ONLY. Hping3 is a network tool designed for packet crafting and analysis, similar to Scapy but with a more command-line-oriented interface. It is often used for testing and troubleshooting network infrastructure, performing security assessments,

What is, and how can you use hping3? Read More »

Configuring Windows Firewall Rules using netsh

Windows Firewall allows you to control the traffic entering and leaving your system through various rules. You can create and configure firewall rules to permit or block specific network activities. Below are some examples of Windows Firewall rules, including inbound and outbound rules: Example 1: Allow Inbound Traffic on a Specific Port (e.g., HTTP –

Configuring Windows Firewall Rules using netsh Read More »

What are some examples of Physical Layer Threats in Networking?

A great question in my two day Security class recently. The physical layer (Layer 1) of the layered model is responsible for the transmission of raw data bits over a communication medium. Although it is often considered more secure due to its reliance on physical components, it is still vulnerable to a variety of threats.

What are some examples of Physical Layer Threats in Networking? Read More »

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top