• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    Wireless, Virtual, Cloud, & Mobile Networking–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 15, 2021 /

    Wireless, Virtual, Cloud, & Mobile Networking Wireless Networking (Note:Ad-hoc networks are Wi-Fi networks comprised only of peer computers.) Intro To 802.11–uses radio waves to transmit info between nodes. A WAP (Wireless Access Point) is a bridging device that connects into an Ethernet network & communicates via radio waves to wireless clients. A WAP has a SSID (Service Set Identifier), a word or phrase used to connect wireless devices to the WAP device. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the method used to prevent wireless collisions. Almost all devices & gadgets today have wireless NICs built-in to them! 802.11 Standards Early wireless standards were 802.11b (2.4-GHz) and 802.11a…

    read more
    Aaron Comments Off on Wireless, Virtual, Cloud, & Mobile Networking–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    You May Also Like

    LinkedIn Learning Path–Comp TIA A+ and Network + Courses…

    December 30, 2020

    Random Number Generation–Functions–STRUCTURED PROGRAMMING Course Notes

    May 27, 2021

    Windows OS Under the Hood–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021
  • Tech

    Remote Connectivity–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021 /

    Remote Connectivity Telephony Technologies Original telephone systems used frequency division multiplexing; today they use time division multiplexing. T1 = 24 DSOs = runs at 1.544 (~1.5) Mbps T3 = 28 DS1s = runs at 44.736 (~45) Mbps [DS1–Digital Signal 1] E1 and E3 are European carriers 64 Kbps Frequency Division Multiplexing Time Division Multiplexing A DS0 can carry 64 kilobits per second! DS1 (digital signal 1)–24 DS0 signals all going down the same wire. this is not Frequency, but Time Division Multiplexing, it uses block & frames, not frequencies. DS1 is just a signal type that runs on something called “T1”. “T1” is a specific type of cabling system. T1…

    read more
    Aaron Comments Off on Remote Connectivity–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    You May Also Like

    What is Attack Surface?

    June 2, 2021

    Blockchain & Money: Session 21: Post Trade Clearing, Settlement, and Processing, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Mobile Networking–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 15, 2021
  • Tech

    IPv6–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021 /

    IPv6 Intro To IPv6 IPv6 are 128-bits, have a MUCH larger address space than IPv4. IPv6 addresses have 8 segments separated by 7 colons. IPv6 allows data to move much faster through the internet. NDP (Neighbor Discovery Protocol) IPv6 Addressing IPv6 addresses can be shortened by removing leading zeros, but be familiar with the rules. IPv6 addresses have 2 IP addresses: a link-local address & an Internet address. The 2nd part of the IPv6 address using EUI-64 is generated from the MAC address. Link-local address is automatically generated; Internet address is provided by local router. Link-local address starts fe80:0000:0000:0000 (1st four sets) Smallest IPv6 address you can have will be…

    read more
    Aaron Comments Off on IPv6–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    You May Also Like

    Cabling & Topology–The Physical Network–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 11, 2021

    Function Call Stack & Activation Records–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    The Story of Super Mario Bros. 3 | Gaming Historian

    December 30, 2020
  • Tech

    Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021 /

    Advanced IP Networking Advanced Networking Devices Understand IP Tunneling Very few Internet protocols are encrypted! Tunnels can encapsulate unencrypted protocols to create encrypted communication channels. Tunnels are often used with remote access connections. A tunnel starts by making an encrypted connection between 2 computers. Tunnels are used to provide encryption where there normally isn’t any. They are used to encrypt unencrypted protocols. VPNs (Virtual Private Networks) A VPN creates a secure tunnel so a remote machine or network can be part of a local network. A ‘client-to-client‘ VPN connects a remote computer to a local network. A ‘site-to-site‘ VPN connects distant networks into a single network. Remote Connections Challenges LAN…

    read more
    Aaron Comments Off on Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    You May Also Like

    Blockchain & Money: Session 22: Trade Finance & Supply Chain, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 23, 2021

    Physical Networking—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021

    ‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item

    March 4, 2021
  • Tech

    Securing TCP/IP–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021 /

    Securing TCP/IP Making TCP/IP Secure Security can be broken into 3 areas: The “CIA of Security”: Confidentiality, Integrity, & Availability Confidentiality can be addressed through encryption. Confidentiality & integrity must be balanced with availability. Encryption Non-repudiation Availability Authorization & Authentication–big part of CIA Symmetric Encryption Cleartext is any unencrypted data. Algorithms use keys to encrypt cleartext into cyphertext. An algorithm that uses the same key to encrypt & decrypt is symmetric encryption. Caesar Cipher–“old goldie”–like a secret decoder ring. Algorithms–the process that “stirs up” the values. Note: All algorithms work this way…we’re going to have cleartext, cyphertext, some form of algorithm, & a key. Key Cyphertext Asymmetric Encryption (created by…

    read more
    Aaron Comments Off on Securing TCP/IP–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    You May Also Like

    What is Traffic Light Protocol (TLP)?

