Types of Bluetooth Attacks
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes gateway protocols or routing protocols on computer networks. All of them are within OSI layer 3. List of Network Routing Protocols Overall list of network routing protocols: The two main categories of network routing protocols are: Interior…
This post summarizes some standards and implementations of Directory Services. List of Directory Services X.500 X.500 is a set of standards related to directory services. One of them is Directory Access Protocol (DAP). It is based on OSI (Open Systems…
This post explains briefly what is a domain name system (DNS). Device Network Identifier Devices in a network are identified based on a different identifiers: This post explains how domain names are used using the domain name system (DNS). In…
This post explains how to activate bluetooth tethering from an Android device and then connect a Windows 10/11 computer to it, so it makes use of the Android’s device internet connection. Steps on how to connect a Windows 10 computer…
This post lists some of the main Content Distribution Networks (CDNs). List of Content Distribution Networks (CDNs) List of Content Distributions Networks (CDNs): Cloudflare Akamai Amazon CloudFront CacheFly Lumen CDN Cloudflare Akamai Amazon CloudFront CacheFly …
This post lists some anonymity networks: Tor / Onionland Freenet I2P ZeroNet Tor / Onionland Tor network is sometimes known colloquially as “onionland” because of the onion routing technology it uses. Official website Freenet Official website I2P Official website ZeroNet…
This post summarizes the most common Virtual Private Network (VPN) protocols. VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution, and it…
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
Do you thing an outsider is using your network? How to see which Devices are connected to a Network Method 1: Check it from router For this method, you need to have access to the router, and know its credentials.…