Ingram’s Zettelkasten
Home
Zettelkasten
Four Essential Freedoms
The Open Source Definition
List
Linked List
Software Defined Networking
Docker
Docker File
Docker Compose
Vim Tabpage Interesting Commands
Vim Buffers Interesting Commands
Vim: Windows and Buffers
Rust Smart Pointers
Double Linked List
Circularly Link List
Stack
Linked List Implementation of Stack
Array Implementation of Stack
Difference between thread and processes
Thread Creation in Pthread
Race Condition
Mutex in Pthread
Routine in Pthread
Queue
Array Implementation of Queue
Tree
Traversal
Linked List Tree
Binary Tree
Binary Search Tree
AVL Tree
Splay Tree
B-Tree
Hash Table
Hash Function
Hash Collision
Separate Chaining
Open Addressing
Linear Probing
Primary Clustering
Quadratic Probing
Conditional Variable in Pthread
Thread Detachment in Pthread
Double Hashing
Load Factor
Rehashing
Extendible Hashing
Barrier in Pthread
Relative Growth Rates
Growth Rates Ranking
Algorithm Analysis
Kubernetes
Semaphore in Pthread
Producer-Consumer Problem
Kubernetes Pod
Kubernetes Service
Kubernetes Ingress
Kubernetes ConfigMap
Kubernetes Secret
Kubernetes Volume
Kubernetes Deployment
Kubernetes StatefulSet
Differences between Parallelism and Concurrency
Limitation of Parallelism
Concurrency
Lock-Guard
Atomic Variable
Kubernetes Worker Node
Kubernetes Master Node
Kubelet
Kube Proxy
Kubernetes API Server
Kubernetes Scheduler
Kubernetes Controller Manager
etcd
Resource Acquisition Is Initialisation (RAII)
Resource Management
Minikube
Kubectl
SOLID
Parallel Advanced Technology Attachment (PATA)
Serial Advanced Technology Attachment (SATA)
Small Computer System Interface (SCSI)
Linux’s Storage Management
Kubernetes Configuration
Docker Swarm
Linux File Systems
Extended File System
Journaling Filesystem
Priority Queue/Heap
Binary Heap
List Implementation of Heap
const_cast
constexpr
Pure Function
volatile
XFS
d-Heap
Kubernetes Namespace
Kubernetes Node
Kubectx
static
extern
Leftist Heap
Skew Heap
Binomial Queue
Function Pointer
Linux Memory Management
Recursive Function
Helm
Persistent Volume
Persistent Volume Claim
Storage Class
Persistent Volume Configuration
Persistent Volume Claim Configuration
Kubernetes Pod Configuration
Storage Class Configuration
Signal Handling in C
Socket Programming
Kubernetes Deployment Configuration
Kubernetes Service Configraution
Kubernetes Secret Configuration
Kubernetes ConfigMap Configuration
Kubernetes Ingress Configuration
Kerberos
Compound Literal
enum
Deadlocks
Disk Quota
Hypertext Transfer Protocol (HTTP)
Docker Image
Container
Big-Endian
Little-Endian
Insertion Sort
On Improving a Sorting Algorithm
Heapsort
Bubble Sort
Selection Sort
Shellsort
Documentation Guide
C++ Standard Template Library (STL)
C++ Container
Iterator
Moral Relativism
ReiserFS
Racism
Question of Socialism
Mergesort
Quicksort
Optimisation
Nation
National Self-Determination
Copyright
The Nature of Computer and Networking
Compliance
Invasion Biology
Representation of Object in Memory
Mach User Interface
Mach
Mach’s Networking
Bucket Sort/Radix Sort
Comparison Sort
Imperialism
Functional Programming
Clojure’s Persistence Collections
Clojure
Lazy Sequence
Memory Alignment
Security Hygiene
Debugging Tools
GDB
Rancangan Pendidikan Falsafah Malaysia
Percolation
Internal Sorting
External Sorting
Two-way Merge
K-way Merge
Polyphase Merge
Replacement Selection
Proletarian Feminism
Debugging Guide
Socialist Organisation Disciplines
Docker Networking
Asymmetric Cryptography
SSH Tunnelling
Explicit Conversion
Lambda Expression
Exception Safety
Copy-on-write
Docker Volume
Docker Registry
C++ Concepts
Docker CLI
Docker Container
Namespace Isolation
Windows Containers
Hyper-V Isolation
macOS Hypervisor Technology
