Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/19/d149177878/htdocs/ccna/wp-content/plugins/maxblogpress-ping-optimizer/maxblogpress-ping-optimizer.php on line 518

Archive for the ‘Ressources’ Category

Play The Binary Game to learn and practice the binary number system

The Binary Game is the best way to learn and practice the binary number system. It is great for classes, students and teachers in
science, math, digital electronics, computers, programming, logic and networking. It is also a LOT of fun to play for anyone who likes to
play fast-paced arcade games.


Tags: ,

Understand and learn XSS with this XSS game

Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your apps and you must learn to dispatch them, pronto! At Google, we know very well how important these bugs are. In fact, Google is so serious about finding and fixing XSS issues that we are paying mercenaries up to $7,500 for dangerous XSS bugs discovered in our most sensitive products. In this training program, you will learn to find and exploit XSS bugs. You’ll use this knowledge to confuse and infuriate your adversaries by preventing such bugs from happening in your applications. There will be cake at the end of the test.


Tags: ,

FREE ISO27k Toolkit from iso27001security.com

FREE ISO27k Toolkit  :


ISMS overview, introductory materials and Toolkit contents

ISMS governance, management & implementation guidance

Model information security policies


ISMS procedures, guidelines and other supporting documents

ISMS-related job descriptions/roles and responsibilities

Tags: ,

Ten Windows Password Myths by Symantec



Myth #1: My Password Hashes Are Safe When Using NTLMv2

Myth #2. Dj#wP3M$c is a Great Password

Myth #3. 14 Characters is the Optimal Password Length

Myth #4. J0hn99 is a Good Password

Myth #5. Eventually Any Password Can Be Cracked

Myth #6. Passwords Should be Changed Every 30 Days

Myth #7. You Should Never Write Down Your Password

Myth #8: Passwords Cannot Include Spaces

Myth #9: Always Use Passfilt.dll

Myth #10: Use ALT+255 for the Strongest Possible Password




The Cisco Mind Share Game is the most comprehensive Learning Game from Cisco yet! This fun and challenging game covers more than half the content of the CCENT / CCNA exam. It was designed to reinforce a variety of standard networking skills and help you practice these new skills in preparation for CCENT and CCNA Cisco certification exams.

mind-share-esa-wireless-topology mind-share-round-difficulty


The Mind Share Game FULL version covers 15 topics including:  

  • Binary number
  • IOS fundamentals
  • IP Addressing
  • Ip routing
  • NAT and PAT
  • The osi model
  • Subnetting
  • Swith operation and behavior
  • Wireless

Achieving a high score in the game requires a keen understanding of the technology, quick recall and recognition, and shrewd gaming strategy. The Cisco Mind Share Game is a great way to improve your speed and accuracy on Cisco certification exams and have fun at the same time! Be one of the first to own this entertaining learning tool from Cisco…you’ll see immediately why thousands of networking professionals use learning games as the killer app in their exam preparation arsenal.






Download and play the Demo Version for a preview of the Mind Share Game.
The Demo version features 5 of the FULL version’s 15 exciting sections, each playable at 3 levels of difficulty. It will leave you wanting more and now more is available in the FULL version.



Tags: , ,

Change your IP address for testing purpose : free VPN service

Sometimes you need to change your IP address to see what others see of your network.

You can use the Loki Network utility to change your IP address and do some testing :

"Loki Network Project is free VPN service and SSL based free VPN server. It is an opportunity to protect your private data (IP address, e-mail/FTP/HTTP passwords, web-sites visited, uploaded/downloaded files and etc…) and bypass certain Internet access limitations you may have at your location.

An example, free Public Loki VPN Service allows you:

– Protect your data from being intercepted by various network sniffers in your LAN segment
– Safely bypass traffic interception and analyses on corporate, ISP or even country level firewall

Bypass any limitations in visiting web-sites or any other Internet services (if access to Loki VPN Servers is not blocked directly).
Loki Network Project can suggest two scenarios to protect your private data:

To use our Public VPN Service that includes set of Loki VPN Servers located in different countries. Guest access to our public service is free to use.

To create your custom service based on your own copy of VPN Server installed on your dedicated or home server. Community version of Loki VPN Server Desktop Edition is free for download and use.

According to all scenarios you have to download and install our free VPN Client software used to help you to create your own security schema.

Download it here : Version  Size 4 MB


Other useful link : http://www.freeproxy.ru/en/free_proxy/cgi-proxy.htm

SDLC : Systems Development Life Cycle Poster

Systems Development Life Cycle (SDLC), or Software Development Life Cycle, in systems engineering and software engineering relates to models or methodologies, that people use to develop systems, generally computer systems.


OSI and the Cisco Three-Layer Hierarchical Model Poster

Free OSI and the Cisco Three-Layer Hierarchical Model poster from TextBuddy

OSI Model

 Click for full sized image !

Excel workbook to create IPSec template for Cisco IOS

Use this sheet from TechRepublic to get a commented configuration IPsec template for your IOS devices.

Sample output from this tool:

ipsec template result sample for Cisco IOS devices
ipsec template result sample for Cisco IOS devices


You can download this tool here : ipsec_worksheet

SAN Security ressources from SanSecurity.com

A simple site with a FAQ and a lot of links concerning System Area Network Security :

Ressources :

Here is the FAQ :

Read the rest of this entry »

Recent Posts


Partner Site