Some users have recently had their accounts hijacked. It seems that the now defunct EVGA forums might have compromised your password there and seems many are using the same PW here. We would suggest you UPDATE YOUR PASSWORD and TURN ON 2FA for your account here to further secure it. None of the compromised accounts had 2FA turned on.
Once you have enabled 2FA, your account will be updated soon to show a badge, letting other members know that you use 2FA to protect your account. This should be beneficial for everyone that uses FSFT.
Cisco certs are worth while and respected not to mention it gives you all the basics....
Networking is growing everything runs off IP networks mobile phones, cable television, every workplace....
If you get into the ISP world you will quickly find out companies use multiple vendors Juniper...
Are you part of the InfoSec department?
A network based IDS can be run off a spanned port and at least give you reporting as to whats going on.
I definitely wouldn't use 1 vendor for everything.
You can run it on the same computer...
Just connect to a regular http site while running wireshark stop the capture and then there should be an option to follow a TCP stream and reassemble it...you will see everything in plain text.
Then try it again with SSL site
You should probably setup a VPN.
pfSense/Vyatta and a number of other products will let you setup a site to site VPN they also have load balancing and other technologies on them however you won't load balancing the VPN traffic.
lol
ISPs don't run large Layer 2 networks...that would scale horrible and destroy performance not to mention most ISPs Comcast, TWC, etc move video traffic around multicast so they already have nicely built networks.
Also network blocks are assigned to the CMTS at least they are with Cisco and...
ISPs route private IPs because they use them for management of gear Cox/Comcast/TW use those IPs for video equipment also.
If they really wanted to seperate the traffic the could use a VRF or VPRN for a separate routing instance.
What? Hopefully they have routing locked down? Please explain lol
And BTW all the people who mentioned you can't use that private IP space because your ISP was...If your routing is properly setup you normally use your ISP for a default route however if you used multiple private ranges they...
I used shell scripts/python all the time writing configuration tools/monitoring tools
I also do a lot of security work and often times need to create my own stuff
1. OSI model was created to allow vendors/programmers whoever to write software or create network devices with out having to rewrite the entire process from high level application down to drivers that control physical hardware.
2. Answer 2 goes back to answer 1
3. Not sure how the OSI model...
If you're not doing any serious hosting and tuning of either just run Apache there are for more resources out there for it.
If you are doing something serious and doing proper testing and config lighttpd can be much faster.
It's definitely out there...
If all your doing is running malwarebytes/combofix maybe you should start spending some time learning about how to analyze malware and actually understand how the box got popped.
I would worry more about what you were doing on unencrypted wireless....
People could easily MITM and attack your browser, sniff data, run sslstrip.
Using open wireless with out some sort of VPN is sketchy
Do you fix home PCs or small office PCs?
You need to start looking at a malware that steals track 2 data and other cool shit if you want to see some nice rootkits or targeted malware.
mturoute can help determine an MTU issue...
I don't know if the router reports interface errors but if its duplex you will see collisions and input errors usually.
If you wanted to do this the way most attackers do you need a wireless card that can be set into monitor mode like the Alfa or other cards with the atheros chip set.
You then use airodump or similar products and capture packets for WEP you need a lot of IVs to crack it you can do airreplay and...
All these people who have seen cases of updated AV and PCs that still get infected are prime examples of my argument.
:-)
I understand signature based AV worked in the past but the majority of REAL/CURRENT threats to PCs can't be stopped by looking for signatures which is why people still get...
lol
Goverment and Corporate are usually targeted for more specific malware attacks
Yet home users are usually attacked via drive by attacks have you ever looked at statistics?
Look at all the new computers that come with Symantec or whatever AV and how many people each day are still getting...