Fleeting Note
Permanent Note
Literature Note
Container Orchestration
Docker Service
Swarm Manager
Swarm Worker
Forwarding References
Perfect Forwarding
Regex Back References
Rust Trait
Linux Container (LXC)
Control Groups (Cgroups)
Application Container
System Container
Virtual Machine (VM)
I/O Improvement in C++
Linux
Linux CPU Scheduler
Completely Fair Queuing (CFQ)
Deadline
Systemd
Relationship Between Problem Report, Symptoms and Defects
Understand a Bug
Locate a Bug
Atomicity of a Note
Note-Taking Tips
Bug Classification
Version Control Hygiene
Graph
Directed Graph
Undirected Graph
Topological Sort
Shortest-Path Algorithm
Unweighted Shortest Path
Dijkstra’s Algorithm
Create A Table for Shortest Path Algorithm
Greedy Algorithm
Negative Edge Costs Shortest-Path
Span
Server-Side Request Forgery (SSRF)
Compile Time Type Determination
C++ Traits
C++ Alternatives
Template Deduction Guide
Dijkstra’s Algorithm with Vertex Selection Rule
Critical Path Analysis
Common Problem in Finding Longest or Shortest Path in Non-acyclic Graph
Peto’s Paradox
How to Decrease the Possibility of Getting Cancer
On State
On Romance Relationship
Socialist Democracy
Phase of Communism
A United Proletariat
Mach’s Interprocess Communication (IPC) Facility
Mach’s Message’s Structure
Mach Network Message Server (NetMsgServer)
Common Lisp Static Type Checking
Common Lisp Type System
Common Lisp Dynamic Type Checking
Common Lisp Compiler Hint
Git Rebase
Git Merge
Git Cherry-Pick
Git Branch Creation
Git HEAD
Git Revert Commits
Git Pull
Minimum Spanning Tree
Prism’s Algorithm
Kruskal’s Algorithm
Ansible
Transfers SSH Public Key
Ansible Playbooks
Ansible Inventory
Feynman Technique
Mathematical Statement
Universal Statement
Existential Statement
Set
Commonly Used Set
Subset
Ordered Pair
Cartesian Product
Set-Builder Notation
Set-Roster Notation
Cartesian Plane
Dynamical System
Relation
Function
Red Hat Ansible Automation Platform
Ansible Modules
Ansible Plugins
Ansible Collection
Ansible Execution Environment (EE)
Ansible Content Navigator
Ansible Basic Configuration (ansible.cfg)
Trade Union
The Eminent Collapse of Capitalism
The Role of Small and Medium Enterprises in Capitalism
Depth First Search (DFS)
Biconnectivity
Urban Planning
Housing Crisis
Avoid Loops in Python
Gopher
URL Parsing
Infrastructure Configuration Management
HashiCorp Terraform
Ansible Variables
Ansible Roles
Automation Hub
Means to Get Ansible Collections
Ansible Galaxy
Ansible Templates
X Window System
XFree86
Xorg
Font
Bitmap Font
Outline Font
Mouse
Linux Video Card Drivers
X Core Font
Xft Font System
Truth Table
Compound Statement
Logical Equivalence
The Laws of Logic
Logical Operators’ Precedence
Necessary and Sufficient Condition
Logic
Argument
Conditional Statement
Dialogic Learning
Null Hypothesis Significance Testing
Security Computer Mode (Seccomp)
Linux Security Modules (LSM)
Euler Circuit
Euler Path
Hamiltonian Cycle
Halting Problem
NP-Complete Problems
Dutch
Greetings in Dutch
The Period of Day in Dutch
Introduction in Dutch
Dutch Pronouns
Dutch Possessive Pronouns
Participation in Liberal Democracy
C++ Allocator
Lateral Propagation
Deep Propagation
Nondeterministic Polynomial-Time (class NP)
decltype
C Linkage Keyword
restrict
Aliasing
register
C Hygiene
alignas and alignof
Inline Function
Skewness of Distribution
Salafism
Wahhabism
X Display Manager Control Protocol (XDMCP)
Display Manager
X Display Manager (XDM)
KDE Display Manager (KDM)
GNOME Display Manager (GDM)
Light Display Manager (LightDM)
Secure Shell (SSH)
SSH Configuration
Braille Display
startx
openSUSE
Virtual Network Computing (VNC)
Time Zone
Encoding
Capitalist Mode of Production
Function-like Macro Hygiene
_Generic
