It’s IPv6 day!
Which of these characters can be used to abbreviate IPv6 addresses?
Why is the IPv4 address range of 127.0.0.0/8 not considered part of a subnet class?
At what point is the “Last Known Good Configuration” updated to the current configuration? A) Five minutes after boot B) During the next login C) During the next System Restore checkpoint D) During the next logoff E) What’s really “good?” What if the configuration is only “somewhat reasonable?”
What USMT application gathers user data and settings to use for a migration?
What is the recommended video RAM requirement for Windows Vista Business?
The bad guys know that attachments and add-ons are some of the easiest ways to attack our computer systems. In this video, you’ll learn about malicious attachments and how some bad guys have used add-ons to take over our PCs.
CompTIA Security+ SY0-301: 3.5 – Malicious Add-ons and Attachments Read More »
Our browsers are very good at saving “cookies” of information to our hard drive, and these details can often be used against us. In this video, you’ll learn how session information saved in browser cookies can be easily manipulated in packet headers to gain unauthorized access to web applications.
CompTIA Security+ SY0-301: 3.5 – Cookies, Header Manipulation, and Session Hijacking Read More »
Are your applications susceptible to attack? In this video, you’ll learn about zero-day attacks and what happens when a zero-day attack is announced.
CompTIA Security+ SY0-301: 3.5 – Zero-day Attacks Read More »