This David Papkin page is about Network Management and Security
Attacks
Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. Attacks are often confused with vulnerabilities, so please try to be sure that the attack you are describing is something that an attacker would do, rather than a weakness in an application.
Authentication
Devices
Network Switch vs Hub- Difference & Comparison Guide
What are Repeaters in Computer Network?
STOP making this mistake with your WiFi Range Extender!
DMZ
Media
OSI
Topologies
Transport
Differences between TCP and UDP
Vulnerabilities
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application. Stakeholders include the application owner, application users, and other entities that rely on the application.
Wireless
Download and rename to Static-Default-Route.zip
End of David Papkin page about Network Management and Security