Author: Valter Popeskic

Using Port Security to Mitigate Layer 2 Attacks

Get rid of the MAC flooding attacks on your switch and all kinds of other attacks that will mitigate you network security by implementing switch port security.
All about the issues to consider when configuring port security on a switch will be written here. Also we will show you how to configure port security on the Cisco IOS. It will be configuration of both static and dynamic port security.

SPDY – reducing web page load time protocol

Networking protocol “SPDY” is used commonly to transport the web content. It is the shortened form of “SPeeDY”. Google (Google Chrome & Chromium) uses this protocol to promote the open-source project (chromium web browser) protocol in order to improve the functionality of HTTP protocol. Since, speeding up the act of transmission is achieved via compression which is the feature of SPDY. In other words, it is developed to access the Google’s web services via browser, named as Google chrome.