Automation Controller
Red Hat Enterprise Linux
Git
Git Push
Git Relative Positioning
Git Fetch
Git History Visualisation
Showing Contributors
Git Notes
Setting up a Laravel project
Class Browser
Refactoring Browser
Printing in Linux
Ghostscript
Common Unix Printing System (CUPS)
Internet Printing Protocol (IPP)
PostScript Printer Definition (PPD)
Science Funding
Application Binary Interface (ABI)
Mach Memory Management
Refactoring
Sport Participation
Infrastructure as Code (IaC)
Server Templating
Infrastructure Provisioning
HashiCorp Configuration Language (HCL)
Python Resource Clean Up
Python Context Management Protocol
Terraform Providers
Terraform Registry
Terraform Plugins
Terraform Project Structure
Python Convention
yield
Python Generator
Python Object Creation
Python Object Initialisation
Test Harness
Maximum Flow Problem
Flow Graph
Ford-Fulkerson Algorithm
Augmenting Path
Residual Graph
Residual Edge
traceback
Syllogism
Modus Ponens
Modus Tollens
Generalisation
Specialisation
Elimination
Transitivity
Malaysian University English Test (MUET)
Emacs Keybinding
Emacs
Emacs Default Commands
Open Systems Interconnection (OSI) Model
Protocol Data Units (PDU)
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Dired
Terraform Variable
Internet Protocol (IP)
Transmission Control Protocol (TCP)
Internet Protocol Suite (TCP/IP)
Media Access Control Address (MAC)
IPv4 Address
Device’s Address
Dynamic Host Configuration Protocol (DHCP)
User Datagram Protocol (UDP)
Well-Known Ports
DRY Principle
Proof by Division into Cases
Logical Fallacy
Affirming The Consequent
Denying The Antecedent
Contradiction Rule
Test Driven Development (TDD)
Unit Testing
Integration Testing
Regression Testing
Validation and Verification of System Requirements
Performance Testing
Usability Testing
Environmental Testing
Rust Box
Rust Deref
Rust Drop
Reference Counting Pointer
Rust RefCell
Rust Borrowing Rule
Rust Weak Pointer
Reference Cycle
Virtual Memory
Bugis People
Turkey Under Erdoğan
Address Classes
Subnetting
IP Address
IPv6 Address
Regional Internet Registry (RIR)
C Resource Clean-Up in Multithreading Environment
Network Address Translation (NAT)
Static NAT
Dynamic NAT
Port Address Translation (PAT)
Islamic Philosophy
Solar Power
Concentrated Solar Power (CSP)
Photovoltaic (PV)
Boolean Expression
Digital Logic Circuit
Recogniser
Two’s Complement
Minangkabau People
Adders
Runtime Diagnostics
Design by Contract (DBC)
Law of Demeter
Model-View-Controller (MVC)
Publish/Subscribe Protocol
CORBA Event Service
Blackboard System
Ethernet
Local-Area Network (LAN)
Carrier Sense Multiple Access Collision Detect Protocol (CSMA/CD)
Collision Domain
Network Device
Repeater
Bridge
Switch
Ethernet Hub
Store-And-Forward Switching
Cut-Through Switching
Fragment-Free Switching
Broadcast Domain
Virtual LAN (VLAN)
Router
Routing Protocol
Link-State Routing Protocol
Distance Vector Routing Protocol
Path-Vector Protocol
Hierarchical Network
Autonomous System (AS)
Interior Gateway Protocols (IGP)
Exterior Gateway Protocols (EGP)
Defensive Programming
Spanning Tree
Spanning Tree Protocol (STP)
Network Loop
“It Can’t Happen”
Crash Program Earlier
Assertions
Prototyping
Software Development Practices
Predicate
Implicit Quantification
Rapid Spanning Tree Protocol (RSTP)
Multiple Spanning Tree (MST)
Active Reading
Critical Reading
Active Image Viewing
Code Generator
Unix Philosophy
Wide Area Network (WAN)
Point-to-Point/Leased Line
Circuit Switching
Packet Switching
Multiprotocol Label Switching (MPLS)
Virtual Private Network (VPN)
Randomness
Multithreading Management
Thread Creation in Rust
Rust Channel
Mutex in Rust
Go Programming Language
Rust Send
Rust Sync
Autovivification
Universal Conditional Statement
