Monthly Archives: September 2012

Acronyms of the CCNA Security Part 4 — Exploits, Attacks and Countermeasures

This article is part 4 of a series that describe the the acronyms that are likely found in a student’s CCNA Security studies. This article addresses the acronyms that are relevant in the context of Exploits, Attacks and Countermeasures. ACE … Continue reading

Posted in CCNA Security, Certification, Security, Technology | Tagged , | Leave a comment

ASA Guest Network With Limited Inside Access

Several months ago, I published an article called Using an ASA to Establish a Guest Network. While this article covered the simple concept of using a DMZ interface to create a simple Guest Network, it did not address one issue that … Continue reading

Posted in CCIE Security, CCNA Security, Certification, Security, Technology | Tagged , , | 9 Comments

Tech Field Day 4–Two Weeks and Counting…

For those that didn’t catch my tweet a couple of weeks ago, I wanted to announce that I was officially selected to attend the GestaltIT Networking Field Day Event in October. This will be my first Network Field Day event … Continue reading

Posted in Blogroll, Events, Technology | Tagged , , | Leave a comment

IPv6–The Cyclical Discussion

I think everyone knows (or should know) that IP version 4 is on its way out. The real question is when it will happen. Moreover, when will IPv6 become mainstream, reach a tipping point, and render IPv4 less relevant. This entire … Continue reading

Posted in Rant, Technology | Tagged | 2 Comments

Acronyms of the CCNA Security Part 3 — Cisco Devices

This article is part 3 of a series that describe the the acronyms that are likely found in a student’s CCNA Security studies. This article addresses the acronyms that are particularly relevant to Cisco Devices. ACS (Access Control Server)–Cisco server … Continue reading

Posted in CCNA Security, Certification, Security, Technology | Tagged , | Leave a comment

Acronyms of the CCNA Security Part 2 — Protocols and Algorithms

This article is a second in a series to help learners locate and understand the acronyms that should be found in their CCNA Security studies. Addressed below are several acronyms that deal with protocols and algorithms. ARP (Address Resolution Protocol)–protocol … Continue reading

Posted in CCNA Security, Certification, Security, Technology | Tagged , | Leave a comment

World Renowned University to Offer Free Raspberry Pi OS Course

Although not directly related to Packets, this course is certainly related to knowledge. The University of Cambridge is offering a free online course called Baking Pi. This course takes students through the development of an Operating System for the ARM … Continue reading

Posted in Blogroll, Technology | Tagged | Leave a comment

Acronyms of the CCNA Security Part 1 — Concepts and General Terms

After spending some time reviewing other IINSv2 materials, it was apparent that there are a lot of acronyms. Thinking it may be beneficial to define expand and define the terms, the list quickly became huge. As a result, I decided … Continue reading

Posted in CCNA Security, Certification, Security, Technology | Tagged , , | Leave a comment

The Legal Gridlock of Innovation

Ever used a Blackberry? If you hold down a letter, it will alternate between upper and lower case until released. Many people think this is a pretty cool feature. The iPhone does  auto-capitalization. However if its not right for the … Continue reading

Posted in Blogroll, Technology | Tagged | Leave a comment

Everyone’s Favorite Topic–Bring Your Own Device

I don’t think I’ve written anything on BYOD. This topic is one that seems to excite opinions and create lively discussions. I happened on a very good podcast on this very subject and wanted to share it. This podcast episode … Continue reading

Posted in Blogroll, Security, Technology | Tagged , , | Leave a comment

Changing Privilege Levels For Cisco IOS Commands

Over the past couple of weeks, the concept of privilege level has been addressed from the perspective of the user. This article will make use of the privilege by moving IOS commands from their default levels of 0, 1 and … Continue reading

Posted in CCNA Security, Certification, Security, Technology | Tagged , , , , | 4 Comments

Binary Math, Not That Different…

Those who have studied entry level networking are at least somewhat familiar with the concept of binary. Computers, based on registers or switches that only have two possible values, are well represented by the two possible values of a binary … Continue reading

Posted in CCNA, Certification, Rant, Technology | Tagged , | 1 Comment