CNN – Convolutional Neural Networks

Convolutional Neural Networks (CNNs) were inspired by the way the human visual cortex works, CNNs are a specialized type of neural network particularly adept at analyzing and understanding images. They are the engine behind many impressive AI applications, from recognizing faces in photos to powering autonomous vehicles.  Traditional neural networks, while powerful, can struggle with Read More …

CDN – Content Delivery Network

A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographic locations. Its primary purpose is to deliver web content, such as images, videos, stylesheets, and scripts, to users more efficiently and quickly. By caching content on multiple servers, a CDN reduces the distance data must travel to reach end-users, Read More …

Conference Video – Why We are Not Building a Defendable Internet

In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …

DDoS – Distributed Denial of Service

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. DDoS attacks are executed using multiple compromised computer systems, often referred to as a botnet, which are controlled by the attacker. These botnets Read More …

What is Network Address Translation

Network Address Translation (NAT) is a method used in networking to modify the IP address information in the headers of data packets as they traverse a router. NAT allows multiple devices on a local network to share a single public IP address, facilitating efficient use of IP address space and adding a layer of security Read More …

The Internet Protocol: The Backbone of Online Communication

The Internet Protocol (IP) is one of the most essential components of modern networking, enabling seamless communication between devices across the globe. This article explores what the Internet Protocol is, how it works, and why it is crucial for online communication. What is the Internet Protocol? The Internet Protocol (IP) is a set of rules Read More …

Conference Video – Introductory Netflow Analysis

Miles Johnson Introductory Netflow Analysis is a 1 hour presentation on the basic concepts of Netflow and network forensics using netflow logs. All IT Security professionals will need to do network forensics at one time or another. Netflow analysis can empower you to discover and understand past network behavior.

TCP: The Backbone of Reliable Communication

The Transmission Control Protocol (TCP) is a fundamental part of internet communication, ensuring reliable data exchange between computers and systems. This article will go into some brief details on what TCP is, how it works, and its critical role in enabling seamless communication across networks. What is TCP? Transmission Control Protocol (TCP) is one of Read More …

DHCP and Its Role in Network Functionality

The Dynamic Host Configuration Protocol (DHCP) is an essential component of modern networking, ensuring that devices can seamlessly connect and communicate within a network. This article explores what DHCP is, why it is critical for networks to function efficiently, and how to configure basic DHCP settings on a home router. What is DHCP? DHCP stands Read More …

FTP – A Tool for Online File Management

In the digital era, the ability to share and manage files efficiently over networks is crucial. The File Transfer Protocol (FTP) is a long-standing tool that enables users to transfer files between systems on a network. This article explains what FTP is, how it works, and its relevance in today’s online world. What is FTP? Read More …