Skip to main content

Posts

Showing posts from December, 2022

Nmap Tutorial to find Network Vulnerabilities

  Learn Nmap to find Network Vulnerabilities

IT risk just got real, time to act!

  Many businesses in South Africa continue to rely and use on premises Information Technology (IT) infrastructure, which is a viable solution, especially on solutions that are static in nature and don’t often change.  Some of these businesses have used the same infrastructure without modification for well over a decade and have understandably been very resistant to change as the perception is that additional costs will be incurred.  During the looting incidents that have hit South Africa, a large proportion of this infrastructure has been destroyed at a significant number of locations. Read the full article over on MyBroadband .

Checklists: Doing the Work Right

  Checklists are vital to the successful completion of any experts’ work. Learn how the medical, nuclear and aviation industries use checklists to execute work safely and efficiently.

Nedbank's Miracle on the Hudson advert

 

How TCP really works: MTU vs MSS

 

Troubleshooting slow networks with Wireshark // wireshark filters // Wireshark performance

 

Optimized Cloud Access - Bigleaf Networks SD-WAN

 

Two Beer Networking - SDWAN Kills Carriers

 

Smoke and Mirror Trading International | Carte Blanche | M-Net