by Grant Collins | May 18, 2020 | Projects
Socket Programming Overview Socket programming is a way of connecting two devices on a network while being able to communicate with each other. One device or node listens to a particular port at an IP, while the other socket reaches out. Socket programming is mostly...
by Grant Collins | May 18, 2020 | Projects
Write an HTTP Proxy Overview An HTTP proxy is a content filter to examine web traffic and identify suspicious content. Using the programming language of your choice, write your own HTTP proxy to identify potentially malicious content being transmitted across the web....
by Grant Collins | May 18, 2020 | Projects
A Cryptographic Message Overview Cryptography is the practice, study, and implementation of techniques used to securely communicate in the presence of an authorized or unknown third party presence. Encryption and decryption is used when communicating across a network,...
by Grant Collins | May 18, 2020 | Projects
MAC Flooding Program Overview MAC flooding is a technique used on network switches to force legitimate MAC table entries out of the switch and potentially send sensitive information to portions of the network. Use your favorite programming language to write a program...
by Grant Collins | May 18, 2020 | Projects
SQL Vulnerability Assessment Overview Structured Query Language (SQL) is a programming language designed to manage data in a relational database. SQL injections are code injecting techniques used to place malicious statements into an entry field for execution –...
by Grant Collins | May 18, 2020 | Projects
Write a Program to Break a Caesar Cipher Overview The Caesar cipher is a substitution cipher and is one of the simplest encryption techniques – making it easy to break. Use your favorite programming language to generate a Caesar cipher. After generating the...