December 11, 2025

from the web: Everything you wanted to know about Access Lists

 


What Access List? What is standard ACL, extended ACL, named ACL, and what is routing protocol ACL? What is a time-based ACL? How to configure ACL?

What is Access-List?


Access-List or ACL is a set of rules which will allow or deny the specific traffic moving through the router. ACL is defined as controlling network traffic and reducing network attacks. ACLs are used to filter traffic based on the set of rules defined for the IN to the router or OUT to the router of the network. An ACL would be your tool of choice for decision-making for example you can se....

Click on the image for the full article

December 10, 2025

Blast from the past - The Unidisc

 

The disc is metal and the whole thing weighs 2.9 kg (6 lbs, 6 oz) and stored 2 MB in 1996.


If you were a computer enthusiast in the late 1970s or early 1980s, you may remember **The Unidisc**, a quirky but clever attempt at solving one of the era’s biggest headaches: incompatible disk formats. Back when every computer manufacturer believed their floppy disk system was the one true path to digital enlightenment, The Unidisc showed up like a universal translator for storage media. Designed to read and write multiple floppy formats, it became a surprisingly essential gadget for anyone juggling CP/M machines, early PC clones, or that one weird computer your uncle bought from a mail-order catalog. One lesser-known bit of trivia is that The Unidisc often found itself used in small businesses that were transitioning from older dedicated word processors to microcomputers. Rather than retyping mountains of documents—a fate worse than dial-up speeds—they used The Unidisc to transfer data from one platform to another. In an era before USB flash drives, cloud sync, or even reliable networking, this thing was basically the Swiss Army knife of floppy drives. And like any Swiss Army knife, half the time you didn’t know what all the tools did, but you were glad they existed anyway. Another fun fact: enthusiasts still mention The Unidisc in retro-computing forums today, usually followed by a story that starts with “You won’t believe what I found in a box in my parents’ basement…” Many collectors swear by its durability—remarkable considering that modern gadgets beg for a protective case just to survive a gentle breeze. The Unidisc, on the other hand, seems to have been built out of the same material used for 1980s school desks and indestructible lunchboxes. You could drop it, stack things on it, or ignore it for 25 years, and it would probably still spin up. Of course, the true charm of The Unidisc lies in its accidental comedy. It promised “universal compatibility,” which was ambitious for a world where every company wanted proprietary everything, down to the screws. Using it sometimes felt like convincing rival kingdoms to sign a peace treaty—magnificent when it worked, mildly tragic when it didn’t. But when that clunky, glorious machine actually transferred your files without arguing, it felt like magic. Today, it’s a delightful reminder of a time when “plug and play” was more like “plug and pray,” and every working data transfer felt like a small personal victory.


Since the testing with the blog site is going so well, there is a good chance networkdatapedia.com name will be pointing here in the new year.
If you want to get weekly email updates - no spam..  
make sure you subscribe by filling out the contact form on the right with the word subscribe and i will add you to the list.


December 09, 2025

from the net: Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack

 

In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second.

Aisuru is a huge botnet-for-hire service that provides an army of routers and IoT devices compromised via known vulnerabilities or through brute-forcing weak credentials.

Internet management and infrastructure company Clou...

click the image for the full article

December 08, 2025

Linux cp command reference sheet

 

Technical cheat sheets are one of those things you don’t truly appreciate until you’re knee-deep in a problem and need the right command right now. When you’re working with Linux—especially with command-line utilities like cp—even seasoned pros can blank on syntax or flags. A good reference sheet acts like a mental shortcut, giving you instant access to the commands you use often, the ones you occasionally need, and the obscure options you’ve inevitably forgotten. Instead of digging through man pages or searching the web, you have the essentials neatly distilled into something you can scan in seconds.

Beyond convenience, cheat sheets dramatically cut down the cognitive load of technical work. Linux commands tend to pack a lot of functionality into short syntax, and remembering every flag (-r, -v, --parents, --no-clobber, etc.) isn’t a realistic expectation—especially when you're switching between tasks all day. A good cheat sheet reduces that mental juggling. It lets you focus on solving the actual problem instead of second-guessing whether you’re about to overwrite the wrong directory or miss a crucial flag that changes behavior. That reduction in friction adds up to faster, more accurate work.

There’s also an incredible amount of invisible effort that goes into creating a solid technical reference sheet. Anyone who has made one knows it’s more than “just jotting down commands.” You have to test each use case, verify edge behaviors, compare different versions of the command across distributions, and decide what’s essential enough to include. It’s a balance between completeness and usability. Too little info, and it’s pointless. Too much, and it becomes another overwhelming document no one wants to use. Curating clean, reliable, concise technical guidance takes real time, technical depth, and often several iterations.

Finally, cheat sheets become valuable assets not just for the person who creates them, but for entire teams. They help standardize how tasks are performed, reduce onboarding time for new staff, and minimize errors caused by inconsistent knowledge. When dealing with something as powerful—and potentially destructive—as Linux file operations, having a tested and trusted reference isn’t just handy; it’s a safeguard. The payoff is huge: smoother workflows, better accuracy, and a more confident technical environment. In short, technical cheat sheets are small tools with big impact.

Just click on the image to get the full screen view

From Dan Nanni www.study-notes.org




Yup, we're on Facebook, 

December 07, 2025

📌 Packet Bookmarks in Wireshark: The Shortcut You Didn’t Know You Needed

 


When you're staring at a firehose of packets in Wireshark, trying to find that one moment in a chaotic capture can feel like decoding ancient hieroglyphics. That’s where packet bookmarks—or more accurately, sending a deliberate “ping” or identifiable packet during a trace—comes in clutch. By injecting a unique packet into the capture at the right moment, you create a visual anchor that helps you quickly zero in on the part of the traffic you actually care about, instead of scrolling endlessly like you're searching for lost treasure.

This technique is especially handy during live troubleshooting. Let’s say you’re working with a remote user and need to isolate when they clicked something, recreated a bug, or triggered a specific network event. Instead of guessing, you have them run a quick ping or curl command right when the issue occurs. That injected packet shows up as a bright, unmistakable blip in the capture. Once you find it, you’re instantly transported to the exact section of packets you need to analyze—no more hunting through thousands of frames by timestamp alone.


It also helps when multiple engineers are involved. If you're collecting captures from different vantage points—client, server, firewall—you can have everyone trigger the same “bookmark” moment. Later, when comparing traces, those bookmarks become synchronization points. This makes aligning timelines between captures a breeze and eliminates those awkward moments where you're trying to figure out why the client’s clock is three minutes off from the server’s.

Ultimately, packet bookmarks are simple, fast, and surprisingly powerful. They don't require any special Wireshark features or advanced filters—just a strategically injected, recognizable packet. Next time you're taking a trace, throw in a deliberate ping or custom packet at key moments. Your future self, scrolling through a mountain of traffic at 2 AM, will thank you.

Enjoy




Better Wi-Fi for the Hospitality Industry from Ekahau


Popular post in the past 30 days