Posts

Showing posts from September, 2021

Network Security

Image
  A ping flood DDoS attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an intruder tries to overcome a targeted device with ICMP echo requests. Typically, ICMP echo-request and echo-reply messages are used to ping a network device to diagnose the device's health and connectivity and the link between the sender and the device.  The network is forced to respond with an equal number of reply packets by flooding the target with request packets. This causes the target to become unavailable to regular traffic. A ping attack demands that the intruder knows the IP address of the destination. Attacks can be divided into three kinds, arranged by the target and how the IP address is resolved: Blind ping – This involves using an external program to reveal the IP address of the target computer or router before launching a DDoS attack. Router disclosed – the ping flood targets routers to obstruct information between computers

Computers in the Workplace

Image
  Subject:  Computer Purchase - Basic Date:  Sep 2, 2021 Contender 1:  ASUS ROG Strix G17 G713QR-XS98 - $1899 AMD Ryzen 9 5900HX 3.3GHz Processor NVIDIA GeForce RTX 3070 8GB GDDR6 32GB DDR4-3200 RAM 1TB Solid State Drive Microsoft Windows 10 Pro 10/100/1000 Network 2x2 Wireless LAN Wifi 6 (802.11ax)+Bluetooth 5.1 3" Full HD Anti-Glare IPS 300Hz Display   Contender 2:  Acer Predator Triton 500 PT515-52-77P9 - $1899 Intel Core i7-10750H Processor 2.6GHz NVIDIA GeForce RTX 2080 SUPER with Max-Q Design 8GB GDDR6 32GB DDR4-2933 RAM 1TB Solid State Drive Microsoft Windows 10 Home Killer Ethernet E3100G 10/100/1000 Network Killer Double Shot Pro Wireless-AX 1650i Bluetooth 5.0 6" Full HD Widescreen LED-backlit IPS NVIDIA G-SYNC 300Hz 3ms Overdrive Response Time Display Winner:  Contender 1:  ASUS ROG Strix G17 G713QR-XS98 - $1899.  This is the clear winner because it has a faster CPU and Graphics card.  Also the screen is bigger.  All in all a better pc.   LG 34WL85C-B.AUS 34"

Traveling Through A Network

Image
  Ping Activity: Google.com Google.com.au Google.co.jp Traceroute Activity: Google.com Google.com.au Google.co.jp The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops.  Each packet hops to a local Internet service provider, a company that offers access to the network, usually for a fee.  The next hop delivers the packet to a long-haul provider, one of the cyberspace airlines that quickly carry data across the world. This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.  For the system to work correctly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.  The final hop takes a packet to the recipient, which reassembles all packets into a coherent message. A separate message goes back through the network, confirming successful delivery. Distance and time are di

Web/Mobile App Critique

Image
  Netflix Review: Although Netflix's streaming service started as a niche offshoot of its disc-mailing service, it is now the front-runner in the category, thanks to its reliable core catalog and some of the best original programming. Netflix integrates excellent features across interfaces, allows offline downloads on mobile platforms, and features 4K content. However, with other high-profile services now available at lower prices, the expensive costs of Netflix's comparable plans stand out. Netflix has an extensive catalog of video content, but it changes all the time.  Shows available one day may be gone the next. It's difficult to state authoritatively what is in Netflix's catalog at any given moment, but that's all part of the fun. Netflix has lost many of its most-watched shows, including  The Office  (to NBC's Peacock),  Friends  (to HBO Max), and several Marvel movies (to Disney+). This is potentially dangerous new ground for Netflix since it will need to

About Me

Image
  Find a good and calm place to raise a family and put down roots.  My goal is to learn the skills needed and then assist local governments with their security needs.   We have seen increased ransomware and malware operations trying to cripple our utilities, hospitals, and police departments.  Each of us has to help each other from a humanity and morality perspective.   All it takes for evil to prevail is for good men and women to do nothing.    BlogThis! Share to Twitter Share to Facebook