Existential Universal Statement
Selangor Civil War
Perl Type Conversion
Perl Boolean
Perl Reference
Perl Logical Operators
Perl Trigonometric Functions
Radian and Degree
Conjunction
Git Archive
Rubber Ducking
Emacs Keyboard Macro
Dictatorship of The Proletariat
Version Control System (VCS)
Larut War
Frame Relay
Virtual Circuit
Switched Virtual Circuit (SVC)
Permanent Virtual Circuit (PVC)
Integrated Services Digital Network (ISDN)
Broadband
Cable Modem
Scientific Reading
Digital Subscriber Line (DSL)
Symmetric Cryptography
Data Encryption Standard (DES)
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)
Diffie-Hellman Key Exchange
Metropolitan Area Network (MAN)
Fibre-Optic Cable
Multimode Fibre-Optic Cable
Single-Mode Fibre-Optic Cable
Attenuation
Dispersion and Non-Linearities
Chromatic Distortion
Polarisation or Mode Distortion
Optical Ethernet
Coarse Wavelength Division Multiplexing (CWDM)
Dense Wavelength Division Multiplexing (DWDM)
Synchronous Optical Network (SONET)
Dynamic Packet Transport (DPT)
Box Evaluation
Multiplexing
Time-Division Multiplexing (TDM)
Wavelength Division Multiplexing (WDM)
Frequency Division Multiplexing (FDM)
Perl Array
Asynchronous Transfer Mode (ATM)
Perl Hash
LAN Emulation (LANE)
Figma Open Source Alternative
Terraform State
Security Service
TNS3131 Network Security And Management
TNS3131 Chapter 1: Overview of Network Security
Security Attack
Security Mechanism
Passive Attack
Active Attack
Interruption
Interception
Modification
Fabrication
Computer Security
Network Security
Internet Security
Masquerade
Denial of Service (DoS)
Replay Attack
Transport Layer Interface (TLI)
TTP3121 TCP/IP Programming
TTP3121 Chapter 1: Introduction
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Internet Service Provider (ISP)
CCNA Certification
TRS2251 Routing And Switching
TRS2251 Chapter 1: Introduction to OSI Model and Internetworking
Network Communication Media
Immutable Infrastructure
Python Descriptor
Terraform Lifecycle
Cryptography
TAC3121 Applied Cryptography
TAC3121 Chapter 1: Introduction
Cryptanalysis
Cryptology
Substitution Cryptography
Shift Cipher
Rotor Machine
Kerckhoff’s Principle
Block Cipher
Stream Cipher
Unconditional Security
Computational Security
One-Time Pad
Cryptanalytic Attack
Brute Force Attack
Quality of Service (QoS)
Forwarding Equivalence Classes (FEC)
TIT3131 Information Theory
TIT3131 Chapter 1: Information Sources and Sources Coding
Information Theory
Entropy
Information
Source Coding Theorem
Source Encoder
Channel Encoder
Modulator
Channel Coding Theorem
Discrete Memoryless Source (DMS)
Domain Name Server (DNS)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Differentiated Service
BSD Packet Filter (BPF)
Datalink Provider Interface (DLPI)
Network Congestion
Protocol
Message Timing
Access Method
Flow Control
Response Timeout
Message Delivery Options
Network Access Protocols
Protocol Suite
ISO
AppleTalk
Novell Netware
Internet Open Standards Organisation
Institute of Electrical and Electronic Engineers (IEEE)
International Organization for Standardization (ISO)
Internet Society (ISOC)
Internet Architecture Board (IAB)
Internet Engineering Task Force (IETF)
Internet Research Task Force (IRTF)
Internet Assigned Numbers Authority (IANA)
Segmentation
Encapsulation
Decapsulation
Integrated Service Router (ISR)
Network Interface Card (NIC)
Network Infrastructure
Physical Topology Diagram
Logical Topology Diagram
Converged Network
Network Reliability
Cloud Computing
Data Center
Network External Threat
Network Internal Threat
Cisco Internetwork Operating System (IOS)
TTP3121 Chapter 2: Introduction to Unix Based OS
Fedora
Ubuntu
Debian
Confidentiality
Authenticity
Integrity
Availability
