Security By Obscurity: Just Hide It?

June 7, 2016 | Comments

Last semester I took an introductory course to information security. One of the concepts we touched on was “security by obscurity.” Basically what that means is if no one is aware of something, they can’t possibly break into it. For example, hiding your diary is a form of security by obscurity. Of course, this has it flaws. There is always the possibility that someone could somehow stumble upon your diary by accident.

Category: Technology
Tags: #security

CCNA1 Packet Tracer – Designing and Implementing a VLSM Addressing Scheme

June 4, 2016 | Comments

I’m currently taking the CCNA1 course offered by Cisco. I struggled a lot with this activity so I thought it would be good to share how I finally figured it out. If you’re a little lazy and just want the answers, click here to go straight to the addressing table or here to download the PDF. Be aware that the addresses may vary but the process is the same regardless.

Category: Technology
Tags: #CCNA






I'm a bookworm