Coen Goedegebure
  • Home
  • About
  • Contact
  • Donate

Network

A collection of 3 posts
Executing a man-in-the-middle attack
Security

Executing a man-in-the-middle attack

How can you become a man-in-the-middle on a network to eavesdrop on user traffic and what can you do to protect yourself against such an attack?
01 Oct 2018 19 min read
The OSI Model
Network

The OSI Model

Understanding the OSI model and the aspects of its 7 layers is important for any IT professional who is involved with networking and connectivity
25 Sep 2018 7 min read
TCP 3-way handshake and port scanning
Network

TCP 3-way handshake and port scanning

How does the TCP 3-way handshake work and how is it used to perform a port scan?
18 Sep 2018 7 min read
Page 1 of 1
Coen Goedegebure © 2026
Powered by Ghost