Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.
Network Security: ARP SpoofingDelves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.
Control Networks: MAC ProtocolExplores the MAC protocol in control networks, addressing packet collisions and different MAC protocols' operation and efficiency.
Censorship ResistanceExplores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
Networks: IP ProtocolExplores the Internet Protocol (IP), BFS algorithm, routing tables, and IPv4 addresses.