Category Archives: Network Security

Border Gateway Protocol Explained with Examples

The Border Gateway Protocol (BGP) is a complex, advanced distance routing protocol utilized primarily for exchanging routing information between major Internet Service Providers (ISPs) and larger client sites. It uses the Best Path Selection Algorithm to choose efficient routes, supporting the complexity of the public internet.

Common Network Security Software.

If you are connected to the Internet through a Wired or Wireless network (USB, broadband Modem, or dial-up), most times you deeply rely on your computer and software for protection from viruses and other threats. If you are connected through a router, it might be able to help; because most routers are equipped with a firewall. This helps… Read More »

How To Secure Cisco Routers Explained with Examples

This page discusses the importance of setting strong passwords on Cisco routers to ward off intruders. the following are guidelines for creating passwords, suggests using passphrases, and outlines the two Cisco password protection schemes – Type 7 and type 5 encryption. It also offers command examples for password encryption and establishing minimum password length.