Explainer
(3)- | DHCP Spoofing Attacks
Dynamic Host Configuration Protocol, or DHCP for short, is one of the most useful protocols for a network admin. For large networks with hundreds or thousands of end devices, configuring each one manually with an IP Address would be tedious and error-prone. DHCP allows admins to define a range of IP Addresses and specify other configuration info for devices to obtain automatically. However, like most protocols, it has a security downfall: DHCP Spoofing. !DHCP spoofing attack diagram DHCP spoofing is when a malicious actor sets up an alternate DHCP server on a network to provide false addressing and configuration information to clients.
- | Diplomacy with Aliens: The Story of the Voyager Golden Records
07:56 AM, September 5, 1977. Shortly before Voyager 1’s launch, a few strips of aluminum foil were just added for extra radiation shielding – the same stuff you’d use in your kitchen. But on that date, history was being made. The first probe to cross into interstellar space was launched, and humans might not be the only ones that know about it. Attached to the probe is a twelve-inch gold-plated copper disk with information about Earth. Its audience wasn’t for any of us, but rather for intelligent life on other planets. But to truly understand the Voyager Golden Records, we
- | How to Get Started with Docker
A few months ago, I made a post outlining some of the things I did with docker on an old desktop computer running Linux on it. While that was more of a high-level overview of the process, this will be a more detailed tutorial of the process of creating your first few Docker containers. But first, what is Docker? AWS, a popular cloud service platform, puts it best when it says that: > Docker is a software platform that allows you to build, test, and deploy applications quickly. Docker packages software into standardized units called containers that have everything the software needs
View all tags here.