Huawei Certification | HCIA-Datacom Exam Outline

HCIE Certification Research Institute | Huawei Certification Exam Tracking Today, I want to share some basics. Many people have gained some understanding of Huawei certification exams and want to further understand the specific exam content. This article will first discuss the specific exam outline for HCIA-Datacom~ 01 Huawei HCIA-Datacom Certification Exam 02 Huawei HCIA-Datacom Exam … Read more

Understanding TCP Network: Three-Way Handshake, Four-Way Teardown, TIME-WAIT, HTTP 2.0

Today, I will share with you some common knowledge points about TCP network, which you will often encounter in daily work or interviews. Considering the length of the content, I suggest you bookmark it and digest it slowly. If it helps, please share it with your friends; “It’s better to enjoy together than to enjoy … Read more

Nine Commonly Used Network Commands

1. Ping Command Ping is a frequently used utility primarily used to determine network connectivity. This is useful for determining whether the network is correctly connected and the status of the network connection. In simple terms, ping is a testing program; if the ping runs correctly, it generally rules out faults in the network access … Read more

Network Security: Nine Common Network Commands

1. Ping Command The ping command is a frequently used utility primarily used to determine network connectivity. It is useful for determining whether the network is properly connected and the status of the network connection. Simply put, ping is a testing program. If ping runs successfully, it generally rules out faults in the network access … Read more

TP-Link Wireless Router Setup Guide

Introducing the setup of the TP-Link wireless router. The demonstration is based on a brand new router. If you are unsure whether the router has been configured previously, it is recommended to reset the TP-Link wireless router. The correct method to reset the TP-Link wireless router: While the router is powered on, press and hold … Read more

Understanding Modbus RTU, ASCII, and TCP Protocols

01 Terminology Interpretation 1 word = 2 bytes; 1 byte = 8 bits. Checksum: A checksum is derived from the preceding data through a certain algorithm to verify the correctness of the data set. When inputting codes as data into a computer or other devices, input errors can easily occur. To reduce such input errors, … Read more

IPv4: Overcoming IPv5, What About IPv6?

Source: ZTE Documentation Original Author: ZTE Documentation Have you heard of IPv5? It was once a highly anticipated technology! IPv5, also known as the Internet Stream Protocol (ST), was designed for connection-oriented communication across IP networks, aiming to support voice and video. However, its 32-bit address scheme is the same as that used by IPv4, … Read more

Analysis of Windows TCP/IP Remote Code Execution Vulnerability (CVE-2020-16898)

CVE Number CVE-2020-16898 Vendor Microsoft/Windows Vulnerability Description Windows 10 version 1709 and above are affected by this vulnerability The vulnerability is caused by improper structure settings during the processing of the ICMPv6 protocol, leading to a stack overflow Vulnerability Impact Attackers can exploit this vulnerability to gain the highest system privileges R3(System) and kernel privileges … Read more