Core Internet Protocols: DNS, HTTP, TCP/IP, Email, TFTP, IP Addressing
DNS Fundamentals
DNS, or Domain Name System, is a fundamental component of the internet that facilitates human-friendly web addresses (like www.example.com) to be translated into IP addresses that computers use to identify each other on the network. In essence, DNS acts as the internet’s phone book, allowing users to access websites using easily recognizable domain names instead of having to remember complex numerical IP addresses.
How DNS Resolution Works
- User Enters a Domain Name: When a user types
Understanding Active Directory and DHCP Configuration
Define Active Directory: Provides the ability to establish a single login and easier management of users.
What services must be in place prior to the installation of a RIS server? Having DNS, DHCP, and Active Directory.
Define Remote Desktop. It allows us to access a server remotely and perform administrative tasks from the terminal.
- DNS Server: Domain Name System (DNS) can find the IP address of a PC’s name.
- DNS Forwarder: Designated by other internal DNS servers for use in consultations to resolve
Essential Network Security Concepts
Firewalls and Network Protection
Firewalls: Mechanisms designed for protection. Their purpose is to allow only authorized data transmission and reception. They isolate and control traffic between separate networks.
What Firewalls Do (and Cannot Do):
- Control traffic flow based on rules.
- Separate networks.
However, firewalls cannot protect against:
- Connections that bypass the firewall.
- Malicious internal users.
- Completely new, unknown threats.
- Network viruses (though they can block infected traffic).
Denial
Read MoreNetwork Fundamentals and Protocols
Network Fundamentals
802.1 Standard
The 802.1 standard states that each network adapter (NIC) has a unique 48-bit physical address recorded in ROM. Thus, each computer connected to the network will have a different ID from the others.
Twisted Pair Cabling
The EIA 568B standard defines categories for differential, twisted pair cabling:
Category 5
It is the most widely used today. It uses 4 pairs of wires: 2 for transmitting data and the other two are either left free or are used to transmit voice. It can
Network Protocol Attacks & Defenses
Week 1: Network Fundamentals & Attacks
Introduction to AS & BGP
The internet consists of autonomous systems (AS) which function like a cloud of routers that can intercommunicate using the BGP protocol (which seems like an internal routing table within routers, with inter-router communication over 179/tcp). This is related to the concept of gateways.
Attacks on BGP
A good high-level overview of BGP.
BGP Vulnerabilities
- BGP hijacking either by advertising smaller, more-specific subnets or faster
Characters in A Man of the People
Elsie
Elsie is an uninhibited young woman who is a friend of Odili’s. The two of them have a sexual relationship, but she is engaged to another man, and Odili doesn’t regard their relationship as serious, although he is terribly offended when she sleeps with Chief Nanga.
After this happens, Odili is angry. Odili discusses Chief Nanga’s ability to manipulate others into getting him out of any compromising situation. As the narrator watches Chief Nanga argue with journalists and public figures,
Read More