Subscribe to Packets Down Range
Hello all,You will receive a confirmation e-mail, so be on the lookout for that once you submit the form. If you don’t receive it, please check your junk mail or drop me a line. It will come from [email protected].
VRF article in an audio format
Recently, I did a VRF article. Like everyone else, I am seeing what all AI can do. As a result, I have been utilizing an AI tool to convert some of my articles to an audio format (Thanks, Cameron). The …
Border Gateway Protocol (BGP): How the Internet’s Routing Protocol Works
Border Gateway Protocol (BGP) is a protocol that makes the Capitl I Internet run. It is the fundamental system that Internet Service Providers (ISPs) and large networks use to exchange reachability information and ensure data finds its way across the …
Top Hacking Books for cybersecurity professionals
Cybersecurity is among the fastest-growing fields today, offering exciting challenges, high demand, and strong earning potential. If you’re interested in protecting systems, networks, and data from cyber threats, here are some books to get you started. 1. Web Application Hacker’s …
What is a router VRF and why it matters
This post will walk you through what a VRF is, why it matters, and how it’s used in real-world networking. What is a VRF? VRF stands for Virtual Routing and Forwarding. It’s a technology that allows multiple instances of routing …
VRF Architectures
1. Basic VRF Architecture Diagram A single router with two VRFs (e.g., Customer_A and Customer_B), each with its own routing table and interface. Purpose: Shows how two VRFs keep overlapping IP spaces separated. 2. Traffic Isolation in VRFs Two devices …
Much welcome BGP changes in Mikrotik routeros 7.19beta
*) bgp – added input.filter-community;*) bgp – fixed excessive CPU usage;*) bgp – fixed input.accept-community;*) bgp – fixed memory leak on receiving notify and closing session;*) bgp – improved performance on BGP input;
Jon Stewart talks broadband and funding
Take the political commentary from the 3rd party people in the second and third vidoes with a grain of salt. These videos talk about the broadband funding process.
Packets Down Range #35: undersea cable, Indiana broadband, training topics
Thunderstorms, seventy-degree weather, and snow. Welcome to Indiana weather. In this issue, we have some exciting events and topics. Several folks in Indiana are preparing for the 2025 Midwest Broadband Operators Meeting. This is May 14-15th. Interconnection & Data Center …
Ransomware resources if you have been hacked
FBI The U.S. Federal Bureau of Investigations (FBI) has websites about cybersecurity and ransomware specifically. The FBI ransomware site is located here: https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/ransomware(opens in a new tab) NIST The National Institute of Science and Technologies is a U.S. Government agency that …
CyberSecurity Term: Principle of Least Privilege
Least privilege is a security principle that aims to limit user access rights to the minimum necessary permissions required to perform their tasks. By granting only the essential permissions, you reduce the number of potential entry points for unauthorized access …