Posted On September 14, 2025

WEEKELY RECAP

admin 0 comments

🔹 Public vs. Private IP Addresses
I learned how public IPs allow devices to connect to the internet, while private IPs are used within local networks. Understanding this helps in setting up secure and efficient communication.

🔹 Linux Command of the Day
Got hands-on with some essential Linux commands:

cat – View file content.

less – Scroll through files page by page.

head – See the first 10 lines of a file.

tail – See the last 10 lines of a file.
These are must-know tools for anyone working with servers or logs.

🔹 DNS and Why It’s a Hacker’s Target
Explored how DNS is like the “phonebook of the internet.” Hackers often attack it through DNS hijacking and cache poisoning to redirect users to malicious sites.

🔹 Subnetting Simplified
Subnetting breaks large networks into smaller ones for better management, security, and performance. Learning the basics of subnet masks and CIDR notation was a big step toward understanding real-world networking.

🔹 Case Study: The Morris Worm (1988)
Studied the first major internet worm, which highlighted vulnerabilities in early systems and taught the world an important lesson in cybersecurity: even small coding oversights can have massive consequences.



Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post

WHAT IS ENCRYPTION ?

Encryption is the process of converting readable data (called plaintext) into an unreadable format (called…

SUBNET MASK AND DEFAULT GATEWAY

SUBNET MASK Think of IP address as your house number in a big city. The…

The WannaCry Ransomware Attack

1. Background Date of outbreak: May 12, 2017 Type of malware: Ransomware (crypto-virus) Impact: Affected…