A computer network is a set of two or more interconnected computer devices sharing resources. Computer networks facilitate the exchange of data and resources using a variety of protocols.
Links to this note
- libwrap
- Main Index
- TCP Wrappers
- VPN
- protocol
- Secure Shell (SSH)
- network protocol
- Active Directory
- air-gapped network
- attackable surface
- authentication
- Berkeley r-commands
- Berkeley Sockets API
- border router
- botnet
- BPF
- Cisco Systems
- client
- computer science
- deep packet inspection
- DHCP
- distributed computing
- DNS
- DNS exfiltration
- dsniff
- Ethernet
- exfiltration
- Extreme Networks
- fallacies of distributed computing
- file transfer
- finger
- firewall
- ftp
- hop (networking)
- hostname
- hping3
- ICMP
- installing CyberChef locally
- internet
- Internet of Things (IoT)
- internet protocol
- Internet Protocol
- IP address
- IP camera
- IPv6
- IRC
- Kerberos
- lateral movement
- LDAP
- load balancer
- MAC address
- Main Index - C
- NAT
- Nessus
- netmask
- netstat command
- network equipment
- network security
- network segment
- network tap
- Network Time Protocol
- NIC
- NIDS
- nmap
- ntpd
- older protocols: telnet, rsh
- OpenSSH
- packet
- packet capture
- packet construction
- packet filter
- packet injection
- port
- port - source and destination
- port scan
- private network
- r-commands
- RFC
- RFC1918
- rootkits hide network traffic
- router
- routing
- rsync
- SCADA
- server
- SMB
- SMTP
- sniffer
- socket
- SOHO
- Sourcefire
- syslog
- syslogd
- system monitoring software
- TCP
- TCP session hijacking
- TCP/IP
- telemetry
- telnet
- TFTP
- traceroute
- Transport Layer Security
- trojan
- TTL
- URI
- user name
- VOIP
- vulnerability scanning
- weak passwords
- web browser
- web server
- WiFi
- Windows domain network
- Winsock
- Wireshark