What WPA suite for your secured Wifi?
In this article we will discuss the use of WPA in a secured wifi context….
In this article we will discuss the use of WPA in a secured wifi context. A little introduction WPA stands for Wifi Portected Access. By protected access, the protocol define the way by which your device will authenticate to the wifi access point to be allowed to associate with this access point and futher, access…
Let’s explore in this article the general operation of Starlink and how it can benefit. Introduction Undoubtedly Starlink helps resolve many connectivity issues and at least starting to offer a cost effective alternative to traditional costly satellite solution with regards to the same use cases. But it is not limited to. Let’s explore in this…...
Introduction The Cisco Meraki solution comes with its own set of devices but allow the integration of other devices like the Catalyst 9k L2 or L3 switches. Currently, the Meraki dashboard supports the onboarding of these family models : 9200, 9300 and 9500. Reusing an existing infrastructure of Catalyst switches is energy, time and cost…...
In this blog, let’s see how we can build an exe file from our py (python) script. Motivation Why it is interesting to build an exe for our py script? poratability, ease of execution, etc. are some reasons why to do so. Instead of opening the IDE, loading the script, run it, an exe file…...
Cisco secure client is a piece of software that install on a user pc, the endpoint. But it is not limited to, it installs also on mobile device. That’s just awesome! Let’s explore in this blog how this client helps secure the DNS. A little theoretical background Before we deep dive into how DNS protection…...
Let’s discover in this blog the recommended study path and experience to fulfill the requirement for a position as a cybersecurity expert of consultant. What is Cybersecurity in general Per Cisco definition, Cybersecurity is “the practice of protecting systems, networks, data and programs from digital attacks”. The scope may include: identification of attacks, protections of…...