Wireshark is a great tool to see the OSI layers in action. I use a VM to start my Window 7 OS, and test out Wireshark, since I have a mac. I start Wireshark, then go to my browser and navigate to the google site.
Info:
This week, I am learning about Class and OOP in Ruby. I will make a small tamagotchi game as personal practice. My goal is to create a “Queer Tamagotchi Interactive Game” that questions the user’s own identity and personalbeliefs…
I’ve been experimenting with chucK, a programming language for musicians. The heart of chucK is time. This is helps me understand more about concurrency, or simultaneously running several processes at once. I know Java and C# have a shared-memory concurrency model. Some modern languages like…
I’ve been interested in networking for a while and I want to be more serious. Sure reading a few books of networking and pentesting is great, but the best advice people in IT can give me is to get certified. I find it hard to commit to something unless there is a clear goal. I need…
Prompt:
Implement Array#pad and Array#pad!.
Each method accepts a minimum size (non-negative integer) and
an optional pad value as arguments.
On July 27th to July 30th, I was at Defcon 25. Here are my top 8 takeaways.
It was 2001, and I had received my first NetZero promotional CD in the mail that promises 10 free hours of internet per month. Ten. Full. Hours. My parents were working class and had to make hard decisions between food and clothing, so services…
Now I have some free time to get back to some old hobbies. Meet Q, my little friend. Q is shy and kind of clumsy but zhe’s only a day old. All the C-code overloading zer brain. (Q is prefer not to stick to our usual gender binary so we will stick with “z” gender pronoun). Q is…
Today is my first day!!!!! W0ooo.
I say goodbye to the world with a gmail vacation message:
Dear reader,
I will be away for the next 9 weeks to work on an important assignment. I am in…
Network+ Objectives:+ clasisfy apps, devices, and protocols related to the OSI layers for encryption devices+ common networking protocols: HTTPS, NTP, SNMP 2/3. SSH+ given a scenario, use appropriate networking monitoring resource to analyze traffic SNMP, SNMPv2, SNMPv3+…