article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I wasn't really interested in security because I was mainly interested in enterprise infrastructure, how to design, big LANs for for networking on organizations like getting file shares up and running so I was an early adopter of Windows infrastructure like Windows, and early, Windows for Workgroups later on, like, NT 4.0 and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I wasn't really interested in security because I was mainly interested in enterprise infrastructure, how to design, big LANs for for networking on organizations like getting file shares up and running so I was an early adopter of Windows infrastructure like Windows, and early, Windows for Workgroups later on, like, NT 4.0 and such.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I wasn't really interested in security because I was mainly interested in enterprise infrastructure, how to design, big LANs for for networking on organizations like getting file shares up and running so I was an early adopter of Windows infrastructure like Windows, and early, Windows for Workgroups later on, like, NT 4.0 and such.

article thumbnail

Introduction to Networking: Part 2, A Few More Basics

Scott Lowe

A virtual LAN , aka a VLAN , allows you to have this ability. Switches generally support a variety of load balancing mechanisms, including source-destination MAC addresses, source-destination IP addresses, and sometimes even layer 4 (TCP/UDP) source-destination ports.

Network 61