this doesn’t completely pertain to hacking but it’s close enough. I’m currently working on the NSA Codebreakers tasks (just for fun) even though i have a very vague knowledge of reverse engineering and other code analysis related things.
I was wondering if someone could explain how a subnet effects a proxy and I can use that subnet to filter proxy logs. i’ve been trying to understand how ip addresses work and what exactly happens when a computer sends out a packet but i cant seem to grasp the concept.
any help is appreciated, thanks!
[link] [comments]
from hacking: security in practice https://ift.tt/3jltFn7
Comments
Post a Comment