View Post

Two Common Router Security Threats

In Cybersecurity by Ian0 Comments

This entry is part 4 of 10 in the series Intrusion Detection

This entry is part 4 of 10 in the series Intrusion DetectionSyn Flood or Denial of Service Attack Syn Flood attacks, often referred to as Denial of Service Attacks are caused through exploitation of the TCP protocol. The attacker sends a large number of TCP/SYN packets using a forged address. Because of this, the destination server is unable to successfully …

Share
View Post

What are Rogue Access Points?

In Cybersecurity by Ian0 Comments

This entry is part 3 of 10 in the series Intrusion Detection

This entry is part 3 of 10 in the series Intrusion DetectionWiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways to lure victims by using rogue access points. These are essentially wireless access points that have been installed in a network without authorization. In some cases these may have been …

Share
View Post

Using jQuery.AJAX() to Retrieve Sample JSON Data

In Web Development by Ian0 Comments

Traditionally the X in AJAX has usually equated XML (eXtensive Markup Notation). In recent years, JSON (JavaScript Object Notation) has taken over in many cases due to its overall efficiency and ease of use. In general, JSON is a much less verbose syntax, which has gained a lot of popularity in modern JavaScript frameworks. Part of this popularity can be …

Share