Skip to content
  • Sunday 5th February 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Author: A. Boukar

    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Network Layer : Connecting Networks

    In the last chapter, we learned how we can connect computers to a network and make them talk to each other. Now, what if we want to talk to a […]

    View the post
    A. BoukarDecember 20, 2020December 30, 2020
    Tags: Internet ProtocolIPNetwork LayerRouter
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Data Link Layer : Communication within a LAN

    In the last chapter, we have learned that layer 1 is responsible for the physical transmission of data between connected machines. The physical layer receives that data from the layer […]

    View the post
    A. BoukarDecember 18, 2020December 29, 2020
    Tags: Data Link LayerEthernetMACSwitch
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    The Physical Layer : How Machines Are Connected

    Now that we have learned about the layers that make up the OSI model, let’s go ahead and discuss each of them separately. In this chapter, we’ll learn about the […]

    View the post
    A. BoukarDecember 17, 2020December 28, 2020
    Tags: Computer NetworksLayer 2Network Interface CardNetworkingNICPhysical Layer
    • Computer Networking
    • The Basics of Computer Networks
    • Tutorials

    Introduction to the OSI Model

    In order to understand computer networks and how they work, we first need to learn about the OSI Model. The OSI Model is a standard that defines a set of […]

    View the post
    A. BoukarDecember 16, 2020December 28, 2020
    Tags: NetworkingNetworksOSI ModelTCP/IP
    • CISSP Articles
    • CISSP Prep

    What is SAML? And Why is it Used?

    Security Assertion Markup Language (SAML) is an open-source standard that allows separate parties to exchange authorization data between them. It allows users to access a third party service using credentials […]

    View the post
    A. BoukarDecember 4, 2020December 27, 2020
    Tags: CISSPOAuthSAMLSecurity Assertion Markup LanguageSSO
    • CISSP Articles
    • CISSP Prep

    NIST Standards You Should Know About For CISSP Exam

    If you are preparing for the CISSP exam, then you have certainly encountered some of NIST standards. They are referenced in almost all eight domains. If you are having a […]

    View the post
    A. BoukarDecember 3, 2020December 25, 2022
    Tags: CISSPCISSP ExamFIPSNational Institute of Standards and TechnologiesNISTNIST SP 800
    • CISSP Articles
    • CISSP Prep

    COBIT – IT Governance Framework

    For years, organizations have suffered from a crucial gap that existed between business objectives and IT governance. IT activities were not always aligned with business goals, information technology risks were […]

    View the post
    A. BoukarDecember 2, 2020December 27, 2020
    Tags: COBITCOBIT5ISACAIT Governance
    • CISSP Articles
    • CISSP Prep

    What is the CIA Triad?

    The CIA Triad stands for Confidentiality, Integrity and Availability. These three concepts form the basis of information security. They are the principles that secure systems should adhere to. In other […]

    View the post
    A. BoukarDecember 1, 2020December 27, 2020
    Tags: AvailabilityCIA TriadConfidentialityInformation SecurityIntegrity

    Posts navigation

    1 … 4 5

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium