Skip to content
  • Friday 24th September 2021
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Author: spectnullbyte

    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Transport Layer : End-to-End Communication

    By now you should know that machines connected to the same network rely on the data link layer in order for them to talk to each other. And if two […]

    View the post
    spectnullbyteDecember 21, 2020December 29, 2020
    Tags: 3 way handshakeTCPTransport layerUDP
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Network Layer : Connecting Networks

    In the last chapter, we learned how we can connect computers to a network and make them talk to each other. Now, what if we want to talk to a […]

    View the post
    spectnullbyteDecember 20, 2020December 30, 2020
    Tags: Internet ProtocolIPNetwork LayerRouter
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Data Link Layer : Communication within a LAN

    In the last chapter, we have learned that layer 1 is responsible for the physical transmission of data between connected machines. The physical layer receives that data from the layer […]

    View the post
    spectnullbyteDecember 18, 2020December 29, 2020
    Tags: Data Link LayerEthernetMACSwitch
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Physical Layer : How Machines Are Connected

    Now that we have learned about the layers that make up the OSI model, let’s go ahead and discuss each of them separately. In this chapter, we’ll learn about the […]

    View the post
    spectnullbyteDecember 17, 2020December 28, 2020
    Tags: Computer NetworksLayer 2Network Interface CardNetworkingNICPhysical Layer
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    Introduction to the OSI Model

    In order to understand computer networks and how they work, we first need to learn about the OSI Model. The OSI Model is a standard that defines a set of […]

    View the post
    spectnullbyteDecember 16, 2020December 28, 2020
    Tags: NetworkingNetworksOSI ModelTCP/IP
    • CISSP Articles
    • CISSP Prep

    What is SAML? And Why is it Used?

    Security Assertion Markup Language (SAML) is an open-source standard that allows separate parties to exchange authorization data between them. It allows users to access a third party service using credentials […]

    View the post
    spectnullbyteDecember 4, 2020December 27, 2020
    Tags: CISSPOAuthSAMLSecurity Assertion Markup LanguageSSO
    • CISSP Articles
    • CISSP Prep

    NIST Standards You Should Know About For CISSP Exam

    If you are preparing for the CISSP exam, then you have certainly encountered some of NIST standards. They are referenced in almost all eight domains. If you are having a […]

    View the post
    spectnullbyteDecember 3, 2020December 27, 2020
    Tags: CISSPCISSP ExamFIPSNational Institute of Standards and TechnologiesNISTNIST SP 800
    • CISSP Articles
    • CISSP Prep

    COBIT – IT Governance Framework

    For years, organizations have suffered from a crucial gap that existed between business objectives and IT governance. IT activities were not always aligned with business goals, information technology risks were […]

    View the post
    spectnullbyteDecember 2, 2020December 27, 2020
    Tags: COBITCOBIT5ISACAIT Governance
    • CISSP Articles
    • CISSP Prep

    What is the CIA Triad?

    The CIA Triad stands for Confidentiality, Integrity and Availability. These three concepts form the basis of information security. They are the principles that secure systems should adhere to. In other […]

    View the post
    spectnullbyteDecember 1, 2020December 27, 2020
    Tags: AvailabilityCIA TriadConfidentialityInformation SecurityIntegrity

    Posts navigation

    1 … 3 4

    Latest Posts

    • XSS
      August 13, 2021August 13, 2021spectnullbyte

      Introduction to Cross-Site Scripting (XSS)

    • August 6, 2021August 6, 2021spectnullbyte

      Using THC Hydra To Brute Force Login Forms

    • Linux Privilege Escalation
      July 30, 2021July 30, 2021spectnullbyte

      Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    • john the ripper
      June 29, 2021June 29, 2021spectnullbyte

      Using John The Ripper To Crack Password Hashes

    • April 20, 2021April 20, 2021spectnullbyte

      Using Gobuster to Find Hidden Web Content

    Newsletter

    Copyright All rights reserved - Patchthenet.com
    • Medium