Posted On September 14, 2025

WEEKELY RECAP

admin 0 comments

🔹 Public vs. Private IP Addresses
I learned how public IPs allow devices to connect to the internet, while private IPs are used within local networks. Understanding this helps in setting up secure and efficient communication.

🔹 Linux Command of the Day
Got hands-on with some essential Linux commands:

cat – View file content.

less – Scroll through files page by page.

head – See the first 10 lines of a file.

tail – See the last 10 lines of a file.
These are must-know tools for anyone working with servers or logs.

🔹 DNS and Why It’s a Hacker’s Target
Explored how DNS is like the “phonebook of the internet.” Hackers often attack it through DNS hijacking and cache poisoning to redirect users to malicious sites.

🔹 Subnetting Simplified
Subnetting breaks large networks into smaller ones for better management, security, and performance. Learning the basics of subnet masks and CIDR notation was a big step toward understanding real-world networking.

🔹 Case Study: The Morris Worm (1988)
Studied the first major internet worm, which highlighted vulnerabilities in early systems and taught the world an important lesson in cybersecurity: even small coding oversights can have massive consequences.



Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post

THE FIRST COMPUTER VIRUS

Creeper Virus (1971) 🔹 Who created it? Developed by Bob Thomas at BBN Technologies (USA).…

WHAT IS CYBERSECURITY ?

Cybersecurity is the practice of protecting computer systems, networks, applications, and data from digital threats…

WHAT IS ENCRYPTION ?

Encryption is the process of converting readable data (called plaintext) into an unreadable format (called…