27 Oct 2014 | Bob Withers
Signs an Email is SPAM

We all get email. We all get junk email. The term that we use is SPAM email. In modern usage, we think of this as the punch line of a “Monty Python” routine. No, I will not sing the “Spam” song for you. The reality is that the term comes from an incident related to the so-called “Robert Morris” worm of 1988. Imagine a piece of Hormel canned meat thrown at the blades of a fan. What comes out the other side?

Read the full story »
31 Oct 2014 | Johnny Bass | CCIE, Certification, Cisco, Routing & Switching
CCIE Routing & Switching Question of the Week: OSPF Process

R6 (in standard area 1) is redistributing routes learned from BGP into the Open Shortest Path First (OSPF) process. Which three OSPF LSA types will R3 advertise into the area 0?

continue
29 Oct 2014 | Guest Authors | Certification, CompTIA, Security+
Security+ Question of the Week: Wireless Network Technology

What technology can use either 2.4 GHz or 5 GHz frequency ranges and can support theoretical throughputs of 600 Mbps when using 802.11 wireless networks?

continue
27 Oct 2014 | James Michael Stewart | Certification, Security
Cybersecurity Awareness Question of the Week: Internet Data

When does data get removed from the Internet?

continue
24 Oct 2014 | Johnny Bass | CCNA, CCNA Security, Certification, Cisco
CCNA Security Question of the Week: Access Control List

Which are key differences between Cisco IOS Access Control List (ACL) configurations and Cisco ASA ACL configurations? (Choose two.)

continue
22 Oct 2014 | Guest Authors | Certification, CompTIA, Security+
Security+ Question of the Week: Vishing

What is vishing?

continue
20 Oct 2014 | James Michael Stewart | Certification, Security
Cybersecurity Awareness Question of the Week: Risky Internet Practices

Which of the following practices places you at the most risk?

continue