Month: August 2023

TCP Flags

 tonyhughes  August 26, 2023

TCP Flags: TCP (Transmission Control Protocol) uses flags in its header to control and manage various aspects of communication. Each…

Common Vulnerabilities and Exposures (CVE)

 tonyhughes  August 26, 2023

Let’s break down what Cyber Security CVEs (Common Vulnerabilities and Exposures) are, provide examples, and explain their usage. 1. What…

Common Vulnerability Scoring System (CVSS)

 tonyhughes  August 26, 2023

a cybersecurity concept known as “Common Vulnerability Scoring System (CVSS)” and how it’s used by cybersecurity analysts. Let’s break it…

C2 (Command and Control) Beaconing Activity

 tonyhughes  August 23, 2023

C2 (Command and Control) beaconing activity refers to a technique used in cyberattacks where compromised machines, also known as “bots”…

Converged Network Interface

 tonyhughes  August 21, 2023

A converged network interface, often referred to as a “converged network adapter” (CNA), is a network interface card (NIC) that…

netstat

 tonyhughes  August 21, 2023

netstat (network statistics) is a command-line utility available in most operating systems, including Windows and Unix-like systems (Linux, macOS). It…