The Webmaster
The Webmaster

Sunday • October 23rd 2022 • 12:41:00 pm

The Webmaster

Sunday • October 23rd 2022 • 12:41:00 pm

IP addresses. Explained.

Subnetting

The IP Address and its Subnet Mask speak binary ones and zeros. The decimal notation, is just to help you type it in faster. The subnet mask, just says all my ones identify the network, and all my zeroes tell you tell you the computer id.

So when you apply a subnet mask to an IP address, it will decode it into network and computer ids.

You can have multiple networks at home, and your router can easily tell what network deliver data to by applying a subnet mask to an IP address.

So an IP address holds two things, network id, and computer id.

IP address network and host portion

Subnet Mask - Explained

What is a Subnet Mask?

Public vs Private IP Address

Basics of Subnetting

Introduction to Networking

Introduction to Networking | Network Fundamentals Part 1

Cabling Devices | Network Fundamentals Part 2

How the OSI Model Works | Network Fundamentals Part 3

How IP Addresses Work | Network Fundamentals Part 4

IP Addressing in Depth | Network Fundamentals Part 5

Introduction to Networking Complete Playlist

Proxies

What is reverse proxy and how it works

Proxy vs Reverse Proxy Server Explained

A Proxy is something you can setup or purchase for your own needs, such as caching to make internet faster, or removing ads to make it safer.

A Reverse proxy is not for you, it is for companies to keep their networks of computers simple. Often the main .com server is a reverse proxy. The company may have 10 servers, sometimes to do different things, sometimes to do the same things efficiently where no computer gets overloaded. When you visit the main .com reverse proxy, it will just get the data you need from one of those servers. It will proxy the data for you.

Load balancing in Layer 4 vs Layer 7 with HAPROXY Examples

Open Source Security: Reverse Proxies

Open System Interconnection Model (OSI Model)

The OSI Model - Explained by Example

OSI Model Explained | OSI Animation

OSI Model Deep Dive

System Architecture And System Design

Microservices Explained and their Pros & Cons

REST API Pros and Cons (Explained by Example)

Publish-Subscribe Architecture (Explained by Example)

Publisher Subscriber Pattern | Pub Sub | System Design

CQRS is probably the cause of the Microservices madness

I ask this question to every Backend Engineer I interview

Database Technology

CouchDB Explained

How to Use PouchDB Database in 35 Minutes

Redis Crash Course - the What, Why and How to use Redis as your primary database

MongoDB in 100 Seconds

PostgreSQL (Postgres) - Installation & Overview

Comparing PostgreSQL with CockroachDB

Indexing in PostgreSQL vs MySQL

Remote Access

Telnet vs SSH Explained

Learn SSH In 6 Minutes - Beginners Guide to SSH Tutorial

SSH Crash Course | With Some DevOps

FTP (File Transfer Protocol), SFTP, TFTP Explained.

Workflow

Why I use Vim in 2022

Switching to i3 - Day One

Complete tmux Tutorial

My Developer Workflow - How I use i3, tmux, and vim

Certification

TOP LIST OF THE MOST USELESS IT CERTS!

make CRAZY money in tech (top 5 Entry-Level Certs)

What Are the Best Cyber Security Certifications For 2021?

4 Most Difficult IT Security Certifications

How to Pass Any SANS / GIAC Certification on Your First Try

Red Hat certifications explained: RHCSA, RHCE and RHCA, and how to use my videos to get there

Study/Exam tips GIAC SANS GSEC

Every Type of Programmer

The Mysterious Life of Developers

The Mysterious Life Of UX Designers

Links
Artwork Credit