Fabio Semperboni

Authentication Bypass in Cisco Unity

A vulnerability exists in Cisco Unity that could allow an unauthenticated user to view or modify some of the configuration parameters of the Cisco...

Cisco basic configuration

There are some "standards" steps used for basic configuration on your Cisco router/switch: Define the hostname Assign the privileged level Secure console port Secure VTY lines Encrypt the passwords Define...

Cisco Compatible Extensions

How do you know if a client device is interoperable with a Cisco wireless LAN (WLAN) infrastructure - supporting the latest WLAN standards and...

How many CCIEs are in the world?

CCIE (Cisco Certified Internetwork Expert) is the highest level of professional certification offered by Cisco. Less than three percent of all Cisco certified professionals...

How to analyze traffic with SPAN feature

Usually when we admin a network, we need to know what are the protocols used more frequently, and why not, discover if someone are...

Routed versus routing protocols

Two categories of protocol exist at the network layer: routed and routing. A routed protocol is a Network Layer protocol that is used to move...

Sep.24, 2008?! 12 new Cisco vulnerability advisories!

On September 24, 2008, at about 16:00 GMT, the The Cisco Product Security Incident Response Team (PSIRT) has published 12 new vulnerability advisories. Mainly...

The configuration register

The configuration register can be used to change router behavior in several ways, such as: how the router boots (into ROMmon, NetBoot) options while booting (ignore...

Cisco to acquire Jabber

Cisco has agreed to purchase open-source instant messaging firm Jabber. The company plans to use the Jabber messaging software within its WebEx Connect and...

Cisco On-Stage TelePresence Experience

Have you ever seen a sci-fi movie where object and people were represented through holography? Now, this technology is no more sci-fi! The system uses...