Pinnedofer shmueliinMac O’ClockNetwork Warrior: How to use macOS network utilitiesNetwork commands, starting from the most popular and quite mythical, ifconfig5 min read·Oct 29, 2020----
ofer shmueliTo Mesh or Not to Mesh?If you are suffering from Wi-Fi coverage issues, then you probably heard someone suggesting “ Go and get yourself a Mesh network “5 min read·Feb 1, 2022----
ofer shmueliCracking codes with pythonGreat book for anyone who wants to learn how cryptography works, and how to implement the knowledge using python1 min read·Oct 13, 2021----
ofer shmueliinGeek CultureARP ( Address Resolution Protocol ) demystifiedWhenever a host needs to contact another host, either in its subnet or in another subnet or maybe on the internet, then it sends an ARP (…4 min read·Aug 19, 2021----
ofer shmueliThe new Apple iPhone WiFi vulnerabilityLet’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can…1 min read·Jul 6, 2021----
ofer shmueliCapture Packets on Your FirewallYou can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP Dump6 min read·Apr 27, 2021--1--1
ofer shmueliFactorial Permutations Using PythonWe use the factorial function to multiply the whole numbers from a chosen number down to one.3 min read·Apr 7, 2021--1--1
ofer shmueliinGeek CultureTransposition Cipher Using Python Random ModuleIn classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher…3 min read·Apr 2, 2021----
ofer shmueliinInfoSec Write-upsFortigate Firewall Split Tunnel ModeIf you’re using an SSL VPN on your Fortigate Firewall, then you have 3 modes to choose from.4 min read·Mar 31, 2021--1--1
ofer shmueliinInfoSec Write-upsBase64 ExplainedBase 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an…3 min read·Mar 31, 2021--3--3