• Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks

Recent Posts

  • Android Attack: Malicious APK Walkthrough
  • No Pain, No Gain! Introducing the Pyramid of Pain
  • Untangling the Web: An Introduction to the OWASP Top 10
  • Phishing : Analysing a Phishy
  • Under ATT&CK: An introduction to MITRE ATT&CK

Recent Comments

  • Anisa on Phishing : Analysing a Phishy
  • Sarah on There Ain’t No Party Like an EC2 Party: Creating Your Website
  • Sarah on Android Attack: Reversing React Native Applications
  • Sarah on Android Attack: Reversing React Native Applications
  • Sarah on Phishing : Analysing a Phishy

Archives

Categories

Skip to content
Security Queens
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks

Day: 28 August 2020

Subnetting IPv4 – TL;DR

by MorganRapid Reads, Technical FundamentalsPosted on 28 August 2020No Comments

Estimated difficulty: 💜💜💜🤍🤍

Every time I attend a course and someone tries to explain subnetting to me, they pretty much un-teach me it and I have to go away and re-learn how it works.

Powered by WordPress Inspiro WordPress Theme by WPZOOM