Cyber security Essentials Archives - Telecom Academy
Understanding logical and physical network topologies
Understanding logical and physical network topologies

Logical and physical network topologies The first thing I’d like to talk about in networking are the topologies. As the name topologies implies, topologies have to do with the shape of a network. Topologies come in two types. They come in logical topology and physical topologies. Physical topology refers to the actual shape or layout […]

Read more
Connection-oriented and Connectionless Protocols
Connection-oriented and Connectionless Protocols

TCP and UDP utilize the two connection types. Connection-oriented and connectionless. TCP is considered connection-oriented. This means it uses a system to provide reliable delivery of traffic. TCP utilizes a system known as the three way handshake to establish connections. Before a connection is considered established both hosts need to send and receive a send packet, and an ACK packet. Technically this could be […]

Read more
What is SSH? How to configure SSH?
What is SSH - How to configure SSH

What is SSH? SSH, or Secure SHell, is a protocol for connecting from one computer to another, usually in order to use the Command-line interface, or Command Shell on a remote system. It’s very widely for system administration such as software update, configuration management, and deployment on Linux and Mac OS X machines. you may also like:   What is telnet? Usage […]

Read more