logologo
HomeProjectsCertificationsArticlesAbout
electrical board

Electrical Pre Trade LVL 3

11/19/2024, 6:06:45 AM

Many practical subjects covered in this course has added much value in part-time work as a junior security technician with Advanced Security. ----> Learning about relays helped me understand how to wire inputs and outputs for exit buttons, EDRs, PIRs, mag clamps, and electronic locks. Understanding how circuits are wired in series and parallel, aided in successfully wiring an EDR's N/C relay in series with an auto-door open relay to unlock the door. Building many small circuits, and a basic domestic circuit, I could see the materials and tools both security technicians and electricians require to carry out the work efficiently.

Read more
Google Drive
DMM measuring continuity

Electrical work at rest home

2/15/2024, 11:41:31 PM

Simple electrical work at a rest home, replacing outlets, fixing bell, new light switch, test & tag.

Read more
Switch

Basic switch configuration

2/2/2024, 7:33:13 AM

This packet tracer scenario includes setting up a hostname and an IP address, MOTD banner, MD5 hashed passwords, and telnet access to a Cisco catalyst 2960 switch from a remote computer. This is a lab from `www.packettracernetwork.com`.

Read more
VPN tunnel with a firewall

Authentication & access control

2/2/2024, 7:30:49 AM

The primary technology that firewalls use for filtering traffic is Access Control Lists. ACLs are typically maintained through a router and filter packets based on the requesting device's source or destination IP address.

Read more
Websocket full duplex communication

Websockets

2/2/2024, 7:24:21 AM

Websockets provide a full-duplex communication channel over a single, long-lived connection between a client and a server on the web, enabling real-time data exchange. This article shows how to exploit websockets

Read more
HTTP smuggling diagram

HTTP smuggling

2/2/2024, 7:19:35 AM

HTTP smuggling is a web vulnerability that allows an attacker to interfere with the way a web server handles the stream of HTTP requests from users

Read more
CSRF

CSRF attack vectors

2/2/2024, 7:18:33 AM

CSRF is a vulnerability that allows an attacker to make requests from an external domain controlled by them. Then calls an endpoint for a vulnerable website that a victim has an account on, then uses the server to complete actions not intended by the victim.

Read more
CORS

CORS vulnerabilities

2/2/2024, 7:16:20 AM

This article will cover CORS and how to protect your website against CORS vulnerabilities. CORS involves modifying the Origin header, and many more complex methods.

Read more
C programming language

Simple functions in C

1/31/2024, 2:26:28 AM

Completing some exercises from the book "Brian Kernighan and Dennis Ritchie - The C Programming Language-Prentice". First exercise.

Read more
View Github
FC connector

Network adapters

1/25/2024, 12:29:56 AM

A list of cable types and network adapters

Read more
Computer rack

Networking hardware & concepts

1/25/2024, 12:28:39 AM

A list of network devices and hardware including diagrams and more info

Read more
NAT router

Network Address Translation - NAT

1/24/2024, 1:07:53 AM

Network Address Translation (NAT) is a networking technique used for modifying IP address information in packet headers while in transit across a routing device. The primary use of NAT is to allow multiple devices on a local network to access external networks, like the internet, using a single public IP address.

Read more
Statistic dashboard

Using statistics and sensors to ensure network availability

1/24/2024, 1:04:51 AM

Gathering information from network devices is mandatory to ensure your devices are functioning correctly.

Read more
Packet tracer scenario of switching and VLANs

Switching & VLANs

1/24/2024, 12:56:03 AM

This article will cover switches at the Data Link layer, as well as VLANs for splitting up broadcast domains and segmenting networks in packet tracer.

Read more
WIFI symbol

Wireless LANs

1/24/2024, 12:46:59 AM

This will cover basic WLAN standards and encryption methods.

Read more
STP example in packet tracer

Spanning Tree Protocol

9/10/2023, 12:42:38 AM

Spanning Tree Protocol is a complex loop prevention algorithm that is used for fault tolerant distrusted switches. This article will cover STP in depth

Read more
Home
Projects
Certifications
Articles
About
GitHubLinkedInStack OverflowDev.toYoutube

@ 2025 Beren Boden.