background preloader

Networks

Facebook Twitter

Network Forensics Puzzle Contest. WEP algorithms. December 2006 by Arvind Doraiswamy | Discuss this article »» (2) As you probably already know Wired Equivalent Privacy (WEP) is used by companies to secure their wireless connections from sniffing attacks.

WEP algorithms

You’ve probably also heard that it’s not very secure. In the first part of this 2 part series I’ll explain the inner workings of WEP and follow it up next month with why it’s insecure. Aircrack-ng. OSI model. Model with 7 layers to describe communications systems The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

OSI model

Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.

Network Scanning