Pinnedofer shmueliinMac O’ClockNetwork Warrior: How to use macOS network utilitiesNetwork commands, starting from the most popular and quite mythical, ifconfigOct 29, 2020Oct 29, 2020
ofer shmueliTo Mesh or Not to Mesh?If you are suffering from Wi-Fi coverage issues, then you probably heard someone suggesting “ Go and get yourself a Mesh network “Feb 1, 2022Feb 1, 2022
ofer shmueliCracking codes with pythonGreat book for anyone who wants to learn how cryptography works, and how to implement the knowledge using pythonOct 13, 2021Oct 13, 2021
ofer shmueliinGeek CultureARP ( Address Resolution Protocol ) demystifiedWhenever a host needs to contact another host, either in its subnet or in another subnet or maybe on the internet, then it sends an ARP (…Aug 19, 2021Aug 19, 2021
ofer shmueliThe new Apple iPhone WiFi vulnerabilityLet’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can…Jul 6, 2021Jul 6, 2021
ofer shmueliCapture Packets on Your FirewallYou can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP DumpApr 27, 20211Apr 27, 20211
ofer shmueliFactorial Permutations Using PythonWe use the factorial function to multiply the whole numbers from a chosen number down to one.Apr 7, 20211Apr 7, 20211
ofer shmueliinGeek CultureTransposition Cipher Using Python Random ModuleIn classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher…Apr 2, 2021Apr 2, 2021
ofer shmueliinInfoSec Write-upsFortigate Firewall Split Tunnel ModeIf you’re using an SSL VPN on your Fortigate Firewall, then you have 3 modes to choose from.Mar 31, 20211Mar 31, 20211
ofer shmueliinInfoSec Write-upsBase64 ExplainedBase 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an…Mar 31, 20213Mar 31, 20213