March 09, 2026

Why Is Your ‘Gigabit’ Port Is Only Doing 100 Mbps

Why Is Your ‘Gigabit’ Port Is Only Doing 100 Mbps


The first time i saw this switch , all sort of red flags shot up in my head. Do you see the issue here? I will give you a hint; the devices are all new (1 Gb ethernet), the switch has 1 Gb ethernet ports.

Ok here goes my rant....

You pay for gigabit. You bought the gigabit switch. The box literally says Gigabit Ethernet in bold, confident letters. And yet… your port is humming along at a very 2005-looking 100 Mbps. What gives? Before you start blaming your computer, your switch, or Mercury being in retrograde, take a breath — there are a handful of very common reasons your link decided to downshift.

The usual suspect? Cabling. Gigabit Ethernet needs all four twisted pairs inside that cable to work properly. Fast Ethernet (100 Mbps) only needs two. So if one pair is damaged, poorly crimped, bent, or simply missing (looking at you, mystery wall jack), the link will politely negotiate down to 100 Mbps and call it a day. A quick cable swap with a known-good Cat5e or Cat6 cable solves this more often than anyone likes to admit.

March 05, 2026

Basics of Wireshark – Session 1 – Setting up your Wireshark Install

Basics of Wireshark – Session 1 – Setting up your Wireshark Install

 The “Basics of Wireshark – Session 1: Setting Up Your Wireshark Install” article on InfoSecMonkey walks beginners through everything needed to get started with one of the most powerful network protocol analyzers available today. It begins with clear, accessible guidance on how to download and install Wireshark—whether you’re on Windows, macOS, or Linux—and ensures you understand the essential options and components that make the installation successful. By following this session, even those new to network analysis will gain confidence installing the software and preparing it for real-world use.

March 04, 2026

Capture DHCP packets to get a lease on your troubleshooting life

Capture DHCP packets to get a lease on your troubleshooting life

Ever feel like your network just decides not to work? That’s usually DHCP quietly causing chaos behind the scenes. Capturing DHCP packets is like eavesdropping on the most important conversation happening on your LAN. You get to watch the full DORA process — Discover, Offer, Request, Acknowledge — play out in real time. Is the client yelling “Anybody got an IP?” and getting ghosted? Is the server offering an address that never gets accepted? A quick packet capture tells the story faster than any guesswork ever could.

March 03, 2026

Drilled .. And Missed The SSD That Refused to Die

Drilled  .. And Missed   The SSD That Refused to Die

Yes, this is true—or at least it's a real incident that went viral recently (around mid-February 2026, based on the reports).

The image and caption comes from a post originally shared on Reddit (in r/LinusTechTips and similar subs), where someone posted photos of a drilled 2.5-inch SATA SSD. The drill went straight through the metal/plastic casing but completely missed the actual PCB (printed circuit board) and NAND flash chips, which were clustered toward one end near the SATA connector. The hole was basically in empty space inside the enclosure.

March 02, 2026

The Evolving Challenge: Criminal Investigations in the Age of Digital Media and AI


Introduction

The modern criminal investigation has changed more in the past fifteen years than in the previous fifty.
Where cases once relied heavily on physical evidence, witness testimony, and paper records, today’s investigations are dominated by digital artifacts. Smartphones, cloud accounts, messaging platforms, IoT devices, encrypted apps, and artificial intelligence–generated media now shape the evidentiary landscape.

For investigators, prosecutors, and forensic examiners, this transformation has introduced both unprecedented opportunity and significant complexity.

1. The Explosion of Digital Evidence

Every crime scene today has the potential to be a digital crime scene.

Even traditional offenses such as domestic violence, fraud, homicide, or theft now involve mobile phone data, social media interactions, cloud storage accounts, smart home devices, vehicle telematics, surveillance systems, and wearable technology.

Popular post in the past 30 days