    June 2, 2021

    Symbols!!! [Ruby Programming Language Notes]

    May 19, 2021

    Scope Rules–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021
  • Tech

    Security & Organization–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 11, 2021 /

    Securing Computers Threats The term “security” encompasses host- and network-based security, and physical security. Common threats include man-in-the-middle attacks, DoS, and DDoS attacks. Symptoms of such attacks (Flags!) include renamed system files, missing files, & more. DoS–Denial of Service; DDoS–Distributed Denial of Service. Zero Day–a new threat that no one has seen before. Dealing With Threats Host-based security includes patching, anti-malware, and a firewall. Network-based security includes IDS, IPS, & firewalls. UTM (Unified Threat Management) includes IDS/IPS, firewalls, and anti-malware; available in the cloud. IDS–Intrusion Detection Systmes IPS–Intrusion Prevention Systems; these systems are more active! Endpoint Management Physical Security Physical security includes perimeter security, room locks, and individual device security.…

    read more
    Aaron Comments Off on Security & Organization–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    You May Also Like

    Blockchain & Money: Session 21: Post Trade Clearing, Settlement, and Processing, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Cabling & Topology–The Physical Network–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 11, 2021

    BIOS & Intro to Core Hardware & Firmware—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 5, 2021
  • Tech

    Cryptography & Cyber Security Course Notes

    April 30, 2021 /

    Crytopgraphy For Security course on You Tube. The triad of cybersecurity is: Confidentiality Integrity Availability Confidentiality refers to “the property that sensitive info is not disclosed to unauthorized individuals, entities, or processes”. —N.I.S.T. Intregrity is defined as the “guarding against improper info modification or destruction, and includes ensuring information non-repudiation & authenticity”. -NIST Availability is “ensuring timely and reliable access to and use of information”. -NIST Impact of Security Breaches: Effectiveness of primary operations are reduced. Financial loss Damage to assets Harm to individuals Threat: potential violation of security Attack: assault on system security derived from intelligent threat. Aspects of Security Security Attack—any action that attempts to compromise the security…

    read more
    Aaron Comments Off on Cryptography & Cyber Security Course Notes

    You May Also Like

    Dual Economy Continues to Emerge as Millions Have Lost Jobs But Hiring Booms In Some Sectors…

    December 30, 2020

    Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    April 14, 2021

    5 Strategies for Reinventing Your Career in Uncertain Times…

    December 30, 2020
  • Tech

    Security issue in Apple Airdrop allow attackers to steal personal information

    April 27, 2021 /

    Simple tip for NON-TECH users…This security issue can also be mitigated by sticking to the principle of least privilege, even when it comes to seemingly innocent apps, that are just trying to make our lives easier. If you’re not actively using Apple’s AirDrop feature, then DO NOT have it running in the background, unnecessarily. “So far, Apple has neither acknowledged the problem nor indicated that they are working on a solution,” the researchers concluded. “This means that the users of more than 1.5 billion Apple devices are still vulnerable to the outlined privacy attacks. Users can only protect themselves by disabling AirDrop discovery in the system settings and by refraining…

    read more
    Aaron Comments Off on Security issue in Apple Airdrop allow attackers to steal personal information

    You May Also Like

    Protected: What is Equinix? And Why Are They So Important??

    March 23, 2021

    Mobile Networking–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 15, 2021

    Scope Rules–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021
  • Tech

    Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    April 14, 2021 /

    So there’s quite a juicy, drama-filled story in the Washington Post that could be a Hollywood plot line about Apple, the FBI, a terrorist’s iPhone, and HACKERS!!! Azimuth Security, a publicity-shy company that says it sells its cyber wares only to democratic governments, secretly crafted the solution the FBI used to gain access to the device, according to several people familiar with the matter. The iPhone was used by one of two shooters whose December 2015 attack left more than a dozen people dead. So, yeah Azimuth is a hacking firm for the better good you can say. Azimuth is a poster child for “white hat” hacking, experts say, which…

    read more
    Aaron Comments Off on Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    You May Also Like

    Array-Giving Enumerables!!! [Ruby Programming Language Notes]

    May 18, 2021

    Blockchain & Money: Session 12: Assessing Use Cases by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 20, 2021

    Network Monitoring–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 16, 2021
  • Tech

    Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    March 30, 2021 /

    According to the Bleeping Computer new service, PHP’s Git server was hacked via a backdoor to the PHP source code. PHP is a general-purpose scripting language especially suited to web development. Typically a server-side programming language, PHP powers many sites on the internet including big players like Wikipedia and Facebook. In this latest attack the official PHP Git repository was hit and the code base was tampered with. Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server. The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf …

    read more
    Aaron Comments Off on Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    You May Also Like

    A Comment on Comments In Programming Languages…

    May 24, 2021

    Working With the Command-Line Interface–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021

    Blockchain & Money: Session 7: Technical Challenges by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 16, 2021
 Older Posts
Newer Posts 

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2025 Starby Four.
Ashe Theme by WP Royal.