🔹 Public vs. Private IP Addresses
I learned how public IPs allow devices to connect to the internet, while private IPs are used within local networks. Understanding this helps in setting up secure and efficient communication.
🔹 Linux Command of the Day
Got hands-on with some essential Linux commands:
cat – View file content.
less – Scroll through files page by page.
head – See the first 10 lines of a file.
tail – See the last 10 lines of a file.
These are must-know tools for anyone working with servers or logs.
🔹 DNS and Why It’s a Hacker’s Target
Explored how DNS is like the “phonebook of the internet.” Hackers often attack it through DNS hijacking and cache poisoning to redirect users to malicious sites.
🔹 Subnetting Simplified
Subnetting breaks large networks into smaller ones for better management, security, and performance. Learning the basics of subnet masks and CIDR notation was a big step toward understanding real-world networking.
🔹 Case Study: The Morris Worm (1988)
Studied the first major internet worm, which highlighted vulnerabilities in early systems and taught the world an important lesson in cybersecurity: even small coding oversights can have massive consequences.