Latest postings by Michael Seese
A proxy firewall is one of the safest but also one of the slowest. As is the case with a lot of information security, there often is a ...more>>
When referring to someone’s state, as in “state of confusion,” you are referring to a (hopefully) temporary condition.&nbs ...more>>
As the name would imply, an access control list, or ACL, says who can and can't enter your firewalls.
Good security practice dictates ...more>>
Technology aside, encryption is really nothing more than the use of a secret code to hide information from the people to whom you wish to ke ...more>>
I could swear that I posted this. But I can't find any reference, so I'll try again...
Packet-filtering firewalls examine only a limi ...more>>
The previous posts outlined the basics of networks and communications. I don’t believe that you wasted your time reading it.&nbs ...more>>
If you want to determine your own personal IP address, and a host of other things you might really be happier not knowing about your compu ...more>>
Perhaps a bit esoteric, but let's consider DHCP...
Dynamic host configuration protocol, an update/extension of the boot protocol (or BOOTP) ...more>>
In order for information to be sent across the Internet, both parties in the conversation need a unique address. After all, my web bro ...more>>
The Internet is a network of networks, the “mother of all WANs.” In other words, it is a bunch of intranets which can talk to each other ...more>>
Before diving into the details of the Internet and networks in general, I wanted to cover a few bona fide propeller-head concepts. I alrea ...more>>
Before diving into the details of the Internet and networks in general, we need to cover a few bona fide propeller-head concepts. Today, i ...more>>