Kerry CorderoKISS IT Design Principle - Human Error Prevention
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact
  • See all results
Home
Wireless
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Wireless

CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Organizational Structures for IT – Network Leads & Network Architects

I’ve carried the Architect title over the years of being in IT. Below is my opinion on the difference between...
Read More
Data CenterLaptops & DesktopsRouting & SwitchingSecurityWireless

Wireshark Filters

URL http.host == “api.cordero.me” DNS dns.qry.name == “www.cordero.me” dns.qry.name matches “.cordero.me” dns.qry.name contains “cordero.me” TCP Flags tcp.flags.reset == 1 tcp.flags.push...
Read More
Wireless

Wireless Security Preference Summary (Highest to Lowest)

Preference Summary (Highest to Lowest): WPA2 + AES WPA + AES WPA + TKIP+AES WPA + TKIP Disabled (no security)...
Read More
Data CenterRouting & SwitchingSecurityServersVOIPWireless

Cisco – Authenticity Assured: Safeguarding Your Network Against Non-Genuine Products

In an era where technology forms the backbone of businesses across the globe, the quality and reliability of network infrastructure...
Read More
Laptops & DesktopsRouting & SwitchingServersWireless

Real World Gigabit Ethernet and Wireless Transfer Speeds

The nominal speed of a network connection, such as Gigabit Ethernet (1G) or 10-Gigabit Ethernet (10G), refers to the maximum...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityVOIPWireless

Always be on the Lookout for Product Updates/Changes

What I mean by this, is keep an eye out for emails, alerts within the product, etc… for updates....
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Certificate Chains

HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

Common Ports

CloudData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

BCP – Business Continuity Planning

Business Continuity Planning (BCP) for IT Networking is a crucial aspect of ensuring the availability and resilience of network infrastructure...
Read More
CloudCodeData CenterLaptops & DesktopsLoad BalancingRouting & SwitchingSecurityServersVOIPWireless

What is Ansible and What Are the Format Options Like YAML

Ansible is an open-source software automation platform written primarily in Python. Known for its simplicity and agentless architecture, It has...
Read More
Load More

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
© 2025 cordero.me • All Rights Reserved
  • Home
  • About
  • Disclaimer
  • Guides and Slides
    • AWS Well-Architected Framework
    • Facebook – Running BGP in the Data Center at Scale
    • Microsoft – Experiences with BGP in Large Scale Data Centers
    • Palo Alto PCNSE Study Guide
  • IP Calculator
  • Links
  • Contact

Categories

  • Business Management
  • Cloud
  • Code
  • Data Center
  • Laptops & Desktops
  • Load Balancing
  • Routing & Switching
  • Security
  • Servers
  • Uncategorized
  • VOIP
  • Wireless

Tags

Active Directory (AD) API AWS Azure Best Practices BGP Certificates Cisco Cisco ACI Cisco ASA Cisco ASR Cisco Catalyst Cisco CLI Cisco ISE Cisco Nexus Cisco Stack DDOS Design DNS EIGRP F5 F5-LTM HTTP(S) IP Addressing and Subnetting macOS Microsoft IIS Microsoft SQL Microsoft Windows OSPF Packet Capture Palo Alto Palo Alto CLI PDF Planning Ports PowerShell python QOS Splunk SSL Structured Cabling TLS Troubleshooting Upgrade VMWare
Start typing to see results or hit ESC to close
Troubleshooting Palo Alto Microsoft Windows F5 Cisco
See all results