This blog was originally started to better help me understand the technologies in the CCIE R&S blueprint; after completing the R&S track I have decided to transition the blog into a technology blog.
CCIE #29033
This blog will continue to include questions, troubleshooting scenarios, and references to existing and new technologies but will grow to include a variety of different platforms and technologies. Currently I have created over 185 questions/answers in regards to the CCIE R&S track!! Note: answers are in the comment field or within "Read More" section.
You can also follow me on twitter @FE80CC1E
You ever wonder how secure your wireless network really is and whether an intruder can easily gain access; have a look at the presentation below to find out how easy it is to penetrate a wireless network that is not properly secured.
Disclaimer: The techniques in the presentation are to be used on networks that you own and/or have explicit access and permission to perform such activities.
The link below will download the presentation I put together some time ago:
Give some of the techniques a try and let me know your findings.
0 comments:
Post a Comment