Security / Hacking / Network Executing a man-in-the-middle attack How can you become a man-in-the-middle on a network to eavesdrop on user traffic and what can you do to protect yourself against such an attack?
Network / Development / Security The OSI Model Understanding the OSI model and the aspects of its 7 layers is important for any IT professional who is involved with networking and connectivity
Network / Security / Hacking / Development TCP 3-way handshake and port scanning How does the TCP 3-way handshake work and how is it used to perform a port scan?