open remote desktop "mstsc.exe", select options, select options, go to "local resources" select "more", check drives. When you connect they'll show up in explorer, sheesh, what's wrong with that?
1) you're a home user
2) you don't have to worry about layer 2 considerations other than gigabit or FE(wireless has other considerations, read a book).
3) If you can measure the 1-2MS(IF ANY) delay by having a large 2 topology, then you're a better man than me and waaaaaaaaay more...
http://www.ipdeny.com/ipblocks/
...so, no, no state by state deny. IPv6 will change everything, I believe we'll rely heavily, or completely, on DNS. So that is another vote for, maybe.
I read the N+ book , didn't take the test, it seemed pretty stupid. Then I took a CCNA bootcamp, passed the CCNA and have been moving on from there. I have Bluecoat, Linux and most of the CCSP finished.
Don't waste your time on taking the N+, it's a good simple book that get's you into it...
if by cheesy you mean SOHO/remote spoke/small business, then sure.
You can terminate a VPN tunnel on a lot of devices (plent of them are free) OTP(one time pass) tokens are the hangup, as previously mentioned. No way arund that other than taking a step down. I suggest disabling aggressive...
in PIX/ASA 7+ you can get the pre shared secrets rather simply, and without tftp. "more system:running-config". That's copy/pastable into a new box, just make sure when you copy/paste configs that the new box has no configuration on it, "write erase" then "reload" to make sure.
I couldn't find a specific length in the RFC, but considering that GET requests sent to (explicit)proxies contain URL's and URL's can be 255 bytes or longer, then no, 32 bytes for a GET request can't be right. Hope that helps... :)
Don't be so quick, guys...There are published exploits for guests that affect the host computer. That means that something that happens on the VM machine can affect the host machine, VMware is not a security measure, it's a tool.
The NSA approved (voted) on the algorithm, I'm sure there is some mathmatical weakness. Not enough to put it at our level of brute force cracking, but I'm sure there is a hardware based cracker (custom silicon) or a supercomputer. OS profiling can cut the number of possible "random" keys down...
to go anywhere, anywhere at all, in the networking world requires you to subnet in your head on the fly. Don't do boolean algebra with bits, just use the magic number and you'll figure it all out. If you don't understand subnetting, you won't get far at all.