In a recent article, I wrote about getting around in your wifi environment, using the airport utility available on the terminal, in this article, we will look at Network commands, starting from the most popular and quite mythical,
ifconfig. Once you get more familiar with your Mac Terminal, the sky is the limit, you can do magical things, on your Mac with text-based access to your operating system using its command-line interface (and not just the basics, as creating files, directories, and assign permissions).
ifconfig command will list all available network interfaces, including their IPV4 and IPV6 addresses, their…
Why do we need to do that?
It allows you to have a low-level view, up to the hexadecimal representation of the different packets
You will see, if packets travel the way they should, if they are dropped and where. It is one of the best diagnostic tools available
In classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher message
In the substitution algorithm( as used in Caesar cipher and vigenere cipher ) we replace one character with another by shifting its place in the alphabet with a pre-defined number of places
Let us use the python pseudo-random number generator module to take plain text and use transposition operation, with the key being the random seed ( the initial value, where the random generator start its math operations )
We will start and import the random…
The first one is a Web mode, where you access resources through a web browser. But with a limited set of protocols.
In the second, Full tunnel mode, you get access to all the protocols and applications, but the traffic the full traffic will move through that tunnel. And sometimes it is not requested. ( Takes resources from your FortiGate firewall )
The third mode is a Split Tunnel mode where you can access specific resources, and the rest of the traffic will move through the public Internet.
Our topology is as follows. We have our LAN interface. And we…
We use base 64 as a method to encode binary data into an ASCII representation.
We do so since many systems and networks just don’t represent binary data as it is supposed to be shown. So how does it actually work?
Let’s do it by example. Let’s take the word FortiGate. Each character has an eight-bit representation.
I have created 2 courses and 2 books, to teach you the theory and practice of a fortigate firewall
What will you learn :
Your iperf client allows you to take throughput measures between different interfaces or between your FortiGate firewall and public iperf servers ( https://iperf.cc/)
iperf is much more accurate and reliable than the dozens or more speed test tools available everywhere. it is an open-source tool that tests your network performance, with respect to the protocols used ( UDP or TCP ), amount of parallel TCP connections, TCP window size…
You can install iperf either as a client or as a server on any Linux, Windows, or Mac computer and you can also use public free iperf servers against your iperf…