I’m doing the network prototyping for my Product Development group project and the plan is to establish 3G connectivity on[…]
Read moreMonth: March 2014
Scanamenities workshop
Yesterday we had a one day workshop, where we had the task of generating some concepts for the 3rd generation[…]
Read moreCategorizing IP addresses when monitoring
When monitoring a network one must keep in mind different known or unknown IP addresses. For a monitoring system setup[…]
Read moreSpreadsheet ### error
I ran upon a strange error in an Excel spreadsheet the other day – 4 digit numbers are displayed as[…]
Read moreCustom laptop battery notifications
Since i bought my laptop, i was concernead of the long-term effects of keeping it plugged in constantly. A lot[…]
Read moreNetworking-student photo session
I was approached by a student doing her internship for the school. She’s doing a booklet that will describe “A[…]
Read moreMounting a TrueCrypt volume from the command-line
If you are reading this post, i’m assuming that you know about TrueCrypt and that you already have an encrypted[…]
Read moreImpressions from Karrieredagene 2014
Like i was saying 2 weeks ago, today i went to this carrer day event in Odense. I came right[…]
Read moreProtect against ARP-spoofing
In a previous article i’ve talked about how you can sniff traffic on LAN using ARP. In this article we[…]
Read moreUnderstanding the Snort architecture
Snort first started as a packet sniffer. Another common example of a packet sniffer is tcpdump, or its graphical big[…]
Read more