Coen Goedegebure's Blog
  • Home
  • About
  • Contact
  • Donate
       

Network

A collection of 3 posts

Security / Hacking / Network

Executing a man-in-the-middle attack

How can you become a man-in-the-middle on a network to eavesdrop on user traffic and what can you do to protect yourself against such an attack?

  • Coen Goedegebure
    Coen Goedegebure
19 min read
Network / Development / Security

The OSI Model

Understanding the OSI model and the aspects of its 7 layers is important for any IT professional who is involved with networking and connectivity

  • Coen Goedegebure
    Coen Goedegebure
7 min read
Network / Security / Hacking / Development

TCP 3-way handshake and port scanning

How does the TCP 3-way handshake work and how is it used to perform a port scan?

  • Coen Goedegebure
    Coen Goedegebure
7 min read
Coen Goedegebure © 2025
Home Twitter LinkedIn Google+