SPDY – reducing web page load time protocol

Networking protocol “SPDY” is used commonly to transport the web content. It is the shortened form of “SPeeDY”. Google (Google Chrome & Chromium) uses this protocol to promote the open-source project (chromium web browser) protocol in order to improve the functionality of HTTP protocol. Since, speeding up the act of transmission is achieved via compression which is the feature of SPDY. In other words, it is developed to access the Google’s web services via browser, named as Google chrome.

Optical Fiber – Fiber Optics

Fiber optic

Today’s finest technology “Fiber optic” is making use of glass or plastic threads objects for the at hand better results during the process of transmitting data with their help. Usually, this fiber is consisted on a cluster of glass fibers. And every piece of this particularly popular technology is able to transmit messages.

Telnet Attacks – Ways to compromise remote connection

In this article I am going to explain some of the reasons why we should switch from Telnet to SSH to get our device management secure.

But first few words about Telnet?

More than once we were in the situation where we needed to configure couple of switches and routers in the same time. More precisely, almost every time we are in a situation where we must configure or troubleshoot more devices in the same time.

Of course that we don’t want to reconnect console cable to every other switch every time we want to make a show command on it.

We want to be able to connect to all the devices in the same time and then just use multiple command prompts one for each device. In this manner we are faster in the troubleshooting process and we can make configurations steps without loosing time on transferring the console cable. Furthermore we have better overview on the configuration as we make troubleshooting commands and we can easily compare different configurations just by opening two command prompts one close to other.

Spoofing Attacks – DHCP Server Spoofing

One of the Layer 2 attacks inside a LAN network that is very dangerous for information privacy and LAN integrity is spoofing attack.

This is special kind of attack where attacker can gain access to network traffic by spoofing responses that would be sent by a valid DHCP server. This attack is using a technique ARP spoofing, also called ARP cache poisoning or ARP poison routing (APR) that is a simple LAN attack technique. ARP spoofing will allow an attacker to intercept frames on a LAN, modify the traffic, stop the traffic or simply sniff all the traffic. This is possible because all the communication in LAN is now crossing attackers interface and this communication is vulnerable to packet sniffing.