Non-Repudiation
Access Control
Encryption and Security Applications
Firewall
Security Standard
Peer Entity Authentication
Data Origin Authentication
Traffic Flow Confidentiality
Digital Signature
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarisation
Specific Security Mechanism
Trusted Functionality
Security Label
Event Detection
Security Audit Trail
Security Recovery
Pervasive Security Mechanism
Communication System
Information Source
Discrete Information Source
Information Rate
TNS3131 Chapter 2: Conventional Encryption and Message Confidentiality
Permutation/Transposition Cryptography
IP Security (IPsec)
Feistel Cipher Structure
Avalanche Effect
Double Data Encryption Standard (2DES)
Meet-In-The-Middle (MITM)
International Data Encryption Algorithm (IDEA)
Blowfish
RC5
Cast-128
Link Encryption
End-to-end Encryption (e2e)
Traffic Analysis
Key Distribution
Key Distribution Center (KDC)
Kernel
Program
Process
Unix System Call
Shell
Electronic Codebook (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
Message Padding
Keyspace
TAC3121 Chapter 2: Finite Fields and Computational Number Theory
Algebraic Structure
Group
Ring
Field
Abelian Group
Communicative Ring
Integral Domain
Modular Arithmetic
Modulo Reduction
Divisor
Greatest Common Divisor (GCD)
Euclidean Algorithm
Galois Field
Lossless Data Compaction
Prefix Coding
Kraft-McMilan Inequality
Hostname Naming Convention
TRS2251 Chapter 2: Introduction to Routing and Packet Switching
Metallic Cable
Unshielded Twisted Pair Cable (UTP)
Shielded Twisted Pair Cable (STP)
Straight-Through Cable
Twisted Pair Cable
Crossover Cable
Roll-Over Cable
Routing Table
Routing Table Principles
RC4
TNS3131 Chapter 3: Public-Key Cryptography
Rivest-Shamir-Adleman (RSA)
Timing Attack
Public Announcement
Publicly Available Directory
Public-Key Authority
Public-Key Certificate
Simple Secret Key Distribution
Hybrid Key Distribution
Differential Cryptanalysis Attack
Integral Cryptanalysis Attack
Side-Channel Attack
Man-In-The-Middle Attack (MITM)
Cisco Packet Tracer
Huffman Coding
Variance of Code-Word Length
Lempel-Ziv Coding
Average Code-Word Length
TRS2251 Chapter 3: Variable Length Subnet Masking and Classless Inter-Domain Routing
Classful Routing Protocols
Classless Routing Protocols
Fix-Length Subnet Masking
Intermediate System to Intermediate System (IS-IS)
Routing Information Protocol (RIP)
Classless Inter-Domain Routing (CIDR)
Variable-Length Subnet Masking (VLSM)
TTP3121 Chapter 3: File Manipulation
Linux Directory Structure
File Descriptor
Linux File Types
TNS3131 Chapter 4: Authentication Application
Simple Authentication Dialogue
State Pattern
Kerberos Version 4
Kerberos Version 5
Nonce
X.509 Authentication Service
Triple A (AAA)
Authorisation
Accounting
Remote Access Dial-In User Service (RADIUS)
Diameter
File Transfer Protocol (FTP)
MMU Network Structure
Prime Factorisation
Fermat’s Theorem
Euler Totient Function
Euler’s Theorem
Chinese Remainder Theorem (CRT)
Primitive Root
Discrete Logarithms (DLOG)
Computational Diffie-Hellman (CDH) Problem
Job Control
TRS2251 Chapter 4: Dynamic Routing
Border Gateway Protocol version 4 (BGPv4)
Hub-And-Spoke Network
Convergence
Load Balancing
Equal Cost Load Balancing
Administrative Distance (AD)
TIT3131 Chapter 2: Channel Capacity and Coding
Discrete Memoryless Channel (DMC)
Channel Matrix
Conditional Probability
Lossless Channel
Deterministic Channel
Noiseless Channel
Binary Symmetric Channel
Mutual Information
Conditional Entropy
Join Probability Distribution
Join Entropy
Interprocess Communication (IPC)
POSIX Mandatory Lock
POSIX Advisory Lock
Pipe
Channel Capacity Theorem
Block Code
Critical Rate
Signal-to-Noise Ratio (SNR)
TAC3121 Chapter 3: Classic Ciphers
