top of page
NetworkersWorld provides Consultation services, Gap assessment, Implementation and Operational support, Training (theory and hands-on), for Computer Network, WAN, LAN, Ethernet, Switching, Enterprise and Service provider Routing, Enterprise Wireless Networking, CyberSecurity, Information Security, Incident Management, Malware Analysis, IT Forensics, IT Risk and compliance. Visit Services page for more details
Real Time Cyber Threat Map
Blog
Search

All About Multicast IP Range
In this post, we will discuss IP addressing for multicast applications. Multicast applications use an address range that falls under the...
TheTechPriyanka
Sep 12, 20233 min read
100 views
0 comments
EAP (Extensible Authentication Protocol)
Today I will talk about EAP (Extensible Authentication Protocol) It was initially designed as a common method that regardless of what you...
TheTechPriyanka
Sep 7, 20232 min read
32 views
0 comments

DHCP Lease Renewal Process
In my last post, I explained about the DHCP lease timer and received a lot of questions about how to renew DHCP leases. Here's how it...
TheTechPriyanka
Sep 5, 20232 min read
614 views
0 comments

DHCP Lease Time
Today I will talk about the DHCP lease time, of course its very easy and well known setting for the DHCP. DHCP Lease Time is one of the...
TheTechPriyanka
Sep 4, 20232 min read
86 views
0 comments

ASDM "this app won't run on your computer" - Windows 10
As we all know, Cisco Adaptive Security Device Manager (ASDM) is software that enables users to manage and monitor security via a web...
TheTechPriyanka
Sep 1, 20231 min read
160 views
0 comments

All About IPv6 Global Unicast Address
In terms of IPv6, we have global unicast, unique local, and link-local addresses. Let's talk about global unicast today. Global unicast...
TheTechPriyanka
Aug 31, 20232 min read
107 views
0 comments

What is Virtual Port and Why we need it?
On computing and networking devices, a port serves as the entry and exit point for data traffic. The concept of a port can be viewed as...
TheTechPriyanka
Aug 29, 20232 min read
926 views
0 comments

802.11 Security Basics
When we look at the 802.11 security basic, we talk about the below basic components 👉 Data privacy, we call it encryption 👉AAA ...
TheTechPriyanka
Aug 28, 20231 min read
28 views
0 comments

Floating Static Route
Are you familiar with floating static routes? In any discussion about routing, one of the most common questions is: Which protocol will...
TheTechPriyanka
Aug 24, 20231 min read
45 views
0 comments
MAC Spoofing
I explained ARP poisoning or ARP spoofing and a few people contacted me asking if it is similar to Mac spoofing. My article on ARP...
TheTechPriyanka
Aug 23, 20231 min read
30 views
0 comments
ARP Poisoning or ARP Spoofing
The most common network switch attack, is ARP poisoning or ARP spoofing/poisoning. As we know, ARP is an address resolution protocol used...
TheTechPriyanka
Aug 23, 20232 min read
24 views
0 comments

All About Native VLAN
Many people get confused about native vlans, which is a very simple concept. Today we'll talk about native VLAN, what it is, why we use...
TheTechPriyanka
Aug 21, 20232 min read
448 views
0 comments

VDC (Virtual Device Context) - Nexus Switches
Here we'll talk about one of the most popular features of the Nexus environment, VDC (Virtual Device Context). The term VDC refers to...
TheTechPriyanka
Aug 17, 20232 min read
60 views
0 comments

A low-cost, and feature-rich wireless solution for small and medium size industry
Happy Monday! Often, in wireless networking for small or medium deployments, we prefer an enterprise-level WLAN architecture that is...
TheTechPriyanka
Jul 24, 20231 min read
106 views
0 comments


SASE (Secure Access Service Edge)
SASE (Secure Access Service Edge) is a solution that combines multiple features of WAN technologies and Network Security into one...
KV
Mar 10, 20231 min read
24 views
0 comments


How to Secure API?
API or Application programming Interface is one of the critical applications in Enteprrise which needs to have security baked in before...
KV
Mar 2, 20231 min read
15 views
0 comments

What is Cloud Security Access Broker (CASB)?
CASB is a security solution that acts as an intermediatory between Users and Cloud service provider. CASB helps mitigate the gaps left...
KV
Mar 1, 20231 min read
21 views
0 comments

What happens when you type a URL in browser
This is quite interesting topic to discuss what exactly happens when you type an URL in the browser and press enter? Let's see that step...
TheTechPriyanka
Nov 24, 20226 min read
282 views
0 comments

Vulnerabilities, Threat and Risk
Despite the fact that Threats, Vulnerabilities, and Risks are often used interchangeably, there are specific meanings to each of these...
TheTechPriyanka
Oct 27, 20223 min read
58 views
0 comments

Hackers Tricking Victims into Installing Android Banking malware
A Network of phishing websites has been identified by a Dutch mobile security company targeting Italian Online-banking users to get hold...
KV
Oct 13, 20222 min read
31 views
0 comments
bottom of page