Monoalphabetic Cipher
Frequency Analysis
Polyalphabetic Cipher
Playfair Cipher
Hill Cipher
Vigenère Cipher
Kasiski Method
Autokey Cipher
TNS3131 Chapter 5: Electronic Mail Security
Pretty Good Privacy (PGP)
Radix-64 Encoding
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Multipurpose Internet Mail Extensions (MIME)
RFC 5322
TTP3121 Chapter 4: Unix Processes Control
TTP3121 Chapter 5: Signals
Signal
Signal Handling In POSIX
TIT3131 Chapter 3: Linear Block Coding
Bandwidth Efficiency Diagram
Shannon’s Limit
Error Control Coding
Convolutional Code
Systematic Code
Linear Block Coding
Identity Matrix
Generator Matrix
TRS2251 Chapter 5: Static Routing
Static Routing
Cisco Discovery Protocol (CDP)
Recursive Route Lookup
Default Route
TRS2251 Chapter 6: RIP Version 2
RIP version 2 (RIPv2)
Vernam Cipher
Rail Fencer Cipher
Row Transposition Cipher
Block/Columnar Transposition Cipher
Product Cipher
TAC3121 Chapter 4: Asymmetric (Public-Key) Encryption
Indistinguishability Against Chosen Ciphertext Attack (IND-CCA)
One-Way Function
Trapdoor One-Way Function
TTP3121 Chapter 6: Inter Process Communication Part 1
Unix Sockets
Named Pipe (FIFO)
Expert System
Machine Learning
Android Programming
TNS3131 Chapter 6: IP Security
Security Association (SA)
TRS2251 Chapter 7: OSPF
Open Shortest Path First (OSPF)
Cisco OSPF Router Configuration
Hamming Weight
Square-and-Multiply Algorithm
Syndrome Decoding
Hamming Distance
Minimum Distance
Hamming Code
Null Object Pattern
Fileless Malware
Two Hats Analogy
Windows Management Instrumentation (WMI)
Web-Based Enterprise Management (WBEM)
Common Information Model (CIM)
Computer Virus
Name Space
Link/Carrier Availability
Scavenger QoS
Design Pattern
Class Diagram
Observer Pattern
Singleton Pattern
Hot Standby Router Protocol (HSRP)
Mediator Pattern
Terraform Data Source
Terraform Meta Arguments
Terraform Resource Replication
Perl Variable
TNS3131 Chapter 7: Web Security
Secure Socket Layer (SSL)
Web Defacement
Web Proxy
Transport Layer Security (TLS)
Secure Electronic Transaction (SET)
TRS2251 Chapter 8: Switching Technology
Switched LAN Architecture
Fixed Configuration Switch
Modular Switch
Stackable Switch
Switch Considerations
Cisco Switch Configuration
TTP3121 Chapter 7: Inter Process Communication Part 2
IPC Facilities Key
Message Queue
Semaphore in System V
Avoiding Timing Attack on RSA
Chosen Ciphertext Attack (CCA) on RSA
El Gamal Encryption
Chosen Ciphertext Attack (CCA) on El Gamal
Comparable Key Sizes for Equivalent Security in Various Encryption Scheme
TAC3121 Chapter 5: Symmetric Cryptography
TTP3121 Chapter 8: TCP & UDP Part 1
Byte Operations in C
TTP3121 Chapter 9: TCP & UDP Part 2
Get Hostname in C
Analytic Attacks
Differential Cryptanalysis
Linear Cryptanalysis
Lucifer
VLAN Trunking Protocol (VTP)
Dynamic Trunking Protocol (DTP)
TIT3131 Chapter 4: Cyclic Code
Cyclic Code
Generator Polynomial
Code Word Polynomial
Parity Polynomial
Parity-Check Polynomial
Parity-Check Matrix
TNS3131 Chapter 8: Network Management Security
Network Management
Network Management System (NMS)
Management Station or Manager
Management Agent
Management Information Base (MIB)
Simple Network Management Protocol (SNMP)
SNMPv1 1988
SNMPv2 1993
SNMPv3 1998
TTP3121 Chapter 10: IO Multiplexing
I/O Multiplexing
Thin Client
TRS2251 Chapter 9: VLANs
80/20 Rule
20/80 Rule
VLAN Trunking
IEEE 802.1Q
Problem of Independent Encryption
TAC3121 Chapter 6: Message Authentication and Hash Functions
Cryptographic Primitives
Message Authentication Code (MAC)
Data Authentication Algorithm (DAA)
Astro
Cyclic Code Encoder
Cyclic Code Decoder
lit
17
Device’s Address
One can find a device by using either
202206151451
# or
202206151453
#.
#networking